|
alex(1) -- extract addresses from message headers (only available within the message handling system, mh)
|
The address line extraction utility alex extracts electronic mail addresses from message headers and prints the addresses on your screen or places them, with a specified alias name, in an alias file. ... |
ali(1) -- list mail aliases (only available within the message handling system, mh)
|
The ali command searches the specified mail alias files for each of the given aliases. It creates a list of addresses for those aliases, and displays that list on the screen. |
alias(1) -- Defines or displays aliases
|
The alias utility creates or redefines alias definitions or writes the values of existing alias definitions to standard output. An alias definition provides a string value that replaces a command name... |
anno(1) -- annotate messages (only available within the message handling system, mh)
|
The anno command annotates a message by adding one or more header fields to the message. The anno command allows you to choose the name of the header field which you add. It records the date at which ... |
any2ps(1) -- Converts a file to mule internal code and then to PostScript format
|
The any2ps command is an alternative to running the coco and m2ps programs separately. Like the programs that it invokes, any2ps is derived from software supplied by the Free Software Foundation. The ... |
apply(1) -- Applies a command to a set of arguments
|
Normally, arguments are chosen individually; the optional number specifies the number of arguments to be passed to command. If number is 0 (zero), command is run without arguments once for each argume... |
appres(1X) -- list X application resource database
|
The appres program prints the resources seen by an application (or subhierarchy of an application) with the specified class and instance names. It can be used to determine which resources a particular... |
apropos(1) -- Locates reference pages by keyword
|
In looking for keywords, apropos considers each word separately and ignores the case of letters. Words that are part of other words are also considered; thus, when looking for the word compile, apropo... |
ar(1) -- archive library maintainer
|
The (ar) utility creates and maintains groups of files combined into a single archive file. Generally, you use this utility to create and update library files that the link editor uses; however, you c... |
as(1) -- assembler
|
The assembler, as, produces object code files in extended coff format. The as command never runs the link editor (ld(1)). The as command accepts one type of argument. The argument file is assumed to b... |
asa(1) -- Interprets carriage-control characters
|
The asa command writes its input files to standard output, mapping carriage-control characters from the text files to line-printer control sequences. The first character of every input line is removed... |
asort(1) -- Sorts or merges files and supports multiple collating weight sequences
|
The asort command sorts lines in its input files and writes the result to standard output. The asort command is similar to the sort command. See the sort(1) reference page for information about featur... |
at(1) -- Runs commands at a later time
|
Both at and batch mail you the standard output and standard error from the scheduled commands, unless you redirect that output. They also write the job number and the scheduled time to standard error.... |
atobm(1X) -- bitmap editor and converter utilities for the X Window System
|
The bitmap program is a rudimentary tool for creating or editing rectangular images made up of 1's and 0's. Bitmaps are used in X for defining clipping regions, cursor shapes, icon shapes, and tile ... |
atom(1) -- Builds an instrumented version of an application program
|
Atom is a programmable instrumentation toolkit. You program it by writing a tool with a routine called Instrument or InstrumentAll that calls Atom's API, as described in the related reference pages. ... |
atq(1) -- Prints the queue of jobs waiting to be run
|
With no options, the queue is sorted in the order that the jobs are to be executed. When a privileged user invokes the atq command without specifying a username, the entire queue is displayed; if a us... |
atrm(1) -- Removes jobs spooled by at
|
If one or more job numbers is specified, atrm attempts to remove only those jobs. If one or more usernames is specified, all jobs belonging to those users are removed. This form of invoking atrm is us... |
awk(1) -- Pattern scanning and processing language
|
The awk command executes programs written in the awk programming language, a powerful pattern matching utility for textual data manipulation. An awk program is a sequence of patterns and corresponding... |
banner(1) -- Creates a large banner
|
The banner command prints the specified message in large letters on the standard output. Each line in the banner output can be up to 10 uppercase or lowercase characters long. On output, all character... |
basename(1) -- Returns the base file name or directory portion of a path name
|
The basename command reads the string specified on the command line, deletes the portion from the beginning to the last / (slash), and writes the base file name to standard output. If suffix is specif... |
batch(1) -- Runs commands at a later time
|
Both at and batch mail you the standard output and standard error from the scheduled commands, unless you redirect that output. They also write the job number and the scheduled time to standard error.... |
bc(1) -- Provides a processor for arbitrary-precision arithmetic language
|
[Tru64 UNIX] The bc command invokes dc automatically, unless the -c (compile only) option is specified. If the -c option is specified, the output from bc goes to the standard output. The bc command le... |
bdftopcf(1X) -- convert X font from Bitmap Distribution Format to Portable Compiled Format
|
The bdftopcf program is a font compiler for the X server and font server. Fonts in Portable Compiled Format can be read by any architecture, although the file is structured to allow one particular arc... |
bdiff(1) -- Finds differences in large files
|
The bdiff command uses diff to find lines that must be changed in two files to make them identical (see the diff command). Its primary purpose is to permit processing of files that are too large for d... |
bfs(1) -- Scans files
|
The bfs command is similar to the ed command, but has some additional subcommands and the ability to process much larger files. Input files can be up to 32K lines long, with up to 512 characters per l... |
bg(1) -- Runs jobs in the background
|
If job control is enabled (see the description of set -m in the ksh(1) reference page), the bg utility resumes suspended jobs from the current environment by running them as background jobs. If the jo... |
biff(1) -- Notifies users when mail arrives
|
The biff command informs the system whether you want to be notified when mail arrives during the current terminal session. The following command enables notification: biff y The following command disa... |
binmail(1) -- Sends and displays messages
|
The mail command writes to standard output all stored mail addressed to your login name, one message at a time, or sends a mail message to another user or users. Another name for the mail command is b... |
bitmap(1X) -- bitmap editor and converter utilities for the X Window System
|
The bitmap program is a rudimentary tool for creating or editing rectangular images made up of 1's and 0's. Bitmaps are used in X for defining clipping regions, cursor shapes, icon shapes, and tile ... |
bmtoa(1X) -- bitmap editor and converter utilities for the X Window System
|
The bitmap program is a rudimentary tool for creating or editing rectangular images made up of 1's and 0's. Bitmaps are used in X for defining clipping regions, cursor shapes, icon shapes, and tile ... |
burst(1) -- explode digests into messages (only available within the message handling system, mh)
|
The burst command extracts the original messages from a forwarded message, discards the forwarder's header details, and places the original messages at the end of the current folder. By default, burs... |
c89(1) -- Standard C Compiler
|
Compiles source code in conformance with the XPG4-UNIX standard. The c89 command can process one or more of the following types of "file" arguments: Files whose names end with are assumed to be C so... |
cal(1) -- Displays a calendar
|
The cal command writes to standard output a Gregorian calendar for the specified year or month. For historical reasons, the cal command's Gregorian calendar is discontinuous. The display for Septembe... |
calendar(1) -- Writes reminder messages to standard output
|
The calendar command reads a file named calendar in your current (usually home) directory and writes to standard output any line in the file that contains the current date or the next day's date. The... |
cancel(1) -- Sends or cancels a printing request
|
The lp command sends the specified files and associated information (collectively called a request) to a line printer for printing. The cancel command cancels printing requests. The lp command associa... |
captoinfo(1) -- Converts a termcap description into a terminfo description.
|
The captoinfo command searches the specified file for termcap descriptions. For each description found, an equivalent terminfo description is written to standard output (along with any comments found)... |
cat(1) -- Concatenates or displays files
|
[Tru64 UNIX] The cat command is frequently used with > (redirection symbol) to concatenate the specified files and write them to the specified destination. (See CAUTIONS.) The cat command is also used... |
cb(1) -- Converts C source code into a readable form
|
When called without options, the cb command does not split or join lines. Note that punctuation in preprocessor statements can cause indentation errors. |
cc(1) -- C compiler
|
The cc command invokes the C compiler. It accepts any of the following file arguments: Arguments whose names end with are assumed to be C source programs. They are compiled, and each object program is... |
cd(1) -- Changes the current working directory
|
The cd command moves you from your present directory to another directory. You must have execute (search) permission in the specified directory. If you do not specify a directory, cd moves you to your... |
cdc(1) -- Changes the comments in a Source Code Control System (SCCS) delta
|
If you specify a directory name, cdc performs the requested actions on all SCCS files in that directory (that is, all files with names that have the s. prefix). If you specify a - (dash) in place of f... |
cddrec(1) -- Read Directory Record from CD-ROM directory
|
The cddrec command reads the Directory Record associated with a file or directory on a mounted CD-ROM and lists its contents on standard output. The output is formatted in a table that contains the na... |
cdptrec(1) -- Read Path Table Record from the CD-ROM Path Table
|
The cdptrec command reads a Path Table Record associated with a CD-ROM directory and lists its contents on standard output. The output is formatted in a table that contains the name of each field of t... |
cdrecord(1) -- Records audio or data compact discs (CDs) from a master
|
The cdrecord command is used to record data or audio compact discs on an Orange Book CD-Recorder. The device refers to scsibus/target/lun of the CDRecorder. Operating systems use a library simulation ... |
cdsuf(1) -- read the System Use Fields from a System Use Area
|
This command is used to access the System Use Fields of the System Use Area associated with a File Section of a file or directory on a Rock Ridge formatted CD-ROM and to list its contents on standard ... |
cdvd(1) -- Read Primary Volume Descriptor from a CD-ROM
|
The cdvd command reads the Primary Volume Descriptor from a CD-ROM and lists the contents on standard output. The output is formatted in a table that contains the name of each field of the Primary Vol... |
cdxar(1) -- Read the Extended Attribute Record from a CD-ROM
|
The cdxar command accesses the Extended Attribute Record (XAR) associated with the File Section of a file or directory and lists its contents on standard output. The output is formatted in a table tha... |
cedit(1) -- Invokes the UDC Manager utility
|
The cedit command invokes the UDC Manager utility, which manages the attributes of user-defined characters (UDCs). You can run UDC Manager to create or edit a font glyph for the character and to manip... |
cflow(1) -- Generates a C language flow graph of external references
|
The cflow command analyzes a collection of object files or assembler, C-language, lex, or yacc source files, and attempts to write a chart of their external references to standard output. Files suffix... |
cgen(1) -- Generates UDC attributes files that are used by system utilities
|
The cgen command runs the character attributes file generator utility. This utility creates the following attribute data files from the attribute database for userdefined characters (UDCs): Font files... |
chatr(1) -- change program's internal attributes
|
The chatr command changes a program's internal attributes. Upon completion, chatr prints the file's old and new values to standard output. The +ed option of chatr is used to specify that a particula... |
checkeq(1) -- Typesets mathematical equations and expressions
|
The neqn command is an nroff(1) preprocessor for displaying mathematical symbols and equations on terminals. Usage almost always involves preprocessing an nroff source file with neqn and then piping t... |
checknr(1) -- Checks nroff files
|
If no files are specified, checknr checks the standard input. Delimiters checked are as follows: Font changes using \fx ... \fP. Size changes using \sx ... \s0. Macros that come in open/close form... |
chfn(1) -- Changes password file information
|
The passwd command changes the password associated with your username (by default) or the specified username. A password must have at least six characters and can be up to eight characters. If you ent... |
chgrp(1) -- Changes the group ownership of a file or directory
|
To change the group ID of a file, you must have superuser privilege or your effective user ID must match the owner ID of the file. If you do not have superuser privilege you can change the group ID of... |
chmod(1) -- Changes permission codes
|
You can use either symbolic or absolute mode to specify the desired permission settings. You can change the permission code of a file or directory only if you own it or if you have superuser authority... |
chown(1) -- Changes the owner of files or directories
|
[Tru64 UNIX] Only a user with superuser authority can use the chown command. The owner argument must be a valid user name or a valid numerical user ID. The optional group argument must be a valid grou... |
chsh(1) -- Changes password file information
|
The passwd command changes the password associated with your username (by default) or the specified username. A password must have at least six characters and can be up to eight characters. If you ent... |
ci(1) -- check in RCS revisions
|
ci stores new revisions into RCS files. Each pathname matching an RCS suffix is taken to be an RCS file. All others are assumed to be working files containing new revisions. ci deposits the contents o... |
ckfsec(1) -- Check file and directory security
|
The ckfsec tool searches a directory tree for worldwritable directories and, in each of these, searches for and reports on the following potential vulnerabilities: A symbolic link whose target has an ... |
cksum(1) -- Displays the checksum and byte count of a file
|
The cksum command reads the files specified by the file argument and calculates a 32-bit checksum Cyclic Redundancy Check (CRC) and the byte count for each file. If no files are specified, standard in... |
clear(1) -- Clears terminal screen
|
The clear command clears your screen, if possible. It looks in the environment for the terminal type and then in the terminfo database to determine how to perform this operation. |
cmp(1) -- Compares two files
|
The cmp command compares two files. If file1 or file2 is - (dash), standard input is used for that file. It is an error to specify - for both files. By default, the cmp command prints no information i... |
co(1) -- check out RCS revisions
|
co retrieves a revision from each RCS file and stores it into the corresponding working file. Pathnames matching an RCS suffix denote RCS files; all others denote working files. Names are paired as ex... |
coco(1) -- code converter for any of Mule's code
|
coco runs as a filter for code conversion among any coding-systems which mule can handle. |
col(1) -- Filters text containing linefeeds
|
The col command performs the line overlays implied by reverse linefeeds (ASCII ), and by forward and reverse half-linefeeds (ASCII and ASCII ). It also replaces white-space chara... |
colcrt(1) -- Filters text processor output for screen previewing
|
The colcrt command provides virtual half-linefeed and reverse linefeed sequences for terminals without such capability, and on which overstriking is destructive. The colcrt command changes underline c... |
colrm(1) -- Extracts columns from a file
|
The colrm command removes selected columns from a file. Input is taken from standard input. Output is sent to standard output. If you specify start_column only, columns between start_column and the la... |
comb(1) -- Combines Source Code Control System (SCCS) deltas
|
By piping the output of the comb command to a shell, or redirecting the output to a file and running that file as a shell procedure, you can reduce the size of your SCCS file. You can first see how mu... |
comm(1) -- Compares two sorted files.
|
The comm command reads file1 and file2 and writes three columns to standard output, showing which lines are common to the files and which are unique to each. The leftmost column of standard output inc... |
command(1) -- Treats command arguments as simple commands
|
The command command allows you to run the following commands: User-defined commands whose names correspond to shell built-in commands. System commands whose names correspond to shell built-in commands... |
comp(1) -- compose a message (only available within the message handling system, mh)
|
Use comp to create a new message for mailing. When you run comp, it provides a message template for you to fill in and invokes an editor so that you can complete the message. The comp command normally... |
compress(1) -- Compresses and expands data
|
The compress command reduces the size of the named files using adaptive Lempel-Ziv coding. Whenever possible, each file is replaced by one with the extension while keeping the same ownership modes, ac... |
cord(1) -- Rearrange procedures in an executable file to facilitate better cache mapping
|
The cord command rearranges procedures in an executable object file to maximize efficiency in a machine's cache. By rearranging the procedures properly, you can reduce the instruction cache miss rate... |
coredump(1) -- Creates a core snapshot of a running process
|
The coredump command creates a core snapshot of a running process. To use the coredump command, you: Must have root privileges or own the process specified (pid). Must have procfs enabled. By default,... |
cp(1) -- Copies files
|
If a destination file already exists, its contents are overwritten if permissions allow, but cp does not change its mode, user ID, or group ID. However, if the file is not being copied by the root use... |
cpio(1) -- Copies files to and from archive storage.
|
The cpio command copies files between archive storage and the file system. It is used to save and restore data from traditional format cpio archives. There are three versions of the cpio command: cpio... |
cpp(1) -- the C language preprocessor
|
The cpp C language preprocessor performs initial text substitutions, manipulations, conditional inclusion, and various other activities as described by the C standard. The preferred way to invoke cpp ... |
creacct(1) -- Creates computer and user accounts on the Windows 2000 server (Active Directory), extracts DNS hostn...
|
The creacct command adds computers and users to the Windows 2000 server, extracts DNS host names and service principal names, sets principal passwords, extracts service tickets, creates Kerberos key t... |
crontab(1) -- Submits a schedule of commands to cron
|
The crontab command copies the specified file or standard input if you do not specify a file into the /var/spool/cron/crontabs directory, which holds all users' crontab files. The cron command runs c... |
crypt(1) -- encode/decode
|
The crypt command reads from the standard input and writes on the standard output. You must supply a key which selects a particular transformation. If no password is given, crypt demands a key from th... |
csh(1) -- C shell command interpreter
|
The C shell is an interactive command interpreter and a command programming language that uses a syntax similar to the C programming language. The shell carries out commands either from a file (called... |
csplit(1) -- Splits files by context
|
By default, csplit writes the file segments to files named xx00 ...xxn, where n is the number of arguments listed on the command line (n may not be greater than 99). These new files get the following ... |
ct(1) -- Dials an attached terminal and issues a login process
|
Once ct establishes a connection, a user on the remote terminal can log in and work on the system. A user on the local system issues ct with the appropriate telephone number to call the modem attached... |
ctags(1) -- Makes a tags file for source file objects.
|
The ctags command makes a tags file for ex and vi editors from the specified C, Pascal, FORTRAN, yacc, lex, and LISP source files. A tags file gives the locations of specified objects (in this case fu... |
cu(1) -- Connects directly or indirectly to a remote system
|
The cu command can establish the connection over a hardwired line, or over a telephone line via a modem. Once the connection is established, you can be logged in on both systems at the same time, exec... |
cut(1) -- Displays specified parts from each line of a file
|
The cut command locates the specified fields in each line of the specified file and writes the characters in those fields to standard output. You must specify the -b option (to select bytes), the -c o... |
cxref(1) -- Creates a C program cross-reference listing
|
The cxref command analyzes C program files and creates a cross-reference table, using a version of the cpp macro preprocessor to include #define directives in its symbol table. The cxref command write... |
cyradm(1) -- IMAP administrative client
|
The cyradm utility is a simple Tcl-based administrative client for the IMAP server. If invoked with a script, cyradm reads Tcl commandsfrom the file script and evaluates them. If invoked with host, cy... |
date(1) -- Displays or sets the date
|
The date command displays the date and, with superuser authority, sets the system date. The date command has been enhanced to support setting the system date past the year 1999, thus providing custome... |
dbx(1) -- source level debugger
|
The dbx command invokes a source-level debugger. You can use dbx to debug programs written in C, Fortran, Pascal, assembly language, and machine code. Languages other than these are not supported by d... |
dc(1) -- Provides an interactive desk calculator for arbitrary precision integer arithmetic
|
The dc command is an arbitrary precision arithmetic calculator. The dc command takes its input from file or standard input until it reads an End-of-File character. It writes to standard output. The dc... |
dd(1) -- Converts and copies a file
|
The dd command reads the specified input file or standard input, does the specified conversions, and copies it to the specified output file or standard output. The input and output block size may be s... |
delta(1) -- Saves editing changes in a Source Code Control System (SCCS) file
|
The delta command reads the g-files that correspond to the specified files (see the get(1) reference page) and creates a new delta. The delta command introduces into the named SCCS file any changes th... |
deroff(1) -- Deletes neqn, nroff, and tbl constructs
|
The deroff command normally follows chains of included files (.so and requests) and processes those files. If a file was already included, a naming it is ignored and a deroff(1) |
df(1) -- Displays statistics on free disk space
|
[Tru64 UNIX] To obtain XCU5.0 compliance, set the environment variable CMD_ENV to xpg4. If the environment variable is not set or it is set to another value, the environment defaults to BSD SVR4. If n... |
diction(1) -- Prints wordy sentences and looks them up in an interactive thesaurus.
|
Each phrase found by the diction command is enclosed in [ ] (brackets). Because diction runs deroff before looking at the text, include formatting header files as part of the input. Before using the e... |
diff(1) -- Compares text files
|
Input Options If neither file1 nor file2 is a directory, then either can be given as - (dash), in which case the standard input is used. If file1 is a directory and file2 is a file, or vice versa, a f... |
diff3(1) -- Compares three files
|
The diff3 command reads three versions of a file and writes to standard output the ranges of text that differ, flagged with the following codes: All three files differ. file1 differs. file2 differs. f... |
diffmk(1) -- Marks differences between files
|
The file1 and file2 variables are the old and new versions of the file, respectively. The diffmk command compares them and writes a new version to standard output, which can be redirected to a file. T... |
dircmp(1) -- Compares two directories
|
First, dircmp compares the file names in each directory. When the same file name appears in both, dircmp compares the contents of the two files. In the output, dircmp lists the files unique to each di... |
dirname(1) -- Returns the base file name or directory portion of a path name
|
The basename command reads the string specified on the command line, deletes the portion from the beginning to the last / (slash), and writes the base file name to standard output. If suffix is specif... |
dis(1) -- Disassemble an object file
|
The dis command disassembles object files into machine instructions. Please note that assembler code and machine code can differ on this machine. A file can be an object or an archive. |
dist(1) -- redistribute a message to additional addresses (only available within the message handling system, m...
|
Use dist to redistribute a message to addresses that are not on the original address list. You can specify the message which you want to redistribute by giving a message number as the msg argument. If... |
dnskeygen(1) -- Generates public, private, and shared secret keys for DNS Security
|
Use the dnskeygen utility to generate and maintain keys for DNS Security. The utility can generate public and private keys to authenticate zone data and shared secret keys to use for Request/Transacti... |
domainname(1) -- display or set the name of the current NIS domain for this system
|
The domainname command, when used without an argument, displays the name of the current domain. When used with argument, sets the current Network Information Service (NIS) domain name to the specified... |
dos2unix(1) -- mtools utility to convert a DOS file to UNIX
|
The dos2unix command converts a file from DOS format to UNIX format. The converted file replaces the original file. Subdirectory names that contain the '/' or '\' separator are supported. If you ... |
dspcat(1) -- Displays all or part of a message catalog
|
The dspcat command, part of the Tru64 UNIX Message Facility, displays a particular message, all of the messages in a set, or all of the messages in a catalog. If you include all three command operands... |
dspmsg(1) -- Displays a selected message from a message catalog
|
The dspmsg utility displays a particular message from a message catalog. The display includes a message identifier, depending on the presence of the -e or -E option and settings for the CAT_MIDSET_cat... |
du(1) -- Displays a summary of disk usage
|
The du command gives the number of blocks in all directories (listed recursively) within each specified directory. [Tru64 UNIX] When the -a option is specified, du reports the number of blocks in indi... |
dxchpwd(1X) -- Create or change password program
|
The dxchpwd command lets you change your password. When you invoke the dxchpwd command, the program prompts you for the old password and then for the new password. Next, the program asks you for the n... |
dxconsole(1X) -- monitor system console messages with X
|
The dxconsole and xconsole programs display messages which are usually sent to /dev/console. By default, xconsole presents the Athena interface and dxconsole presents the Motif interface. Since dxcons... |
dxdiff(1X) -- Motif visual differences program
|
The dxdiff application does a line-by-line comparison of two files and displays the differences between them. The contents of the two files are displayed in two text regions on either side of a centra... |
dxhangulim(1X) -- An input server for Korean
|
In a Motif environment such as CDE, Asian language input methods are supported by independent processes called input servers. The Korean input server (dxhangulim) is an X client process that can run o... |
dxhanyuim(1X) -- An input server for Traditional Chinese
|
In a Motif environment such as CDE, Asian language input methods are supported by independent processes called input servers. The Traditional Chinese input server (dxhanyuim) is an X client process th... |
dxhanziim(1X) -- An input server for Simplified Chinese
|
In a Motif environment such as CDE, Asian language input methods are supported by independent processes called input servers. The Simplified Chinese input server (dxhanziim) is an X client process tha... |
dxim(1X) -- A multilingual input server for Simplified Chinese, Traditional Chinese, Korean, and Phrase input me...
|
In a Motif environment such as CDE, Asian language input methods are supported by independent processes called input servers. The multilingual input server (dxim) is an X client process that runs on a... |
dximageview(1X) -- Image Viewer for displaying graphics files
|
The Image Viewer application, dximageview, allows the user to view graphics files. The supported image types are GIF, JPEG, TIFF, and X Pixmap (XPM). |
dxjim(1X) -- An input server for Japanese
|
In a Motif environment such as CDE, Asian language input methods are supported by independent processes called input servers. The Japanese input server (dxjim) is an X client process that can run on a... |
dxkbledpanel(1X) -- Present an on-screen display of keyboard indicators.
|
The dxkbledpanel command is meant to be a replacement for the kb_indicator application. If XKB is active in the server, the dxkbledpanel command presents an on-screen display of keyboard indicators. E... |
dxkeycaps(1X) -- Graphically display and edit the keyboard mapping
|
The dxkeycaps command displays a keyboard with keycaps drawn according to the current server keymap. When you move the mouse over a key, the command describes the key symbols and modifiers that the ke... |
dxmtools(1) -- DOS Tools Graphical User Interface for manipulating files on an MSDOS diskette
|
|
dxpause(1X) -- locks (pauses) an X display
|
The dxpause program must be invoked explicitly by users (typically those running the generic X display manager rather than CDE). The dxpause program places a blank screen over the workstation screen a... |
dxterm(1X) -- DECwindows terminal emulator
|
The dxterm command displays a window that provides VT320 terminal emulation and a standard terminal type for programs not directly aware of the X Window System. The terminal emulator also supports the... |
e(1) -- Edits a file line by line
|
The ed command does not alter the file itself until you use the write subcommand. You can specify on the command line the file you want to edit, or you can use ed subcommands to read a file into the b... |
echo(1) -- Writes its arguments to standard output
|
The echo command writes the specified string to standard output, followed by a newline character. The arguments are separated by spaces. Use the echo command to produce diagnostic messages in command ... |
ed(1) -- Edits a file line by line
|
The ed command does not alter the file itself until you use the write subcommand. You can specify on the command line the file you want to edit, or you can use ed subcommands to read a file into the b... |
edit(1) -- Edits a file line by line with a simplified command set
|
The edit command is part of a family of editors that also includes ed, ex, and vi. It is a simplified version of the ex editor, which itself is built on the ed line editor. To edit the contents of a f... |
editres(1X) -- a dynamic resource editor for X Toolkit applications
|
editres is a tool that allows users and application developers to view the full widget hierarchy of any X Toolkit application that speaks the editres protocol. In addition editres will help the user c... |
egrep(1) -- Searches a file for patterns
|
By default, the grep command treats a pattern as a basic regular expression (BRE). With the -E option, the pattern is treated as an extended regular expression (ERE). With the -F option, the pattern i... |
emacs(1) -- emacs editor
|
The emacs software is unsupported software that is provided as part of Tru64 UNIX. We will fix problems in this unsupported software only if they are specific to Tru64 UNIX. We will not fix problems t... |
env(1) -- Displays or sets the current environment, or displays the values of environment variables
|
The env command lets you get and change your current environment, and then run the specified command with the changed environment. If the -i option is used, the current environment is ignored and the ... |
error(1) -- Analyzes and disperses compiler error messages
|
Using the error program can replace the painful, traditional methods of scribbling abbreviations of errors on paper, and permits error messages and source code to be viewed simultaneously without mach... |
etags(1) -- Generates a tags file for the emacs or mule editor
|
The etags program creates a tag table file in a format understood by the emacs editor. The program understands the syntax of C, C++, Fortran, Pascal, and Lisp source files. It reads the source files s... |
eucset(1) -- Sets and gets EUC code widths for the terminal
|
The eucset command sets or gets the encoding and display widths of the Extended UNIX Code (EUC) characters processed by the current input terminal. EUC is an encoding method for code sets composed of ... |
evmget(1) -- Retrieves stored events
|
The evmget command retrieves stored events and outputs them to stdout as EVM events. Events are obtained from a configured set of log files and event channels, using channel-specific retrieval functio... |
evminfo(1) -- Provides information about EVM
|
The evminfo command writes selected information about the EVM environment to its standard out stream. The options determine the information to be displayed. |
evmpost(1) -- Posts events to the EVM daemon
|
The evmpost command takes a file or stream of text event sources as input and converts them to binary EVM events. By default, the command then posts them to the EVM daemon for distribution. If the -r ... |
evmshow(1) -- Displays an EVM event
|
The evmshow command is EVM's event formatter; it reads raw EVM events either produced by other EVM commands or stored in a file and converts them to display format for viewing. Events are read from s... |
evmsort(1) -- Sorts events
|
The evmsort command reads and sorts a stream of EVM events. By default, events are read from stdin, and are sorted into ascending timestamp order. Sorted events are written to the command's stdout st... |
evmwatch(1) -- Monitors EVM events
|
The evmwatch command subscribes to the events specified by the filter_expr and passes all events to its stdout stream as they arrive. Output is in the form of raw EVM events. If the -A option is speci... |
ex(1) -- Edits lines in a file interactively, with screen display.
|
The ex command is a line-oriented text editor that is a subset of the vi screen editor. [Tru64 UNIX] The ex editor is similar to ed, but is more powerful, providing multiline displays and access to a ... |
expand(1) -- Replaces tab characters with spaces or spaces with tab characters
|
The expand command changes tab characters to spaces in the named files, or the standard input, and writes the result to the standard output. The unexpand command puts tab characters into the data from... |
explain(1) -- Prints wordy sentences and looks them up in an interactive thesaurus.
|
Each phrase found by the diction command is enclosed in [ ] (brackets). Because diction runs deroff before looking at the text, include formatting header files as part of the input. Before using the e... |
expr(1) -- Evaluates arguments as expressions
|
The expr command reads an expression, evaluates it, and writes the result to standard output. Within the expression argument, you must separate each term with spaces, precede characters special to the... |
extract(1) -- interactive string extract and replace
|
The extract command interactively extracts text strings from source programs. The extract command replaces the strings it extracts with calls to the catgets function. The command also writes the strin... |
f(1) -- Displays user information
|
By default, information for each user on the host is listed. This information includes the login name, terminal name and write status (an * (asterisk)) before the terminal name appears (if write permi... |
false(1) -- Returns a standard exit value
|
The true command returns a 0 (zero) exit value. The false command returns a nonzero exit value. These commands are usually used in input to shell commands. |
fc(1) -- Processes the command history list
|
The fc utility lists or edits and reexecutes commands previously entered to an interactive shell. The command history list references commands by number. The first number in the list is selected arbit... |
feedback(1) -- Generate an optimization feedback file using pixie and prof
|
The feedback command invokes pixie to add profiling code to an object file. The object file generated by pixie is executed to obtain profiling information. The feedback command then invokes prof to an... |
fg(1) -- Runs jobs in the foreground
|
If job control is enabled (see the description of set -m in the ksh(1) reference page), the fg utility moves a background job from the current environment into the foreground. Using fg to place a job ... |
fgrep(1) -- Searches a file for patterns
|
By default, the grep command treats a pattern as a basic regular expression (BRE). With the -E option, the pattern is treated as an extended regular expression (ERE). With the -F option, the pattern i... |
file(1) -- Determines file type
|
The file command reads input files and performs a series of tests on each one. It then attempts to classify them by type and writes the file types to standard output. The file command uses the /etc/ma... |
find(1) -- Finds files matching an expression
|
The find command recursively searches the directory tree for each specified path name, seeking files that match the Boolean expression. The output from the find command varies depending on the terms u... |
finger(1) -- Displays user information
|
By default, information for each user on the host is listed. This information includes the login name, terminal name and write status (an * (asterisk)) before the terminal name appears (if write permi... |
fixso(1) -- Fixes a shared object so that it can be quickstarted
|
The fixso utility allows executables that depend on a shared library registered in the so_locations database to continue to run quickstarted even if the shared library changed after the time the execu... |
flex(1) -- Generates a C Language lexical analyzer
|
The flex command is a tool for generating scanners: programs which recognize lexical patterns in text. The flex command reads the given input files, or its standard input if no filenames are given or ... |
fmt(1) -- Formats mail messages prior to sending
|
The fmt command reads the input file or files, or standard input if no files are specified, and writes to standard output a version of the input with lines of a length as close as possible to width co... |
fold(1) -- Breaks or wraps lines in a file
|
The fold command is a filter that wraps lines from the specified input files or standard input to a maximum of width (or bytes, if the -b option is specified). The fold command wraps lines by insertin... |
folder(1) -- set folder or display current folder name (only available within the message handling system, mh)
|
The folder command lets you set the current folder, or display information about it. It can also be used to manage the folder stack. If you use the folder command without a +folder argument, informati... |
folders(1) -- list folders and contents (only available within the message handling system, mh)
|
The folders command displays the names of your folders and the number of messages that they each contain. The folders command displays a list of all the folders in your Mail directory. The folders are... |
fontconverter(1X) -- Converts user-defined characters (UDCs) into PCF format
|
The fontconverter command creates PCF format font files for user-defined characters (UDCs) that are created by the font editor of the cedit utility. The PCF format font files allow UDCs to be displaye... |
fonts.alias(1X) -- create an index of X font files in a directory
|
For each directory argument, mkfontdir reads all of the font files in the directory searching for properties named "FONT", or (failing that) the name of the file stripped of its suffix. These are co... |
fonts.dir(1X) -- create an index of X font files in a directory
|
For each directory argument, mkfontdir reads all of the font files in the directory searching for properties named "FONT", or (failing that) the name of the file stripped of its suffix. These are co... |
fonts.scale(1X) -- create an index of X font files in a directory
|
For each directory argument, mkfontdir reads all of the font files in the directory searching for properties named "FONT", or (failing that) the name of the file stripped of its suffix. These are co... |
forw(1) -- Forwards messages (only available within the message handling system, mh)
|
The forw command sends one or more messages on to recipients who were not the original addressees. The command encapsulates all messages to be forwarded and adds a message header. Forwarded messages a... |
from(1) -- Shows whom mail messages are from
|
If user is specified, then user's mailbox is examined instead of your own. |
fs(1X) -- X font server
|
xfs is the X Window System font server. It supplies fonts to X Window System display servers. |
fsinfo(1X) -- X font server information utility
|
The fsinfo program is a utility for displaying information about an X font server. It is used to examine the capabilities of a server, the predefined values for various parameters used in communicatin... |
fslsfonts(1X) -- list fonts served by X font server
|
The fslsfonts program lists the fonts that match the given pattern. The wildcard character "*" may be used to match any sequence of characters (including none), and "?" to match any single charact... |
fstobdf(1X) -- generate BDF font from X font server
|
The fstobdf program reads a font from a font server and prints a BDF file on the standard output that may be used to recreate the font. This is useful in testing servers, debugging font metrics, and r... |
ftoc(1) -- interface between prof and cord
|
The ftoc interface reads one or more feedback files produced by the -feedback option of the profiler prof(1) and writes onto stdout a reorder-file for use with the cacherearranging program cord(1). It... |
ftp(1) -- Transfers files between a local and a remote host
|
The ftp command is the interface to the File Transfer Protocol (FTP). The FTP protocol allows transferring data between hosts that use dissimilar file systems. Although the protocol provides a lot of ... |
gencat(1) -- Creates and modifies a message catalog
|
The gencat command creates or modifies a message catalog from a message text source file. A message text source file is a text file that you create to hold messages printed by your program. You can us... |
gendisk(1) -- Produces magnetic disk distribution media
|
Use the gendisk utility to produce disk distribution media. The gendisk utility performs the following tasks: Searches the kit descriptor database for the prodID specified on the command line. The def... |
gentapes(1) -- Produces magnetic tape distribution media
|
Use the gentapes utility to produce MT9 or TK50 magnetic tape distribution media. The gentapes utility performs the following tasks: Determines the media code (TK or MT) for the specified tape device.... |
genxlt(1) -- Generates a codeset conversion table
|
The iconv subsystem can use either an algorithmic or a table converter to convert data from one codeset to another. The genxlt command creates a table converter to be used by the iconv subsystem. The ... |
get(1) -- Creates a specified version of a Source Code Control System (SCCS) file
|
The get command reads the specified versions of the named SCCS files, and creates a text file (the g-file), for each file according to the specified options. The command then writes each text file to ... |
getacl(1) -- Displays the specified access control list (ACL) on a file of directory
|
Note This command is based on Draft 13 of the POSIX P1003.6 standard. The getacl command displays the selected type of ACL for each file or directory named on the command line. The following three typ... |
getconf(1) -- Displays system configuration variable values
|
In the system_var synopsis form, the getconf utility writes, to the standard output, the value of the variable specified in the system_var operand. In the path_var synopsis form, the getconf utility w... |
getopt(1) -- Parses command line flags and arguments
|
The getopt command is used to parse a list of tokens using a format that specifies expected flags and arguments. A flag is a single ASCII letter and, when followed by a : (colon), is expected to take ... |
getopts(1) -- Parses utility options
|
The getopts utility is used to retrieve flags and flagarguments from a list of parameters. Each time it is invoked, the getopts utility places the value of the next flag in the shell variable specifie... |
gprof(1) -- Displays call-graph profile data
|
The gprof command produces an execution profile of programs. The effect of called routines is incorporated into the profile of each caller. Profile data of three kinds is accepted by gprof: PC-samplin... |
grep(1) -- Searches a file for patterns
|
By default, the grep command treats a pattern as a basic regular expression (BRE). With the -E option, the pattern is treated as an extended regular expression (ERE). With the -F option, the pattern i... |
groups(1) -- Displays your group membership
|
The groups command writes to standard output the groups to which you or the specified user belong. The Tru64 UNIX operating system allows a user to belong to many different groups at the same time. Yo... |
gunzip(1) -- Compresses or expands files.
|
The gzip command reduces the size of specified files using the Lempel-Ziv coding (LZ77). Whenever possible, each file is replaced by one with the extension modes, access and modification times. If fil... |
gzcat(1) -- Compresses or expands files.
|
The gzip command reduces the size of specified files using the Lempel-Ziv coding (LZ77). Whenever possible, each file is replaced by one with the extension modes, access and modification times. If fil... |
gzip(1) -- Compresses or expands files.
|
The gzip command reduces the size of specified files using the Lempel-Ziv coding (LZ77). Whenever possible, each file is replaced by one with the extension modes, access and modification times. If fil... |
hash(1) -- Remembers or reports utility locations
|
The hash utility affects the way the current shell environment remembers the locations of utilities found. Depending on the arguments specified, it adds utility locations to its list of remembered loc... |
head(1) -- Displays the beginning of files
|
The head command copies the standard input to standard output, ending output of each file at the specified point. |
help(1) -- Provides information for new users
|
The help command presents a one-page display of information for new users. Information is available for the following topics: Concatenating or displaying files Editing lines interactively Sending and ... |
hiprof(1) -- CPU-time and page-fault call-graph profiler for performance analysis
|
See prof_intro(1) for an introduction to the application performance tuning tools provided with Tru64 UNIX. The hiprof command creates an instrumented version of a program (program.hiprof) that produc... |
hostid(1) -- Sets or displays the identifier of the local host
|
The hostid command displays the 32-bit identifier of the host as a hexadecimal number in host standard byte order. The identifier must be unique across all hosts and is commonly set to the Internet ad... |
hostname(1) -- Sets or displays the name of the current host system
|
The hostname command sets or displays the name of the current host system. If you use the -s option, the short form of the host name is displayed. Only the superuser can set the hostname. |
iceauth(1X) -- ICE authority file utility
|
The iceauth program is used to edit and display the authorization information used in connecting with ICE. This program is usually used to extract authorization records from one machine and merge them... |
ico(1X) -- animate an icosahedron or other polyhedron
|
The ico command displays a wire-frame rotating polyhedron, with hidden lines removed, or a solid-fill polyhedron with hidden faces removed. There are a number of different polyhedra available; adding ... |
iconv(1) -- Converts encoded characters to another codeset
|
The iconv command converts the encoding of characters in file from one coded character set to another and writes the results to standard output. The input and output coded character sets are identifie... |
id(1) -- Displays the user's system identity
|
The id command writes to standard output a message containing the user and group IDs and corresponding names of the invoking process. If effective names and IDs do not match the real ones, the id comm... |
ident(1) -- identify files
|
ident searches for all occurrences of the pattern $keyword:...$ in the named files or, if no file name appears, the standard input. These patterns are normally inserted automatically by the RCS comman... |
iec(1) -- Instruction Emulator Control
|
Some processors in the Alpha processor family do not implement all of the instructions defined in the Alpha architecture. The operating system provides an instruction emulator that permits all program... |
imake(1X) -- C preprocessor interface to the make utility
|
Imake is used to generate Makefiles from a template, a set of cpp macro functions, and a per-directory input file called an Imakefile. This allows machine dependencies (such as compiler options, alter... |
inc(1) -- Incorporates new mail (only available within the message handling system, mh)
|
Use the inc command to incorporate mail from your incoming maildrop into a folder. The new messages being incorporated are numbered sequentially, starting with the next highest available number in the... |
indent(1) -- changes the appearance of a C program by inserting or deleting whitespace
|
This man page is based on the Info file indent.info, produced by Makeinfo-1.47 from the input file indent.texinfo. This is Edition 0.02, 5 May 1992, of The indent Manual (for indent Version 1.3). Copy... |
infocmp(1) -- Compares or prints terminfo descriptions
|
Use the infocmp command to: Compare a binary terminfo entry with other terminfo entries. Rewrite a terminfo description to take advantage of the user (-u option) terminfo field. Print a terminfo descr... |
install(1) -- Installs a command
|
The install command copies (or moves) file into the appropriate directory, retaining the owner and permissions of the existing copy, if any. A newly created file has permission code 755, owner bin, an... |
installbsd(1) -- Installs a command (BSD version)
|
If destination is a file and such a file already exists, installbsd removes it before file is moved or copied. If destination is a directory, file is moved or copied into that directory with its origi... |
intro(1) -- Introduction to commands
|
Section 1 describes the commands available for all Tru64 UNIX users. Some reference pages in this section may contain suffixes to allow their files to exist with those of other reference pages having ... |
invcutter(1) -- Generates a subset inventory file
|
The contents of a software product kit for the setld(8) command are specified by a master inventory file whose format is described in the stl_mi(4) reference page. The invcutter command processes a ma... |
iostat(1) -- Reports I/O statistics
|
The iostat command reports the following information: For terminals (collectively), the number of characters read and written per second. For each disk, the number of transfers per second and bytes tr... |
ipcrm(1) -- Removes message queue, semaphore set, or shared memory identifiers
|
The details of the remove operations are described in the Section 2 reference pages for msgctl(), shmctl(), and semctl(). The identifiers and keys can be found by using the ipcs command. |
ipcs(1) -- Reports Interprocess Communication (IPC) facility status
|
If you do not specify any options, ipcs writes information in a short form about currently active message queues, shared memory segments, semaphores, remote queues, and local queue headers. Column Hea... |
jdic2txt(1) -- Convert Japanese text and dictionary files between the JSY, WX, and VJE input methods
|
Three Japanese input methods are used on a Tru64 UNIX system: the JSY input method (HP), the WX input method (A.I. Soft Company), and the VJE input method (VACS Company). Software for the JSY input me... |
jfile(1) -- Determines file type
|
The file command reads input files and performs a series of tests on each one. It then attempts to classify them by type and writes the file types to standard output. The file command uses the /etc/ma... |
jim_convert(1) -- Convert Japanese text and dictionary files between the JSY, WX, and VJE input methods
|
Three Japanese input methods are used on a Tru64 UNIX system: the JSY input method (HP), the WX input method (A.I. Soft Company), and the VJE input method (VACS Company). Software for the JSY input me... |
jobs(1) -- Displays status of jobs in the current session
|
The jobs utility displays the status of jobs that were started in the current shell environment. When jobs reports the termination status of a job, the shell removes its process ID from the list of th... |
join(1) -- Joins the lines of two files
|
The join field is the field in the input files that join looks at to determine what will be included in the output. One line appears in the output for each identical join field appearing in both file1... |
jsy2vjetxt(1) -- Convert Japanese text and dictionary files between the JSY, WX, and VJE input methods
|
Three Japanese input methods are used on a Tru64 UNIX system: the JSY input method (HP), the WX input method (A.I. Soft Company), and the VJE input method (VACS Company). Software for the JSY input me... |
jsy2wxtxt(1) -- Convert Japanese text and dictionary files between the JSY, WX, and VJE input methods
|
Three Japanese input methods are used on a Tru64 UNIX system: the JSY input method (HP), the WX input method (A.I. Soft Company), and the VJE input method (VACS Company). Software for the JSY input me... |
kb_indicator(1X) -- Controls the compose (kana) LED during an X session
|
The kb_indicator application is part of the support for the Kana-Kanji conversion input method used for Japanese characters. This application is available only if the optional Tru64 UNIX subsets that ... |
kdestroy(1) -- Destroys valid or nonvalid Kerberos tickets and removes the cache file
|
The kdestroy command writes zeros to the credentials cache (which destroys any active Kerberos tickets) and then removes the cache file. |
kill(1) -- Sends a signal to a running process
|
The kill command sends a signal to one or more running processes. The default is the SIGTERM signal (signal number 15), which usually terminates processes that do not ignore or catch the signal. You i... |
kinit(1) -- Obtains and caches initial ticket granting tickets (TGTs) and service tickets
|
The kinit command: Obtains and caches an initial ticket (TGT). Acquires service tickets. Renews tickets that are renewable. Validates postdated tickets. |
kits(1) -- Generates setld format distribution kits
|
The kits command produces subset images, inventories, and control files for an installation using the setld command. You need to know the key file which describes the product to be built, a hierarchy ... |
klist(1) -- Lists the tickets stored in the credentials cache file
|
The klist command lists tickets in the credentials cache file. |
kprofile(1) -- Profile a program (uprofile) or kernel
|
See prof_intro(1) for an introduction to the application performance tuning tools provided with Tru64 UNIX. The uprofile command uses the Alpha on-chip performance counters to produce a finely-grained... |
ksh(1) -- Korn shell
|
The Korn shell carries out commands either interactively from a terminal keyboard or from a file. The Korn shell is backward compatible with the Bourne shell (invoked with the sh command) and contains... |
ktutil(1) -- Manages entries in service key table file
|
The ktutil command manages entries in service key table files. Note that the service key table file is owned by root, so you must log on as root to access it. All options other than the -l option atte... |
ladebug(1) -- Invokes the Ladebug debugger
|
The Ladebug debugger is a symbolic source code debugger that debugs programs compiled by the DEC C, ACC, DEC C++, DEC Ada, DEC COBOL, DEC Fortran 90, and DEC Fortran 77 compilers. For full source-leve... |
lbxproxy(1X) -- Low BandWidth X proxy
|
Applications that would like to take advantage of the Low Bandwidth extension to X (LBX) must make their connections to an lbxproxy. These applications need to know nothing about LBX, they simply conn... |
ld(1) -- link editor
|
The ld command invokes the Tru64 UNIX link editor ("linker") which links extended COFF object files. The ld command combines several object files into one, performs relocation, resolves external sym... |
ldd(1) -- List dynamic dependencies of executable files or shared objects
|
The ldd command lists the dynamic dependencies of an executable file or shared object: If filename is an executable file, ldd lists the pathnames of all shared objects that would be loaded as a result... |
learn(1) -- Provides computer-aided instruction for the C shell
|
To get started, enter learn; if this is the first time that you are invoking the learn command, you are guided through a series of questions to determine what type of instruction you want to receive. ... |
leave(1) -- Reminds you when to leave
|
The leave command waits until the specified time, then reminds you to leave. You are reminded 5 minutes and 1 minute before the actual time, at the time, and every minute thereafter. When you log out,... |
lex(1) -- Generates programs for lexical tasks
|
The lex command uses the rules and actions contained in file to generate a program, lex.yy.c, which can be compiled with the cc command. That program can then receive input, break the input into the l... |
line(1) -- Reads one line from standard input
|
The line command copies one line, up to and including a newline, from standard input and writes it to standard output. Use this command within a shell command file to read from your terminal. The line... |
link(1) -- Creates an additional directory entry for an existing file
|
The link command performs the link() system call to create an additional directory entry for an existing file, file1. In effect, the underlying file then has two names, file1 and file2 (either of thes... |
lint(1) -- a C program checker
|
The lint program checker attempts to detect features of the C program files that are likely to be bugs, nonportable, or wasteful. It also checks type usage more strictly than the compilers. Among the ... |
listres(1X) -- list resources in widgets
|
The listres program generates a list of a widget's resource database. The class in which each resource is first defined, the instance and class name, and the type of each resource is listed. If no sp... |
llogin(1) -- Connects to a LAT service
|
The llogin command enables Tru64 UNIX users to connect to LAT services offered by other nodes in the local area network (LAN). You do not need superuser privileges or node information in order to conn... |
ln(1) -- Make a hard link or a symbolic link to a file
|
A link is a directory entry that refers to a file. Usually, sourcename is an existing file, and targetname does not exist. Thus, targetname becomes a new name, or pseudonym for sourcename. A file, tog... |
lndir(1X) -- create a shadow directory of symbolic links to another directory tree
|
lndir makes a shadow copy todir of a directory tree fromdir, except that the shadow is not populated with real files but instead with symbolic links pointing at the real files in the fromdir directory... |
locale(1) -- Displays information about locales
|
The locale command without any options or arguments writes to standard output the names and values of all the current locale environment variables, such as LANG and LC_COLLATE. The locale command with... |
localedef(1) -- Builds a locale from locale and character map source files
|
The localedef command converts source files that contain definitions of the locale-dependent information (collation, date-and-time displays, and character properties) into a run-time format. The comma... |
lock(1) -- Requests and verifies a user password
|
The lock command then locks the terminal and does not relinquish it until the password is received again, unless one of the following occurs: The root password is entered. The time-out interval is exc... |
logger(1) -- Makes entries in the system log
|
The logger command makes the specified entries in the system log file. The logger command provides a program and shell script interface to the syslog() subroutine. The file in which entries are made d... |
login(1) -- Signs the user on to the system
|
The invocation of login for initial signon is made by a system program or server using the privileged -h and -f forms of the login command. If login is invoked without an argument, it asks for a user ... |
logname(1) -- Displays user login name
|
The logname command writes to standard output the name you used to log into the system. |
look(1) -- Finds lines in a sorted list
|
If no file is specified, look searches in the system word list /usr/share/dict/words, with the options -df assumed by default. The look command uses binary search. The -d and -f options affect compari... |
lorder(1) -- Finds the best order for member files in an object library
|
The lorder command is essentially obsolete. Use the following command in its place: % ar -ts file.a The lorder command reads one or more object or library archive files, looks for external references,... |
lp(1) -- Sends or cancels a printing request
|
The lp command sends the specified files and associated information (collectively called a request) to a line printer for printing. The cancel command cancels printing requests. The lp command associa... |
lpq(1) -- Examines the spool queues.
|
The lpq command examines the spooling area used by lpd for printing files on the line printer and reports the status of the specified requests or all requests associated with a user. The lpq command i... |
lpr(1) -- Sends files to spooling daemon for printing
|
The lpr command uses the lpd spooling daemon to print files. If you specify a hyphen (-) for a file name, the lpr command reads from standard input; this can be used in conjunction with specified file... |
lprm(1) -- Removes requests from the line printer spooling queue
|
Because the spooling directory is protected from users, using lprm is normally the way a user can remove a request. The lprm command without any arguments deletes the currently active request if it is... |
lpstat(1) -- Displays line printer status information
|
If no options are given, then lpstat displays the status of all requests made by the lp and lpr commands. Any arguments that are not options are assumed to be a request_ID (as returned by the lp or lp... |
ls(1) -- Lists and generates statistics for files
|
The ls command writes to standard output the contents of each specified directory or the name of each specified file, along with any other information you ask for with options. If you do not specify a... |
ltf(1) -- labeled tape facility
|
The ltf command reads and writes single-volume Versions 3 and 4 ANSI-compatible tape volumes. The file argument specifies each file or directory name that is to be processed. If a directory name is sp... |
m2ps(1) -- Converts text in Mule internal code to PostScript format
|
The m2ps command converts text encoded in Mule internal code (called *internal*) to a PostScript file that can be printed. To handle text not coded in *internal* code, you first have to convert the co... |
m4(1g) -- GNU m4 macro processor
|
The GNU m4 software is unsupported software that is provided as part of Tru64 UNIX. HP will fix problems in this unsupported software only if they are specific to Tru64 UNIX. HP will not fix problems ... |
m4(1) -- Preprocesses files, expanding macro definitions
|
[XPG4-UNIX] You can use m4 to process built-in macros or user-defined macros. Each file is processed in order. If you do not specify a file or if you give a dash (-) as a filename, the m4 command read... |
machine(1) -- return architecture type of machine
|
The machine command displays on standard output the architecture of the machine. The machine command is used within shell procedures to tailor the results to a specific architecture. The exit value of... |
mail(1) -- Sends and displays messages
|
The mail command writes to standard output all stored mail addressed to your login name, one message at a time, or sends a mail message to another user or users. Another name for the mail command is b... |
Mail(1) -- Sends and receives mail
|
The mailx and Mail commands allow you to do the following: Compose a message and send it. Receive a message and look at it. Store received messages in your mailbox or in folders. Discard messages. The... |
mailq(1) -- Displays the contents of the mail queue
|
The mailq command displays a list of messages in the mail queue. The mailq command is the same as the sendmail command with the -bp option; see sendmail for more information. |
mailx(1) -- Sends and receives mail
|
The mailx and Mail commands allow you to do the following: Compose a message and send it. Receive a message and look at it. Store received messages in your mailbox or in folders. Discard messages. The... |
make(1u) -- Maintains, updates, and regenerates groups of programs.
|
This make command is one of several versions available. See the SEE ALSO section for references to information about other versions of the command. By default, the make(1) command is invoked if you ty... |
make(1) -- Maintains up-to-date versions of target files and performs shell commands
|
This make command is one of several versions available. See the SEE ALSO section for references to information about other versions of the command. By default, the make(1) command described in this re... |
make(1p) -- Maintains program dependencies
|
[Tru64 UNIX] The make(1p) command is one of several versions available. See the SEE ALSO section for references to information about other versions of the command. By default, the make(1) command is i... |
makedepend(1X) -- create dependencies in makefiles
|
makedepend reads each sourcefile in sequence and parses it like a C-preprocessor, processing all #include, #define, #undef, #ifdef, #ifndef, #endif, #if and #else directives so that it can correctly t... |
man(1) -- Displays reference pages
|
The man command provides online access to the system's reference pages. For example, if reference pages are available on your system, the following command displays the first screenful of reference i... |
mark(1) -- mark messages (only available within the message handling system, mh)
|
Use the mark command to assign a name to a sequence of messages within the current folder. A sequence is a number of messages that are grouped together under a name. You can then use that name with an... |
mattrib(1) -- mtools utility to change DOS file attribute options
|
The mattrib command sets the attribute options of a DOS file using the plus (+) operator, or clears attribute options using the minus (-) operator. DOS pathnames that contain the '/' or '\' separ... |
maze(1X) -- an automated X11 demo repeatedly creating and solving a random maze
|
The maze program creates a "random" maze and then solves it with graphical feedback. |
mcd(1) -- mtools utility to change or report the DOS working directory
|
Without arguments, the mcd command reports the current device and working directory. Otherwise, the mcd command changes the current device and current working directory relative to a DOS file system. ... |
mcopy(1) -- mtools utility to copy DOS files to and from a UNIX operating system
|
The mcopy command copies the specified file to the named file, or copies multiple files to the named directory. The specified files or directories can be either DOS or UNIX files. If the file is a tex... |
mcs(1) -- Manipulates object file comment sections
|
The mcs command allows users to perform operations on the comment section (.comment) of HP (e)COFF object files. The comment section of an object can contain information such as the "ident" string f... |
mcutil(1) -- Media changer manipulation utility
|
The mcutil utility provides a means to manipulate media changer devices. The utility uses the media_changer_name to locate an entry in the mcicap file, which contains configuration information. If the... |
mdel(1) -- mtools utility to delete a DOS file
|
The mdel command deletes a file or files on an DOS file system. Unlike the DOS convention, multiple arguments can be specified. If a read only file is encountered, the mdel command queries whether or ... |
mdir(1) -- mtools utility to display contents of a DOS directory
|
The mdir command lists the contents of a DOS directory. Unlike the DOS convention, multiple arguments are supported. If the component of the path is not a directory, an error occurs. The mdir command ... |
mdiskcopy(1) -- mtools utility to copy a DOS diskette image to another diskette
|
The mdiskcopy command copies the contents of one diskette to another diskette in a bit-by-bit image copy. There is no error checking or validation of any kind performed. The mdiskcopy command prompts ... |
merge(1) -- three-way file merge
|
merge incorporates all changes that lead from file2 to file3 into file1. The result goes to standard output if -p is present, into file1 otherwise. merge is useful for combining separate changes to an... |
mesg(1) -- Permits or refuses write messages
|
The mesg command controls whether other users on the system can send messages to you with the talk and write commands. Called without arguments, mesg displays the current terminal message permission s... |
mformat(1) -- mtools utility to add a DOS file system to a
|
Note You must specify the floppy disk storage device that is to be formatted. If you do not specify a device, or if a device is not found, the command may incorrectly format a SCSI device which could ... |
mgdiff(1X) -- Motif-based graphical file difference browser
|
Mgdiff is a graphical front end to the diff command. It permits the user to view the differences between two ASCII files in context and, optionally, to write out a third file which is the user-defined... |
mh(1) -- Introduction to the MH system for handling mail
|
MH is the name of a powerful message handling system. Rather than being a single comprehensive program, MH consists of a collection of fairly simple single-purpose programs to send, receive, save, and... |
MH(1) -- Introduction to the MH system for handling mail
|
MH is the name of a powerful message handling system. Rather than being a single comprehensive program, MH consists of a collection of fairly simple single-purpose programs to send, receive, save, and... |
mhdecode(1) -- Decodes a binary file for MH
|
The mhdecode command decodes for MH a file created by the uuencode command. The mhdecode command reads an encoded file, strips off any leading and trailing lines added by uuencode, and sends output to... |
mhl(1) -- produce formatted listings of MH messages (only available within the message handling system, mh)
|
The mhl command is a program for listing formatted messages, which can be used as a replacement for more, the default showproc program. As with more, each of the messages specified as arguments (or th... |
mhmail(1) -- send or read mail (only available within the message handling system, mh)
|
The mhmail program is intended as a replacement for the standard mail programs, bellmail and ucbmail. See binmail(1) and mail(1) for more details of these mail programs. When invoked without arguments... |
mhpath(1) -- print full pathnames of MH messages and folders (only available within the message handling system, ...
|
Use the mhpath command to display the full pathname of the specified folder. If you do not specify a folder, mhpath displays the pathname of the current folder. If you specify a message with its messa... |
mkcatdefs(1) -- Preprocesses a message source file
|
The mkcatdefs utility preprocesses a message source file to do one or more of the following operations. These operations ease maintenance of compilable programs, scripts, or both: Convert symbolic ide... |
mkdep(1) -- generate dependency list from a C program
|
The mkdep command uses cc(1) to compile a list of dependency files required to build the named C program file or files. The list is formatted so that it is suitable for inclusion into a makefile for m... |
mkdir(1) -- Makes a directory
|
The mkdir command creates new directories with read, write, and execute permissions based upon the permissions established by the umask setting. [Tru64 UNIX] The mkdir command also creates the standar... |
mkdirhier(1X) -- makes a directory hierarchy
|
The mkdirhier command creates the specified directories. Unlike mkdir if any of the parent directories of the specified directory do not exist, it creates them as well. |
mkfifo(1) -- Makes FIFO special files
|
For each file argument, mkfifo performs actions equivalent to the mkfifo() call with the following arguments: The file argument is used as the pathname argument. If the -m option is not used, the valu... |
mkfontdir(1X) -- create an index of X font files in a directory
|
For each directory argument, mkfontdir reads all of the font files in the directory searching for properties named "FONT", or (failing that) the name of the file stripped of its suffix. These are co... |
mkmanifest(1) -- mtools utility to create a shell script to restore UNIX file names from DOS
|
The mkmanifest command creates a shell script that aids in the restore of UNIX file names that were overwritten by DOS file name restrictions. DOS file names are uppercase only, cannot exceed 8 charac... |
mkstr(1) -- Creates an error message file
|
The use of mkstr can reduce the size of programs that contain many error diagnostics and reduce system overhead in running such programs. The mkstr command processes each of the specified files, placi... |
mktemp(1) -- Create a secure and uniquely named file or directory
|
The mktemp utility is provided to give shell scripts a safer way to create temporary files, particularly when writing to world-writeable areas, such as /tmp or /var/tmp. Traditional methods for creati... |
mktrashcan(1) -- Attaches, detaches, or shows a trashcan directory
|
The trashcan utilities (mktrashcan and rmtrashcan) enable you to attach or detach an existing directory, which you specify as a trashcan directory, to any number of directories within the same fileset... |
mlabel(1) -- mtools utility to label a DOS volume
|
The mlabel command displays the current volume label, if present, and prompts the user for a new volume label. To delete an existing volume label, press the Return Key at the prompt. Reasonable care i... |
mmd(1) -- mtools utility to make a DOS directory
|
The mmd command makes a new directory on a DOS file system. Unlike DOS conventions, this command accepts multiple arguments. Reasonable care is taken to create a valid DOS directory name. If an invali... |
more(1) -- Displays a file one screenful at a time
|
The more utility reads files and either writes them to the terminal on a page-by-page basis or filters them to standard output. If standard output is not a terminal device, all input files are copied ... |
mrd(1) -- mtools utility to remove a DOS directory
|
The mrd command removes a directory from a DOS file system. If the directory is not empty, an error occurs. Unlike DOS conventions, this command allows multiple arguments. DOS subdirectory names that ... |
mread(1) -- mtools utility to perform a low level read (copy) of a DOS file to UNIX
|
The mread command copies the specified DOS file to the named UNIX file, or copies multiple DOS files to the named UNIX directory. DOS subdirectory names that contain the '/' or '\' separator are ... |
mren(1) -- mtools utility to rename an existing DOS file
|
The mren command renames an existing file on a DOS file system. You can also use the mren command to rename directories. Reasonable care is taken to create a valid DOS file name. If an invalid DOS tar... |
msgchk(1) -- check for messages (only available within the message handling system, mh)
|
The msgchk program checks all known mail drops for mail that is waiting for you. It displays whether you have mail waiting to be read or not and shows the date that you last read your mail. You can ch... |
msh(1) -- MH shell (only available within the message handling system, mh)
|
The command msh is an interactive program that implements a subset of the normal MH commands operating on a single file in packf format. That is, msh is used to read a file that contains a number of m... |
mt(1) -- Magnetic tape manipulating program
|
The mt command enables you to manage magnetic tape drives and also to coordinate shared access to tape devices, including devices that are part of a storage area network (SAN). Note Unless enhanced se... |
mtools(1) -- Provides a collection of tools for manipulating DOS files
|
The mtools commands are a public domain collection of programs that let you read, write, and manipulate files on a DOS file system (typically a diskette) from a UNIX system. Each command attempts to e... |
mtype(1) -- mtools utility to display the contents of a DOS file
|
The mtype command displays the specified file on the screen. Unlike conventions, this command supports multiple arguments. Subdirectory names that contain the '/' or '\' separator are supported. ... |
mule(1) -- Multilingual Enhancement to GNU Emacs
|
Mule is a multilingual enhancement to GNU Emacs. Mule provides a facility to display, input, and edit multilingual characters in addition to all GNU Emacs facilities. GNU Emacs is a new version of Ema... |
mv(1) -- Moves files and directories
|
If you move a file to a new directory, mv retains the original file name. When you move a file, all other links to the file remain intact. In the second form, one or more files are moved to directory ... |
mvdir(1) -- Moves (renames) a directory
|
The mvdir command renames directories within a file system. To use mvdir, you must have write permission to directory1 and directory2 and to the parent directories of directory1 and directory2. The di... |
mwm(1X) -- The Motif Window Manager
|
The mwm utility is an X Window System client that provides window management functionality and some session management functionality. It provides functions that facilitate control (by the user and the... |
mwrite(1) -- mtools utility to perform a low level write (copy) of a UNIX file to DOS
|
The mwrite command copies the specified UNIX file to the named DOS file, or copies multiple UNIX files to the named DOS directory. The destination directory cannot be omitted. Reasonable care is taken... |
neqn(1) -- Typesets mathematical equations and expressions
|
The neqn command is an nroff(1) preprocessor for displaying mathematical symbols and equations on terminals. Usage almost always involves preprocessing an nroff source file with neqn and then piping t... |
netscape(1) -- Invokes Netscape (R) Communicator for the World Wide Web
|
The netscape command invokes the Netscape browser for the World Wide Web. Netscape enables you to view documents (called "pages" or "Web pages") that have been formatted with the HTML hypertext ma... |
netstat(1) -- Displays network statistics.
|
The interval argument specifies in seconds the interval for updating and displaying information. The first line of the display shows cumulative statistics; subsequent lines show statistics recorded du... |
newaliases(1) -- Builds a new copy of the alias database
|
The newaliases command builds a new copy of the alias file from source. The location of the alias source is controlled by the setting of the A processing flag either in the sendmail.cf file or by the ... |
newgrp(1) -- Changes primary group identification of a shell process
|
The newgrp command changes the primary group identification of the current shell process to group. You remain logged in and the current directory is unchanged, but calculations of access permissions t... |
newinv(1) -- Updates distribution kit master inventory
|
The newinv command interactively maintains the master inventory files used for producing distribution kits in setld format. The program updates the master inventory for a product when changes are made... |
news(1) -- Writes system news items to standard output
|
Each news item is contained in a separate file in the /usr/news directory. Anyone having read/write permission to this directory can create a news file. If you run the news command without any options... |
next(1) -- show the next message (only available within the message handling system, mh)
|
The command next displays the next message in the current folder. The next message is the one after the current message in the folder. The message that is shown becomes the current message. If you nam... |
nice(1) -- Runs a command at a different priority
|
The nice command lets you run the specified command at a lower priority. The value of priority can range from 1 to 19, with 19 being the lowest priority. The default value of priority is 10. [Tru64 UN... |
nl(1) -- Numbers lines in a file
|
The nl command reads file (standard input by default), numbers the lines in the input, and writes the numbered lines to standard output. In the output, nl numbers the lines on the left, according to t... |
nm(1) -- Name list dump of object files
|
The nm command prints formatted listings of the symbol and external sections of an object file symbol table. A file can be an object file, an archive library, or a shared library. If you do not specif... |
nohup(1) -- Runs a utility ignoring hangups and quits
|
The nohup command runs utility, ignoring all hangups and QUIT signals. You can use this command to run programs in the background after logging off the system. To run a nohup command in the background... |
nrdist(1) -- Remote file distribution client program
|
The nrdist command is a program to maintain identical copies of files over multiple hosts. It preserves the owner, group, mode, and modification time of files if possible and can update programs that ... |
nroff(1) -- Formats text
|
The nroff command formats text in the specified files for typewriter-like devices. If no file argument is present, nroff reads from standard input. An argument consisting of a single minus sign (-) is... |
ntp(1) -- query a clock running a Network Time Protocol daemon, either ntpd or xntpd
|
The ntp command may be retired in a future release; use the ntpdate(8) command instead. The ntp command is used to determine the offset between the local clock and a remote clock. It can also be used ... |
objZ(1) -- Compression utility
|
The objZ command takes a regular, read/write file in ALPHAMAGIC format as input and converts it to ALPHAMAGICZ compressed format. The compressed output file replaces the input file. When the -u option... |
oclock(1X) -- round X clock
|
The oclock program simply displays the current time on an analog display. |
od(1) -- Writes the contents of a file to standard output
|
The output continues until the end of the file. When od reads standard input, the offset and label operands must be preceded by a + (plus sign). If you omit the file argument and do not specify -A, -j... |
odump(1) -- Dumps selected parts of an object file
|
The odump command dumps selected parts of each file that is specified. For details on the object file parts presented in the odump output, see the Assembly Language Programmer's Guide. |
optacon(1X) -- An X program for the Optacon II
|
The Optacon II, a product of TeleSensory Corporation, is an optical-to-tactile conversion device meant to assist the blind in accessing visual information. The optacon utility was made specifically to... |
ostrip(1) -- Reduce the size of object files
|
The ostrip command reduces the components of any object file based on the options that are specified. It is designed to work with any object file, that is, files, image files, and shared object files.... |
pack(1) -- Compresses and expands files
|
The pack command The pack command stores the specified file in a compressed form. The input file is replaced by a packed file with a name derived from the original file name (file.z), with the ownersh... |
packf(1) -- compress a folder into a single file (only available within the message handling system, mh)
|
Each message in a folder is normally stored as a separate file. The packf command takes all messages from the current folder and copies them to a single specified file. Each message in the file is sep... |
page(1) -- Displays a file one screenful at a time
|
The more utility reads files and either writes them to the terminal on a page-by-page basis or filters them to standard output. If standard output is not a terminal device, all input files are copied ... |
pagesize(1) -- Displays system memory page size
|
The pagesize command prints the size of a page of memory in bytes, as returned by the getpagesize() call. This command is useful when constructing portable shell scripts. |
passwd(1) -- Changes password file information
|
The passwd command changes the password associated with your username (by default) or the specified username. A password must have at least six characters and can be up to eight characters. If you ent... |
paste(1) -- Joins corresponding lines of several files or subsequent lines in one file
|
Specifying the -d option or no options causes the paste command to treat each file as a column, joining them horizontally with a tab character by default (parallel merging). Using the -s option, the p... |
patch(1) -- Applies changes to files
|
By default, the patched version is put in place of the original. The original file can be backed up to the same name with the extension by using the -b option. You may also specify where you want the ... |
pathchk(1) -- Checks path names
|
The pathchk command checks that one or more path names are valid (that is, they can be used to access or create a file without causing syntax errors) and portable (that is, no file name truncation wil... |
pax(1) -- Extracts, writes, and lists archive files
|
The pax command extracts and writes member files and any associated, extended attributes of archive files; writes lists of the member files of archives; and copies directory hierarchies. The -r and -w... |
pcat(1) -- Compresses and expands files
|
The pack command The pack command stores the specified file in a compressed form. The input file is replaced by a packed file with a name derived from the original file name (file.z), with the ownersh... |
pddump(1) -- Dump profiling data files
|
The pddump command displays, on the standard output, the record definitions and data of the specified profiling data files. Each file's dump is prefixed by the line "File = file:". This is followed... |
pdtostd(1) -- Convert profiling data files to standard format
|
The pdtostd command converts profiling data files from the format that the Tru64 UNIX profilers use into the older industry standard formats. The converted files can then be processed by tools compile... |
perl(1) -- Practical Extraction and Report Language
|
The perl software is unsupported software that is provided as part of Tru64 UNIX. We will fix problems in this unsupported software only if they are specific to Tru64 UNIX. We will not fix problems th... |
pfstat(1) -- Print packet filter status information
|
The pfstat command interprets the data structures of the packet filter driver packetfilter(7). The data structures are contained in /dev/kmem. |
pg(1) -- Formats files for a terminal display
|
To determine terminal attributes, pg looks up the terminal type specified by the TERM environment variable in the terminfo database. The default type is dumb. At any time during the operation of pg, y... |
phrase(1) -- Manages databases used with the phrase input method
|
The phrase input method is supported in the Korean, Traditional Chinese, and Simplified Chinese environments. Phrase input is a shorthand input method that automatically converts a keyword into a phra... |
pick(1) -- select messages by content (only available within the message handling system, mh)
|
The pick command lets you search messages in a folder on a diverse range of search criteria. You can search the mail headers or the text of some or all of the messages within a folder for the specifie... |
pinfo(1) -- Displays processor administration information
|
The psrinfo and pinfo commands display information about processors. The processor variable specifies the processor identification number, which is a unique integer that identifies the processor. If y... |
pixie(1) -- Instruction-counting profiler for optimization and
|
See prof_intro(1) for an introduction to the application performance tuning tools provided with Tru64 UNIX. The pixie command creates an instrumented version of a program (program.pixie) that produces... |
pixstats(1) -- Analyzes profile data
|
The prof command analyzes one or more data files generated by the compiler's execution-profiling system and produces a listing. The prof command can also combine those data files or produce a feedbac... |
pr(1) -- Writes a file to standard output
|
A heading that contains the page number, date, time, and the name of the file separates the output into pages. Unless specified, columns are of equal width and separated by at least one space. Lines t... |
praliases(1) -- display system mail aliases
|
The praliases command displays system aliases used by the sendmail(8) program. If no arguments are given, the praliases command displays all of the system aliases contained in the file /var/adm/sendma... |
prev(1) -- show the previous message (only available within the message handling system, mh)
|
The prev command displays the previous message in the current folder. The previous message is the one before the current message in the folder. The message that is shown becomes the current message. Y... |
printenv(1) -- Displays or sets the current environment, or displays the values of environment variables
|
The env command lets you get and change your current environment, and then run the specified command with the changed environment. If the -i option is used, the current environment is ignored and the ... |
printf(1) -- Writes formatted output
|
The printf command converts, formats, and writes its arguments to the standard output. The values specified by the argument variable are formatted under control of the format variable. Syntax of the a... |
prof(1) -- Analyzes profile data
|
The prof command analyzes one or more data files generated by the compiler's execution-profiling system and produces a listing. The prof command can also combine those data files or produce a feedbac... |
prof_intro(1) -- Introduction to application profilers, profiling, optimization, and performance analysis
|
Tru64 UNIX supports four approaches to performance improvement: Automatic and profile-directed optimizations. For example: pixie -update a.out data/* cc -non_shared -O3 -spike -feedback a.out *.c Manu... |
prompter(1) -- prompting editor front-end (only available within the message handling system, mh)
|
The prompter editor is a rudimentary editor provided by comp, dist, forw, and repl. It is automatically called by the above commands; you do not need to specify it. The prompter editor allows rapid co... |
prs(1) -- Displays key information in a Source Code Control System (SCCS) file
|
The prs command reads SCCS files, and writes to standard output a part or all of the file according to a format you specify. Data Keywords    [Toc]    [Back] Data keywords specify the parts of an SCCS... |
ps(1) -- Displays current process status
|
While ps is a fairly accurate snapshot of the system, ps cannot begin and finish a snapshot as fast as some processes change state. At times there may be minor discrepancies. The ps command can be use... |
pset_assign_cpu(1) -- Assigns a processor to a processor set
|
The pset_assign_cpu command assigns one or more processors to an existing processor set. The pset_id variable is a unique integer that identifies the processor set and is returned by the pset_create c... |
pset_assign_pid(1) -- Assigns a process ID to a processor set
|
The pset_assign_pid command assigns one or more process identification numbers to an existing processor set. The pset_id variable is a unique integer that identifies the processor set and is returned ... |
pset_create(1) -- Creates a processor set
|
The pset_create command creates a new processor set and displays a unique integer as the identifier for the new processor set. The new processor set does not have any processors assigned to it. You mu... |
pset_destroy(1) -- Destroys a processor set
|
The pset_destroy command destroys an existing processor set. The pset_id variable is a unique integer that identifies the processor set and is returned by the pset_create command. If the processor set... |
pset_info(1) -- Displays processor set information
|
The pset_info command displays information about processor sets and the processors that are assigned to each set. Note that a stopped processor is not a member of any processor set, and its processor ... |
pseudo(1) -- Starts a non-STREAMS pty interface for a STREAMS device
|
The pseudo command provides an appropriate interface for STREAMS tty devices that are installed on systems configured to use the non-STREAMS pty driver. The pseudo command opens a pair of master and s... |
psrinfo(1) -- Displays processor administration information
|
The psrinfo and pinfo commands display information about processors. The processor variable specifies the processor identification number, which is a unique integer that identifies the processor. If y... |
puff(1X) -- An X program for sight-impaired users
|
Puff (puff) is intended for people who need text and graphics displayed at a high magnification factor. Typically users will want both the pointer and text to be tracked as they work. Puff follows the... |
puzzle(1X) -- 15-puzzle game for X
|
Executing puzzle with no arguments plays a 4x4 15-puzzle. The control bar has two boxes in it. Clicking in the left box scrambles the puzzle. Clicking in the right box solves the puzzle. Clicking the ... |
pwd(1) -- Displays the pathname of the current working directory
|
The pwd command writes to standard output the full pathname of your current working directory. All directories are separated by a / (slash). The first / represents the root directory and the last dire... |
quota(1) -- displays disk usage and limits
|
The quota command displays disk space usage and limits. Disk quotas are displayed as 1 kilobyte blocks unless the -h option is specified, then they are displayed as K (kilobyte), M (megabyte), G (giga... |
ranlib(1) -- Converts archives to random libraries
|
If you specify the -t option, the ranlib command only touches the archives and does not modify them. This is useful after copying an archive or using make with the -t option in order to avoid having l... |
rcp(1) -- Copies files on the same host, between a local host and a remote host, and between two remote hosts
|
The rcp command copies files on the same host, between a local host and a remote host, and between two remote hosts. Metacharacters that must be interpreted at a remote host must be quoted using \ (b... |
rcs(1) -- change RCS file attributes
|
rcs creates new RCS files or changes attributes of existing ones. An RCS file contains multiple revisions of text, an access list, a change log, descriptive text, and some control attributes. For rcs ... |
rcsclean(1) -- clean up working files
|
rcsclean removes working files that were checked out and never modified. For each file given, rcsclean compares the working file and a revision in the corresponding RCS file. If it finds a difference,... |
rcsdiff(1) -- compare RCS revisions
|
rcsdiff runs diff(1) to compare two revisions of each RCS file given. Pathnames matching an RCS suffix denote RCS files; all others denote working files. Names are paired as explained in ci(1). The op... |
rcsfreeze(1) -- freeze a configuration of sources checked in under RCS
|
rcsfreeze assigns a symbolic revision number to a set of RCS files that form a valid configuration. The idea is to run rcsfreeze each time a new version is checked in. A unique symbolic name (C_number... |
rcsintro(1) -- introduction to RCS commands
|
The Revision Control System (RCS) manages multiple revisions of files. RCS automates the storing, retrieval, logging, identification, and merging of revisions. RCS is useful for text that is revised f... |
rcsmerge(1) -- merge RCS revisions
|
rcsmerge incorporates the changes between two revisions of an RCS file into the corresponding working file. Pathnames matching an RCS suffix denote RCS files; all others denote working files. Names ar... |
rcvstore(1) -- incorporate new mail asynchronously
|
The command rcvstore incorporates a message from the standard input into an MH folder. If a +folder argument is not given the file is placed in your +inbox folder. The new message being incorporated i... |
rdist(1) -- Maintains identical copies of files on multiple hosts
|
The rdist command preserves the owner, group, mode, and modification time of files if possible. It can also update programs that are executing. The rdist command reads commands from distfile in your $... |
read(1) -- Reads a line from standard input
|
The read utility reads a single line from standard input. By default, unless the -r option is specified, backslash (\) acts as an escape character. If standard input is a terminal device and the invo... |
red(1) -- Edits a file line by line
|
The ed command does not alter the file itself until you use the write subcommand. You can specify on the command line the file you want to edit, or you can use ed subcommands to read a file into the b... |
refile(1) -- file message in other folders (only available within the message handling system, mh)
|
Use the refile command to move the specified message from the current folder to another folder. You can refile messages in more than one folder by giving multiple folder names as arguments. If you do ... |
repl(1) -- reply to a message (only available within the message handling system, mh)
|
Use repl to reply to a message that you have received. By default, repl replies to the current message in the current folder. If you want to reply to another message, you can specify a message number ... |
reset(1) -- Initializes terminals
|
The tset command first determines the type of terminal involved, and then does necessary initializations and mode settings, including terminal-dependent processing such as setting Erase and Kill chara... |
resize(1X) -- set TERMCAP and terminal settings to current xterm window size
|
The resize command prints a shell command for setting the TERM and TERMCAP environment variables to indicate the current size of xterm window from which the command is run. For this output to take eff... |
rev(1) -- Reverses the sequence of characters in a line
|
The rev command copies the named files to standard output, reversing the order of characters in every line. If no file is specified, standard input is accepted. |
rlog(1) -- print log messages and other information about RCS files
|
rlog prints information about RCS files. Pathnames matching an RCS suffix denote RCS files; all others denote working files. Names are paired as explained in ci(1). rlog prints the following informati... |
rlogin(1) -- Logs a user into a remote host
|
The rlogin command logs a user into a remote host that is running the rlogind daemon. Alternatively, you can use the telnet command (if supported). The remote terminal type is the same as that given i... |
rm(1) -- Removes (unlinks) files or directories
|
The rm command removes the entries for the specified files from a directory. If file is of the directory type: If you specify neither -R or -r, rm writes a diagnostic message to standard error, does n... |
rmail(1) -- Handles remote mail
|
The rmail command interprets incoming mail received through the uucp command. It collapses From header lines in the form generated by the mail command into a single line of the form: return_path!sende... |
rmdel(1) -- Removes a delta from a Source Code Control System (SCCS) file
|
The rmdel command removes the delta specified by SID from each named SCCS file. You can remove only the most recently created delta in a branch, or the latest trunk delta if it has no branches. In add... |
rmdir(1) -- Removes a directory
|
The rmdir command removes a directory from the system. The directory must be empty before you can remove it, and you must have write permission in its parent directory. Use the ls -al command to see i... |
rmf(1) -- remove folder (only available within the message handling system, mh)
|
The rmf command removes all of the messages within the current folder, and then removes the folder itself. If there are any files within the folder which are not part of MH, they are not removed, and ... |
rmm(1) -- remove messages (only available within the message handling system, mh)
|
The rmm command deletes the current message from the current folder. You can specify messages and folders other than the current ones by using the +folder and msgs arguments. The current message is no... |
rmtrashcan(1) -- Attaches, detaches, or shows a trashcan directory
|
The trashcan utilities (mktrashcan and rmtrashcan) enable you to attach or detach an existing directory, which you specify as a trashcan directory, to any number of directories within the same fileset... |
rpcgen(1) -- an RPC protocol compiler
|
The rpcgen compiler is a tool that generates C code to implement an protocol. The input to rpcgen is the (Remote Procedure Call) Language, which is similar to C. The rpcgen command is normally used as... |
rsh(1) -- Executes a specified command on a remote host or logs into a remote host
|
The rsh command sends standard input from a local host to a remote host and receives standard output and standard error from the remote host. By default, the rsh command executes the rlogin command if... |
Rsh(1b) -- The Bourne shell, an interactive command interpreter and command programming language
|
The Bourne shell is a command programming language that executes commands read from a terminal or a file. The Rsh command specifies a restricted version of the standard command interpreter sh; Rsh is ... |
rstart(1X) -- a sample implementation of a Remote Start client
|
The rstart command is a simple implementation of a Remote Start client as defined in A Flexible Remote Execution Protocol Based on rsh. It uses rsh as its underlying remote execution mechanism. |
rstartd(1X) -- a sample implementation of a Remote Start rsh helper
|
rstartd is an implementation of a Remote Start "helper" as defined in A Flexible Remote Execution Protocol Based on rsh. This document describes the peculiarities of rstartd and how it is configured... |
runcat(1) -- Pipes message text source from mkcatdefs to gencat
|
The runcat command invokes the mkcatdefs command and pipes the message catalog source data (the output from mkcatdefs) to the gencat program. The file source_file contains the message text with your s... |
runclass(1) -- Runs a command in a specific scheduling class
|
The runclass utility lets you run a command (including any of its arguments) in a scheduling class. All the threads created by the command process, and its subprocesses, inherit the class binding. Unl... |
runcord(1) -- invokes cord to rearrange procedures in an executable file to facilitate better cache mapping
|
The runcord command invokes ftoc(1) to read one or more feedback files produced by the -feedback option of the profiler prof(1) or by the feedback(1) utility and generates a reorder-file for use with ... |
runon(1) -- Runs a command or process on a specific CPU, a processor set (pset), or a Resource Affinity Domain (...
|
The runon utility does one of the following: Starts a command on the specified CPU, processor set (pset) or Resource Affinity Domain (RAD). The argument operand represents any options or arguments for... |
rup(1) -- Show host status of remote machines (RPC version)
|
The rup command displays the current time, amount of time since the system was last started, number of users logged in, and the load averages for remote machines. It broadcasts on the local network, a... |
ruptime(1) -- Displays the status of each host on a network
|
The status lines are sorted by hostname unless the -l, -t, or -u option is indicated. The status information is provided in packets broadcast once every 3 minutes by each network host running rwhod. A... |
rusers(1) -- Display a list of users who are logged in to a remote machine
|
The rusers command displays information about users and processes running on remote machines. The listing is in the order in which responses are received, but this order can be changed by specifying o... |
rwall(1) -- Write to all users over a network
|
The rwall command reads a message from standard input until end-of-file. It then sends the following message to all users logged in on the specified host machines, preceded by the line: Broadcast Mess... |
rwho(1) -- Shows which users are logged into hosts on the local network.
|
The rwho command displays the username, hostname, and start date and time of each session for everyone on the local network who is currently logged in to a host running the rwhod daemon. If one or mor... |
sact(1) -- Displays current Source Code Control System (SCCS) file editing status
|
The sact command reads SCCS files and writes the contents, if any, of the p-file associated with file to standard output (see the get command for information about the contents of the p-file). |
scan(1) -- produce a one-line-per-message scan listing (only available within the message handling system, mh)
|
The scan command produces a one-line-per-message listing of the messages in the current folder. You can scan a folder other than the current folder by using the +folder argument. You can use the msgs ... |
sccs(1) -- Administration program for Source Code Control System (SCCS) commands
|
The sccs command is an administration program that incorporates the set of SCCS commands into the operating system. [Tru64 UNIX] The sccs command can be used to assign or reassign file ownership. The ... |
sccsdiff(1) -- Compares two versions of a Source Code Control System (SCCS) file
|
Any number of SCCS files can be specified, but the same arguments apply to all files. |
sccshelp(1) -- Provides information about a Source Code Control System (SCCS) message or command
|
The sccshelp command displays information about the use of a specified SCCS command or about messages generated while using the commands. Each message has an associated error code, which can be suppli... |
scp(1) -- Secure Shell client remote copy application
|
The scp2 (secure copy) command creates a secure connection between a Secure Shell client and a server to copy files. A secure connection provides client and server authentication, user authentication,... |
scp2(1) -- Secure Shell client remote copy application
|
The scp2 (secure copy) command creates a secure connection between a Secure Shell client and a server to copy files. A secure connection provides client and server authentication, user authentication,... |
script(1) -- Makes a transcript of terminal session
|
The transcript is written to file, or appended to file if the -a option is given. If no file name is given, the transcript is saved in the file typescript. The script ends when the forked shell exits.... |
sdiff(1) -- Compares two files and displays the differences in
|
The sdiff command displays each line of the two files with a series of spaces between them if the lines are identical, a < (left angle bracket) in the field of spaces if the line only exists in file1,... |
sed(1) -- Stream editor
|
The sed command includes many features for selecting lines to be modified and making changes only to the selected lines. The sed command uses two work spaces for holding the line being modified: the p... |
send(1) -- send a message (only available within the message handling system, mh)
|
Use send to send the draft message to the specified recipients. You normally choose send as one of the options from the whatnow program. However, you can use send just like any other MH command. If yo... |
setacl(1) -- Changes the specified access control list (ACL) on a file or directory
|
Note This command is based on Draft 13 of the POSIX P1003.6 standard. The setacl command is used to add, modify, and remove access control lists (ACL) and individual ACL entries on files and directori... |
sftp(1) -- Secure Shell file transfer client
|
The sftp2 command creates a secure connection between a Secure Shell client and a server to transfer files over a network. The sftp2 command is intended as a secure replacement for the ftp command. A ... |
sftp2(1) -- Secure Shell file transfer client
|
The sftp2 command creates a secure connection between a Secure Shell client and a server to transfer files over a network. The sftp2 command is intended as a secure replacement for the ftp command. A ... |
sh(1p) -- Shell, the standard command language interpreter (POSIX Shell)
|
The POSIX shell carries out commands either interactively from a terminal keyboard or from a file. Some important features of the shell are as follows: Command aliasing File name substitution Tilde su... |
sh(1) -- Shell, the standard command language interpreter
|
[Tru64 UNIX] Tru64 UNIX provides two command interpreters with the name sh. The XCU5.0 and POSIX.2 compliant command interpreter sh is available in the file /usr/bin/posix/sh and is described in the s... |
sh(1b) -- The Bourne shell, an interactive command interpreter and command programming language
|
The Bourne shell is a command programming language that executes commands read from a terminal or a file. The Rsh command specifies a restricted version of the standard command interpreter sh; Rsh is ... |
show(1) -- show (list) messages (only available within the message handling system, mh)
|
Use show to display the contents of the current message. You can specify alternative messages or folders by using the +folder or msgs arguments. If a folder is given, it becomes the current folder. Th... |
showfont(1X) -- font dumper for X font server
|
The showfont command displays data about a font that matches the given pattern. The information shown includes font information, font properties, character metrics, and character bitmaps. The wildcard... |
showrgb(1X) -- uncompile an rgb color-name database
|
The showrgb program reads an rgb color-name database compiled for use with the dbm database routines and converts it back to source form, printing the result to standard output. The default database i... |
shtrashcan(1) -- Attaches, detaches, or shows a trashcan directory
|
The trashcan utilities (mktrashcan and rmtrashcan) enable you to attach or detach an existing directory, which you specify as a trashcan directory, to any number of directories within the same fileset... |
size(1) -- Prints the size of an object file and the sizes of its segments or sections
|
The size command prints information about the text, rdata, data, sdata, bss, and sbss sections of each file. The file can be an object or an archive. If you do not specify a file, size uses a.out as t... |
sleep(1) -- Suspends execution for at least the specified time
|
The sleep command suspends execution of a process for at least the interval specified by seconds, which can range from 0 to 2,147,483,647 seconds. Depending on system activity, the actual time of susp... |
slocal(1) -- MH receive-mail hooks
|
A receive-mail hook is a program that is run whenever you receive a mail message. You do not invoke the hook yourself; it is invoked on your behalf by sendmail, when you include the following line in ... |
soelim(1) -- Processes .so requests in nroff input
|
The soelim command reads the specified files or standard input and performs the textual inclusion implied by nroff requests of the form: .so file When these requests appear at the beginning of input l... |
sort(1) -- Sorts or merges files
|
The sort command sorts lines in its input files and writes the result to standard output. The sort command performs one of the following functions: Sorts lines of all the named files together and writ... |
sortm(1) -- sort messages (only available within the message handling system, mh)
|
The command sortm sorts all the messages in the current folder into chronological order according to the contents of the Date: fields of the messages. By default, sortm sorts all the messages in the c... |
spell(1) -- Finds spelling errors
|
|
spellin(1) -- Finds spelling errors
|
|
spellout(1) -- Finds spelling errors
|
|
spike(1) -- Performs code optimization after linking a program
|
Spike is a tool for performing code optimization after linking. It is a replacement for om and does similar optimizations. Because it can operate on an entire program, Spike is able to do optimization... |
split(1) -- Splits a file into pieces
|
The split command reads file and writes it in number-line pieces (default 1000 lines) to a set of output files. The size of the output files can be modified by using the -b or -l options. Each output ... |
ssh(1) -- Secure Shell client remote login and command execution application
|
The ssh2 command creates a secure connection between a Secure Shell client and server for remote log in and command execution. The ssh2 command is intended as a secure replacement for the rlogin and r... |
ssh-add(1) -- Adds private keys into the authentication agent
|
The ssh-add2 command adds private keys into the ssh-agent2 authentication agent. The authentication agent must be running and must be an ancestor of the current process. If a private key requires a pa... |
ssh-add2(1) -- Adds private keys into the authentication agent
|
The ssh-add2 command adds private keys into the ssh-agent2 authentication agent. The authentication agent must be running and must be an ancestor of the current process. If a private key requires a pa... |
ssh-agent(1) -- Starts the Secure Shell authentication agent, which holds private keys in memory
|
The ssh-agent2 command starts the Secure Shell authentication agent on a Secure Shell client that is configured to use public key user authentication. The authentication agent holds the private keys i... |
ssh-agent2(1) -- Starts the Secure Shell authentication agent, which holds private keys in memory
|
The ssh-agent2 command starts the Secure Shell authentication agent on a Secure Shell client that is configured to use public key user authentication. The authentication agent holds the private keys i... |
ssh-certenroll(1) -- Certificate enrollment client
|
The ssh-certenroll2 command allows users to enroll certificates. It will connect to a certification authority (CA) and use the CMPv2 protocol for enrolling a certificate. The user can supply an existi... |
ssh-certenroll2(1) -- Certificate enrollment client
|
The ssh-certenroll2 command allows users to enroll certificates. It will connect to a certification authority (CA) and use the CMPv2 protocol for enrolling a certificate. The user can supply an existi... |
ssh-chrootmgr(1) -- Sets up chroot-ready environment for users
|
You use the ssh-chrootmgr command when you want the sshd daemon and the sftp-server to enforce use of the ChRootUsers or ChRootGroups keywords in the sshd2_config file. Using the ChRoot{Users,Groups} ... |
ssh-dummy-shell(1) -- Restricted shell
|
The ssh-dummy-shell command provides access to systems where only file transfer functionality is permitted. Users with file transfer only access can have ssh-dummyshell as their user shell. When execu... |
ssh-hostbased-setup(1) -- Sets up Secure Shell host-based authentication by verifying and if necessary, copying a public host ...
|
A local and remote host must have a copy of each other's public host key to use Secure Shell host-based authentication. The ssh-hostbased-setup command verifies and if necessary, copies the public ho... |
ssh-keygen(1) -- On a Secure Shell server, generates the host key pair. On a Secure Shell client, generates the authe...
|
On a Secure Shell server, the ssh-keygen2 command generates and manages the host key pair. On a Secure Shell client, the ssh-keygen2 command generates the authentication key pair necessary for public ... |
ssh-keygen2(1) -- On a Secure Shell server, generates the host key pair. On a Secure Shell client, generates the authe...
|
On a Secure Shell server, the ssh-keygen2 command generates and manages the host key pair. On a Secure Shell client, the ssh-keygen2 command generates the authentication key pair necessary for public ... |
ssh-probe(1) -- Locates Secure Shell servers from the local network
|
The ssh-probe2 command sends a query packet as a UDP datagram to servers and displays the address and the Secure Shell version number of the servers that respond to the query. |
ssh-probe2(1) -- Locates Secure Shell servers from the local network
|
The ssh-probe2 command sends a query packet as a UDP datagram to servers and displays the address and the Secure Shell version number of the servers that respond to the query. |
ssh-pubkeymgr(1) -- Configures Secure Shell public key user authentication
|
The ssh-pubkeymgr command creates the user files necessary to configure public key user authentication on a Secure Shell client. Initially, it checks for public keys, and prompts the user for the foll... |
ssh-validate-conf(1) -- Verifies the Secure Shell client or server configuration file.
|
The ssh-validate-conf command verifies whether the keyword in the Secure Shell server or the client configuration file is valid. If a keyword is invalid, a message is printed. Any lines that are comme... |
ssh2(1) -- Secure Shell client remote login and command execution application
|
The ssh2 command creates a secure connection between a Secure Shell client and server for remote log in and command execution. The ssh2 command is intended as a secure replacement for the rlogin and r... |
stdump(1) -- Dump portions of a file containing symbolic information
|
The stdump tool dumps symbolic information from an object file, an executable file, or any other file produced by the compiler that contains symbolic information. |
strchg(1) -- Alters and queries stream configuration
|
The strchg command pushes and pops STREAMS modules on and off the user's standard input Stream to achieve a desired configuration. The strconf command queries the configuration of the Stream, then pr... |
strconf(1) -- Alters and queries stream configuration
|
The strchg command pushes and pops STREAMS modules on and off the user's standard input Stream to achieve a desired configuration. The strconf command queries the configuration of the Stream, then pr... |
strextract(1) -- batch string extraction
|
The strextract command extracts text strings from source programs. This command also writes the string it extracts to a message text file. The message text file contains the text for each message extr... |
strings(1) -- Finds strings in an ASCII or binary file
|
A string is any sequence of 4 or more printing characters ending with a newline or null character. The strings command is useful for identifying random object files. [Tru64 UNIX] If file specifies an ... |
strip(1) -- Removes symbols and relocation bits
|
The strip command removes the symbol table and any strippable subsections of the section, including compact relocation information ordinarily present in executable files. This is useful to save space ... |
strmerge(1) -- batch string replacement
|
The strmerge command reads the strings specified in the message file produced by strextract and replaces those strings with calls to the message file in the source program to create a new source progr... |
stty(1) -- Sets terminal characteristics
|
The stty utility sets or reports on terminal I/O characteristics for the device that is its standard input. The -dsusp switch works only when the terminal settings are set to the BSD clist options in ... |
style(1) -- Analyzes surface characteristics of a document.
|
The style command analyzes the surface characteristics of the writing style of a document. It reports on readability, sentence length and structure, word length and usage, verb type, and sentence open... |
su(1) -- Substitutes user ID temporarily
|
The su command requires the password of the specified username, and if it is given, changes to that username and invokes the user shell without changing the current directory. If the - option is used,... |
suggest(1) -- Prints wordy sentences and looks them up in an interactive thesaurus.
|
Each phrase found by the diction command is enclosed in [ ] (brackets). Because diction runs deroff before looking at the text, include formatting header files as part of the input. Before using the e... |
sum(1) -- Displays the checksum and byte count in block-size (1024) units of a file
|
The checksum and number of blocks are written to standard output. The sum command is generally used to determine if a file that was copied or communicated over transmission lines is an exact copy of t... |
syslog(1) -- enables and disables printing to the console device, /dev/console, by the syslogd daemon.
|
Under certain circumstances you may need to control the volume of information messages displayed on the console device. The syslog command enables you to control the syslogd daemon's capability to pr... |
tabs(1) -- Sets tab stops on terminals
|
If you use the tabs command with no options or operands, the terminal tabs are reset to the system defaults for your terminal type. If only the -T option is used, tabs are reset to the defaults for th... |
tail(1) -- Writes a file to standard output, beginning at a specified point
|
If you do not specify -f, -r, -number, or +number, tail begins reading 10 lines before the end of the file. The default starting point is - (end of input), l (lines) is the default unit, and 10 is the... |
talk(1) -- Converses with another user
|
The talk command allows two users to enter text simultaneously into windows displayed on each other's terminals. To initiate a conversation, one user executes talk and specifies the second user's us... |
tar(1) -- Manipulates tape archives
|
The tar command is used to save and restore data from traditional format tar archives. [Tru64 UNIX] The actions of tar on a trusted system are controlled by the way the Information System Security Off... |
tarsets(1) -- subset kitting command file generator
|
The tarsets command is used by the kits utility to produce software kits for use with the setld(8) utility. The tarsets command reads subset inventory records from standard input and writes a command ... |
tbl(1) -- formats tables for nroff
|
The tbl preprocessor is used for formatting tables for nroff. When you run tbl, the input files are copied to standard output, except for lines between the .TS (table start) and .TE (table end) comman... |
tcl(1) -- Tool Command Language
|
The tcl software is unsupported software that is provided as part of Tru64 UNIX. We will fix problems in this unsupported software only if they are specific to Tru64 UNIX. We will not fix problems tha... |
tcl-tk(1) -- Tool Command Language
|
The tcl software is unsupported software that is provided as part of Tru64 UNIX. We will fix problems in this unsupported software only if they are specific to Tru64 UNIX. We will not fix problems tha... |
tcopy(1) -- Copies magnetic tapes
|
If a source and a destination tape are specified then the tcopy command copies the source tape into the destination tape. If only a source tape is specified then tcopy prints information about the con... |
tee(1) -- Displays the output of a program and copies it into a file
|
The tee command reads standard input and writes to both standard output, and each specified file. The tee command is useful when you wish to view program output as it is displayed, and also want to sa... |
telnet(1) -- Logs into a remote host
|
The telnet command is the interface to the TELNET protocol. The TELNET protcol allows remote login to other hosts. The telnet command uses the Transmission Control Protocol/Internet Protocol (TCP/IP) ... |
test(1) -- Evaluates conditional expressions
|
The test command evaluates an expression constructed of functions and operators. If the value of expression is true, test returns an exit value of zero (0); otherwise, it returns FALSE, a nonzero exit... |
tftp(1) -- Provides the Trivial File Transfer Protocol (TFTP)
|
The tftp command transfers files between hosts using TFTP. Because TFTP is a minimal file transfer protocol, the tftp command does not provide all of the features described under the ftp command. For ... |
third(1) -- Third Degree: heap usage and leak profiler, and
|
See prof_intro(1) for an introduction to the application performance tuning tools provided with Tru64 UNIX. Third Degree (third) creates an instrumented version of a debuggable C or C++ program (namin... |
tic(1) -- Translates terminfo files from source to compiled format
|
If a file is not specified, the tic command reads standard input. The tic command places the results in the /usr/share/lib/terminfo directory. If the TERMINFO environment variable is set, the results ... |
time(1) -- Times the execution of a command
|
The time command prints the elapsed time during the execution of a command, the time spent in the system, and the time spent in execution of the command on the diagnostic output system. Time is report... |
tip(1) -- Connects to a remote system
|
You must have a login account on the remote system to use the tip command. Either the system argument or the telephone_number argument is required. The system argument specifies the name of a remote s... |
tk(1) -- Tool Command Language
|
The tcl software is unsupported software that is provided as part of Tru64 UNIX. We will fix problems in this unsupported software only if they are specific to Tru64 UNIX. We will not fix problems tha... |
touch(1) -- Updates file access and modification times
|
The touch command updates the access and modification times of each file or directory named to the one specified on the command line or to the current time if you do not specify a time. You can specif... |
tput(1) -- Queries the terminal information database
|
The capability_name argument indicates the attribute type from a terminfo file. The output of the tput command is a string if the attribute capability_name is of the type string, or an integer if the ... |
tr(1) -- Translates characters
|
Input characters from string1 are replaced with the corresponding characters in string2. The tr command cannot handle an ASCII NUL (\000) in string1 or string2; it always deletes NUL from the input. ... |
trans(1) -- translation tool for use with source message catalogs
|
The trans command assists in the translation of source message catalogs. The command reads input from file.msg and writes its output to either a file named trans.msg or a file you name on the command ... |
trbsd(1) -- Translates characters
|
Input characters from string1 are replaced with the corresponding characters in string2. The trbsd command cannot handle an ASCII NUL (\000) in string1 or string2; it always deletes NUL from the inpu... |
true(1) -- Returns a standard exit value
|
The true command returns a 0 (zero) exit value. The false command returns a nonzero exit value. These commands are usually used in input to shell commands. |
tset(1) -- Initializes terminals
|
The tset command first determines the type of terminal involved, and then does necessary initializations and mode settings, including terminal-dependent processing such as setting Erase and Kill chara... |
tsort(1) -- Sorts an unordered list of ordered pairs (topological sort)
|
The tsort command reads from file or standard input an unordered list of ordered pairs, builds an ordered list, and writes it to standard output. [Tru64 UNIX] For creating a subroutine library, do not... |
tty(1) -- Returns pathname of terminal device
|
The command tty -s evaluates as TRUE if standard input is a display and FALSE if it is not. [Tru64 UNIX] The file /dev/tty is a special file always refers to your controlling terminal, although it als... |
twm(1X) -- Tab Window Manager for the X Window System
|
twm is a window manager for the X Window System. It provides titlebars, shaped windows, several forms of icon management, user-defined macro functions, click-to-type and pointer-driven keyboard focus,... |
txt2jdic(1) -- Convert Japanese text and dictionary files between the JSY, WX, and VJE input methods
|
Three Japanese input methods are used on a Tru64 UNIX system: the JSY input method (HP), the WX input method (A.I. Soft Company), and the VJE input method (VACS Company). Software for the JSY input me... |
type(1) -- Writes a description of command type
|
The type utility indicates how each argument would be interpreted if used as a command name. The standard output of type contains information about each parameter. The information provided identifies ... |
u(1) -- Displays a compact list of users who are on the system
|
The users command lists the login names of the users currently on the system in a compact, one-line format. The usernames are in collated order. |
uac(1) -- Unaligned Access Message Control
|
Most complex instruction set computers (CISC) can access unaligned data but only at a significantly reduced speed. Most reduced instruction set computers (RISC) do not attempt to handle unaligned acce... |
uil(1X) -- The user interface language compiler
|
The uil command invokes the UIL compiler. The User Interface Language (UIL) is a specification language for describing the initial state of a user interface for a Motif application. The specification ... |
ul(1) -- Translates underlining for display on a terminal
|
The ul command translates underscores to the sequence that indicates display underlining for the terminal in use, as specified by the TERM environment variable. |
ulimit(1) -- Sets or reports a resource limit
|
This command sets, or reports, the limit on the size of system resources, as indicated by the option. [Tru64 UNIX] If neither the -H option nor the -S option is specified, the limit applies to both ha... |
umask(1) -- Displays or sets the file mode creation mask
|
The umask command sets the file mode creation mask of the current shell execution environment to the value specified by the mask operand. This mask affects the initial value of the file permission bit... |
unalias(1) -- Removes alias definitions
|
The unalias utility removes the definition for each alias name specified. The aliases are removed from the current shell execution environment. |
uname(1) -- Displays information about the operating system
|
The uname command writes system information to standard output. This command is used primarily to determine which system you are using. The options cause selected information returned by the uname() c... |
uncompress(1) -- Compresses and expands data
|
The compress command reduces the size of the named files using adaptive Lempel-Ziv coding. Whenever possible, each file is replaced by one with the extension while keeping the same ownership modes, ac... |
unexpand(1) -- Replaces tab characters with spaces or spaces with tab characters
|
The expand command changes tab characters to spaces in the named files, or the standard input, and writes the result to the standard output. The unexpand command puts tab characters into the data from... |
unget(1) -- Cancels a previous get command
|
The unget command lets you restore a g-file created with a get -e before the new delta is created, and therefore discard the changes (see the get and delta commands). The unget command lets you revers... |
unifdef(1) -- Removes #ifdefed lines
|
The unifdef command recognizes nested #ifdefs, comments, single and double quotes of C syntax so that it can function correctly, but does not include files or interpret macros. The unifdef command rec... |
uniq(1) -- Removes or lists repeated lines in a file
|
The input_file and output_file arguments must be different files. If the input_file operand is not specified, or if it is -, uniq uses standard input. Repeated lines must be on consecutive lines to be... |
units(1) -- Converts units from one measure to another
|
The units command converts quantities expressed in one measurement to their equivalents in another. The units command is an interactive command. It prompts you for the unit you want to convert from an... |
unix2dos(1) -- mtools utility to convert a UNIX file to DOS format
|
The unix2dos command converts a file from UNIX format to DOS format. The converted file replaces the original file. Subdirectory names that contain the '/' or '\' separator are supported. If you ... |
unlink(1) -- Creates an additional directory entry for an existing file
|
The link command performs the link() system call to create an additional directory entry for an existing file, file1. In effect, the underlying file then has two names, file1 and file2 (either of thes... |
unpack(1) -- Compresses and expands files
|
The pack command The pack command stores the specified file in a compressed form. The input file is replaced by a packed file with a name derived from the original file name (file.z), with the ownersh... |
uprofile(1) -- Profile a program (uprofile) or kernel
|
See prof_intro(1) for an introduction to the application performance tuning tools provided with Tru64 UNIX. The uprofile command uses the Alpha on-chip performance counters to produce a finely-grained... |
uptime(1) -- Shows how long a system has been running
|
The display of the uptime command is identical to the heading of a w command display. The load average numbers give the number of jobs in the run queue for the last 5 seconds, the last 30 seconds, and... |
users(1) -- Displays a compact list of users who are on the system
|
The users command lists the login names of the users currently on the system in a compact, one-line format. The usernames are in collated order. |
uucp(1) -- Copies files from one system to another (UNIX-toUNIX system copy)
|
The uucp command can copy files within a local system, between a local and a remote system, and between two remote systems. The uucp command accomplishes the file transfer in two steps: first, by crea... |
uudecode(1) -- Encodes or decodes a binary file
|
The uuencode and uudecode commands are used to send a binary file via uucp or other mail. This combination can be used over indirect mail links even when uusend is not available. The uuencode command ... |
uuencode(1) -- Encodes or decodes a binary file
|
The uuencode and uudecode commands are used to send a binary file via uucp or other mail. This combination can be used over indirect mail links even when uusend is not available. The uuencode command ... |
uulog(1) -- Displays UUCP log files
|
Individual log files are created for each remote system with which the local system communicates using the uucp, uusend, uuto, or uux commands. Use the uulog command to display a summary of uucp, uuse... |
uuname(1) -- Displays names of accessible systems
|
In order for a local system to communicate with a remote system, the remote system must support the UUCP protocol. The accessible remote systems are listed in the /usr/lib/uucp/Systems file. Before co... |
uupick(1) -- Accepts or rejects files transmitted to a user by uuto
|
When the files have arrived, the rmail command notifies the recipient, who then issues the uupick command to receive and handle the files. Specifically, uupick searches the public directory on the loc... |
uusend(1) -- Sends a file to a remote host
|
The remote system does not need to be directly connected to the local system, but a chain of uucp links needs to connect the two system. |
uustat(1) -- Reports status of and provides job control for remote file transfer requests and other operations
|
The uustat command is particularly useful in monitoring transfer (copy) requests issued with the uucp and uuto commands, and requests made with the uux command to run commands on a remote system. In a... |
uuto(1) -- Copies public files between systems using local file access control
|
The uuto command calls the uucp command for the actual file transfer, but uuto enables the recipient to use the uupick command to handle the transferred files on the local system. The source argument ... |
uutry(1) -- Tries to contact remote system with debugging on
|
The uutry command is a shell that invokes uucico to call a remote site, system. Debugging is turned on (level 9). The debugging output is put into the file /tmp/system. A tail -f on this file is execu... |
uux(1) -- Runs a command on another system
|
The command gathers various files from the designated systems, if necessary. It then runs a specified command on a designated system. The user can direct the output from the command to a specified fil... |
uuxqt(1) -- Executes remote command requests
|
When uux is entered by a user, the program creates the necessary C.* (Command), D.* (Data), and X.* (Execute) files and places them in the spooling directory on the designated remote system. The uux c... |
vacation(1) -- Informs senders of mail that recipient is absent
|
The vacation command accepts standard input and attempts to send a vacation message to the user specified in that input, which should be a mail message. The vacation command is usually invoked in your... |
val(1) -- Validates Source Code Control System (SCCS) files
|
The val command reads files and determines whether each specified file is an SCCS file meeting the characteristics specified by the options. The val command displays error messages to standard output ... |
vedit(1) -- Edits files with a full screen display
|
The ex editor subcommands can be used within the vi editor, because vi is based on ex. The view command is a read-only version of vi; the readonly option is set to protect files during browsing. The v... |
vi(1) -- Edits files with a full screen display
|
The ex editor subcommands can be used within the vi editor, because vi is based on ex. The view command is a read-only version of vi; the readonly option is set to protect files during browsing. The v... |
view(1) -- Edits files with a full screen display
|
The ex editor subcommands can be used within the vi editor, because vi is based on ex. The view command is a read-only version of vi; the readonly option is set to protect files during browsing. The v... |
viewres(1X) -- graphical class browser for Xt
|
The viewres program displays a tree showing the widget class hierarchy of the Athena Widget Set. Each node in the tree can be expanded to show the resources that the corresponding class adds (that is,... |
vje2jsytxt(1) -- Convert Japanese text and dictionary files between the JSY, WX, and VJE input methods
|
Three Japanese input methods are used on a Tru64 UNIX system: the JSY input method (HP), the WX input method (A.I. Soft Company), and the VJE input method (VACS Company). Software for the JSY input me... |
vmstat(1) -- Displays virtual memory statistics
|
Use the vmstat command to display statistics which describe how virtual memory is used. To cause the vmstat command to display statistics at the specified interval, specify a time in seconds for the o... |
w(1) -- Prints a summary of current system activity
|
The system summary shows the current time, the amount of time since the system was last started, the number of users logged in to the system, and the load averages. The load average numbers give the n... |
wait(1) -- Awaits process completion
|
When an asynchronous list is started by the shell, the process ID of the last command in each element of the asynchronous list becomes known in the current shell execution environment. If the wait uti... |
wall(1) -- Sends a message to all users logged into the local system or to all members of a cluster
|
The wall command reads from standard input until you press the End-of-File key sequence, or takes its input from the contents of file if you specify it, and sends the input as a message to all users w... |
wc(1) -- Counts the lines, words, characters, and bytes in a file
|
A word is defined as a string of characters delimited by white space as defined in the X/Open Base Definitions for XCU4. The wc command counts lines, words, and bytes by default. Use the appropriate o... |
what(1) -- Displays identifying information for Source Code Control System (SCCS) files
|
The what command searches the named files for all occurrences of the pattern that get(1) substitutes for the %Z% keyletter, and writes to standard output whatever follows the pattern up to, but not in... |
whatis(1) -- Describes a command's function
|
The whatis command is equivalent to the man command with the -f option. |
whatnow(1) -- prompting front-end for send (only available within the message handling system, mh)
|
After you have finished editing a draft message in comp, dist, forw or repl, the whatnow program prompts you for the next required action. Press at the What now? prompt to see a list of the a... |
whereis(1) -- Locates files for programs
|
The whereis program locates source, binary, and reference pages for the specified programs. When looking for a match, the program names are stripped of leading pathname components and any trailing ext... |
which(1) -- Locates a program file including aliases and paths
|
The which command takes a list of program names and looks for the files that would be executed if these names were given as commands. Each program argument is expanded if it is aliased and searched fo... |
who(1) -- Identifies users currently logged in
|
The who command displays the following information for the users and/or processes you specify: Login name Terminal name Date Time of login Host Entering who am i or who am I displays your login name, ... |
whoami(1) -- Displays the user's name
|
The whoami command displays the username associated with your current ID. Unlike who am i, this command tells you what your effective user ID is, and not who is logged on to your tty (it does not use ... |
whois(1) -- Internet username directory service
|
The name argument can specify the following: The name of a registered user The name of a registered Internet host The name of some other entity recognized by the whois server By default, the whois com... |
whom(1) -- report to whom a message is addressed (only available within the message handling system, mh)
|
The whom command is used to expand the headers of a message into a set of addresses, and optionally to verify that those addresses are deliverable at that time if -check is given. The whom command is ... |
window(1) -- Implements a window environment
|
A window is a rectangular portion of the physical terminal screen associated with a set of processes. Its size and position can be changed by the user at any time. Processes communicate with their win... |
write(1) -- Sends messages to other users
|
When two users converse with write, each user alternately sends and receives short messages from their respective terminals. [Tru64 UNIX] For another user to receive your message, that user must be lo... |
wx2jsytxt(1) -- Convert Japanese text and dictionary files between the JSY, WX, and VJE input methods
|
Three Japanese input methods are used on a Tru64 UNIX system: the JSY input method (HP), the WX input method (A.I. Soft Company), and the VJE input method (VACS Company). Software for the JSY input me... |
X(1X) -- a portable, network-transparent window system
|
X Window System servers run on computers with bitmap displays. The server distributes user input to and accepts output requests from various client programs through a variety of different interprocess... |
x11perf(1X) -- X11 server performance test program
|
The x11perf program runs one or more performance tests and reports how fast an X server can execute the tests. Many graphics benchmarks assume that the graphics device is used to display the output of... |
x11perfcomp(1X) -- X11 server performance comparison program
|
The x11perfcomp program merges the output of several x11perf(1X) runs into a nice tabular format. It takes the results in each file, fills in any missing test results if necessary, and for each test s... |
xargs(1) -- Constructs argument lists and runs commands
|
The xargs command runs the command string as many times as necessary to process all input arguments. The default command string is echo. Arguments read from standard input are character strings delimi... |
xauth(1X) -- X authority file utility
|
The xauth program is used to edit and display the authorization information used in connecting to the X server. This program is usually used to extract authorization records from one machine and merge... |
xbiff(1X) -- mailbox flag for X
|
The xbiff program displays a little image of a mailbox. When there is no mail, the flag on the mailbox is down. When mail arrives, the flag goes up and the mailbox beeps. By default, pressing any mous... |
xcalc(1X) -- scientific calculator for X
|
xcalc is a scientific calculator desktop accessory that can emulate a TI-30 or an HP-10C. |
xcd(1X) -- Motif based CD player control panel
|
The xcd command displays a graphical representation of a compact disk player's control panel using X-based Motif windows. The display includes a main key pad with keys for PLAY, STOP, PAUSE, EJECT, N... |
xclipboard(1X) -- X clipboard client
|
The xclipboard program is used to collect and display text selections that are sent to the CLIPBOARD by other clients. It is typically used to save CLIPBOARD selections for later use. It stores each C... |
xclock(1X) -- analog / digital clock for X
|
The xclock program displays the time in analog or digital form. The time is continuously updated at a frequency which may be specified by the user. |
xcmsdb(1X) -- Device Color Characterization utility for X Color Management System
|
xcmsdb is used to load, query, or remove Device Color Characterization data stored in properties on the root window of the screen as specified in section 7, Device Color Characterization, of the ICCCM... |
xconsole(1X) -- monitor system console messages with X
|
The dxconsole and xconsole programs display messages which are usually sent to /dev/console. By default, xconsole presents the Athena interface and dxconsole presents the Motif interface. Since dxcons... |
XConsortium(1X) -- X Consortium information
|
The X Consortium is an independent, not-for-profit Delaware membership corporation. It was formed in 1993 as the successor to the MIT X Consortium. The purpose of the X Consortium is to foster the dev... |
xcutsel(1X) -- interchange between cut buffer and selection
|
The xcutsel program is used to copy the current selection into a cut buffer and to make a selection that contains the current contents of the cut buffer. It acts as a bridge between applications that ... |
Xdec(1X) -- X Window System server
|
The Xdec command starts the X server. The Xdec command supports the run-time loading and execution of X server libraries on Tru64 UNIX platforms with graphics devices. The command loads appropriate li... |
xdm(1X) -- X Display Manager with support for XDMCP, host chooser
|
The xdm program manages a collection of X displays, which may be on the local host or remote servers. The design of xdm was guided by the needs of X terminals as well as the X Consortium standard XDMC... |
xdpr(1X) -- dump an X window directly to a printer
|
The xdpr command uses the commands xwd, xpr, and lpr orlp to dump an X window, process it for a particular printer type, and print it out on the printer of your choice. This is the easiest way to get ... |
xdpyinfo(1X) -- display information utility for X
|
The xdpyinfo program is a utility for displaying information about an X server. It is used to examine the capabilities of a server, the predefined values for various parameters used in communicating b... |
xearth(1X) -- displays a shaded image of the Earth in the root window
|
xearth sets the X root window to an image of the Earth, as seen from your favorite vantage point in space, correctly shaded for the current position of the Sun. By default, xearth updates the displaye... |
xedit(1X) -- simple text editor for X
|
The xedit program provides a window consisting of the following four areas: A set of commands that allow you to exit xedit, save the file, or load a new file into the edit window. Displays xedit messa... |
xemacs(1) -- emacs editor
|
The emacs software is unsupported software that is provided as part of Tru64 UNIX. We will fix problems in this unsupported software only if they are specific to Tru64 UNIX. We will not fix problems t... |
xev(1X) -- print contents of X events
|
The xev program creates a window and then asks the X server to send it events whenever anything happens to the window (such as being moved, resized, typed in, clicked in, and so forth.). You can also ... |
xeyes(1X) -- a follow the mouse X demo
|
The xeyes program watches what you do and reports to the Boss. |
xfd(1X) -- display all the characters in an X font
|
The xfd utility creates a window containing the name of the font being displayed, a row of command buttons, several lines of text for displaying character metrics, and a grid containing one glyph per ... |
xfontsel(1X) -- point & click interface for selecting X11 font names
|
The xfontsel application provides a simple way to display the fonts known to your X server, examine samples of each, and retrieve the X Logical Font Description ("XLFD") full name for a font. If -pa... |
xfs(1X) -- X font server
|
xfs is the X Window System font server. It supplies fonts to X Window System display servers. |
xgas(1X) -- animated simulation of an ideal gas
|
xgas is a physical simulation of an ideal gas in a heated box. Gas molecules move around the box with velocities dependent on their temperature. A chamber consisting of two boxes contains the gas mole... |
xgc(1X) -- X graphics demo
|
The xgc program demonstrates various features of the X graphics primitives. Try the buttons, see what they do; we have not the time to document them, perhaps you do? |
xhost(1X) -- server access control program for X
|
The xhost program is used to add and delete host names or user names to the list allowed to make connections to the X server. In the case of hosts, this provides a rudimentary form of privacy control ... |
xieperf(1X) -- XIE server extension test and demo program
|
The xieperf program is based upon R5 x11perf(1X), and while not entirely comprehensive in its coverage of the XIE protocol (see BUGS, below), it is intended to be useful in the evaluation of XIE imple... |
xkbcomp(1X) -- compile XKB keyboard description
|
The xkbcomp keymap compiler converts a description of an XKB keymap into one of several output formats. The most common use for xkbcomp is to create a compiled keymap file (.xkm extension) which can b... |
xkbdfltmap(1X) -- Determine default X keymap for locale and keyboard
|
The xkbdfltmap command queries the system console for the language and keyboard settings. Then, based upon whether the XKB server extension is active in the server, it will optionally download an xmod... |
xkbprint(1X) -- print an XKB keyboard description
|
The xkbprint command generates a printable or encapsulated PostScript description of the XKB keyboard description specified by source. The source can be any compiled keymap (.xkm) file that includes a... |
xkill(1X) -- kill a client by its X resource
|
The xkill command is a utility for forcing the X server to close connections to clients. This program is very dangerous, but is useful for aborting programs that have displayed undesired windows on a ... |
xload(1X) -- system load average display for X
|
The xload program displays a periodically updating histogram of the system load average. |
xlogo(1X) -- X Window System logo
|
The xlogo program displays the X Window System logo. |
xlsatoms(1X) -- list interned atoms defined on server
|
The xlsatoms command lists the interned atoms. By default, all atoms starting from 1 (the lowest atom value defined by the protocol) are listed until unknown atom is found. If an explicit range is giv... |
xlsclients(1X) -- list client applications running on a display
|
The xlsclients command is a utility for listing information about the client applications running on a display. It may be used to generate scripts representing a snapshot of the user's current sessio... |
xlsfonts(1X) -- server font list displayer for X
|
The xlsfonts command lists the fonts that match the given pattern. The wildcard character "*" may be used to match any sequence of characters (including none), and "?" to match any single characte... |
xmag(1X) -- magnify parts of the screen
|
The xmag program allows you to magnify portions of an X screen. The magnification occurs on the screen specified by the $DISPLAY environmental variable or by the -display command line option regardles... |
xman(1X) -- Manual page display program for the X Window System
|
The xman program is a manual page browser. The default size of the initial xman window is small so that you can leave it running throughout your entire login session. In the initial window there are t... |
xmbind(1X) -- Configures virtual key bindings
|
xmbind is an X Window System client that configures the virtual key bindings for Motif applications. This action is performed by mwm at its startup, so the xmbind client is only needed when mwm is not... |
xmesh(1) -- Reports utilization percentages of EV7 based AlphaServer systems mesh components.
|
You use the xmesh application to view a mesh, which is the interconnection of CPUs on EV7 based AlphaServer systems. The xmesh application reports the percent of utilization for the hardware component... |
xmh(1X) -- send and read mail with an X interface to MH
|
The xmh program provides a graphical user interface to the MH Message Handling System. To actually do things with your mail, it makes calls to the MH package. Electronic mail messages may be composed,... |
xmkmf(1X) -- create a Makefile from an Imakefile
|
The xmkmf command is the normal way to create a Makefile from an Imakefile shipped with third-party software. When invoked with no arguments in a directory containing an Imakefile, the imake program i... |
xmodmap(1X) -- utility for modifying keymaps in X
|
The xmodmap program is used to edit and display the keyboard modifier map and keymap table that are used by client applications to convert event keycodes into keysyms. It is usually run from the user... |
Xnest(1X) -- a nested X server
|
Xnest is a client and a server. Xnest is a client of the real server which manages windows and graphics requests on its behalf. Xnest is a server to its own clients. Xnest manages windows and graphics... |
xon(1X) -- start an X program on a remote machine
|
The xon program runs the specified command (default xterm -ls) on the remote machine using rsh, remsh, or rcmd. xon passes the DISPLAY, XAUTHORITY and XUSERFILESEARCHPATH environment variables to the ... |
xpr(1X) -- print an X window dump
|
The xpr command takes as input a window dump file produced by xwd(1X) and formats it for output on PostScript printers, the LN03 or LA100, the IBM PP3812 page printer, the HP LaserJet (or other PCL pr... |
xprop(1X) -- property displayer for X
|
For each of these properties, its value on the selected window or font is printed using the supplied formatting information if any. If no formatting information is supplied, internal defaults are used... |
xrdb(1X) -- X server resource database utility
|
The xrdb command is used to get or set the contents of the RESOURCE_MANAGER property on the root window of screen 0, or the SCREEN_RESOURCES property on the root window of any or all screens, or every... |
xrefresh(1X) -- refresh all or part of an X screen
|
xrefresh is a simple X program that causes all or part of your screen to be repainted. This is useful when system messages have messed up your screen. xrefresh maps a window on top of the desired area... |
xrx(1X) -- helper program
|
The helper program may be used with any Web browser to interpret documents in the RX MIME type format and start remote applications. xrx reads in the RX document specified by its filename, from which ... |
Xsecurity(1X) -- X display access control
|
X provides mechanism for implementing many access control systems. Release 6 includes five mechanisms: Host Access Simple host-based access control. MIT-MAGIC-COOKIE-1 Shared plain-text "cookies". X... |
XSecurity(1X) -- X display access control
|
X provides mechanism for implementing many access control systems. Release 6 includes five mechanisms: Host Access Simple host-based access control. MIT-MAGIC-COOKIE-1 Shared plain-text "cookies". X... |
Xserver(1X) -- X Window System server
|
The Xdec command starts the X server. The Xdec command supports the run-time loading and execution of X server libraries on Tru64 UNIX platforms with graphics devices. The command loads appropriate li... |
xset(1X) -- user preference utility for X
|
This program is used to set various user preference options of the display. |
xsetroot(1X) -- root window parameter setting utility for X
|
The setroot program allows you to tailor the appearance of the background ("root") window on a workstation display running X. Normally, you experiment with xsetroot until you find a personalized loo... |
xsoundsentry(1X) -- Visual bell monitor
|
The xsoundsentry utility provides visual indications of bell events that occur in the X server. These bell events result from calls to XBell. (See XBell(3X11)). This utility is useful for people with ... |
XStandards(1X) -- X Consortium Standards
|
The following documents are X Consortium standards: X Window System Protocol X Version 11, Release 6 Robert W. Scheifler Xlib - C Language X Interface X Version 11, Release 6 James Gettys, Robert W. S... |
xstdcmap(1X) -- X standard colormap utility
|
The xstdcmap utility can be used to selectively define standard colormap properties. It is intended to be run from a user's X startup script to create standard colormap definitions in order to facili... |
xstr(1) -- Extracts strings from C programs to implement shared strings
|
The strings extracted by xstr are replaced with references to this array. This serves to implement shared constant strings, most useful if they are also read-only. The following command extracts the s... |
xterm(1X) -- terminal emulator for X
|
The xterm program is a terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that cannot use the window system directly. If the underlyi... |
Xvfb(1X) -- virtual framebuffer X server
|
Xvfb is an X server that can run on machines with no display hardware and no physical input devices. It emulates a dumb framebuffer using virtual memory. The Xvfb command supports the run-time loading... |
xwd(1X) -- dump an image of an X window
|
The xwd utility is an X Window System window dumping utility. xwd allows X users to store window images in a specially formatted dump file. This file can then be read by various other X utilities for ... |
xwininfo(1X) -- window information utility for X
|
The xwininfo program is a utility for displaying information about windows. Various information is displayed depending on which options are selected. If no options are chosen, -stats is assumed. The u... |
xwud(1X) -- image displayer for X
|
The xwud program is an X Window System image undumping utility. xwud allows X users to display in a window an image saved in a specially formatted dump file, such as produced by xwd(1X). |
yacc(1) -- Generates an LR(1) parsing program from input consisting
|
The yacc command converts a context-free grammar specification into a set of tables for a simple automaton that executes an LR(1) parsing algorithm. The yacc grammar can be ambiguous; specified preced... |
yes(1) -- Affirms repetitively
|
The yes command repeatedly outputs y, or the locale's equivalent of a y, or, if specified, explication. (The LC_MESSAGES variable determines the locale's equivalent of y or n (for yes/no queries)). ... |
ypcat(1) -- print values from an Network Information Service (NIS) data base
|
The ypcat command prints values stored in an NIS map specified by mname, which may be either a mapname or a map nickname. To look at the network-wide password database, passwd.byname, with the nicknam... |
ypmatch(1) -- print the value of one or more keys from an NIS map
|
The ypmatch command prints the values associated with one or more keys from the Network Information Service (NIS) map (database) specified by mname, which may be either a mapname or a map nickname. Mu... |
yppasswd(1) -- change password in Network Information Service (NIS)
|
Note If Enhanced Security is enabled on your system, use the passwd command to change your password, even if NIS is in use. The yppasswd command lets you change your password in the Network Informatio... |
ypwhich(1) -- determine which host is the current NIS server or map master.
|
The ypwhich command identifies the Network Information Service (NIS) server that currently supplies NIS services to an NIS client. It also identifies which NIS server is the master for a map. If invok... |
zcat(1) -- Compresses and expands data
|
The compress command reduces the size of the named files using adaptive Lempel-Ziv coding. Whenever possible, each file is replaced by one with the extension while keeping the same ownership modes, ac... |
[(1) -- Evaluates conditional expressions
|
The test command evaluates an expression constructed of functions and operators. If the value of expression is true, test returns an exit value of zero (0); otherwise, it returns FALSE, a nonzero exit... |
accept(2) -- Accept a new connection on a socket
|
The accept() function extracts the first connection on the queue of pending connections, creates a new socket with the same properties as the specified socket, and allocates a new file descriptor for ... |
access(2) -- Determines the accessibility of a file
|
The access() function checks for accessibility of the file specified by a pathname. Only access bits are checked. A directory may be indicated as writable by access(), but an attempt to open it for wr... |
acct(2) -- Enables and disables process accounting
|
The acct() function enables and disables UNIX process accounting. When enabled, process accounting produces an accounting record on behalf of each terminating process. The path parameter specifies the... |
adjtime(2) -- Correct the time to allow synchronization of the system clock
|
The adjtime() function makes small adjustments to the system time (as returned by the gettimer() function), advancing or decreasing it by the time specified by the delta parameter of the timeval struc... |
aio_fsync(2) -- Asynchronously writes changes in a file to permanent storage
|
The aio_fsync function asynchronously causes system buffers containing a file's modified data to be written to permanent storage. All modified data in the file indicated by the file descriptor in the... |
async_daemon(2) -- Create a local NFS asynchronous I/O server
|
The use of the async_daemon() function is not supported in customer applications, and the interface is subject to change without notice. It is intended for use solely by nfsiod(8). The async_daemon() ... |
atexit(2) -- Terminate a process
|
The atexit() function registers functions to be called at normal process termination for cleanup processing. The function adds a single exit handler to a list of handlers to be called at process termi... |
audcntl(2) -- audit control
|
The audcntl system call provides control over flags offered by the audit subsystem. All requests, except where otherwise noted, are privileged. The following list describes the requests: The system au... |
audgen(2) -- generate an audit record
|
The audgen system call generates an audit record. The argument event is an integer indicating the event type of the operation being audited (see audit.h). The value of event must be between one of the... |
bind(2) -- Bind a name to a socket
|
The bind() function assigns an address to an unnamed socket. Sockets created with the socket() function are unnamed; they are identified only by their address family. A bind that references a UNIX dom... |
brk(2) -- Change space allocation
|
The brk() function sets the lowest data segment location not used by the program (called the break) to addr. In the alternate function sbrk(), incr more bytes are added to the program's data space, a... |
bsd_signal(2) -- Interface to simplified signal facilities
|
The bsd_signal() function provides a partially compatible interface for programs written to historical system interfaces. The handler function should be declared as follows (sig is the signal number).... |
chdir(2) -- Change the current directory
|
The chdir() function changes the current directory to the directory indicated by the path parameter. If the path parameter refers to a symbolic link, the chdir() function sets the current directory to... |
chmod(2) -- Change file access permissions
|
The chmod() function sets the access permissions of the file specified by the path parameter according to the bit pattern specified by the mode parameter. The fchmod() function sets the access permiss... |
chown(2) -- Change the owner and group IDs of a file
|
The chown(), lchown() and fchown() functions change the owner and group of a file. A process can change the value of the owner ID of a file only if the process has superuser privilege. A process witho... |
chroot(2) -- Change the effective root directory
|
The chroot() function causes the directory named by the path parameter to become the effective root directory. The effective root directory is the starting point when searching for a file's pathname ... |
close(2) -- Close the file associated with a file descriptor
|
The close() function closes the file associated with the filedes parameter. All regions of a file specified by the filedes parameter that this process has previously locked with the lockf() function a... |
connect(2) -- Connect two sockets
|
The connect() function requests a connection between two sockets. The kernel sets up the communications links between the sockets; both sockets must use the same address format and protocol. The conne... |
creat(2) -- Open a file for reading or writing
|
The following two function calls are equivalent: creat(path, mode); open(path, O_WRONLY | O_CREAT | O_TRUNC, mode); The open() and creat() functions establish a connection between the file named by th... |
dup(2) -- Control open file descriptors
|
The fcntl() function performs controlling operations on the open file specified by the filedes parameter. When the fcntl(), dup() and dup2() functions need to block, only the calling thread is suspend... |
dup2(2) -- Control open file descriptors
|
The fcntl() function performs controlling operations on the open file specified by the filedes parameter. When the fcntl(), dup() and dup2() functions need to block, only the calling thread is suspend... |
environ(2) -- Execute a file
|
The exec functions replace the current process image with a new process image. The system constructs the new image from an executable file, called a new process image file. Successful calls to exec fu... |
errno(2) -- Introduction to system calls
|
Section 2 describes the Tru64 UNIX system calls, which are the entries into the operating system kernel. Some reference pages in this section may contain suffixes to allow their files to exist with th... |
exec(2) -- Execute a file
|
The exec functions replace the current process image with a new process image. The system constructs the new image from an executable file, called a new process image file. Successful calls to exec fu... |
execl(2) -- Execute a file
|
The exec functions replace the current process image with a new process image. The system constructs the new image from an executable file, called a new process image file. Successful calls to exec fu... |
execle(2) -- Execute a file
|
The exec functions replace the current process image with a new process image. The system constructs the new image from an executable file, called a new process image file. Successful calls to exec fu... |
execlp(2) -- Execute a file
|
The exec functions replace the current process image with a new process image. The system constructs the new image from an executable file, called a new process image file. Successful calls to exec fu... |
execv(2) -- Execute a file
|
The exec functions replace the current process image with a new process image. The system constructs the new image from an executable file, called a new process image file. Successful calls to exec fu... |
execve(2) -- Execute a file
|
The exec functions replace the current process image with a new process image. The system constructs the new image from an executable file, called a new process image file. Successful calls to exec fu... |
execvp(2) -- Execute a file
|
The exec functions replace the current process image with a new process image. The system constructs the new image from an executable file, called a new process image file. Successful calls to exec fu... |
exec_with_loader(2) -- Execute a file with a loader
|
The exec_with_loader() function replaces the current process image with a new process image, in a manner similar to what the exec functions do. Both the loader parameter and the file parameter point t... |
exit(2) -- Terminate a process
|
The atexit() function registers functions to be called at normal process termination for cleanup processing. The function adds a single exit handler to a list of handlers to be called at process termi... |
exportfs(2) -- Export an NFS file system
|
The exportfs system call allows the specified local file system to be mounted remotely by an NFS client. This system call is usually called from mountd. The system call allows access to the kernels ex... |
fchdir(2) -- Change the current directory
|
The chdir() function changes the current directory to the directory indicated by the path parameter. If the path parameter refers to a symbolic link, the chdir() function sets the current directory to... |
fchmod(2) -- Change file access permissions
|
The chmod() function sets the access permissions of the file specified by the path parameter according to the bit pattern specified by the mode parameter. The fchmod() function sets the access permiss... |
fchown(2) -- Change the owner and group IDs of a file
|
The chown(), lchown() and fchown() functions change the owner and group of a file. A process can change the value of the owner ID of a file only if the process has superuser privilege. A process witho... |
fcntl(2) -- Control open file descriptors
|
The fcntl() function performs controlling operations on the open file specified by the filedes parameter. When the fcntl(), dup() and dup2() functions need to block, only the calling thread is suspend... |
fdatasync(2) -- Writes data changes in a file to permanent storage
|
The fdatasync function causes system buffers containing a file's modified data to be written to permanent storage. The fdatasync function does not return until the operation has been completed. The f... |
flock(2) -- Apply or remove an advisory lock on an open file
|
The flock() function applies or removes an advisory lock on the file associated with the filedes file descriptor. Advisory locks allow cooperating processes to perform consistent operations on files, ... |
fork(2) -- Create a new process
|
The fork() and vfork() functions create a new process (child process) that is identical to the calling process (parent process). The child process inherits the following from the parent process: Envir... |
fpathconf(2) -- Retrieve file implementation characteristics
|
The fpathconf() and pathconf() functions provide a method for an application to determine the current value of a configurable limit or option (variable) that is associated with a file or directory. Fo... |
freezefs(2) -- The freezefs() API causes the specified fileset's domain to enter into a metadata stable state, caus...
|
To allow coherent hardware snapshots in multivolume domain configurations, filesystem metadata must be consistent across all volumes when the individual volumes are snapped or cloned. These configurat... |
fstat(2) -- Provide information about a file
|
The stat() function obtains information about the file named by the path parameter. Read, write, or execute permission for the named file is not required, but all directories listed in the pathname le... |
fstatfs(2) -- Get file system statistics
|
The statfs() and fstatfs() functions return information about a mounted file system. The returned information is in the format of the statfs structure that is declared in the file. When... |
fstatvfs(2) -- Get file system information
|
The statvfs() and fstatvfs() functions return descriptive information about a mounted file system. The returned information is in the format of a statvfs structure, which is defined in the |
fsync(2) -- Write changes in a file to permanent storage
|
The fsync() function causes system buffers containing a file's modified data and attributes to be written to permanent storage. The fsync() function does not return until the operation has been compl... |
ftime(2) -- Gets and sets date and time and converts time between timeval and timeval64
|
The gettimeofday(), ftime(), and settimeofday() functions get and set the time and timezone information stored in the kernel. The gettimeofday() function gets the current time, expressed in seconds an... |
ftruncate(2) -- Change file length
|
The truncate() and ftruncate() functions change the length of a file to the size in bytes specified by the length parameter. If the new length is less than the previous length, the truncate() and ftru... |
fuser(2) -- Reports PIDs and UIDs for files, file systems and/or the devices attached to them.
|
The fuser function reports a list of PIDs and UIDs that are associated with a specified file, file system, and/or the devices that are attached to them. The fuser function can report back additional i... |
getaddressconf(2) -- Get information about the system address space configuration
|
The getaddressconf() function fills in the array of structures pointed to by the buffer parameter with information describing the configuration of process address space on the system. This information... |
getcontext(2) -- Initiates and restores user level context switching
|
Using both the getcontext() and setcontext() functions enables you to initiate user level context control, switching between multiple threads of control within a single process. When you call getconte... |
getdirentries(2) -- Get directory entries in a file-system independent format.
|
The getdirentries() function reads directory entries from a directory into a buffer. The entries are returned as dirent structures, a file-system independent format. Caution This call is not the POSIX... |
getdomainname(2) -- get or set name of current domain
|
The getdomainname system call returns the domain name of the current host, as set by setdomainname. The setdomainname system call sets the domain of the host machine to be name, which has a length spe... |
getdtablesize(2) -- Get the size of the descriptor table
|
The getdtablesize() function returns the maximum number of file descriptors in a process' descriptor table. Each process has a fixed size descriptor table that is guaranteed to have at least 64 slots... |
getegid(2) -- Get the group ID of the calling process
|
The getgid() function returns the real group ID of the calling process. The getegid() function returns the effective group ID of the calling process. The real group ID is specified at login time. The ... |
geteuid(2) -- Get the real or effective user ID
|
The getuid() function returns the real user ID of the calling process. The geteuid() function returns the effective user ID of the calling process. |
getfh(2) -- Get a file handle
|
The getfh() function returns a file handle for the specified file or directory in the file handle pointed to by the fhp parameter. This function is restricted to the root user. |
getfsstat(2) -- Get a list of all mounted file systems
|
The getfsstat() function returns information about all mounted file systems. Upon successful completion, the buffer pointed to by the buf parameter is filled with an array of statfs structures, one fo... |
getgid(2) -- Get the group ID of the calling process
|
The getgid() function returns the real group ID of the calling process. The getegid() function returns the effective group ID of the calling process. The real group ID is specified at login time. The ... |
getgroups(2) -- Get the supplementary group IDs of the current process
|
The getgroups() function gets the current supplementary group IDs of the calling process. The list is stored in the array pointed to by the grouplist parameter. The gidsetsize parameter indicates the ... |
gethostid(2) -- Get the unique identifier of the current host
|
The gethostid() function allows a process to retrieve the 32-bit identifier for the current host. The host ID is stored in network standard byte order and is set either by the hostid(1) command or the... |
gethostname(2) -- Get the name of the local host
|
The gethostname() function retrieves the host name of the local host as it is configured on the system. If a fullyqualified domain name is configured as the host name, that name is returned. If suffic... |
getitimer(2) -- Return or set the value of interval timers
|
The getitimer() function returns the current value for the timer specified by the which parameter in the structure pointed to by the value parameter. The setitimer() function sets the timer specified ... |
getlogin(2) -- Get or set the login name
|
The getlogin() function returns the login name of the user associated with the current session. The name is normally associated with a login shell at the time a session is created, and is inherited by... |
getlogin_r(2) -- Get or set the login name
|
The getlogin() function returns the login name of the user associated with the current session. The name is normally associated with a login shell at the time a session is created, and is inherited by... |
getmsg(2) -- Receive the next message from a Stream
|
The getmsg() and getpmsg() functions retrieve the contents of messages. These messages are located at the Stream head read queue associated with a STREAMS file. Messages must contain a control part or... |
getpagesize(2) -- Get the system page size
|
The getpagesize() function returns the number of bytes in a page. You might need to include this value in parameters to memory management system calls. The page size is an operating system page size a... |
getpeername(2) -- Gets the name of the peer socket
|
The getpeername() function retrieves the name of the peer socket connected to the specified socket. If the actual length of the address is greater than the length of the sockaddr structure, the addres... |
getpgid(2) -- Get the process group ID
|
The getpgid() function returns the process group ID of the process specified by the process ID pid. Specifying a pid of 0 (zero) returns the process group ID of the calling process. |
getpgrp(2) -- Get the process ID, process group ID, or parent process ID
|
The getpid() function returns the process ID of the calling process. The getpgrp() function returns the process group ID of the calling process. The getppid() function returns the parent process ID of... |
getpid(2) -- Get the process ID, process group ID, or parent process ID
|
The getpid() function returns the process ID of the calling process. The getpgrp() function returns the process group ID of the calling process. The getppid() function returns the parent process ID of... |
getpmsg(2) -- Receive the next message from a Stream
|
The getmsg() and getpmsg() functions retrieve the contents of messages. These messages are located at the Stream head read queue associated with a STREAMS file. Messages must contain a control part or... |
getppid(2) -- Get the process ID, process group ID, or parent process ID
|
The getpid() function returns the process ID of the calling process. The getpgrp() function returns the process group ID of the calling process. The getppid() function returns the parent process ID of... |
getpriority(2) -- Get or set process scheduling priority
|
The getpriority() function obtains the current priority of a process, process group, or user. The getpriority() function returns the highest priority (lowest numerical value) pertaining to any of the ... |
getrlimit(2) -- Control maximum system resource consumption
|
The getrlimit() function obtains the limits on the consumption of system resources by the current process and each process it creates. You use the setrlimit() function to set these resources. Each res... |
getrusage(2) -- Get information about resource utilization
|
The getrusage() function returns information describing the resources used by the current process or its terminated or waited for child processes. If the child process is never waited for, for example... |
getsid(2) -- Retrieves the session ID of a process
|
Use the getsid function to retrieve the session ID for a process. The function returns the session ID assigned to the process identified in the process_id parameter. If you specify 0 (zero) in the pro... |
getsockname(2) -- Get the socket name
|
The getsockname() function retrieves the locally bound address of the specified socket. If the actual length of the address is greater than the length of the sockaddr structure, the address is truncat... |
getsockopt(2) -- Get socket options
|
The getsockopt() function allows an application program to query socket options. The calling program specifies the name of the socket, the name of the option, and a place to store the requested inform... |
getsysinfo(2) -- Gets system information
|
The getsysinfo system call retrieves information from the system. When information about multiple system structures is returned, it is stored in consecutive buffer locations. The information for each ... |
gettimeofday(2) -- Gets and sets date and time and converts time between timeval and timeval64
|
The gettimeofday(), ftime(), and settimeofday() functions get and set the time and timezone information stored in the kernel. The gettimeofday() function gets the current time, expressed in seconds an... |
gettimeofday64(2) -- Gets and sets date and time and converts time between timeval and timeval64
|
The gettimeofday(), ftime(), and settimeofday() functions get and set the time and timezone information stored in the kernel. The gettimeofday() function gets the current time, expressed in seconds an... |
getuid(2) -- Get the real or effective user ID
|
The getuid() function returns the real user ID of the calling process. The geteuid() function returns the effective user ID of the calling process. |
h_errno(2) -- Error-return value for network database operations.
|
Refer to endhostent(). |
intro(2) -- Introduction to system calls
|
Section 2 describes the Tru64 UNIX system calls, which are the entries into the operating system kernel. Some reference pages in this section may contain suffixes to allow their files to exist with th... |
ioctl(2) -- Control devices
|
The ioctl() function performs a variety of control functions on devices and STREAMS. For non-STREAMS files, the functions performed by this call are device-specific control functions. The request and ... |
kill(2) -- Send a signal to a process or to a group of processes
|
The kill() function sends the signal specified by the signal parameter to the process or group of processes specified by the process parameter. To send a signal to another process, at least one of the... |
killpg(2) -- Send a signal to a process group
|
The killpg() function sends the signal specified by the signal parameter to the group of processes specified by the process_grp parameter. The process sending the signal must have the same effective u... |
lchown(2) -- Change the owner and group IDs of a file
|
The chown(), lchown() and fchown() functions change the owner and group of a file. A process can change the value of the owner ID of a file only if the process has superuser privilege. A process witho... |
link(2) -- Create a hard link to an existing file on the local file system
|
The link() function creates an additional hard link (directory entry) for an existing file. The old and the new link share equal access rights to the underlying object. The link() function atomically ... |
listen(2) -- Listen for socket connections and limits the backlog of incoming connections
|
The listen() function identifies the socket that receives the connections, marks the socket as accepting connections, and limits the number (backlog) of outstanding connection requests in the system q... |
lseek(2) -- Move read-write file offset
|
The lseek() function sets the file offset for the open file specified by the filedes parameter. The whence parameter determines how the offset is to be interpreted. The lseek() function allows the fil... |
lstat(2) -- Provide information about a file
|
The stat() function obtains information about the file named by the path parameter. Read, write, or execute permission for the named file is not required, but all directories listed in the pathname le... |
madvise(2) -- Advise the system of the expected paging behavior of a process
|
The madvise() function permits a process to advise the system about its expected future behavior in referencing a mapped file or shared memory region. |
makecontext(2) -- Manipulate user level context switching
|
The makecontext() function modifies the context specified by the ucp parameter. Before you call the makecontext() function, call the getcontext() function to initialize the ucp parameter. Before you c... |
memcntl(2) -- memory management control
|
The memcntl function enables the calling process to exercise various control operations over the address space which is identified by the mappings set for the address range [addr, addr, + len]. Select... |
mkdir(2) -- Create a directory
|
The mkdir() function creates a new directory with the following attributes: The owner ID is set to the process's effective user ID. The group ID is set to the group ID of its parent directory. [Tru64... |
mknod(2) -- Create a FIFO or special file
|
The mknod() function creates a special file or FIFO. Using the mknod() function to create file types other than FIFO special requires superuser privilege. For the mknod() function to complete successf... |
mmap(2) -- Map a file system object into virtual memory
|
The mmap() function creates a new mapped file region, a new private region, or a new shared memory region. The addr and len parameters specify the requested starting address and length in bytes for th... |
mount(2) -- Mount or unmount a file system
|
Except in the case of file-on-file mounting, the mount() function mounts a file system on the directory pointed to by the mnt-path parameter. Following the mount, references to mnt-path refer to the r... |
mprotect(2) -- Modify access protections of memory mapping
|
The mprotect() function modifies the access protection of a mapped file or shared memory region. The addr and len parameters specify the address and length in bytes of the region to be modified. The l... |
msgctl(2) -- Perform message control operations
|
The msgctl() function allows a process to query or set the contents of the msqid_ds structure associated with the specified message queue ID. It also allows a process to remove the message queue ID an... |
msgget(2) -- Return (and possibly create) the ID for a message queue
|
The msgget() function returns the message queue ID for the message queue identified by the key parameter. If the message queue ID does not exist, the msgget() function attempts to create it. If you sp... |
msgrcv(2) -- Receive a message from a message queue
|
The msgrcv() function receives a message from the queue associated with the msqid parameter. The function returns the number of bytes in the received message. The msgp parameter points to a user-defin... |
msgsnd(2) -- Send a message to a message queue
|
The msgsnd() function sends a message to the queue associated with the msqid parameter. When the kernel sends a message, it allocates space for the message and copies the data from user space. The ker... |
msync(2) -- Synchronize a mapped file
|
The msync() function controls the caching operations of a mapped file region. The msync() function can be used to ensure that modified pages in the region are transferred to the file's underlying sto... |
munmap(2) -- Unmap a mapped region
|
The munmap() function unmaps a mapped file or shared memory region. The addr and len parameters specify the address and length in bytes, respectively, of the region to be unmapped. The len parameter m... |
mvalid(2) -- Check memory region for validity
|
The mvalid() function checks the validity of a memory region. A region is considered to be valid if accesses of the requested type are allowed to all addresses in the region. The header f... |
nfssvc(2) -- Create a remote NFS server
|
The use of the nfssvc() function is not supported in customer applications, and the interface is subject to change without notice. It is intended for use solely by nfsd(8). The nfssvc() function start... |
ntp_gettime(2) -- Get the date, time, and kernel time error values
|
The ntp_gettime() system call returns three read-only values in the ntptimeval structure. The ntptimeval structure members are as follows: The current system time expressed as a Unix timeval structure... |
open(2) -- Open a file for reading or writing
|
The following two function calls are equivalent: creat(path, mode); open(path, O_WRONLY | O_CREAT | O_TRUNC, mode); The open() and creat() functions establish a connection between the file named by th... |
pathconf(2) -- Retrieve file implementation characteristics
|
The fpathconf() and pathconf() functions provide a method for an application to determine the current value of a configurable limit or option (variable) that is associated with a file or directory. Fo... |
pid_block(2) -- stops (blocks) or resumes (unblocks) the specified process
|
The pid_block() function blocks execution of the process until one of the following conditions occurs: The process is unblocked by the pid_unblock() function. A signal is sent to the process. The opti... |
pid_unblock(2) -- stops (blocks) or resumes (unblocks) the specified process
|
The pid_block() function blocks execution of the process until one of the following conditions occurs: The process is unblocked by the pid_unblock() function. A signal is sent to the process. The opti... |
pipe(2) -- Create an interprocess channel
|
The pipe() function creates a unidirectional interprocess channel called a pipe, and returns two file descriptors, filedes[0] and filedes[1]. The file descriptor specified by the filedes[0] parameter ... |
plock(2) -- Lock the text and/or data segments of a process in memory
|
The plock() function locks or unlocks a process's text segments, data segments, or both in physical memory. When locked, the physical pages containing the text or data segment will not be paged out. ... |
poll(2) -- Monitor conditions on multiple file descriptors
|
The poll() function provides users with a mechanism for multiplexing input/output over a set of file descriptors that reference open streams. For each member of the array pointed to by filedes, poll()... |
pread(2) -- read from a file
|
The read() function attempts to read nbytes of data from the file associated with the filedes parameter into the buffer pointed to by the buffer parameter. If the value of nbytes is 0 (zero), the read... |
priocntl(2) -- manage scheduling properties of process
|
The priocntl function is used to change the class, priority, and other scheduling properties of one or more active processes. Processes are divided into four classes: realtime, time-sharing, POSIX rou... |
priocntlset(2) -- change scheduling property of a process or set of processes
|
This function is used to change the scheduling properties of a running process or group of processes. While the priocntl(2) function performs the same tasks, this function enables you to specify the p... |
profil(2) -- Start and stop execution profiling
|
The profil() function controls execution profiling. The short_buffer parameter points to an area of memory whose length (in bytes) is given by the buffer_size parameter. After this call, the process'... |
ptrace(2) -- Trace the execution of a child process
|
The ptrace() function permits a parent process to control execution of a child process. It is primarily used by utility programs to enable breakpoint debugging. The child process behaves normally unti... |
putmsg(2) -- Send a message on a Stream
|
The putmsg() and putpmsg() functions send messages to the STREAMS file. These messages are generated from user-provided buffer(s), and must contain a control part and/or a data part. The open Stream s... |
putpmsg(2) -- Send a message on a Stream
|
The putmsg() and putpmsg() functions send messages to the STREAMS file. These messages are generated from user-provided buffer(s), and must contain a control part and/or a data part. The open Stream s... |
pwrite(2) -- Write to a file
|
The write() function attempts to write nbytes of data to the file associated with the filedes parameter from the buffer pointed to by the buffer parameter. If the nbytes parameter is 0 (zero), the wri... |
quotactl(2) -- Manipulate disk quotas
|
The quotactl() function is used to enable and disable quotas and to manipulate disk quotas for file systems on which quotas have been enabled. Quotas are supported for the UNIX file system (UFS) and t... |
read(2) -- read from a file
|
The read() function attempts to read nbytes of data from the file associated with the filedes parameter into the buffer pointed to by the buffer parameter. If the value of nbytes is 0 (zero), the read... |
readlink(2) -- Read the value of a symbolic link
|
The readlink() function places the contents of the symbolic link named by the path parameter in buffer, which has size buf_size. If the actual length of the symbolic link is greater than buf_size, an ... |
readv(2) -- read from a file
|
The read() function attempts to read nbytes of data from the file associated with the filedes parameter into the buffer pointed to by the buffer parameter. If the value of nbytes is 0 (zero), the read... |
reboot(2) -- Reboot or halt the system
|
The reboot() function restarts the system. The default startup is automatic and brings up /vmunix in the normal, nonmaintenance mode. In an application, the calling process must have superuser privile... |
recv(2) -- Receive messages from connected sockets
|
The recv() function receives messages from a connected socket. The recvfrom() and recvmsg() functions receive messages from both connected and unconnected sockets; however, they are usually used for u... |
recvfrom(2) -- Receive messages from sockets
|
The recvfrom() function permits an application program to receive messages from unconnected sockets. It is normally applied to unconnected sockets because it includes parameters that permit a calling ... |
recvmsg(2) -- Receive a message from a socket using a message structure
|
The recvmsg() function receives messages from unconnected or connected sockets and returns the total length of the message. For message-based sockets (for example, SOCK_DGRAM), you must read the entir... |
rename(2) -- Rename a directory or a file within a file system
|
The rename() function renames a directory or a file within a file system. For rename() to complete successfully, the calling process must have write and search permission to the parent directories of ... |
revoke(2) -- Void all references to a file
|
The revoke() function invalidates all file descriptors associated with the pathname specified in path, which must be a block- or character-special file. Any open file system object on the device on wh... |
rmdir(2) -- Remove a directory file
|
The rmdir() function removes the directory specified by the path parameter. The directory is removed only if it is an empty directory. For the rmdir() function to execute successfully, the calling pro... |
sbrk(2) -- Change space allocation
|
The brk() function sets the lowest data segment location not used by the program (called the break) to addr. In the alternate function sbrk(), incr more bytes are added to the program's data space, a... |
screen(2) -- Gateway packet screening facility
|
The gateway screen facility allows a user-level process to decide which network packets should be forwarded by the kernel (when the system is acting as a gateway). When the screen mode is set to "off... |
select(2) -- Synchronous I/O multiplexing
|
The select() function checks the status of objects identified by bit masks called I/O descriptor sets. Each I/O descriptor set consists of an array of bits whose relative position and state represent ... |
semctl(2) -- Perform semaphore control operations
|
The semctl() function allows a process to perform various operations on an individual semaphore within a semaphore set, on all semaphores within a semaphore set, and on the semid_ds structure associat... |
semget(2) -- Return (and possibly create) a semaphore ID
|
The system defines sets of semaphores in a system-wide table, with each set being an entry in the table. The semget() function returns an ID that identifies the semaphore set's entry in the table. Yo... |
semop(2) -- Perform semaphore operations
|
The semop() function performs operations on the semaphores in the specified semaphore set. The semaphore operations are defined in the sops array. The sops array contains nsops elements, each of which... |
send(2) -- Send messages on a socket
|
The send() function sends a message only when the socket is connected (this includes when the peer of a connectionless socket has been set with a connect() call). The sendto() and sendmsg() functions ... |
sendfile(2) -- Send the contents of a file through a socket
|
The sendfile() function sends the specified contents of a file only through a connected socket. |
sendmsg(2) -- Send a message from a socket using a message structure
|
The sendmsg() function sends messages through connected or unconnected sockets using the msghdr message structure. This minimizes the number of directly supplied parameters to the function call. The <... |
sendto(2) -- Send messages through a socket
|
The sendto() function allows an application program to send messages through an unconnected socket by specifying a destination address. To broadcast on a socket, issue a setsockopt() function using th... |
setcontext(2) -- Initiates and restores user level context switching
|
Using both the getcontext() and setcontext() functions enables you to initiate user level context control, switching between multiple threads of control within a single process. When you call getconte... |
setdomainname(2) -- get or set name of current domain
|
The getdomainname system call returns the domain name of the current host, as set by setdomainname. The setdomainname system call sets the domain of the host machine to be name, which has a length spe... |
setgid(2) -- Set the group ID
|
The setgid() function sets the real group ID, effective group ID, and the saved set group ID to the value specified by the group_id parameter. If the process does not have superuser privilege, but the... |
setgroups(2) -- Set the group access list
|
The setgroups() function sets the group access list of the current user process according to the array pointed to by the grouplist parameter. This function fails unless the invoking process has superu... |
sethostid(2) -- Set the unique identifier of the current host
|
The sethostid() function allows a calling process with a root user ID to set a new 32-bit identifier for the current host. The sethostid() function enables an application program to reset the host ID.... |
sethostname(2) -- Set the name of the current host
|
The sethostname() function allows a calling process with root user authority to set the internal host name of a machine on a network. System host names are limited to MAXHOSTNAMELEN as defined in the ... |
setitimer(2) -- Return or set the value of interval timers
|
The getitimer() function returns the current value for the timer specified by the which parameter in the structure pointed to by the value parameter. The setitimer() function sets the timer specified ... |
setlogin(2) -- Get or set the login name
|
The getlogin() function returns the login name of the user associated with the current session. The name is normally associated with a login shell at the time a session is created, and is inherited by... |
setpgid(2) -- Set the process group ID
|
Use the setpgid() function to add a process to an existing process group or to create a new process group within a process's session. The setpgid() function does not change the process group ID of a ... |
setpgrp(2) -- Set the process group ID
|
Use the setpgid() function to add a process to an existing process group or to create a new process group within a process's session. The setpgid() function does not change the process group ID of a ... |
setpriority(2) -- Get or set process scheduling priority
|
The getpriority() function obtains the current priority of a process, process group, or user. The getpriority() function returns the highest priority (lowest numerical value) pertaining to any of the ... |
setregid(2) -- Set the real and effective group ID
|
The setregid() function sets the real group ID of the current process to the value specified by the rgid parameter, and sets the effective group ID to the value specified by the egid parameter. If the... |
setreuid(2) -- Set real and effective user IDs
|
The setreuid() function sets the real and effective user IDs of the current process to the values specified by the ruid and euid parameters. If ruid or euid is -1, the corresponding effective or real ... |
setrlimit(2) -- Control maximum system resource consumption
|
The getrlimit() function obtains the limits on the consumption of system resources by the current process and each process it creates. You use the setrlimit() function to set these resources. Each res... |
setsid(2) -- Set the process group ID
|
The setsid() function creates a new session when the calling process is not a process group leader. The calling process then becomes the session leader of this session, becomes the process leader of t... |
setsockopt(2) -- Set socket options
|
The setsockopt() function sets options associated with a socket. Options may exist at multiple protocol levels. The SO_ options are always present at the uppermost socket level. The setsockopt() funct... |
setsysinfo(2) -- Set system information
|
The setsysinfo system call modifies system information. The op argument specifies the operation to be performed. Values for op are defined in the and header fil... |
settimeofday(2) -- Gets and sets date and time and converts time between timeval and timeval64
|
The gettimeofday(), ftime(), and settimeofday() functions get and set the time and timezone information stored in the kernel. The gettimeofday() function gets the current time, expressed in seconds an... |
settimeofday64(2) -- Gets and sets date and time and converts time between timeval and timeval64
|
The gettimeofday(), ftime(), and settimeofday() functions get and set the time and timezone information stored in the kernel. The gettimeofday() function gets the current time, expressed in seconds an... |
setuid(2) -- Set the user ID
|
The setuid() function sets the real user ID, effective user ID, and the saved set user ID to the user_id parameter. To change the real user ID, the effective user ID, and the saved set user ID, the ca... |
shmat(2) -- Attach a shared memory region
|
The shmat() function attaches the shared memory region identified by the shmid parameter to the virtual address space of the calling process. For the addr parameter, the process can specify either an ... |
shmctl(2) -- Perform shared memory control operations
|
The shmctl() function provides a variety of shared memory control operations as specified by the cmd parameter. The cmd values and their operations are as follows: Queries the shared memory region ID ... |
shmdt(2) -- Detach a shared memory region
|
The shmdt() function detaches the shared memory region at the address specified by the addr parameter from the address space of the calling process. Other instances of the region attached at other add... |
shmget(2) -- Return (and possibly create) the ID for a shared memory region
|
The shmget() function returns (and possibly creates) the ID for the shared memory region identified by the key parameter. If IPC_PRIVATE is used for the key parameter, the shmget() function returns th... |
shutdown(2) -- Shut down socket send and receive operations
|
The shutdown() function disables receive and/or send operations on the specified socket. |
sigaction(2) -- Specify the action to take upon delivery of a signal
|
When a process requests the sigaction() function, the process can both examine or specify what action is to be performed when the specified signal is delivered. The parameters determine the behavior o... |
sigaltstack(2) -- set or get signal alternate stack context
|
This function enables another stack area to be defined where signals can be examined for their execution status and processed. If a signal's action, specified by the sigaction(2) function, indicates ... |
sigblock(2) -- Provide a compatibility interface to the sigprocmask function
|
The sigblock() function causes the signals specified by the mask parameter to be added to the set of signals currently being blocked from delivery. The signals are blocked from delivery by logically O... |
signal(2) -- Modifies signal functions
|
The signal function provides compatibility for older versions of the operating system whose function is a subset of the sigaction function. The signal function sets the action associated with a signal... |
sigpending(2) -- Examine pending signals
|
The sigpending() function stores in the object pointed to by the set parameter the set of signals that are blocked from delivery and pending to the calling process. |
sigprocmask(2) -- Set the current signal mask
|
The sigprocmask() function is used to examine or change the signal mask of the calling process. Typically, you would use the sigprocmask (SIG_BLOCK) call to block signals during a critical section of ... |
sigreturn(2) -- Return from a signal
|
The sigreturn() function restores the processor state of the calling process from a sigcontext structure. The sigcontext structure contains the state of all applicationvisible registers as well as the... |
sigsend(2) -- Send a signal to one or more processes
|
The sigsend function sends a signal to a group of processes specified by the id and idtype parameters. The sig parameter specifies the signal to be sent. It contains either a valid signal or a zero (0... |
sigsendset(2) -- Send a signal to one or more processes
|
The sigsend function sends a signal to a group of processes specified by the id and idtype parameters. The sig parameter specifies the signal to be sent. It contains either a valid signal or a zero (0... |
sigsetmask(2) -- Set the current signal mask
|
The sigprocmask() function is used to examine or change the signal mask of the calling process. Typically, you would use the sigprocmask (SIG_BLOCK) call to block signals during a critical section of ... |
sigstack(2) -- Set and get the signal stack context
|
The sigstack() function defines an alternate stack on which signals are to be processed. If the value of the instack parameter is nonzero, it points to a sigstack structure, which has the following me... |
sigsuspend(2) -- Atomically change the set of blocked signals and wait for a signal
|
The sigsuspend() function replaces the signal mask of the process (or thread) with the set of signals pointed to by the signal_mask parameter, and then suspends execution of the caller until delivery ... |
sigvec(2) -- Provide a compatibility interface to the sigaction() function
|
The sigvec() function is provided for compatibility with old UNIX systems; its function is a subset of the operations available with the sigaction() function. Like the sigaction() function, the sigvec... |
socket(2) -- Create an end point for communication and return a descriptor
|
The socket() function creates a socket of the specified type in the specified domain. The socket() function returns a descriptor (an integer) that can be used in later system calls that operate on soc... |
socketpair(2) -- Create a pair of connected sockets
|
The socketpair() function creates an unnamed pair of connected sockets in a specified domain, of a specified type, under the protocol optionally specified by the protocol parameter. The two sockets ar... |
stat(2) -- Provide information about a file
|
The stat() function obtains information about the file named by the path parameter. Read, write, or execute permission for the named file is not required, but all directories listed in the pathname le... |
statfs(2) -- Get file system statistics
|
The statfs() and fstatfs() functions return information about a mounted file system. The returned information is in the format of the statfs structure that is declared in the file. When... |
statvfs(2) -- Get file system information
|
The statvfs() and fstatvfs() functions return descriptive information about a mounted file system. The returned information is in the format of a statvfs structure, which is defined in the |
strmod_add(2) -- Add STREAMS modules and drivers
|
The strmod_add() interface is used to configure STREAMS modules and drivers into the kernel. Specifically, the function allows STREAMS drivers to add entry points in character device switch tables. Mo... |
strmod_del(2) -- Delete STREAMS modules and drivers
|
The strmod_del() interface is used to remove configured STREAMS modules and drivers from the kernel. Specifically, it allows STREAMS drivers to remove entry points in character device switch tables. M... |
swapcontext(2) -- Manipulate user level context switching
|
The makecontext() function modifies the context specified by the ucp parameter. Before you call the makecontext() function, call the getcontext() function to initialize the ucp parameter. Before you c... |
swapctl(2) -- Manages the system swap space
|
The swapctl function manages the system swap space by adding, deleting, or returning information about swap resources. The cmd parameter that you select determines the value of the arg parameter. The ... |
swapon(2) -- Add a swap device for interleaved paging and swapping
|
The swapon() function makes a block special device available to the system for allocation of paging and swapping space. (The operating system does not currently support paging and swapping to a normal... |
symlink(2) -- Make a symbolic link to a file
|
The symlink() function creates a symbolic link with the name specified by the path2 parameter which refers to the file named by the path1 parameter. Like a hard link, which is described in link(2), a ... |
sync(2) -- Update all file systems
|
The sync() function causes all information in memory that should be on disk to be written out. The writing, although scheduled, is not necessarily complete upon return from the sync() function. Types ... |
sync2(2) -- Flush file system metadata and data from memory buffers to disk
|
The sync2() function causes file system data to be flushed (written) to disk. Which memory buffers are flushed to disk depends on the POLICY argument. If the policy is SYNC_SYNCPOLICY, all memory buff... |
syscall(2) -- indirect system call
|
The syscall system call performs the system call whose assembly language interface has the specified number, register arguments r0 and r1, and further arguments arg. The r0 value of the system call is... |
sysfs(2) -- gather information about file system types
|
This function gathers information about configured file system types. Depending on the operation you want to perform, the opcode parameter may be specified by itself, or in combination with the other ... |
sysinfo(2) -- manages system information strings
|
The sysinfo function retrieves and sets information relating to the operating system into a buffer pointed to by the buf parameter. This function is similar to the sysconf function which returns an in... |
table(2) -- Examine or update elements from a system table
|
The table() interface is used to examine or update one or more elements in the system table. The system table is specified by id and the starting element is specified by index. The table() interface c... |
TIMEVAL32TO64(2) -- Gets and sets date and time and converts time between timeval and timeval64
|
The gettimeofday(), ftime(), and settimeofday() functions get and set the time and timezone information stored in the kernel. The gettimeofday() function gets the current time, expressed in seconds an... |
TIMEVAL64TO32(2) -- Gets and sets date and time and converts time between timeval and timeval64
|
The gettimeofday(), ftime(), and settimeofday() functions get and set the time and timezone information stored in the kernel. The gettimeofday() function gets the current time, expressed in seconds an... |
truncate(2) -- Change file length
|
The truncate() and ftruncate() functions change the length of a file to the size in bytes specified by the length parameter. If the new length is less than the previous length, the truncate() and ftru... |
uadmin(2) -- provides administrative control
|
The uadmin function enables control of some basic administrative functions. Mostly, it is called by other system administrative procedures which must perform automatic shutdowns, halts, and reboots of... |
umask(2) -- Sets and gets the value of the file creation mask
|
The umask() function sets the file mode creation mask of the process to the value of the cmask parameter and returns the previous value of the mask. The cmask parameter is constructed by a logical OR ... |
umount(2) -- Mount or unmount a file system
|
Except in the case of file-on-file mounting, the mount() function mounts a file system on the directory pointed to by the mnt-path parameter. Following the mount, references to mnt-path refer to the r... |
uname(2) -- Get the name of the current system
|
The uname() function stores information identifying the current system in the structure pointed to by the name parameter. The uname() function uses the utsname structure, which is defined in the |
unlink(2) -- Remove a directory entry
|
When the directory entry is a hard link, the unlink() function removes it and decrements the link count of the file referenced by the link. When the directory entry is a symbolic link, the unlink() fu... |
ustat(2) -- Get file system statistics
|
The statfs() and fstatfs() functions return information about a mounted file system. The returned information is in the format of the statfs structure that is declared in the file. When... |
uswitch(2) -- Get or set compatibility environment specific behavior for a calling process through the uswitch val...
|
The uswitch system call is used to get or change the compatibility environment specific behavior in Tru64 UNIX. Any changes affect the calling process and its children. When the USW_NULLP bit of uswit... |
utime(2) -- Set file access and modification times
|
The utimes() function sets the access and modification times of the file pointed to by the path parameter to the value of the times parameter. The utimes() function allows time specifications accurate... |
utimes(2) -- Set file access and modification times
|
The utimes() function sets the access and modification times of the file pointed to by the path parameter to the value of the times parameter. The utimes() function allows time specifications accurate... |
vfork(2) -- Create a new process
|
The fork() and vfork() functions create a new process (child process) that is identical to the calling process (parent process). The child process inherits the following from the parent process: Envir... |
vtimes(2) -- Get information about resource utilization
|
The getrusage() function returns information describing the resources used by the current process or its terminated or waited for child processes. If the child process is never waited for, for example... |
wait(2) -- Wait for a child process to stop or terminate
|
The wait(), waitpid(), and wait3() functions allow the calling process to obtain status information pertaining to one of its child processes. Various options permit status information to be obtained f... |
wait3(2) -- Wait for a child process to stop or terminate
|
The wait(), waitpid(), and wait3() functions allow the calling process to obtain status information pertaining to one of its child processes. Various options permit status information to be obtained f... |
wait4(2) -- Wait for a child process to stop or terminate
|
The wait(), waitpid(), and wait3() functions allow the calling process to obtain status information pertaining to one of its child processes. Various options permit status information to be obtained f... |
waitid(2) -- Wait for child process to change state
|
The waitid() function holds a calling process until the state of a child process changes. The current state of the child is recorded in a structure pointed to by the infop parameter. If a child proces... |
waitpid(2) -- Wait for a child process to stop or terminate
|
The wait(), waitpid(), and wait3() functions allow the calling process to obtain status information pertaining to one of its child processes. Various options permit status information to be obtained f... |
write(2) -- Write to a file
|
The write() function attempts to write nbytes of data to the file associated with the filedes parameter from the buffer pointed to by the buffer parameter. If the nbytes parameter is 0 (zero), the wri... |
writev(2) -- Write to a file
|
The write() function attempts to write nbytes of data to the file associated with the filedes parameter from the buffer pointed to by the buffer parameter. If the nbytes parameter is 0 (zero), the wri... |
_exit(2) -- Terminate a process
|
The atexit() function registers functions to be called at normal process termination for cleanup processing. The function adds a single exit handler to a list of handlers to be called at process termi... |
a64l(3) -- convert long integer and base-64 ASCII string
|
These functions are used to maintain numbers stored in base-64 ASCII characters. The a64l() function converts a character string to a long integer. The l64a() function converts a long integer to a cha... |
abort(3) -- Generates a software signal to end the current process
|
The abort() function sends a SIGABRT signal to the current process. This signal terminates the process unless both of the following conditions are true: (1) signal SIGABRT is being caught, and (2) the... |
abs(3) -- Computes absolute value and division of integers
|
The abs() function returns the absolute value of its integer operand. The div() function computes the quotient and remainder of the division of the numerator numerator by the denominator denominator. ... |
acalloc(3) -- arena memory allocator
|
The amalloc family of routines provides a main memory allocator based on the malloc(3) memory allocator. This allocator has been extended so that an arbitrary memory space ("arena") can be set up as... |
acceptable_password(3) -- Determines if a password meets deduction requirements (Enhanced Security)
|
The acceptable_password() function determines if the given password is difficult to deduce from well known, passwordguessing heuristics. The cleartext (plaintext) password is passed as the first argum... |
acl_add_perm(3) -- Adds a permission to a set of permissions belonging to an ACL entry
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_add_perm() function adds the permission specified by perm_d to the permission set referred to by the permset_d parameter... |
acl_clear_perm(3) -- Clears a set of permissions in an ACL entry
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_clear_perm() function clears the permissions from the permission set in permset_d. |
acl_copy_entry(3) -- Copies an ACL entry
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_copy_entry() function copies the contents of the individual ACL entry indicated by the src_d parameter to the individual... |
acl_copy_ext(3) -- Copies the ACL from internal working space format to a contiguous, persistent form of the ACL
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_copy_ext() function copies the contents of the ACL in internal working space format, pointed to by acl_d, into the buffe... |
acl_copy_int(3) -- Copies the ACL from contiguous, persistent format to internal working space format
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_copy_int() function copies the contents of the ACL from the buffer pointed to by buf_p to the working storage internal f... |
acl_create_entry(3) -- Create a new ACL entry
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_create_entry() function creates a new ACL entry in the ACL pointed to by the acl_p argument. If there is insufficient sp... |
acl_delete_def_fd(3) -- Deletes the default access ACL from the designated directory
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_delete_def_fd() function deletes the default access ACL from the directory designated by fd. |
acl_delete_def_file(3) -- Deletes the default access ACL from the designated directory
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_delete_def_file() function deletes the default access ACL from the directory designated by path_p. |
acl_delete_entry(3) -- Deletes an ACL entry
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. Deletes the designated ACL entry from the ACL that contains it. |
acl_delete_perm(3) -- Delete permissions from a set of permissions belonging to an ACL entry
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_delete_perm() function deletes the specified permission in perm_d from the permission set. This function does not return... |
acl_dup(3) -- Creates a duplicate copy of the ACL
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_dup() function creates a copy of the designated ACL. Once created, this copy is independent of the original ACL. |
acl_first_entry(3) -- Resets the current ACL entry to be the first ACL entry
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_first_entry() function sets the internal ACL entry offset pointer of the specified ACL such that a subsequent call to ac... |
acl_free(3) -- Releases an ACL internal working storage area for an ACL
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_free() function releases the system working storage area associated with the ACL indicated by the acl_d descriptor. This... |
acl_free_qualifier(3) -- Frees the storage for the qualifier for an ACL entry
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_free_qualifier() function releases the storage space pointed to by the argument tag_qualifier_p. The type of this space ... |
acl_free_text(3) -- Releases an ACL text working storage
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_free_text() function releases the allocated memory area associated with the ACL text indicated by the buf_p descriptor. |
acl_from_text(3) -- Converts the textual representation of an ACL to an internal representation
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_from_text() function converts the textual representation of the ACL into the working storage internal representation use... |
acl_get_entry(3) -- Returns a descriptor to an ACL entry
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_get_entry() function returns a pointer to the next entry in the specified ACL. Following a call to the acl_get_fd(), acl... |
acl_get_fd(3) -- Retrieves the specified ACL associated with the specified file or directory
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_get_fd() function retrieves the specified ACL for the given file descriptor. The acl_tag_t field designates if the ACL b... |
acl_get_file(3) -- Given the pathname to a file or directory, retrieve the designated ACL
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_get_file() function retrieves the designated ACL via a pathname. The type of ACL being retrieved is designated in acl_ty... |
acl_get_permset(3) -- Retrieves a pointer to the permissions for a given ACL entry
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_get_permset() function sets the permset_p parameter to point to the permission set of the designated entry. The permset_... |
acl_get_qualifier(3) -- Retrieves the tag qualifier (ID) for an ACL entry
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_get_qualifier() function retrieves ACL entry tag qualifier, which is the user or group ID associated with the entry. If ... |
acl_get_tag_type(3) -- Retrieves the entry tag type identifier for an ACL entry
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_get_tag_type() function retrieves the tag type for the ACL entry and stores it in a location pointed to by tag_type_p. T... |
acl_init(3) -- Allocate and initialize ACL internal working storage
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_init() function allocates and initializes working storage for an ACL of at least size bytes. A pointer to the working st... |
acl_set_fd(3) -- Sets the ACL on the file or directory designated by the file descriptor
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. Given a file descriptor to a file or directory, the acl_set_fd() function sets the designated ACL. The type of ACL being set is ... |
acl_set_file(3) -- Sets the ACL on the file or directory designated by the path name
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. Given a path name to a file or directory, the acl_set_file() function sets the designated ACL. The type of ACL being set is dete... |
acl_set_permset(3) -- Sets permissions in a given ACL entry
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. Given a pointer to an ACL entry, the acl_set_permset() function sets the permissions. Any permissions in the ACL entry before th... |
acl_set_qualifier(3) -- Sets the tag qualifier (UID or GID) on an ACL entry
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. Given an ACL entry, the acl_set_qualifier() function sets the id in the ACL entry. If the tag type of the given ACL entry is ACL... |
acl_set_tag_type(3) -- Sets the tag type in an ACL entry
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. Given a pointer to an ACL entry, the acl_set_tag_type() function sets the ACL entry tag type. |
acl_size(3) -- Determines the size of the contiguous, persistent representation of the given ACL
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. Given an ACL, the acl_size() function determines the number of bytes required for storing the ACL if converted to contiguous, pe... |
acl_to_text(3) -- Converts an ACL to an ASCII string
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. Given an ACL the acl_to_text() function converts it into a NULL terminated ASCII character string. The acl_to_text() function al... |
acl_valid(3) -- Checks an ACL for validity
|
NOTE: This function is based on Draft 13 of the POSIX P1003.6 standard. The acl_valid() function checks the ACL for validity. An ACL is invalid if one or more of the following conditions are violated:... |
acos(3) -- Trigonometric and inverse trigonometric functions in radian and degree calculations.
|
The sin(), sinf(), and sinl() functions compute the sine of x, measured in radians. The sind(), sindf(), and sindl() functions compute the sine of x, measured in degrees. The cos(), cosf(), and cosl()... |
acosd(3) -- Trigonometric and inverse trigonometric functions in radian and degree calculations.
|
The sin(), sinf(), and sinl() functions compute the sine of x, measured in radians. The sind(), sindf(), and sindl() functions compute the sine of x, measured in degrees. The cos(), cosf(), and cosl()... |
acosh(3) -- Compute inverse hyperbolic functions
|
The asinh(), asinhf(), and asinhl() functions return the hyperbolic arc sine of x, in the range [-infinity, +infinity] where asinh(x) = ln(x+ sqrt(x**2 + 1)). The asinh() function is the inverse funct... |
acreate(3) -- arena memory allocator
|
The amalloc family of routines provides a main memory allocator based on the malloc(3) memory allocator. This allocator has been extended so that an arbitrary memory space ("arena") can be set up as... |
AC_AuthCompute(3) -- Compute authorization (CDSA)
|
This function performs an authorization computation and returns the results as a group of tuple certificates. The computation is based on the following input values: One or more items that identify th... |
AC_PassThrough(3) -- Call exported module-specific operations (CDSA)
|
This function allows applications to call authorization computation module-specific operations that have been exported. Such operations might include queries or services specific to the domain represe... |
addch(3) -- Add a character (with attributes) to a Curses window and advance the cursor
|
The addch, waddch, mvaddch, and mvwaddch routines put the character ch into the window at the current cursor position of the window and advance the position of the window cursor. Their function is sim... |
addchnstr(3) -- Add string of characters (and attributes) to a Curses window
|
All of these routines copy chstr directly into the window image structure starting at the current or specified cursor position. The four routines with n as the last argument copy at most n elements, b... |
addchstr(3) -- Add string of characters (and attributes) to a Curses window
|
All of these routines copy chstr directly into the window image structure starting at the current or specified cursor position. The four routines with n as the last argument copy at most n elements, b... |
addnstr(3) -- Add a string of characters to a Curses window and advance cursor
|
These routines write the characters of the character string str on the given window. The four routines with n as the last argument write at most n characters. For the other routines, the string should... |
addnwstr(3) -- Add a string of wchar_t characters to a Curses window and advance cursor
|
These routines write all the characters of the wchar_t character string wstr on the given window. The four routines with n as the last argument write at most n wchar_t characters. For the routines wit... |
addstr(3) -- Add a string of characters to a Curses window and advance cursor
|
These routines write the characters of the character string str on the given window. The four routines with n as the last argument write at most n characters. For the other routines, the string should... |
addwch(3) -- Add a wchar_t character (with attributes) to a Curses window and advance cursor
|
The addwch, waddwch, mvaddwch, and mvwaddwch routines put the character wch, holding a wchar_t character, into the window at the current cursor position of the window and advance the position of the w... |
addwchnstr(3) -- Add a string of wchar_t characters (and attributes) to a Curses window
|
All of these routines copy wchstr, which points to a string of wchar_t characters, directly into the window image structure starting at the current or specified cursor position. The four routines with... |
addwchstr(3) -- Add a string of wchar_t characters (and attributes) to a Curses window
|
All of these routines copy wchstr, which points to a string of wchar_t characters, directly into the window image structure starting at the current or specified cursor position. The four routines with... |
addwstr(3) -- Add a string of wchar_t characters to a Curses window and advance cursor
|
These routines write all the characters of the wchar_t character string wstr on the given window. The four routines with n as the last argument write at most n wchar_t characters. For the routines wit... |
add_proplist_entry(3) -- adds an Extended File Attribute to the Extended File Attribute buffer
|
The add_proplist_entry() function initializes an Extended File Attribute buffer, pointed to by **bufptr, with the Extended File Attribute specified by the *name and *value parameters. The function can... |
add_wch(3) -- Add a complex character and rendition to a Curses window and advance the cursor
|
The add_wch, wadd_wch, mvadd_wch, and mvwadd_wch functions put the complex character wch into the window at the current or specified cursor position, of the current or specified window, and advance th... |
add_wchnstr(3) -- Add an array of complex characters and rendition to a Curses window
|
All of these functions copy wchstr, which points to an array of complex characters, directly into the current or specified window image structure starting at the current cursor position or the positio... |
add_wchstr(3) -- Add an array of complex characters and rendition to a Curses window
|
All of these functions copy wchstr, which points to an array of complex characters, directly into the current or specified window image structure starting at the current cursor position or the positio... |
adelete(3) -- arena memory allocator
|
The amalloc family of routines provides a main memory allocator based on the malloc(3) memory allocator. This allocator has been extended so that an arbitrary memory space ("arena") can be set up as... |
advance(3) -- Regular expression compile and match routines
|
The compile(), advance(), and step() functions are used for general-purpose expression matching. The compile() function takes a simple regular expression as input and produces a compiled expression th... |
advance_r(3) -- Regular expression compile and match routines
|
The compile(), advance(), and step() functions are used for general-purpose expression matching. The compile() function takes a simple regular expression as input and produces a compiled expression th... |
advfs_clonefset(3) -- Creates a read-only copy of an active fileset
|
This function makes a read-only copy (clone) of an active fileset without taking the fileset off line. When you create a clone fileset, it is a read-only snapshot of fileset data structures (metadata)... |
advfs_get_fdmn_list(3) -- Get an AdvFS file domain list
|
Use this function to obtain information about the AdvFS file domains on a system. The function returns the information in the domainInfo[] array. The information is returned only for valid file domain... |
advfs_get_file_attributes(3) -- Get the AdvFS attributes of a file
|
This function returns the AdvFS-specific attributes of the file specified by the fd parameter in the specified fileAttributes structure. |
advfs_get_fset_list(3) -- Obtain a list of all the filesets in an AdvFS file domain
|
Use this function to obtain information about the filesets in an AdvFS file domain. Information about both mounted and unmounted filesets is returned. The function returns the information in the "fil... |
advfs_get_fset_quotas(3) -- Obtains fileset quotas for an AdvFS fileset
|
This function obtains the fileset quotas for the fileset specified by the domainName and filesetName parameters and returns them in the structure specified in *filesetQuotas. |
advfs_rmfset(3) -- Removes a fileset or a clone fileset
|
This function removes an AdvFS fileset from the named file domain. Once you have removed a fileset using this function, the fileset and its files are not recoverable. The only way to restore the files... |
advfs_set_file_attributes(3) -- Set AdvFS file attributes
|
This function sets a file's AdvFS-specific attributes to the attributes that are defined in the specified fileAttributes structure. However, the function does not set any attributes that are marked a... |
advfs_set_fset_quotas(3) -- Sets fileset quotas for an AdvFS fileset
|
This function associates the fileset quotas that are specified in the filesetQuotas structure with the fileset specified by the domainName and filesetName parameters. Note that the advfs_get_set_quota... |
afree(3) -- arena memory allocator
|
The amalloc family of routines provides a main memory allocator based on the malloc(3) memory allocator. This allocator has been extended so that an arbitrary memory space ("arena") can be set up as... |
aio_cancel(3) -- Cancels one or more asynchronous I/O requests pending against the specified file descriptor (P1003.1...
|
The aio_cancel function cancels asynchronous I/O requests. Normal signal delivery occurs for asynchronous I/O operations that are successfully canceled. If a request cannot be canceled, then the norma... |
aio_error(3) -- Returns the error status of a specified asynchronous I/O operation (P1003.1b)
|
The aio_error function returns the error status associated with the aiocb structure referenced by the aiocbp argument. The error status is the errno value that is set by the corresponding asynchronous... |
aio_group_completion_np(3) -- Enables the use of aio_results_np function
|
The aio_group_completion_np function enables an application to use aio group completion through the aio_results_np function. The function must be called before any other aio function. After this call,... |
aio_read(3) -- Queues a single asynchronous read request
|
The aio_read function allows the calling process to asynchronously read aiocbp->aio_nbytes from the file associated with aiocbp->aio_fildes into the buffer pointed to by aiocbp->aio_buf. The aio_read ... |
aio_results_np(3) -- Returns results for completed asynchronous I/O operations
|
The aio_results_np function suspends the calling process until at least howmany asynchronous I/O operations have completed, until a signal interrupts the function, or until a timeout interval, if spec... |
aio_return(3) -- Returns the status of an asynchronous I/O operation (P1003.1b)
|
The aio_return function returns the number of bytes read or written by the corresponding asynchronous I/O function. The return status for an asynchronous I/O operation is the value that would be retur... |
aio_suspend(3) -- Suspends the calling process until at least
|
The aio_suspend function suspends the calling process until at least one asynchronous I/O operation has completed, until a signal interrupts the function, or until a timeout interval, if specified, ha... |
aio_write(3) -- Queues a single asynchronous write request (P1003.1b)
|
The aio_write function allows the calling process to asynchronously write aiocbp->aio_nbytes to the file, raw disk partition, or connected socket associated with aiocbp->aio_fildes from the buffer poi... |
alarm(3) -- Sets or changes the timeout of interval timers.
|
The alarm() function is used to obtain notification of a timeout after the number of real-time seconds specified by the seconds parameter has elapsed. At some time after seconds seconds have elapsed, ... |
alloca(3) -- Provide a memory allocator
|
The malloc() and free() functions provide a simple, general-purpose memory allocation package. Note See also the subsection "Using the densemalloc Library" for information on using libdensemalloc to... |
alphasort(3) -- Scan or sorts directory contents
|
The scandir() function reads the directory pointed to by the dir_name parameter. It then uses the malloc() function to create an array of pointers to directory entries. The scandir() function returns ... |
amallinfo(3) -- arena memory allocator
|
The amalloc family of routines provides a main memory allocator based on the malloc(3) memory allocator. This allocator has been extended so that an arbitrary memory space ("arena") can be set up as... |
amalloc(3) -- arena memory allocator
|
The amalloc family of routines provides a main memory allocator based on the malloc(3) memory allocator. This allocator has been extended so that an arbitrary memory space ("arena") can be set up as... |
amallocblksize(3) -- arena memory allocator
|
The amalloc family of routines provides a main memory allocator based on the malloc(3) memory allocator. This allocator has been extended so that an arbitrary memory space ("arena") can be set up as... |
amallopt(3) -- arena memory allocator
|
The amalloc family of routines provides a main memory allocator based on the malloc(3) memory allocator. This allocator has been extended so that an arbitrary memory space ("arena") can be set up as... |
ApplicationShell(3X) -- The ApplicationShell widget class
|
ApplicationShell is used as the main top-level window for an application. An application should have more than one ApplicationShell only if it implements multiple logical applications. Classes    [Toc... |
arealloc(3) -- arena memory allocator
|
The amalloc family of routines provides a main memory allocator based on the malloc(3) memory allocator. This allocator has been extended so that an arbitrary memory space ("arena") can be set up as... |
asctime(3) -- converts time units
|
The asctime(), ctime(), gmtime(), localtime(), mktime(), and tzset() functions convert time values between tm structures, time_t type variables, and strings. [POSIX] The asctime_r(), ctime_r(), gmtime... |
asctime_r(3) -- converts time units
|
The asctime(), ctime(), gmtime(), localtime(), mktime(), and tzset() functions convert time values between tm structures, time_t type variables, and strings. [POSIX] The asctime_r(), ctime_r(), gmtime... |
asin(3) -- Trigonometric and inverse trigonometric functions in radian and degree calculations.
|
The sin(), sinf(), and sinl() functions compute the sine of x, measured in radians. The sind(), sindf(), and sindl() functions compute the sine of x, measured in degrees. The cos(), cosf(), and cosl()... |
asind(3) -- Trigonometric and inverse trigonometric functions in radian and degree calculations.
|
The sin(), sinf(), and sinl() functions compute the sine of x, measured in radians. The sind(), sindf(), and sindl() functions compute the sine of x, measured in degrees. The cos(), cosf(), and cosl()... |
asinh(3) -- Compute inverse hyperbolic functions
|
The asinh(), asinhf(), and asinhl() functions return the hyperbolic arc sine of x, in the range [-infinity, +infinity] where asinh(x) = ln(x+ sqrt(x**2 + 1)). The asinh() function is the inverse funct... |
assert(3) -- Inserts program diagnostics
|
The assert() macro inserts diagnostics into programs. On execution, when the expression parameter is false (returns FALSE), this macro writes information about the particular call that failed, includi... |
assign_cpu_to_pset(3) -- Assigns a processor to a processor set
|
The assign_cpu_to_pset() function removes processors from their current processor set and assigns them to the processor set specified by the pset_id variable. This function requires root privileges. I... |
assign_pid_to_pset(3) -- Assigns a process identification number to a processor set
|
The assign_pid_to_pset() function assigns the process identification number specified by the pid_list variable to the processor set specified by the pset_id variable. This function requires root privi... |
atan(3) -- Trigonometric and inverse trigonometric functions in radian and degree calculations.
|
The sin(), sinf(), and sinl() functions compute the sine of x, measured in radians. The sind(), sindf(), and sindl() functions compute the sine of x, measured in degrees. The cos(), cosf(), and cosl()... |
atan2(3) -- Trigonometric and inverse trigonometric functions in radian and degree calculations.
|
The sin(), sinf(), and sinl() functions compute the sine of x, measured in radians. The sind(), sindf(), and sindl() functions compute the sine of x, measured in degrees. The cos(), cosf(), and cosl()... |
atand(3) -- Trigonometric and inverse trigonometric functions in radian and degree calculations.
|
The sin(), sinf(), and sinl() functions compute the sine of x, measured in radians. The sind(), sindf(), and sindl() functions compute the sine of x, measured in degrees. The cos(), cosf(), and cosl()... |
atand2(3) -- Trigonometric and inverse trigonometric functions in radian and degree calculations.
|
The sin(), sinf(), and sinl() functions compute the sine of x, measured in radians. The sind(), sindf(), and sindl() functions compute the sine of x, measured in degrees. The cos(), cosf(), and cosl()... |
atanh(3) -- Compute inverse hyperbolic functions
|
The asinh(), asinhf(), and asinhl() functions return the hyperbolic arc sine of x, in the range [-infinity, +infinity] where asinh(x) = ln(x+ sqrt(x**2 + 1)). The asinh() function is the inverse funct... |
atof(3) -- Converts a character
|
The atof() function converts, to a double floating-point value, the string pointed to by the nptr parameter - up to the first character that is inconsistent with the format of a floating-point number.... |
atoi(3) -- Convert a character string to the specified integer data type
|
The atoi(), atol(), strtol(), and strtoul() functions are used to convert a character string pointed to by the nptr parameter to an integer having a specified data type. The atoi() and atol() function... |
atol(3) -- Convert a character string to the specified integer data type
|
The atoi(), atol(), strtol(), and strtoul() functions are used to convert a character string pointed to by the nptr parameter to an integer having a specified data type. The atoi() and atol() function... |
attroff(3) -- Curses character and window attribute control routines
|
These routines manipulate the current attributes of the current or specified window. The current attributes of a window are applied to all characters that are written into the window with waddch, wadd... |
attron(3) -- Curses character and window attribute control routines
|
These routines manipulate the current attributes of the current or specified window. The current attributes of a window are applied to all characters that are written into the window with waddch, wadd... |
attrset(3) -- Curses character and window attribute control routines
|
These routines manipulate the current attributes of the current or specified window. The current attributes of a window are applied to all characters that are written into the window with waddch, wadd... |
attr_get(3) -- Functions that control Curses window attributes
|
These functions manipulate the attributes and color of the window rendition of the current or specified window. The current attributes of a window are applied to all characters that are written into t... |
attr_off(3) -- Functions that control Curses window attributes
|
These functions manipulate the attributes and color of the window rendition of the current or specified window. The current attributes of a window are applied to all characters that are written into t... |
attr_on(3) -- Functions that control Curses window attributes
|
These functions manipulate the attributes and color of the window rendition of the current or specified window. The current attributes of a window are applied to all characters that are written into t... |
attr_set(3) -- Functions that control Curses window attributes
|
These functions manipulate the attributes and color of the window rendition of the current or specified window. The current attributes of a window are applied to all characters that are written into t... |
audgenl(3) -- generate an audit record
|
This routine is an interface to the audgen() system call. It accepts a variable number of arguments describing the event and audit data, then calls audgen() with the appropriate parameters to generate... |
aud_sitevent(3) -- audit site event operations
|
Audit site events are specific to and defined by a particular installation. For example, an installation could have its own database program, and want to have it use the audit subsystem. To do so, the... |
aud_sitevent_num(3) -- audit site event operations
|
Audit site events are specific to and defined by a particular installation. For example, an installation could have its own database program, and want to have it use the audit subsystem. To do so, the... |
authnone_create(3) -- miscellaneous library routines for ONC remote procedure calls
|
The RPC routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the... |
authunix_create(3) -- miscellaneous library routines for ONC remote procedure calls
|
The RPC routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the... |
authunix_create_default(3) -- miscellaneous library routines for ONC remote procedure calls
|
The RPC routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the... |
auth_destroy(3) -- miscellaneous library routines for ONC remote procedure calls
|
The RPC routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the... |
auth_for_terminal_es(3) -- determine whether a given user is authorized for login on a given terminal (Enhanced Security)
|
The auth_for_terminal_es() function determines whether the username associated with the prpwd parameter is authorized for logins on the terminal associated with the prtc parameter. The determination i... |
basename(3) -- Return the base filename or directory portion of a pathname
|
The basename() and dirname() functions complement each other. The basename() function reads path and returns a pointer to the final component of the pathname, deleting any trailing / (slash) character... |
baudrate(3) -- Routines for querying the Curses environment
|
The baudrate routine returns the output speed of the terminal. The number returned is an integer that represents bits per second (for example, 9600). The erasechar routine returns the current erase ch... |
bcmp(3) -- Perform memory operations
|
The bcopy(), bcmp(), and bzero() functions operate on variable length strings of bytes. Unlike the string functions, they do not check for null bytes. The bcopy() function copies the value of the leng... |
bcopy(3) -- Perform memory operations
|
The bcopy(), bcmp(), and bzero() functions operate on variable length strings of bytes. Unlike the string functions, they do not check for null bytes. The bcopy() function copies the value of the leng... |
beep(3) -- Curses bell and screen flash routines
|
The beep and flash routines are used to alert the terminal user. The routine beep sounds the audible alarm on the terminal, if possible. If an audible alarm is not possible, the routine flashes the sc... |
bessel(3) -- Compute Bessel functions
|
The j0(), j0f(), j0l(), j1(), j1f(), and j1l() functions return the value of the Bessel function of the first kind of orders 0 (zero) and 1, respectively. The jn(), jnf(), and jnl() functions return t... |
BF_cbc_encrypt(3) -- Blowfish encryption
|
This library implements the Blowfish cipher, which was invented and described by Counterpane. See http://www.counterpane.com/blowfish.html. Blowfish is a block cipher that operates on 64-bit (8 byte) ... |
BF_cfb64_encrypt(3) -- Blowfish encryption
|
This library implements the Blowfish cipher, which was invented and described by Counterpane. See http://www.counterpane.com/blowfish.html. Blowfish is a block cipher that operates on 64-bit (8 byte) ... |
BF_decrypt(3) -- Blowfish encryption
|
This library implements the Blowfish cipher, which was invented and described by Counterpane. See http://www.counterpane.com/blowfish.html. Blowfish is a block cipher that operates on 64-bit (8 byte) ... |
BF_ecb_encrypt(3) -- Blowfish encryption
|
This library implements the Blowfish cipher, which was invented and described by Counterpane. See http://www.counterpane.com/blowfish.html. Blowfish is a block cipher that operates on 64-bit (8 byte) ... |
BF_encrypt(3) -- Blowfish encryption
|
This library implements the Blowfish cipher, which was invented and described by Counterpane. See http://www.counterpane.com/blowfish.html. Blowfish is a block cipher that operates on 64-bit (8 byte) ... |
BF_ofb64_encrypt(3) -- Blowfish encryption
|
This library implements the Blowfish cipher, which was invented and described by Counterpane. See http://www.counterpane.com/blowfish.html. Blowfish is a block cipher that operates on 64-bit (8 byte) ... |
BF_options(3) -- Blowfish encryption
|
This library implements the Blowfish cipher, which was invented and described by Counterpane. See http://www.counterpane.com/blowfish.html. Blowfish is a block cipher that operates on 64-bit (8 byte) ... |
BF_set_key(3) -- Blowfish encryption
|
This library implements the Blowfish cipher, which was invented and described by Counterpane. See http://www.counterpane.com/blowfish.html. Blowfish is a block cipher that operates on 64-bit (8 byte) ... |
bindresvport(3) -- Bind a socket to a privileged IP port
|
The bindresvport() function is used to bind a socket descriptor to a privileged IP port, that is, a port number in the range 0-1023. The routine returns 0 if it is successful, otherwise -1 is returned... |
bind_to_cpu(3) -- Bind execution to a specific CPU
|
Upon return from bind_to_cpu() or bind_to_cpu_id(), all threads of the target pid are running on the target CPU. Bound threads are not eligible for execution on any other CPU. You release CPU binding ... |
bind_to_cpu_id(3) -- Bind execution to a specific CPU
|
Upon return from bind_to_cpu() or bind_to_cpu_id(), all threads of the target pid are running on the target CPU. Bound threads are not eligible for execution on any other CPU. You release CPU binding ... |
bio(3) -- I/O abstraction
|
A BIO is an I/O abstraction. It hides many of the underlying I/O details from an application. If an application uses a BIO for its I/O it can transparently handle SSL connections, unencrypted network ... |
BIO_append_filename(3) -- FILE bio
|
The BIO_s_file() function returns the BIO file method. As its name implies it is a wrapper round the stdio FILE structure and it is a source/sink BIO. Calls to BIO_read() and BIO_write() read and writ... |
BIO_callback_ctrl(3) -- BIO control operations
|
The BIO_ctrl(), BIO_callback_ctrl(), BIO_ptr_ctrl(), and BIO_int_ctrl() functions are BIO control operations taking arguments of various types. These functions are not usually called directly; various... |
BIO_ctrl(3) -- BIO control operations
|
The BIO_ctrl(), BIO_callback_ctrl(), BIO_ptr_ctrl(), and BIO_int_ctrl() functions are BIO control operations taking arguments of various types. These functions are not usually called directly; various... |
BIO_ctrl_get_read_request(3) -- Find out how many bytes were requested from the BIO
|
The BIO_ctrl_get_read_request() function returns the number of bytes that were last requested from bio by a BIO_read() operation. This is useful for BIO pairs, for example, so that the application kno... |
BIO_ctrl_get_write_guarantee(3) -- BIO pair BIO
|
The BIO_s_bio() function returns the method for a BIO pair. A BIO pair is a pair of source/sink BIOs where data written to either half of the pair is buffered and can be read from the other half. Both... |
BIO_ctrl_pending(3) -- Find out how many bytes are buffered in a BIO
|
The BIO_ctrl_pending() function returns the number of bytes buffered in a BIO. |
BIO_ctrl_reset_read_request(3) -- BIO pair BIO
|
The BIO_s_bio() function returns the method for a BIO pair. A BIO pair is a pair of source/sink BIOs where data written to either half of the pair is buffered and can be read from the other half. Both... |
BIO_ctrl_wpending(3) -- BIO control operations
|
The BIO_ctrl(), BIO_callback_ctrl(), BIO_ptr_ctrl(), and BIO_int_ctrl() functions are BIO control operations taking arguments of various types. These functions are not usually called directly; various... |
BIO_debug_callback(3) -- BIO callback functions
|
BIO_set_callback() and BIO_get_callback() set and retrieve the BIO callback, they are both macros. The callback is called during most high level BIO operations. It can be used for debugging purposes t... |
BIO_destroy_bio_pair(3) -- BIO pair BIO
|
The BIO_s_bio() function returns the method for a BIO pair. A BIO pair is a pair of source/sink BIOs where data written to either half of the pair is buffered and can be read from the other half. Both... |
BIO_do_accept(3) -- Accept BIO
|
The BIO_s_accept() function returns the accept BIO method. This is a wrapper round the platform's TCP/IP socket accept routines. Using accept BIOs, TCP/IP connections can be accepted and data transfe... |
BIO_do_connect(3) -- Connect BIO
|
The BIO_s_connect() function returns the connect BIO method. This is a wrapper round the platform's TCP/IP socket connection routines. Using connect BIOs TCP/IP connections can be made and data trans... |
BIO_eof(3) -- BIO control operations
|
The BIO_ctrl(), BIO_callback_ctrl(), BIO_ptr_ctrl(), and BIO_int_ctrl() functions are BIO control operations taking arguments of various types. These functions are not usually called directly; various... |
BIO_find_type(3) -- BIO chain traversal
|
The BIO_find_type() function searches for a BIO of a given type in a chain, starting at BIO b. If type is a specific type, such as BIO_TYPE_MEM, then a search is made for a BIO of that type. If type i... |
BIO_flush(3) -- BIO control operations
|
The BIO_ctrl(), BIO_callback_ctrl(), BIO_ptr_ctrl(), and BIO_int_ctrl() functions are BIO control operations taking arguments of various types. These functions are not usually called directly; various... |
BIO_free(3) -- BIO allocation and freeing functions
|
The BIO_new() function returns a new BIO using method type. The BIO_set() function sets the method of an already existing BIO. The BIO_free() function frees up a single BIO. The BIO_vfree()function al... |
BIO_free_all(3) -- BIO allocation and freeing functions
|
The BIO_new() function returns a new BIO using method type. The BIO_set() function sets the method of an already existing BIO. The BIO_free() function frees up a single BIO. The BIO_vfree()function al... |
BIO_f_base64(3) -- BIO filter for base64
|
The BIO_f_base64() function returns the base64 BIO method. This is a filter BIO that base64 encodes any data written through it and decodes any data read through it. Base64 BIOs do not support the BIO... |
BIO_f_buffer(3) -- Buffering BIO
|
The BIO_f_buffer() function returns the buffering BIO method. Data written to a buffering BIO is buffered and periodically written to the next BIO in the chain. Data read from a buffering BIO comes fr... |
BIO_f_cipher(3) -- Cipher BIO filter
|
The BIO_f_cipher() function returns the cipher BIO method. This is a filter BIO that encrypts any data written through it, and decrypts any data read from it. It is a BIO wrapper for the EVP_CipherIni... |
BIO_f_md(3) -- Message digest BIO filter
|
BIO_f_md() returns the message digest BIO method. This is a filter BIO that digests any data passed through it, it is a BIO wrapper for the EVP_DigestInit(), EVP_DigestUpdate(), and EVP_DigestFinal() ... |
BIO_f_null(3) -- Null filter
|
BIO_f_null() returns the null filter BIO method. This is a filter BIO that does nothing. All requests to a null filter BIO are passed through to the next BIO in the chain. This means that a BIO chain ... |
BIO_f_ssl(3) -- SSL BIO
|
The BIO_f_ssl() function returns the SSL BIO method. This is a filter BIO which is a wrapper round the OpenSSL SSL routines adding a BIO "flavor" to SSL I/O. I/O performed on an SSL BIO communicates... |
BIO_gets(3) -- BIO I/O functions
|
The BIO_read() function attempts to read len bytes from BIO b and places the data in buf. The BIO_gets() function performs the BIOs gets operation and places the data in buf. Usually this operation wi... |
BIO_get_accept_port(3) -- Accept BIO
|
The BIO_s_accept() function returns the accept BIO method. This is a wrapper round the platform's TCP/IP socket accept routines. Using accept BIOs, TCP/IP connections can be accepted and data transfe... |
BIO_get_bind_mode(3) -- Accept BIO
|
The BIO_s_accept() function returns the accept BIO method. This is a wrapper round the platform's TCP/IP socket accept routines. Using accept BIOs, TCP/IP connections can be accepted and data transfe... |
BIO_get_callback(3) -- BIO callback functions
|
BIO_set_callback() and BIO_get_callback() set and retrieve the BIO callback, they are both macros. The callback is called during most high level BIO operations. It can be used for debugging purposes t... |
BIO_get_callback_arg(3) -- BIO callback functions
|
BIO_set_callback() and BIO_get_callback() set and retrieve the BIO callback, they are both macros. The callback is called during most high level BIO operations. It can be used for debugging purposes t... |
BIO_get_cipher_ctx(3) -- Cipher BIO filter
|
The BIO_f_cipher() function returns the cipher BIO method. This is a filter BIO that encrypts any data written through it, and decrypts any data read from it. It is a BIO wrapper for the EVP_CipherIni... |
BIO_get_cipher_status(3) -- Cipher BIO filter
|
The BIO_f_cipher() function returns the cipher BIO method. This is a filter BIO that encrypts any data written through it, and decrypts any data read from it. It is a BIO wrapper for the EVP_CipherIni... |
BIO_get_close(3) -- BIO control operations
|
The BIO_ctrl(), BIO_callback_ctrl(), BIO_ptr_ctrl(), and BIO_int_ctrl() functions are BIO control operations taking arguments of various types. These functions are not usually called directly; various... |
BIO_get_conn_hostname(3) -- Connect BIO
|
The BIO_s_connect() function returns the connect BIO method. This is a wrapper round the platform's TCP/IP socket connection routines. Using connect BIOs TCP/IP connections can be made and data trans... |
BIO_get_conn_int_port(3) -- Connect BIO
|
The BIO_s_connect() function returns the connect BIO method. This is a wrapper round the platform's TCP/IP socket connection routines. Using connect BIOs TCP/IP connections can be made and data trans... |
BIO_get_conn_ip(3) -- Connect BIO
|
The BIO_s_connect() function returns the connect BIO method. This is a wrapper round the platform's TCP/IP socket connection routines. Using connect BIOs TCP/IP connections can be made and data trans... |
BIO_get_conn_port(3) -- Connect BIO
|
The BIO_s_connect() function returns the connect BIO method. This is a wrapper round the platform's TCP/IP socket connection routines. Using connect BIOs TCP/IP connections can be made and data trans... |
BIO_get_fd(3) -- File descriptor BIO
|
The BIO_s_fd() function returns the file descriptor BIO method. This is a wrapper around the platform's file descriptor routines, such as read() and write(). The BIO_read() and BIO_write() functions ... |
BIO_get_fp(3) -- FILE bio
|
The BIO_s_file() function returns the BIO file method. As its name implies it is a wrapper round the stdio FILE structure and it is a source/sink BIO. Calls to BIO_read() and BIO_write() read and writ... |
BIO_get_info_callback(3) -- BIO control operations
|
The BIO_ctrl(), BIO_callback_ctrl(), BIO_ptr_ctrl(), and BIO_int_ctrl() functions are BIO control operations taking arguments of various types. These functions are not usually called directly; various... |
BIO_get_md(3) -- Message digest BIO filter
|
BIO_f_md() returns the message digest BIO method. This is a filter BIO that digests any data passed through it, it is a BIO wrapper for the EVP_DigestInit(), EVP_DigestUpdate(), and EVP_DigestFinal() ... |
BIO_get_md_ctx(3) -- Message digest BIO filter
|
BIO_f_md() returns the message digest BIO method. This is a filter BIO that digests any data passed through it, it is a BIO wrapper for the EVP_DigestInit(), EVP_DigestUpdate(), and EVP_DigestFinal() ... |
BIO_get_mem_data(3) -- Memory BIO
|
BIO_s_mem() return the memory BIO method function. A memory BIO is a source/sink BIO which uses memory for its I/O. Data written to a memory BIO is stored in a BUF_MEM structure which is extended as a... |
BIO_get_mem_ptr(3) -- Memory BIO
|
BIO_s_mem() return the memory BIO method function. A memory BIO is a source/sink BIO which uses memory for its I/O. Data written to a memory BIO is stored in a BUF_MEM structure which is extended as a... |
BIO_get_num_renegotiates(3) -- SSL BIO
|
The BIO_f_ssl() function returns the SSL BIO method. This is a filter BIO which is a wrapper round the OpenSSL SSL routines adding a BIO "flavor" to SSL I/O. I/O performed on an SSL BIO communicates... |
BIO_get_read_request(3) -- BIO pair BIO
|
The BIO_s_bio() function returns the method for a BIO pair. A BIO pair is a pair of source/sink BIOs where data written to either half of the pair is buffered and can be read from the other half. Both... |
BIO_get_retry_BIO(3) -- BIO retry functions
|
These functions determine why a BIO is not able to read or write data. They will typically be called after a failed BIO_read() or BIO_write() call. The BIO_should_retry() function is true if the call ... |
BIO_get_retry_reason(3) -- BIO retry functions
|
These functions determine why a BIO is not able to read or write data. They will typically be called after a failed BIO_read() or BIO_write() call. The BIO_should_retry() function is true if the call ... |
BIO_get_ssl(3) -- SSL BIO
|
The BIO_f_ssl() function returns the SSL BIO method. This is a filter BIO which is a wrapper round the OpenSSL SSL routines adding a BIO "flavor" to SSL I/O. I/O performed on an SSL BIO communicates... |
BIO_get_write_buf_size(3) -- BIO pair BIO
|
The BIO_s_bio() function returns the method for a BIO pair. A BIO pair is a pair of source/sink BIOs where data written to either half of the pair is buffered and can be read from the other half. Both... |
BIO_get_write_guarantee(3) -- BIO pair BIO
|
The BIO_s_bio() function returns the method for a BIO pair. A BIO pair is a pair of source/sink BIOs where data written to either half of the pair is buffered and can be read from the other half. Both... |
BIO_int_ctrl(3) -- BIO control operations
|
The BIO_ctrl(), BIO_callback_ctrl(), BIO_ptr_ctrl(), and BIO_int_ctrl() functions are BIO control operations taking arguments of various types. These functions are not usually called directly; various... |
BIO_make_bio_pair(3) -- BIO pair BIO
|
The BIO_s_bio() function returns the method for a BIO pair. A BIO pair is a pair of source/sink BIOs where data written to either half of the pair is buffered and can be read from the other half. Both... |
BIO_new(3) -- BIO allocation and freeing functions
|
The BIO_new() function returns a new BIO using method type. The BIO_set() function sets the method of an already existing BIO. The BIO_free() function frees up a single BIO. The BIO_vfree()function al... |
BIO_new_bio_pair(3) -- Create a new BIO pair
|
The BIO_new_bio_pair() function creates a buffering BIO pair. It has two endpoints between data can be buffered. Its typical use is to connect one endpoint as underlying input/output BIO to an SSL and... |
BIO_new_buffer_ssl_connect(3) -- SSL BIO
|
The BIO_f_ssl() function returns the SSL BIO method. This is a filter BIO which is a wrapper round the OpenSSL SSL routines adding a BIO "flavor" to SSL I/O. I/O performed on an SSL BIO communicates... |
BIO_new_fd(3) -- File descriptor BIO
|
The BIO_s_fd() function returns the file descriptor BIO method. This is a wrapper around the platform's file descriptor routines, such as read() and write(). The BIO_read() and BIO_write() functions ... |
BIO_new_file(3) -- FILE bio
|
The BIO_s_file() function returns the BIO file method. As its name implies it is a wrapper round the stdio FILE structure and it is a source/sink BIO. Calls to BIO_read() and BIO_write() read and writ... |
BIO_new_fp(3) -- FILE bio
|
The BIO_s_file() function returns the BIO file method. As its name implies it is a wrapper round the stdio FILE structure and it is a source/sink BIO. Calls to BIO_read() and BIO_write() read and writ... |
BIO_new_mem_buf(3) -- Memory BIO
|
BIO_s_mem() return the memory BIO method function. A memory BIO is a source/sink BIO which uses memory for its I/O. Data written to a memory BIO is stored in a BUF_MEM structure which is extended as a... |
BIO_new_socket(3) -- Socket BIO
|
The BIO_s_socket() function returns the socket BIO method. This is a wrapper around the platform's socket routines. BIO_read() and BIO_write() read or write the underlying socket. BIO_puts() is suppo... |
BIO_new_ssl(3) -- SSL BIO
|
The BIO_f_ssl() function returns the SSL BIO method. This is a filter BIO which is a wrapper round the OpenSSL SSL routines adding a BIO "flavor" to SSL I/O. I/O performed on an SSL BIO communicates... |
BIO_new_ssl_connect(3) -- SSL BIO
|
The BIO_f_ssl() function returns the SSL BIO method. This is a filter BIO which is a wrapper round the OpenSSL SSL routines adding a BIO "flavor" to SSL I/O. I/O performed on an SSL BIO communicates... |
BIO_next(3) -- BIO chain traversal
|
The BIO_find_type() function searches for a BIO of a given type in a chain, starting at BIO b. If type is a specific type, such as BIO_TYPE_MEM, then a search is made for a BIO of that type. If type i... |
BIO_pending(3) -- BIO control operations
|
The BIO_ctrl(), BIO_callback_ctrl(), BIO_ptr_ctrl(), and BIO_int_ctrl() functions are BIO control operations taking arguments of various types. These functions are not usually called directly; various... |
BIO_pop(3) -- Add and remove BIOs from a chain.
|
The BIO_push() function appends the BIO append to b. It returns b. The BIO_pop() function removes the BIO b from a chain and returns the next BIO in the chain. The return is NULL if there are no more ... |
BIO_ptr_ctrl(3) -- BIO control operations
|
The BIO_ctrl(), BIO_callback_ctrl(), BIO_ptr_ctrl(), and BIO_int_ctrl() functions are BIO control operations taking arguments of various types. These functions are not usually called directly; various... |
BIO_push(3) -- Add and remove BIOs from a chain.
|
The BIO_push() function appends the BIO append to b. It returns b. The BIO_pop() function removes the BIO b from a chain and returns the next BIO in the chain. The return is NULL if there are no more ... |
BIO_puts(3) -- BIO I/O functions
|
The BIO_read() function attempts to read len bytes from BIO b and places the data in buf. The BIO_gets() function performs the BIOs gets operation and places the data in buf. Usually this operation wi... |
BIO_read(3) -- BIO I/O functions
|
The BIO_read() function attempts to read len bytes from BIO b and places the data in buf. The BIO_gets() function performs the BIOs gets operation and places the data in buf. Usually this operation wi... |
BIO_read_filename(3) -- FILE bio
|
The BIO_s_file() function returns the BIO file method. As its name implies it is a wrapper round the stdio FILE structure and it is a source/sink BIO. Calls to BIO_read() and BIO_write() read and writ... |
BIO_reset(3) -- BIO control operations
|
The BIO_ctrl(), BIO_callback_ctrl(), BIO_ptr_ctrl(), and BIO_int_ctrl() functions are BIO control operations taking arguments of various types. These functions are not usually called directly; various... |
BIO_retry_type(3) -- BIO retry functions
|
These functions determine why a BIO is not able to read or write data. They will typically be called after a failed BIO_read() or BIO_write() call. The BIO_should_retry() function is true if the call ... |
BIO_rw_filename(3) -- FILE bio
|
The BIO_s_file() function returns the BIO file method. As its name implies it is a wrapper round the stdio FILE structure and it is a source/sink BIO. Calls to BIO_read() and BIO_write() read and writ... |
BIO_seek(3) -- BIO control operations
|
The BIO_ctrl(), BIO_callback_ctrl(), BIO_ptr_ctrl(), and BIO_int_ctrl() functions are BIO control operations taking arguments of various types. These functions are not usually called directly; various... |
BIO_set(3) -- BIO allocation and freeing functions
|
The BIO_new() function returns a new BIO using method type. The BIO_set() function sets the method of an already existing BIO. The BIO_free() function frees up a single BIO. The BIO_vfree()function al... |
BIO_set_accept_bios(3) -- Accept BIO
|
The BIO_s_accept() function returns the accept BIO method. This is a wrapper round the platform's TCP/IP socket accept routines. Using accept BIOs, TCP/IP connections can be accepted and data transfe... |
BIO_set_accept_port(3) -- Accept BIO
|
The BIO_s_accept() function returns the accept BIO method. This is a wrapper round the platform's TCP/IP socket accept routines. Using accept BIOs, TCP/IP connections can be accepted and data transfe... |
BIO_set_bind_mode(3) -- Accept BIO
|
The BIO_s_accept() function returns the accept BIO method. This is a wrapper round the platform's TCP/IP socket accept routines. Using accept BIOs, TCP/IP connections can be accepted and data transfe... |
BIO_set_callback(3) -- BIO callback functions
|
BIO_set_callback() and BIO_get_callback() set and retrieve the BIO callback, they are both macros. The callback is called during most high level BIO operations. It can be used for debugging purposes t... |
BIO_set_callback_arg(3) -- BIO callback functions
|
BIO_set_callback() and BIO_get_callback() set and retrieve the BIO callback, they are both macros. The callback is called during most high level BIO operations. It can be used for debugging purposes t... |
BIO_set_cipher(3) -- Cipher BIO filter
|
The BIO_f_cipher() function returns the cipher BIO method. This is a filter BIO that encrypts any data written through it, and decrypts any data read from it. It is a BIO wrapper for the EVP_CipherIni... |
BIO_set_close(3) -- BIO control operations
|
The BIO_ctrl(), BIO_callback_ctrl(), BIO_ptr_ctrl(), and BIO_int_ctrl() functions are BIO control operations taking arguments of various types. These functions are not usually called directly; various... |
BIO_set_conn_hostname(3) -- Connect BIO
|
The BIO_s_connect() function returns the connect BIO method. This is a wrapper round the platform's TCP/IP socket connection routines. Using connect BIOs TCP/IP connections can be made and data trans... |
BIO_set_conn_int_port(3) -- Connect BIO
|
The BIO_s_connect() function returns the connect BIO method. This is a wrapper round the platform's TCP/IP socket connection routines. Using connect BIOs TCP/IP connections can be made and data trans... |
BIO_set_conn_ip(3) -- Connect BIO
|
The BIO_s_connect() function returns the connect BIO method. This is a wrapper round the platform's TCP/IP socket connection routines. Using connect BIOs TCP/IP connections can be made and data trans... |
BIO_set_conn_port(3) -- Connect BIO
|
The BIO_s_connect() function returns the connect BIO method. This is a wrapper round the platform's TCP/IP socket connection routines. Using connect BIOs TCP/IP connections can be made and data trans... |
BIO_set_fd(3) -- File descriptor BIO
|
The BIO_s_fd() function returns the file descriptor BIO method. This is a wrapper around the platform's file descriptor routines, such as read() and write(). The BIO_read() and BIO_write() functions ... |
BIO_set_fp(3) -- FILE bio
|
The BIO_s_file() function returns the BIO file method. As its name implies it is a wrapper round the stdio FILE structure and it is a source/sink BIO. Calls to BIO_read() and BIO_write() read and writ... |
BIO_set_info_callback(3) -- BIO control operations
|
The BIO_ctrl(), BIO_callback_ctrl(), BIO_ptr_ctrl(), and BIO_int_ctrl() functions are BIO control operations taking arguments of various types. These functions are not usually called directly; various... |
BIO_set_md(3) -- Message digest BIO filter
|
BIO_f_md() returns the message digest BIO method. This is a filter BIO that digests any data passed through it, it is a BIO wrapper for the EVP_DigestInit(), EVP_DigestUpdate(), and EVP_DigestFinal() ... |
BIO_set_mem_buf(3) -- Memory BIO
|
BIO_s_mem() return the memory BIO method function. A memory BIO is a source/sink BIO which uses memory for its I/O. Data written to a memory BIO is stored in a BUF_MEM structure which is extended as a... |
BIO_set_mem_eof_return(3) -- Memory BIO
|
BIO_s_mem() return the memory BIO method function. A memory BIO is a source/sink BIO which uses memory for its I/O. Data written to a memory BIO is stored in a BUF_MEM structure which is extended as a... |
BIO_set_nbio(3) -- Connect BIO
|
The BIO_s_connect() function returns the connect BIO method. This is a wrapper round the platform's TCP/IP socket connection routines. Using connect BIOs TCP/IP connections can be made and data trans... |
BIO_set_nbio_accept(3) -- Accept BIO
|
The BIO_s_accept() function returns the accept BIO method. This is a wrapper round the platform's TCP/IP socket accept routines. Using accept BIOs, TCP/IP connections can be accepted and data transfe... |
BIO_set_ssl(3) -- SSL BIO
|
The BIO_f_ssl() function returns the SSL BIO method. This is a filter BIO which is a wrapper round the OpenSSL SSL routines adding a BIO "flavor" to SSL I/O. I/O performed on an SSL BIO communicates... |
BIO_set_ssl_mode(3) -- SSL BIO
|
The BIO_f_ssl() function returns the SSL BIO method. This is a filter BIO which is a wrapper round the OpenSSL SSL routines adding a BIO "flavor" to SSL I/O. I/O performed on an SSL BIO communicates... |
BIO_set_ssl_renegotiate_bytes(3) -- SSL BIO
|
The BIO_f_ssl() function returns the SSL BIO method. This is a filter BIO which is a wrapper round the OpenSSL SSL routines adding a BIO "flavor" to SSL I/O. I/O performed on an SSL BIO communicates... |
BIO_set_ssl_renegotiate_timeout(3) -- SSL BIO
|
The BIO_f_ssl() function returns the SSL BIO method. This is a filter BIO which is a wrapper round the OpenSSL SSL routines adding a BIO "flavor" to SSL I/O. I/O performed on an SSL BIO communicates... |
BIO_set_write_buf_size(3) -- BIO pair BIO
|
The BIO_s_bio() function returns the method for a BIO pair. A BIO pair is a pair of source/sink BIOs where data written to either half of the pair is buffered and can be read from the other half. Both... |
BIO_should_io_special(3) -- BIO retry functions
|
These functions determine why a BIO is not able to read or write data. They will typically be called after a failed BIO_read() or BIO_write() call. The BIO_should_retry() function is true if the call ... |
BIO_should_read(3) -- BIO retry functions
|
These functions determine why a BIO is not able to read or write data. They will typically be called after a failed BIO_read() or BIO_write() call. The BIO_should_retry() function is true if the call ... |
BIO_should_retry(3) -- BIO retry functions
|
These functions determine why a BIO is not able to read or write data. They will typically be called after a failed BIO_read() or BIO_write() call. The BIO_should_retry() function is true if the call ... |
BIO_should_write(3) -- BIO retry functions
|
These functions determine why a BIO is not able to read or write data. They will typically be called after a failed BIO_read() or BIO_write() call. The BIO_should_retry() function is true if the call ... |
BIO_shutdown_wr(3) -- BIO pair BIO
|
The BIO_s_bio() function returns the method for a BIO pair. A BIO pair is a pair of source/sink BIOs where data written to either half of the pair is buffered and can be read from the other half. Both... |
BIO_ssl_copy_session_id(3) -- SSL BIO
|
The BIO_f_ssl() function returns the SSL BIO method. This is a filter BIO which is a wrapper round the OpenSSL SSL routines adding a BIO "flavor" to SSL I/O. I/O performed on an SSL BIO communicates... |
BIO_ssl_shutdown(3) -- SSL BIO
|
The BIO_f_ssl() function returns the SSL BIO method. This is a filter BIO which is a wrapper round the OpenSSL SSL routines adding a BIO "flavor" to SSL I/O. I/O performed on an SSL BIO communicates... |
BIO_s_accept(3) -- Accept BIO
|
The BIO_s_accept() function returns the accept BIO method. This is a wrapper round the platform's TCP/IP socket accept routines. Using accept BIOs, TCP/IP connections can be accepted and data transfe... |
BIO_s_bio(3) -- BIO pair BIO
|
The BIO_s_bio() function returns the method for a BIO pair. A BIO pair is a pair of source/sink BIOs where data written to either half of the pair is buffered and can be read from the other half. Both... |
BIO_s_connect(3) -- Connect BIO
|
The BIO_s_connect() function returns the connect BIO method. This is a wrapper round the platform's TCP/IP socket connection routines. Using connect BIOs TCP/IP connections can be made and data trans... |
BIO_s_fd(3) -- File descriptor BIO
|
The BIO_s_fd() function returns the file descriptor BIO method. This is a wrapper around the platform's file descriptor routines, such as read() and write(). The BIO_read() and BIO_write() functions ... |
BIO_s_file(3) -- FILE bio
|
The BIO_s_file() function returns the BIO file method. As its name implies it is a wrapper round the stdio FILE structure and it is a source/sink BIO. Calls to BIO_read() and BIO_write() read and writ... |
BIO_s_mem(3) -- Memory BIO
|
BIO_s_mem() return the memory BIO method function. A memory BIO is a source/sink BIO which uses memory for its I/O. Data written to a memory BIO is stored in a BUF_MEM structure which is extended as a... |
BIO_s_null(3) -- Null data sink
|
BIO_s_null() returns the null sink BIO method. Data written to the null sink is discarded; reads return EOF. |
BIO_s_socket(3) -- Socket BIO
|
The BIO_s_socket() function returns the socket BIO method. This is a wrapper around the platform's socket routines. BIO_read() and BIO_write() read or write the underlying socket. BIO_puts() is suppo... |
BIO_tell(3) -- BIO control operations
|
The BIO_ctrl(), BIO_callback_ctrl(), BIO_ptr_ctrl(), and BIO_int_ctrl() functions are BIO control operations taking arguments of various types. These functions are not usually called directly; various... |
BIO_vfree(3) -- BIO allocation and freeing functions
|
The BIO_new() function returns a new BIO using method type. The BIO_set() function sets the method of an already existing BIO. The BIO_free() function frees up a single BIO. The BIO_vfree()function al... |
BIO_wpending(3) -- BIO control operations
|
The BIO_ctrl(), BIO_callback_ctrl(), BIO_ptr_ctrl(), and BIO_int_ctrl() functions are BIO control operations taking arguments of various types. These functions are not usually called directly; various... |
BIO_write(3) -- BIO I/O functions
|
The BIO_read() function attempts to read len bytes from BIO b and places the data in buf. The BIO_gets() function performs the BIOs gets operation and places the data in buf. Usually this operation wi... |
BIO_write_filename(3) -- FILE bio
|
The BIO_s_file() function returns the BIO file method. As its name implies it is a wrapper round the stdio FILE structure and it is a source/sink BIO. Calls to BIO_read() and BIO_write() read and writ... |
bkgd(3) -- Routines for manipulating the background in a Curses window
|
The bkgdset and wbkgdset routines manipulate the background of the named window. Background is defined as chtype and consists of any combination of attributes and a character. The attribute part of th... |
bkgdset(3) -- Routines for manipulating the background in a Curses window
|
The bkgdset and wbkgdset routines manipulate the background of the named window. Background is defined as chtype and consists of any combination of attributes and a character. The attribute part of th... |
bkgrnd(3) -- Set or get background character and rendition by using a complex character
|
By using the information in wch, the bkgrndset and wbkgrndset functions set the background rendition and manipulate the window rendition of the current or specified window. These functions turn off th... |
bkgrndset(3) -- Set or get background character and rendition by using a complex character
|
By using the information in wch, the bkgrndset and wbkgrndset functions set the background rendition and manipulate the window rendition of the current or specified window. These functions turn off th... |
blowfish(3) -- Blowfish encryption
|
This library implements the Blowfish cipher, which was invented and described by Counterpane. See http://www.counterpane.com/blowfish.html. Blowfish is a block cipher that operates on 64-bit (8 byte) ... |
bn(3) -- Multiprecision integer arithmetics
|
This library performs arithmetic operations on integers of arbitrary size. It was written for use in public key cryptography, such as RSA and Diffie-Hellman. It uses dynamic memory allocation for stor... |
BN_add(3) -- Arithmetic operations on BIGNUMs
|
The BN_add() function adds a and b and places the result in r (r=a+b). The r value can be the same BIGNUM as a or b. The BN_sub() function subtracts b from a and places the result in r (r=a-b). The BN... |
BN_add_word(3) -- Arithmetic functions on BIGNUMs with integers
|
These functions perform arithmetic operations on BIGNUMs with unsigned integers. They are much more efficient than the normal BIGNUM arithmetic operations. The BN_add_word() function adds w to a (a+=w... |
bn_add_words(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_bin2bn(3) -- Format conversions
|
The BN_bn2bin() function converts the absolute value of a into big-endian form and stores it at to. The to value must point to BN_num_bytes(a) bytes of memory. The BN_bin2bn() function converts the po... |
BN_bn2bin(3) -- Format conversions
|
The BN_bn2bin() function converts the absolute value of a into big-endian form and stores it at to. The to value must point to BN_num_bytes(a) bytes of memory. The BN_bin2bn() function converts the po... |
BN_bn2dec(3) -- Format conversions
|
The BN_bn2bin() function converts the absolute value of a into big-endian form and stores it at to. The to value must point to BN_num_bytes(a) bytes of memory. The BN_bin2bn() function converts the po... |
BN_bn2hex(3) -- Format conversions
|
The BN_bn2bin() function converts the absolute value of a into big-endian form and stores it at to. The to value must point to BN_num_bytes(a) bytes of memory. The BN_bin2bn() function converts the po... |
BN_bn2mpi(3) -- Format conversions
|
The BN_bn2bin() function converts the absolute value of a into big-endian form and stores it at to. The to value must point to BN_num_bytes(a) bytes of memory. The BN_bin2bn() function converts the po... |
bn_check_top(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_clear(3) -- Allocate and free BIGNUMs
|
The BN_new() function allocates and initializes a BIGNUM structure. The BN_init() function initializes an existing uninitialized BIGNUM. The BN_clear() function is used to destroy sensitive data such ... |
BN_clear_bit(3) -- Bit operations on BIGNUMs
|
The BN_set_bit() function sets bit n in a to 1 (a|=(1< |
BN_clear_free(3) -- Allocate and free BIGNUMs
|
The BN_new() function allocates and initializes a BIGNUM structure. The BN_init() function initializes an existing uninitialized BIGNUM. The BN_clear() function is used to destroy sensitive data such ... |
BN_cmp(3) -- BIGNUM comparison and test functions
|
The BN_cmp() function compares the numbers a and b. The BN_ucmp() function compares their absolute values. The BN_is_zero(), BN_is_one(), and BN_is_word() test if a equals 0, 1, or w respectively. The... |
bn_cmp_words(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_copy(3) -- Copy BIGNUMs
|
The BN_copy() function copies from to to. The BN_dup() function creates a new BIGNUM containing the value from. |
BN_CTX_end(3) -- Use temporary BIGNUM variables
|
These functions are used to obtain temporary BIGNUM variables from a BN_CTX (which can been created by using the BN_CTX_new() function) in order to save the overhead of repeatedly creating and freeing... |
BN_CTX_free(3) -- Allocate and free BN_CTX structures
|
A BN_CTX is a structure that holds BIGNUM temporary variables used by library functions. Since dynamic memory allocation to create BIGNUMs is rather expensive when used in conjunction with repeated su... |
BN_CTX_get(3) -- Use temporary BIGNUM variables
|
These functions are used to obtain temporary BIGNUM variables from a BN_CTX (which can been created by using the BN_CTX_new() function) in order to save the overhead of repeatedly creating and freeing... |
BN_CTX_init(3) -- Allocate and free BN_CTX structures
|
A BN_CTX is a structure that holds BIGNUM temporary variables used by library functions. Since dynamic memory allocation to create BIGNUMs is rather expensive when used in conjunction with repeated su... |
BN_CTX_new(3) -- Allocate and free BN_CTX structures
|
A BN_CTX is a structure that holds BIGNUM temporary variables used by library functions. Since dynamic memory allocation to create BIGNUMs is rather expensive when used in conjunction with repeated su... |
BN_CTX_start(3) -- Use temporary BIGNUM variables
|
These functions are used to obtain temporary BIGNUM variables from a BN_CTX (which can been created by using the BN_CTX_new() function) in order to save the overhead of repeatedly creating and freeing... |
BN_dec2bn(3) -- Format conversions
|
The BN_bn2bin() function converts the absolute value of a into big-endian form and stores it at to. The to value must point to BN_num_bytes(a) bytes of memory. The BN_bin2bn() function converts the po... |
BN_div(3) -- Arithmetic operations on BIGNUMs
|
The BN_add() function adds a and b and places the result in r (r=a+b). The r value can be the same BIGNUM as a or b. The BN_sub() function subtracts b from a and places the result in r (r=a-b). The BN... |
BN_div_recp(3) -- Modular multiplication using reciprocal
|
The BN_mod_mul_reciprocal() function can be used to perform an efficient BN_mod_mul() operation when the operation will be performed repeatedly with the same modulus. It computes r=(a*b)%m using recp=... |
BN_div_word(3) -- Arithmetic functions on BIGNUMs with integers
|
These functions perform arithmetic operations on BIGNUMs with unsigned integers. They are much more efficient than the normal BIGNUM arithmetic operations. The BN_add_word() function adds w to a (a+=w... |
bn_div_words(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_dump(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_dup(3) -- Copy BIGNUMs
|
The BN_copy() function copies from to to. The BN_dup() function creates a new BIGNUM containing the value from. |
BN_exp(3) -- Arithmetic operations on BIGNUMs
|
The BN_add() function adds a and b and places the result in r (r=a+b). The r value can be the same BIGNUM as a or b. The BN_sub() function subtracts b from a and places the result in r (r=a-b). The BN... |
bn_expand(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_expand2(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_fix_top(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_free(3) -- Allocate and free BIGNUMs
|
The BN_new() function allocates and initializes a BIGNUM structure. The BN_init() function initializes an existing uninitialized BIGNUM. The BN_clear() function is used to destroy sensitive data such ... |
BN_from_montgomery(3) -- Montgomery multiplication
|
These functions implement Montgomery multiplication. They are used automatically when BN_mod_exp() is called with suitable input, but they may be useful when several operations are performed using the... |
BN_gcd(3) -- Arithmetic operations on BIGNUMs
|
The BN_add() function adds a and b and places the result in r (r=a+b). The r value can be the same BIGNUM as a or b. The BN_sub() function subtracts b from a and places the result in r (r=a-b). The BN... |
BN_generate_prime(3) -- Generate primes and test for primality
|
The BN_generate_prime() function generates a pseudo-random prime number of num bits. If ret is not NULL, it will be used to store the number. If callback is not NULL, it is called as follows: callback... |
BN_get_word(3) -- BIGNUM assignment operations
|
The BN_zero(), BN_one(), and BN_set_word() functions set a to the values 0, 1 and w respectively. BN_zero() and BN_one() are macros. The BN_value_one() function returns a BIGNUM constant of value 1. T... |
BN_hex2bn(3) -- Format conversions
|
The BN_bn2bin() function converts the absolute value of a into big-endian form and stores it at to. The to value must point to BN_num_bytes(a) bytes of memory. The BN_bin2bn() function converts the po... |
BN_init(3) -- Allocate and free BIGNUMs
|
The BN_new() function allocates and initializes a BIGNUM structure. The BN_init() function initializes an existing uninitialized BIGNUM. The BN_clear() function is used to destroy sensitive data such ... |
bn_internal(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_is_bit_set(3) -- Bit operations on BIGNUMs
|
The BN_set_bit() function sets bit n in a to 1 (a|=(1< |
BN_is_odd(3) -- BIGNUM comparison and test functions
|
The BN_cmp() function compares the numbers a and b. The BN_ucmp() function compares their absolute values. The BN_is_zero(), BN_is_one(), and BN_is_word() test if a equals 0, 1, or w respectively. The... |
BN_is_one(3) -- BIGNUM comparison and test functions
|
The BN_cmp() function compares the numbers a and b. The BN_ucmp() function compares their absolute values. The BN_is_zero(), BN_is_one(), and BN_is_word() test if a equals 0, 1, or w respectively. The... |
BN_is_prime(3) -- Generate primes and test for primality
|
The BN_generate_prime() function generates a pseudo-random prime number of num bits. If ret is not NULL, it will be used to store the number. If callback is not NULL, it is called as follows: callback... |
BN_is_prime_fasttest(3) -- Generate primes and test for primality
|
The BN_generate_prime() function generates a pseudo-random prime number of num bits. If ret is not NULL, it will be used to store the number. If callback is not NULL, it is called as follows: callback... |
BN_is_word(3) -- BIGNUM comparison and test functions
|
The BN_cmp() function compares the numbers a and b. The BN_ucmp() function compares their absolute values. The BN_is_zero(), BN_is_one(), and BN_is_word() test if a equals 0, 1, or w respectively. The... |
BN_is_zero(3) -- BIGNUM comparison and test functions
|
The BN_cmp() function compares the numbers a and b. The BN_ucmp() function compares their absolute values. The BN_is_zero(), BN_is_one(), and BN_is_word() test if a equals 0, 1, or w respectively. The... |
BN_lshift(3) -- Bit operations on BIGNUMs
|
The BN_set_bit() function sets bit n in a to 1 (a|=(1< |
BN_lshift1(3) -- Bit operations on BIGNUMs
|
The BN_set_bit() function sets bit n in a to 1 (a|=(1< |
BN_mask_bits(3) -- Bit operations on BIGNUMs
|
The BN_set_bit() function sets bit n in a to 1 (a|=(1< |
BN_mod(3) -- Arithmetic operations on BIGNUMs
|
The BN_add() function adds a and b and places the result in r (r=a+b). The r value can be the same BIGNUM as a or b. The BN_sub() function subtracts b from a and places the result in r (r=a-b). The BN... |
BN_mod_exp(3) -- Arithmetic operations on BIGNUMs
|
The BN_add() function adds a and b and places the result in r (r=a+b). The r value can be the same BIGNUM as a or b. The BN_sub() function subtracts b from a and places the result in r (r=a-b). The BN... |
BN_mod_inverse(3) -- Compute inverse modulo n
|
The BN_mod_inverse() function computes the inverse of a modulo n and places the result in r ((a*r)%n==1). If r is NULL, a new BIGNUM is created. The ctx is a previously allocated BN_CTX used for tempo... |
BN_mod_mul(3) -- Arithmetic operations on BIGNUMs
|
The BN_add() function adds a and b and places the result in r (r=a+b). The r value can be the same BIGNUM as a or b. The BN_sub() function subtracts b from a and places the result in r (r=a-b). The BN... |
BN_mod_mul_montgomery(3) -- Montgomery multiplication
|
These functions implement Montgomery multiplication. They are used automatically when BN_mod_exp() is called with suitable input, but they may be useful when several operations are performed using the... |
BN_mod_mul_reciprocal(3) -- Modular multiplication using reciprocal
|
The BN_mod_mul_reciprocal() function can be used to perform an efficient BN_mod_mul() operation when the operation will be performed repeatedly with the same modulus. It computes r=(a*b)%m using recp=... |
BN_mod_word(3) -- Arithmetic functions on BIGNUMs with integers
|
These functions perform arithmetic operations on BIGNUMs with unsigned integers. They are much more efficient than the normal BIGNUM arithmetic operations. The BN_add_word() function adds w to a (a+=w... |
BN_MONT_CTX_copy(3) -- Montgomery multiplication
|
These functions implement Montgomery multiplication. They are used automatically when BN_mod_exp() is called with suitable input, but they may be useful when several operations are performed using the... |
BN_MONT_CTX_free(3) -- Montgomery multiplication
|
These functions implement Montgomery multiplication. They are used automatically when BN_mod_exp() is called with suitable input, but they may be useful when several operations are performed using the... |
BN_MONT_CTX_init(3) -- Montgomery multiplication
|
These functions implement Montgomery multiplication. They are used automatically when BN_mod_exp() is called with suitable input, but they may be useful when several operations are performed using the... |
BN_MONT_CTX_new(3) -- Montgomery multiplication
|
These functions implement Montgomery multiplication. They are used automatically when BN_mod_exp() is called with suitable input, but they may be useful when several operations are performed using the... |
BN_MONT_CTX_set(3) -- Montgomery multiplication
|
These functions implement Montgomery multiplication. They are used automatically when BN_mod_exp() is called with suitable input, but they may be useful when several operations are performed using the... |
BN_mpi2bn(3) -- Format conversions
|
The BN_bn2bin() function converts the absolute value of a into big-endian form and stores it at to. The to value must point to BN_num_bytes(a) bytes of memory. The BN_bin2bn() function converts the po... |
BN_mul(3) -- Arithmetic operations on BIGNUMs
|
The BN_add() function adds a and b and places the result in r (r=a+b). The r value can be the same BIGNUM as a or b. The BN_sub() function subtracts b from a and places the result in r (r=a-b). The BN... |
bn_mul_add_words(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_mul_comba4(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_mul_comba8(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_mul_high(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_mul_low_normal(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_mul_low_recursive(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_mul_normal(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_mul_part_recursive(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_mul_recursive(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_mul_word(3) -- Arithmetic functions on BIGNUMs with integers
|
These functions perform arithmetic operations on BIGNUMs with unsigned integers. They are much more efficient than the normal BIGNUM arithmetic operations. The BN_add_word() function adds w to a (a+=w... |
bn_mul_words(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_new(3) -- Allocate and free BIGNUMs
|
The BN_new() function allocates and initializes a BIGNUM structure. The BN_init() function initializes an existing uninitialized BIGNUM. The BN_clear() function is used to destroy sensitive data such ... |
BN_num_bits(3) -- Get BIGNUM size
|
These functions return the size of a BIGNUM in bytes or bits, and the size of an unsigned integer in bits. BN_num_bytes() is a macro. |
BN_num_bits_word(3) -- Get BIGNUM size
|
These functions return the size of a BIGNUM in bytes or bits, and the size of an unsigned integer in bits. BN_num_bytes() is a macro. |
BN_num_bytes(3) -- Get BIGNUM size
|
These functions return the size of a BIGNUM in bytes or bits, and the size of an unsigned integer in bits. BN_num_bytes() is a macro. |
BN_one(3) -- BIGNUM assignment operations
|
The BN_zero(), BN_one(), and BN_set_word() functions set a to the values 0, 1 and w respectively. BN_zero() and BN_one() are macros. The BN_value_one() function returns a BIGNUM constant of value 1. T... |
bn_print(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_print(3) -- Format conversions
|
The BN_bn2bin() function converts the absolute value of a into big-endian form and stores it at to. The to value must point to BN_num_bytes(a) bytes of memory. The BN_bin2bn() function converts the po... |
BN_print_fp(3) -- Format conversions
|
The BN_bn2bin() function converts the absolute value of a into big-endian form and stores it at to. The to value must point to BN_num_bytes(a) bytes of memory. The BN_bin2bn() function converts the po... |
BN_pseudo_rand(3) -- Generate pseudo-random number
|
The BN_rand() function generates a cryptographically strong pseudo-random number of bits in length and stores it in rnd. If top is -1, the most significant bit of the random number can be zero. If top... |
BN_rand(3) -- Generate pseudo-random number
|
The BN_rand() function generates a cryptographically strong pseudo-random number of bits in length and stores it in rnd. If top is -1, the most significant bit of the random number can be zero. If top... |
BN_RECP_CTX_free(3) -- Modular multiplication using reciprocal
|
The BN_mod_mul_reciprocal() function can be used to perform an efficient BN_mod_mul() operation when the operation will be performed repeatedly with the same modulus. It computes r=(a*b)%m using recp=... |
BN_RECP_CTX_init(3) -- Modular multiplication using reciprocal
|
The BN_mod_mul_reciprocal() function can be used to perform an efficient BN_mod_mul() operation when the operation will be performed repeatedly with the same modulus. It computes r=(a*b)%m using recp=... |
BN_RECP_CTX_new(3) -- Modular multiplication using reciprocal
|
The BN_mod_mul_reciprocal() function can be used to perform an efficient BN_mod_mul() operation when the operation will be performed repeatedly with the same modulus. It computes r=(a*b)%m using recp=... |
BN_RECP_CTX_set(3) -- Modular multiplication using reciprocal
|
The BN_mod_mul_reciprocal() function can be used to perform an efficient BN_mod_mul() operation when the operation will be performed repeatedly with the same modulus. It computes r=(a*b)%m using recp=... |
BN_rshift(3) -- Bit operations on BIGNUMs
|
The BN_set_bit() function sets bit n in a to 1 (a|=(1< |
BN_rshift1(3) -- Bit operations on BIGNUMs
|
The BN_set_bit() function sets bit n in a to 1 (a|=(1< |
BN_set_bit(3) -- Bit operations on BIGNUMs
|
The BN_set_bit() function sets bit n in a to 1 (a|=(1< |
bn_set_high(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_set_low(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_set_max(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_set_word(3) -- BIGNUM assignment operations
|
The BN_zero(), BN_one(), and BN_set_word() functions set a to the values 0, 1 and w respectively. BN_zero() and BN_one() are macros. The BN_value_one() function returns a BIGNUM constant of value 1. T... |
BN_sqr(3) -- Arithmetic operations on BIGNUMs
|
The BN_add() function adds a and b and places the result in r (r=a+b). The r value can be the same BIGNUM as a or b. The BN_sub() function subtracts b from a and places the result in r (r=a-b). The BN... |
bn_sqr_comba4(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_sqr_comba8(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_sqr_normal(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_sqr_recursive(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_sqr_words(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_sub(3) -- Arithmetic operations on BIGNUMs
|
The BN_add() function adds a and b and places the result in r (r=a+b). The r value can be the same BIGNUM as a or b. The BN_sub() function subtracts b from a and places the result in r (r=a-b). The BN... |
BN_sub_word(3) -- Arithmetic functions on BIGNUMs with integers
|
These functions perform arithmetic operations on BIGNUMs with unsigned integers. They are much more efficient than the normal BIGNUM arithmetic operations. The BN_add_word() function adds w to a (a+=w... |
bn_sub_words(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_to_montgomery(3) -- Montgomery multiplication
|
These functions implement Montgomery multiplication. They are used automatically when BN_mod_exp() is called with suitable input, but they may be useful when several operations are performed using the... |
BN_ucmp(3) -- BIGNUM comparison and test functions
|
The BN_cmp() function compares the numbers a and b. The BN_ucmp() function compares their absolute values. The BN_is_zero(), BN_is_one(), and BN_is_word() test if a equals 0, 1, or w respectively. The... |
BN_value_one(3) -- BIGNUM assignment operations
|
The BN_zero(), BN_one(), and BN_set_word() functions set a to the values 0, 1 and w respectively. BN_zero() and BN_one() are macros. The BN_value_one() function returns a BIGNUM constant of value 1. T... |
bn_wexpand(3) -- BIGNUM library internal functions
|
This page describes the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_zero(3) -- BIGNUM assignment operations
|
The BN_zero(), BN_one(), and BN_set_word() functions set a to the values 0, 1 and w respectively. BN_zero() and BN_one() are macros. The BN_value_one() function returns a BIGNUM constant of value 1. T... |
border(3) -- Create Curses borders, and horizontal and vertical lines
|
The border, wborder, and box routines draw a border around the edges of the window. Each of the following arguments contains both a character and attributes for a particular part of the border: Left s... |
border_set(3) -- Draw borders or lines by using complex characters and renditions
|
The border_set and wborder_set functions draw a border around the edges of the current or specified window. These functions do not advance the cursor position, do not perform special character process... |
box(3) -- Create Curses borders, and horizontal and vertical lines
|
The border, wborder, and box routines draw a border around the edges of the window. Each of the following arguments contains both a character and attributes for a particular part of the border: Left s... |
box_set(3) -- Draw borders or lines by using complex characters and renditions
|
The border_set and wborder_set functions draw a border around the edges of the current or specified window. These functions do not advance the cursor position, do not perform special character process... |
bsearch(3) -- Performs a binary search
|
The bsearch() function does a binary search and returns a pointer in an array that indicates where an object is found. The compar comparison function is called with two parameters that point to object... |
btowc(3) -- Convert a single byte from multibyte-character to
|
The btowc() function determines if a single-byte value constitutes a valid character in the initial shift state from a multibyte codeset. If so, the function returns the corresponding wide-character v... |
btree(3) -- btree database access method
|
The routine dbopen() is the library interface to database files. One of the supported file formats is btree files. The general description of the database access methods is in dbopen(3), this referenc... |
buffer(3) -- Simple character arrays structure
|
The buffer library handles simple character arrays. Buffers are used for various purposes in the library, most notably memory BIOs. The library uses the BUF_MEM structure defined in buffer.h: typedef ... |
BUF_MEM_free(3) -- Simple character arrays structure
|
The buffer library handles simple character arrays. Buffers are used for various purposes in the library, most notably memory BIOs. The library uses the BUF_MEM structure defined in buffer.h: typedef ... |
BUF_MEM_grow(3) -- Simple character arrays structure
|
The buffer library handles simple character arrays. Buffers are used for various purposes in the library, most notably memory BIOs. The library uses the BUF_MEM structure defined in buffer.h: typedef ... |
BUF_MEM_new(3) -- Simple character arrays structure
|
The buffer library handles simple character arrays. Buffers are used for various purposes in the library, most notably memory BIOs. The library uses the BUF_MEM structure defined in buffer.h: typedef ... |
BUF_strdup(3) -- Simple character arrays structure
|
The buffer library handles simple character arrays. Buffers are used for various purposes in the library, most notably memory BIOs. The library uses the BUF_MEM structure defined in buffer.h: typedef ... |
bzero(3) -- Perform memory operations
|
The bcopy(), bcmp(), and bzero() functions operate on variable length strings of bytes. Unlike the string functions, they do not check for null bytes. The bcopy() function copies the value of the leng... |
cabs(3) -- Calculate Euclidean distance and absolute value
|
The hypot(), hypotf(), and hypotl() functions compute the length of the hypotenuse of a right triangle, where x and y represent the perpendicular sides of the triangle. The hypot(x,y), hypotf(x,y) and... |
calloc(3) -- Provide a memory allocator
|
The malloc() and free() functions provide a simple, general-purpose memory allocation package. Note See also the subsection "Using the densemalloc Library" for information on using libdensemalloc to... |
callrpc(3) -- library routines for client ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
can_change_color(3) -- Curses
|
The Curses library includes routines that manipulate color-on-color alphanumeric terminals. To use these routines, applications must call start_color, usually right after initscr. Colors are always us... |
catclose(3) -- Close a specified message catalog
|
The catclose() function closes the message catalog identified by cat_descriptor. Before exiting, programs should close any message catalogs they have opened. If a program accesses several message cata... |
catgets(3) -- Retrieve a message from a catalog
|
The catgets() function retrieves a message from a catalog after a successful call to the catopen() function. If the catgets() function finds the specified message, a pointer to the message text is ret... |
catopen(3) -- Opening a message catalog
|
The catopen() function opens a specified message catalog and returns a catalog descriptor that is used by the catgets() function to retrieve messages from the catalog. The name parameter specifies the... |
cbreak(3) -- Curses
|
The cbreak and nocbreak routines put the terminal into and out of cbreak mode, respectively. In this mode, characters typed by the user are immediately available to the program, and erase/kill charact... |
cbrt(3) -- Square and cube root functions
|
sqrt(), sqrtf(), and sqrtl() compute the rounded square root of x. For platforms supporting a signed zero, sqrt (-0) = 0. cbrt(), cbrtf(), and cbrtl() return the rounded cube root of y. --------------... |
ccos(3) -- Complex functions
|
These functions can only be called from languages that support the double_complex and float_complex data types. csin() and csinf() compute the sine of a complex number. ccos() and ccosf() return the c... |
cdiv(3) -- Complex functions
|
These functions can only be called from languages that support the double_complex and float_complex data types. csin() and csinf() compute the sine of a complex number. ccos() and ccosf() return the c... |
cdsa(3) -- Common Data Security Architecture (CDSA) implemented as
|
CDSA is a multiplatform, industry standard security infrastructure. It provides a standards-based, stable programming interface that applications can use to access operating system security services, ... |
CDSA(3) -- Common Data Security Architecture (CDSA) implemented as
|
CDSA is a multiplatform, industry standard security infrastructure. It provides a standards-based, stable programming interface that applications can use to access operating system security services, ... |
cdsa_intro(3) -- Common Data Security Architecture (CDSA) implemented as
|
CDSA is a multiplatform, industry standard security infrastructure. It provides a standards-based, stable programming interface that applications can use to access operating system security services, ... |
CDSA_intro(3) -- Common Data Security Architecture (CDSA) implemented as
|
CDSA is a multiplatform, industry standard security infrastructure. It provides a standards-based, stable programming interface that applications can use to access operating system security services, ... |
cd_cdrec(3) -- reads the Directory Record from a CDROM directory
|
The cd_drec routine fills the *drec structure with the contents of the Directory Record that is associated with a file or directory pointed to by *path. The cd_cdrec function copies the complete Direc... |
cd_cptrec(3) -- reads the Path Table Record from the
|
The cd_ptrec() routine fills the *ptrec structure with the contents of the Path Table Record associated with the directory that is pointed to by *path. The cd_cptrec() function copies the complete Pat... |
cd_cpvd(3) -- reads the Primary Volume Descriptor from
|
The function cd_pvd() fills the *pvd structure with the contents of the Primary Volume Descriptor from the CD-ROM. To execute this function successfully, the user must have read or execute permission ... |
cd_cxar(3) -- reads the Extended Attribute Record for
|
The cd_xar() routine fills the *xar structure with the contents of the Extended Attribute Record (XAR) that is associated with the file or directory pointed to by *path. The total number of logical bl... |
cd_defs(3) -- sets or gets default values for the User or Group ID, or for file or directory permissions
|
The cd_defs() routine sets or gets the default values for UIDs, GIDs, or file or directory permissions for a mounted CD-ROM. |
cd_drec(3) -- reads the Directory Record from a CDROM directory
|
The cd_drec routine fills the *drec structure with the contents of the Directory Record that is associated with a file or directory pointed to by *path. The cd_cdrec function copies the complete Direc... |
cd_getdevmap(3) -- get mappings of major/minor numbers of a
|
This function gets the major and minor numbers of one device file on a mounted Rock Ridge format CD-ROM. The argument path points to a file or directory within the CDROM file hierarchy. The argument i... |
cd_idmap(3) -- sets or gets mappings of User and Group IDs on
|
The cd_idmap() routine sets or gets the mapping of UIDs or GIDs for a mounted CD-ROM. |
cd_nmconv(3) -- sets or gets CD-ROM file name conversions
|
The cd_nmconv() routine sets of gets the name conversion *flag for file names on a mounted CD-ROM. |
cd_ptrec(3) -- reads the Path Table Record from the
|
The cd_ptrec() routine fills the *ptrec structure with the contents of the Path Table Record associated with the directory that is pointed to by *path. The cd_cptrec() function copies the complete Pat... |
cd_pvd(3) -- reads the Primary Volume Descriptor from
|
The function cd_pvd() fills the *pvd structure with the contents of the Primary Volume Descriptor from the CD-ROM. To execute this function successfully, the user must have read or execute permission ... |
cd_setdevmap(3) -- set mappings of major/minor numbers of a
|
The cd_setdevmap()function sets or unsets (based on cmd) the major and minor numbers of one device file on a mounted Rock Ridge format CD-ROM. The argument path points to a file or directory within th... |
cd_suf(3) -- read System Use Field from a specified System Use
|
The cd_suf() function returns a System Use Field in the System Use Area for path. |
cd_type(3) -- determines the type of file system recorded on a
|
The cd_type() routine determines the type of file system recorded on the CD-ROM pointed to by *path. |
cd_xar(3) -- reads the Extended Attribute Record for
|
The cd_xar() routine fills the *xar structure with the contents of the Extended Attribute Record (XAR) that is associated with the file or directory pointed to by *path. The total number of logical bl... |
ceil(3) -- Round floatingpoint
|
The floor(), floorf(), and floorl() functions return the largest floating-point integer value less than or equal to x. The ceil(), ceilf(), and ceill() functions return the smallest floating-point int... |
cexp(3) -- Complex functions
|
These functions can only be called from languages that support the double_complex and float_complex data types. csin() and csinf() compute the sine of a complex number. ccos() and ccosf() return the c... |
cfgetispeed(3) -- Get the input baud rate for a terminal
|
The cfgetispeed() function extracts the input baud rate from the termios structure to which the termios_p parameter points. This function returns exactly the value in the termios structure, without in... |
cfgetospeed(3) -- Get the output baud rate for a terminal
|
The cfgetospeed() function extracts the output baud rate from the termios structure to which the termios_p parameter points. This function returns exactly the value in the termios data structure, with... |
cfg_connect(3) -- connect to the configuration management server on a remote host
|
Before your application can perform operations on remote kernel subsystems, it must call the cfg_connect() routine. This routine invokes the configuration management server and establishes a socket co... |
cfg_disconnect(3) -- remove the connection to a remote configuration management server
|
Once your application is finished using a remote configuration management server, it should call the cfg_disconnect() routine. This routine closes sockets and stops execution of the configuration mana... |
cfg_psm_catadd(3) -- Perform category operations on the Process Set Manager (PSM) set
|
Refer to PSM(4) for a description of the Process Set Manager, which supports the functions described in this reference page. Functions    [Toc]    [Back] Use these functions as follows: Adds the categ... |
cfg_psm_catget(3) -- Perform category operations on the Process Set Manager (PSM) set
|
Refer to PSM(4) for a description of the Process Set Manager, which supports the functions described in this reference page. Functions    [Toc]    [Back] Use these functions as follows: Adds the categ... |
cfg_psm_catops(3) -- Perform category operations on the Process Set Manager (PSM) set
|
Refer to PSM(4) for a description of the Process Set Manager, which supports the functions described in this reference page. Functions    [Toc]    [Back] Use these functions as follows: Adds the categ... |
cfg_psm_catrem(3) -- Perform category operations on the Process Set Manager (PSM) set
|
Refer to PSM(4) for a description of the Process Set Manager, which supports the functions described in this reference page. Functions    [Toc]    [Back] Use these functions as follows: Adds the categ... |
cfg_psm_memadd(3) -- Perform member operations on the Process Set manager (PSM) set
|
Refer to PSM(4) for a description of the Process Set Manager, which supports the functions described in this reference page. Functions    [Toc]    [Back] Use these functions as follows: Adds a process... |
cfg_psm_memget(3) -- Perform member operations on the Process Set manager (PSM) set
|
Refer to PSM(4) for a description of the Process Set Manager, which supports the functions described in this reference page. Functions    [Toc]    [Back] Use these functions as follows: Adds a process... |
cfg_psm_memops(3) -- Perform member operations on the Process Set manager (PSM) set
|
Refer to PSM(4) for a description of the Process Set Manager, which supports the functions described in this reference page. Functions    [Toc]    [Back] Use these functions as follows: Adds a process... |
cfg_psm_memrem(3) -- Perform member operations on the Process Set manager (PSM) set
|
Refer to PSM(4) for a description of the Process Set Manager, which supports the functions described in this reference page. Functions    [Toc]    [Back] Use these functions as follows: Adds a process... |
cfg_subsys_config(3) -- configure a subsystem
|
To initially configure a subsystem into the kernel, call the cfg_subsys_config() routine. If the subsystem is not loaded into the kernel, this routine loads the subsystem. The routine then configures ... |
cfg_subsys_defaults(3) -- determine the /etc/sysconfigtab value for selected attributes of a subsystem
|
Use the cfg_subsys_defaults() routine to get information about the value assigned to attributes in the /etc/sysconfigtab database. You can request information about one or more attributes, but you can... |
cfg_subsys_defaults_all(3) -- determine the /etc/sysconfigtab value for all attributes of a subsystem
|
Use the cfg_subsys_defaults_all() routine to get the value of all attributes of a subsystem as specified in the /etc/sysconfigtab database. For information about the /etc/sysconfigtab database, see sy... |
cfg_subsys_list(3) -- determine the names and states of all subsystems registered on the system
|
Use the cfg_subsys_list() routine to determine the names of subsystems available on the system and the current state of those subsystems. The subsys array returns NULL terminated subsystem names of le... |
cfg_subsys_op(3) -- perform a subsystem-specific operation
|
Use the cfg_subsys_op() routine to request that the system perform subsystem-specific operations. These operations are defined by the subsystem. When your application calls the cfg_subsys_op() routine... |
cfg_subsys_query(3) -- determine the value of selected subsystem attributes
|
Use the cfg_subsys_query() routine to get information about a list of subsystem attributes. You can get information about one or more attributes. When your application calls the cfg_subsys_query() rou... |
cfg_subsys_query_all(3) -- determine the value of all attributes for a subsystem
|
Use the cfg_subsys_query_all() routine to get information about all the attributes for a particular subsystem. When your application calls the cfg_subsys_query_all() routine, it passes the name of the... |
cfg_subsys_reconfig(3) -- reconfigure attribute values for a subsystem
|
Use the cfg_subsys_reconfig() routine to modify attribute values for a subsystem. The modifications made by this routine take effect immediately because they are made to the in-memory copy of the subs... |
cfg_subsys_state(3) -- determine the state of the named subsystem
|
Use the cfg_subsys_state() routine to determine the state of a particular subsystem. Subsystems can be loaded, loaded and configured, or unloaded. (Subsystems must be loaded to be configured.) In addi... |
cfg_subsys_unconfig(3) -- unconfigure a subsystem
|
When a subsystem is not needed, you can use the cfg_subsys_unconfig() routine to unconfigure the subsystem. If the subsystem is loadable, it is unloaded from the kernel. When a subsystem is unloaded, ... |
cfsetispeed(3) -- Set input baud rate for a terminal
|
The cfsetispeed() function sets the input baud rate stored in the structure pointed to by the termios_p parameter to the value specified by the speed parameter. If the input baud rate is set to 0 (zer... |
cfsetospeed(3) -- Set the output baud rate for a terminal
|
The cfsetospeed() function sets the output baud rate stored in the structure pointed to by the termios_p parameter to the speed specified by the speed parameter. The zero baud rate, B0, is used to ter... |
check_auth_parameters(3) -- Get or check user or group IDs (Enhanced Security)
|
The identity functions provide a way to recall the IDs of a process at the time the program started. They are useful when interrogating the invoking environment of a program after any setuid() or setg... |
check_usage(3) -- checks whether a disk partition is in use
|
The check_usage() function checks whether the special device file is in use, that is, whether it contains a valid file system, is part of LSM, or is being used by a database or for swap space. If the ... |
chgat(3) -- Change renditions of characters in a Curses window
|
These functions change the renditions of the next n characters in the current or specified window (or of the remaining characters on the line if n is -1), starting at the current or specified cursor p... |
class_add(3) -- add a member to an existing scheduling class
|
This routine adds a member to an existing scheduling class. If the member is found in another class, the member will be moved to the new class if force is TRUE. Note that the calling process must have... |
class_change(3) -- change the allotted resources of an existing scheduling class
|
The class_change() routine changes the limits of the CPU resources that an existing class is allowed to use. If the requested percentage would cause the total resource percentage of all classes to exc... |
class_change_name(3) -- change the name of an existing class
|
Changes the name of an existing class. Note that the calling process must have root access privileges. |
class_close(3) -- close the class database file
|
The class_close() routine is used on application exit to close the class database file. The calling process must have root access privileges. |
class_configure(3) -- set or change class database configuration parameters
|
Set or change the class scheduler database configuration parameters. If no database exists, one will be created. No (NULL) inputs for all parameters will create a database with the default values. If ... |
class_create(3) -- create a new scheduling class
|
Create a new class. The created class will be empty. Use class_add() to populate the class. If the requested percentage causes the total percentage of all classes to exceed 100%, the call will fail an... |
class_database_file_exists(3) -- determines if the database exists
|
This function determines if the class scheduler database exists on disk. Note that the calling process must have root access privileges. |
class_database_modified(3) -- determines if the database has changed
|
The class_database_modified() function determines whether the database has changed since the last disk update. The intended use of this function is to determine whether class_save_database() should be... |
class_database_name(3) -- gets the name of the current database
|
This function gets the name of the current class scheduling database. Note that the calling process must have root access privileges. |
class_delete(3) -- remove a member from an existing scheduling class
|
Remove a member from an existing class. Note that the calling process must have root access privileges. |
class_destroy(3) -- destroy an existing class
|
Destroy an existing class. If the class is not empty, the force parameter determines the action. Note that the calling process must have root access privileges. |
class_disable(3) -- disable class scheduling.
|
Disables class scheduling (if currently enabled) on the partition described by handle. Note that the calling process must have root access privileges. |
class_enable(3) -- enable class scheduling
|
Enables class scheduling (if not already enabled). Note that the calling process must have root access privileges. |
class_get_classes(3) -- get classes for a class scheduling database
|
This function returns classes in a class scheduling database. The structure class_info is the list of classes. A NULL list entry indicates the end of the list. Note that the calling process must have ... |
class_get_class_members(3) -- get the membership information of a class
|
This function returns members belonging to the specified scheduling class. The structure class_member_info is the list of class members. A NULL list entry indicates the end of the list. Note that the ... |
class_get_config_stats(3) -- return database configuration information
|
This function returns the configuration parameters of the current class scheduling database for the specified partition. If no database exists, the default configuration values are returned. Note that... |
class_index_to_name(3) -- gets the class name given the class index
|
Given the class index, this call returns the class name. Note that the calling process must have root access privileges. |
class_load_database(3) -- load a new database
|
This function loads a new class scheduling database into memory. If class scheduling has been enabled, the changes take effect immediately. If the current in-memory database has been modified and not ... |
class_open(3) -- initialize the class scheduling database
|
The class_open() function is used to prepare the class database for use as follows: Opening the disk file (if required) Creating (or attaching to) a shared memory section Creating (or attaching to) a ... |
class_restore_database(3) -- restore the in-memory class database from disk
|
After making updates to the in-memory database, the application can cancel the updates by restoring the on-disk version with this routine. Note that the calling process must have root access privilege... |
class_save_database(3) -- write the in-memory class database to disk
|
The class scheduler database is shared in memory by the class_admin command, the class scheduler daemon, and the runclass command. Administrative changes (such as adding a gid to a class) need to be s... |
clear(3) -- Clear all or part of a Curses window
|
The erase and werase routines copy blanks to every position in the window. The clear and wclear routines are similar to erase and werase but also call clearok. The result is that the screen is cleared... |
clearenv(3) -- Clears the process environment
|
The clearenv() function clears the process environment. No environment variables are defined immediately after a call to clearenv(). The clearenv() function sets the value of the external variable env... |
clearerr(3) -- Clear indicators on a stream
|
The clearerr() function resets the error indicator and the EOF indicator for the stream specified by the stream parameter. |
clearok(3) -- Routines for controlling output options for a Curses terminal
|
These routines set options that deal with output within Curses. Unless stated otherwise, all options are initially FALSE. It is not necessary to turn these options off before calling endwin. The clear... |
clntraw_create(3) -- library routines for client ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnttcp_create(3) -- library routines for client ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clntudp_bufcreate(3) -- library routines for client ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clntudp_create(3) -- library routines for client ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_broadcast(3) -- library routines for client ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_call(3) -- library routines for client ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_control(3) -- library routines for client ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_create(3) -- library routines for client ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_destroy(3) -- library routines for client ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_freeres(3) -- library routines for client ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_geterr(3) -- library routines for client ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_pcreateerror(3) -- library routines for client ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_perrno(3) -- library routines for client ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_perror(3) -- library routines for client ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_spcreateerror(3) -- library routines for client ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_sperrno(3) -- library routines for client ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_sperror(3) -- library routines for client ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clock(3) -- Report CPU time used
|
The clock() function reports the amount of processor time used by the calling process and each of its terminated child processes for which a wait function has been executed. When a child process does ... |
clock_getres(3) -- Gets the resolution for the specified clock (P1003.1b)
|
The clock_getres function returns the resolution value for the specified clock. If the res argument is NULL, the clock resolution is not returned. |
clock_gettime(3) -- Obtains or sets the time for the specified clock (P1003.1b)
|
The clock_gettime function returns the current time (in seconds and nanoseconds) for the specified clock. The clock_settime function sets the specified clock. The CLOCK_REALTIME clock measures the amo... |
clock_settime(3) -- Obtains or sets the time for the specified clock (P1003.1b)
|
The clock_gettime function returns the current time (in seconds and nanoseconds) for the specified clock. The clock_settime function sets the specified clock. The CLOCK_REALTIME clock measures the amo... |
clog(3) -- Complex functions
|
These functions can only be called from languages that support the double_complex and float_complex data types. csin() and csinf() compute the sine of a complex number. ccos() and ccosf() return the c... |
closedir(3) -- Perform operations on directories
|
The opendir() function opens the directory designated by the dir_name parameter and associates a directory stream with it. The directory stream is positioned at the first entry. The type DIR, which is... |
closelog(3) -- Control system log
|
The syslog() function writes messages to the system log maintained by the syslogd daemon. The syslogd daemon reads messages and writes them to the system console or to a log file, or forwards them to ... |
closelog_r(3) -- Control system log
|
The syslog() function writes messages to the system log maintained by the syslogd daemon. The syslogd daemon reads messages and writes them to the system console or to a log file, or forwards them to ... |
clrtobot(3) -- Clear all or part of a Curses window
|
The erase and werase routines copy blanks to every position in the window. The clear and wclear routines are similar to erase and werase but also call clearok. The result is that the screen is cleared... |
clrtoeol(3) -- Clear all or part of a Curses window
|
The erase and werase routines copy blanks to every position in the window. The clear and wclear routines are similar to erase and werase but also call clearok. The result is that the screen is cleared... |
clu_free_info(3) -- Gets information about a cluster and its members
|
When called from a member of a cluster, the clu_info() function returns specific cluster status information when the following options are specified: CLU_INFO_MEMBSTATE - returns the following informa... |
clu_free_memb(3) -- Gets information about a cluster and its members
|
When called from a member of a cluster, the clu_info() function returns specific cluster status information when the following options are specified: CLU_INFO_MEMBSTATE - returns the following informa... |
clu_get_info(3) -- Gets information about a cluster and its members
|
When called from a member of a cluster, the clu_info() function returns specific cluster status information when the following options are specified: CLU_INFO_MEMBSTATE - returns the following informa... |
clu_get_memb_by_id(3) -- Gets information about a cluster and its members
|
When called from a member of a cluster, the clu_info() function returns specific cluster status information when the following options are specified: CLU_INFO_MEMBSTATE - returns the following informa... |
clu_get_memb_by_name(3) -- Gets information about a cluster and its members
|
When called from a member of a cluster, the clu_info() function returns specific cluster status information when the following options are specified: CLU_INFO_MEMBSTATE - returns the following informa... |
clu_info(3) -- Gets information about a cluster and its members
|
When called from a member of a cluster, the clu_info() function returns specific cluster status information when the following options are specified: CLU_INFO_MEMBSTATE - returns the following informa... |
clu_is_member(3) -- Determine whether the local system is currently a cluster member or has been configured to be a clus...
|
The clu_is_member() function determines whether the local system is currently a cluster member (that is, the TruCluster Server software has been installed and configured, the system has booted a clust... |
clu_is_ready(3) -- Determine whether the local system is currently a cluster member or has been configured to be a clus...
|
The clu_is_member() function determines whether the local system is currently a cluster member (that is, the TruCluster Server software has been installed and configured, the system has booted a clust... |
CL_CertAbortCache(3) -- Terminate a certificate cache handle (CDSA)
|
|
CL_CertAbortQuery(3) -- Terminate a results handle (CDSA)
|
This function terminates a results handle used to access multiple certificate fields identified by a single OID. The ResultsHandle was created and returned by CSSM_CL_CertGetFirstFieldValue() (CSSM AP... |
CL_CertCache(3) -- Cache a copy of a certificate (CDSA)
|
This function caches a copy of a certificate for subsequent accesses using the functions CSSM_CL_CertGetFirstCachedFieldValue() (CSSM API), or CL_CertGetFirstCachedFieldValue() (CL SPI), and CSSM_CL_C... |
CL_CertCreateTemplate(3) -- Allocate and initialize memory for a certificate template (CDSA)
|
This function allocates and initializes memory for an encoded certificate template output in CertTemplate->Data. The template values are specified by the input OID/value pairs contained in CertFields.... |
CL_CertDescribeFormat(3) -- Return a list of the CSSM_OID values (CDSA)
|
This function returns a list of the CSSM_OID values this certificate library module uses to name and reference fields of a certificate. Multiple CSSM_OID values can correspond to a single field. These... |
CL_CertGetAllFields(3) -- Return a list of input certificate values (CDSA)
|
This function returns a list of the values stored in the input certificate. |
CL_CertGetAllTemplateFields(3) -- Extract and return values stored in CertTemplate (CDSA)
|
This function extracts and returns a copy of the values stored in the encoded CertTemplate. The memory for the CertFields output is allocated by the service provider using the calling application's m... |
CL_CertGetFirstCachedFieldValue(3) -- Return values from the cached certificate (CDSA)
|
This function returns a single structure containing a set of field values from the cached certificate identified by CertHandle. The selected fields are designated by the CSSM_OID CertField and returne... |
CL_CertGetFirstFieldValue(3) -- Return the value of the certificate field (CDSA)
|
This function returns the value of the certificate field designated by the CSSM_OID CertField. The OID also identifies the data format for the field value returned to the caller. If multiple OIDs name... |
CL_CertGetKeyInfo(3) -- Return the public key and integral information (CDSA)
|
This function returns the public key and integral information about the key from the specified certificate. The key structure returned is a compound object. It can be used in any function requiring a ... |
CL_CertGetNextCachedFieldValue(3) -- Return the value of a certificate field (CDSA)
|
This function returns the value of a certificate field, when that field occurs multiple times in a certificate. Certificates with repeated fields (such as multiple signatures) have multiple field valu... |
CL_CertGetNextFieldValue(3) -- Return the value of a certificate field (CDSA)
|
This function returns the value of a certificate field, when that field occurs multiple times in a certificate. Certificates with repeated fields (such as multiple signatures) have multiple field valu... |
CL_CertGroupFromVerifiedBundle(3) -- Verify the signature of a bundle (CDSA)
|
This function accepts as input a certificate bundle (a codified and signed aggregation of the certificates in the group), verifies the signature of the bundle (if a signature is present), and returns ... |
CL_CertGroupToSignedBundle(3) -- Convert a certificate group to a certificate bundle (CDSA)
|
This function accepts as input a certificate group (as an array of individual certificates) and returns a certificate bundle (a codified and signed aggregation of the certificates in the group). The c... |
CL_CertSign(3) -- Sign a certificate (CDSA)
|
This function signs a certificate using the private key and signing algorithm specified in the CCHandle. The result is a signed, encoded certificate in SignedCert. The certificate field values are spe... |
CL_CertVerify(3) -- Verify a signed certificate (CDSA)
|
This function verifies that the signed certificate has not been altered since it was signed by the designated signer. Only one signature is verified by this function. If the certificate to be verified... |
CL_CertVerifyWithKey(3) -- Verify with a key (CDSA)
|
This function verifies that the CertToBeVerified parameter was signed using a specific private key and that the certificate has not been altered since it was signed using that private key. The public ... |
CL_CrlAbortCache(3) -- Terminate a CRL cache handle (CDSA)
|
This function terminates a CRL cache handle created and returned by the function CSSM_CL_CrlCache() (CSSM API), or CL_CrlCache() (CL SPI). The Certificate Library module releases all cache space and s... |
CL_CrlAbortQuery(3) -- Terminate a query (CDSA)
|
This function terminates the query initiated by CSSM_CL_CrlGetFirstFieldValue() or CSSM_CL_CrlGetFirstCachedFieldValue() function (or their CL SPI equivalents), and allows the CL to release all interm... |
CL_CrlAddCert(3) -- Revoke an input certificate (CDSA)
|
This function revokes the input certificate by adding a record representing the certificate to the CRL. The values for the new entry in the CRL are specified by the list of OID/value input pairs. The ... |
CL_CrlCache(3) -- Cache a copy of a certificate revocation list (CDSA)
|
This function caches a copy of a CertificateRevocationList (CRL) for subsequent accesses using the functions CSSM_CL_CrlGetFirstFieldValue() and CSSM_CL_CrlGetNextFieldValue() (or their CL SPI equival... |
CL_CrlCreateTemplate(3) -- Create
|
This function creates an unsigned, memory-resident CRL. Fields in the CRL are initialized with the descriptive data specified by the OID/value input pairs. The specified OID/value pairs can initialize... |
CL_CrlDescribeFormat(3) -- Return a list of the CSSM_OID values (CDSA)
|
This function returns a list of the CSSM_OID values the Certificate Library module uses to name and reference fields of a CRL. Multiple CSSM_OID values can correspond to a single field. These OIDs can... |
CL_CrlGetAllCachedRecordFields(3) -- Return field values from a CRL record (CDSA)
|
This function returns all field values from a prelocated, cached CRL record. The scanned CRL record is identified by CrlRecordIndex, which is returned by the function CSSM_CL_IsCertInCachedCrl() (CSSM... |
CL_CrlGetAllFields(3) -- Get the field values from the CRL (CDSA)
|
This function returns one or more structures. Each structure contains a set of field values from the encoded, packed CRL contained in Crl. Each structure is returned in the FieldValue entry of the CSS... |
CL_CrlGetFirstCachedFieldValue(3) -- Get field values from the cached CRL (CDSA)
|
This function returns a single structure containing a set of field values from the cached CRL identified by CrlHandle parameter. The selected fields are designated by the CSSM_OID CrlField parameter a... |
CL_CrlGetFirstFieldValue(3) -- Get the value of the first CRL field (CDSA)
|
This function returns the value of the CRL field designated by the CSSM_OID CrlField. The OID also identifies the data format for the field value returned to the caller. If multiple OIDs name the same... |
CL_CrlGetNextCachedFieldValue(3) -- Get the value of the next cached CRL field (CDSA)
|
This function returns the value of a CRL field, when that field occurs multiple times in a CRL. CRLs with repeated fields (such as revocation records) have multiple field values corresponding to a sin... |
CL_CrlGetNextFieldValue(3) -- Get the value of the next CRL field (CDSA)
|
This function returns the value of a CRL field, when that field occurs multiple times in a CRL. CRLs with repeated fields (such as revocation records) have multiple field values corresponding to a sin... |
CL_CrlRemoveCert(3) -- Reinstate a certificate (CDSA)
|
This function reinstates a certificate by removing it from the specified CRL. The operation is valid only if the CRL has not been closed by the process of signing the CRL by executing CSSM_CL_CrlSign(... |
CL_CrlSetFields(3) -- Set new field values (CDSA)
|
This function will set the fields of the input CRL to the new values, specified by the input OID/value pairs. If there is more than one possible instance of an OID (for example, as in an extension or ... |
CL_CrlSign(3) -- Sign a CRL (CDSA)
|
This function signs a CRL using the private key and signing algorithm specified in the CCHandle parameter. The result is a signed, encoded certificate revocation list in SignedCrl. The unsigned CRL is... |
CL_CrlVerify(3) -- Verify a signed CRL has not been altered (CDSA)
|
This function verifies that the signed CRL has not been altered since it was signed by the designated signer. It does this by verifying the digital signature over the fields specified by the VerifySco... |
CL_CrlVerifyWithKey(3) -- Verify a CRL with a specific key (CDSA)
|
This function verifies that the CrlToBeVerified parameter was signed using a specific private key and that the certificate revocation list has not been altered since it was signed using that private k... |
CL_FreeFields(3) -- Free fields (CDSA)
|
|
CL_FreeFieldValue(3) -- Free field data (CDSA)
|
This function frees the data specified by Value and Value->Data. CertOrCrlOid indicates the type of the data in Value. This function should be used only to free CSSM_DATA values returned from calls CS... |
CL_IsCertInCachedCrl(3) -- Search cached CRL for a record (CDSA)
|
This function searches the cached CRL for a record corresponding to the certificate. The result of the search is returned in CertFound. The CRL and the records within the CRL must be digitally signed.... |
CL_IsCertInCrl(3) -- Search CRL for a certificate record (CDSA)
|
This function searches the CRL for a record corresponding to the certificate. The result of the search is returned in CertFound. The CRL and the records within the CRL must be digitally signed. This f... |
CL_PassThrough(3) -- Extend certificate library functionality (CDSA)
|
This function allows applications to call certificate library module-specific operations. Such operations might include queries or services that are specific to the domain represented by the CL module... |
cmul(3) -- Complex functions
|
These functions can only be called from languages that support the double_complex and float_complex data types. csin() and csinf() compute the sine of a complex number. ccos() and ccosf() return the c... |
COLORS(3) -- Curses
|
The Curses library includes routines that manipulate color-on-color alphanumeric terminals. To use these routines, applications must call start_color, usually right after initscr. Colors are always us... |
color_content(3) -- Curses
|
The Curses library includes routines that manipulate color-on-color alphanumeric terminals. To use these routines, applications must call start_color, usually right after initscr. Colors are always us... |
COLOR_PAIR(3) -- Curses
|
The Curses library includes routines that manipulate color-on-color alphanumeric terminals. To use these routines, applications must call start_color, usually right after initscr. Colors are always us... |
COLOR_PAIRS(3) -- Curses
|
The Curses library includes routines that manipulate color-on-color alphanumeric terminals. To use these routines, applications must call start_color, usually right after initscr. Colors are always us... |
color_set(3) -- Functions that control Curses window attributes
|
These functions manipulate the attributes and color of the window rendition of the current or specified window. The current attributes of a window are applied to all characters that are written into t... |
compile(3) -- Regular expression compile and match routines
|
The compile(), advance(), and step() functions are used for general-purpose expression matching. The compile() function takes a simple regular expression as input and produces a compiled expression th... |
compile_r(3) -- Regular expression compile and match routines
|
The compile(), advance(), and step() functions are used for general-purpose expression matching. The compile() function takes a simple regular expression as input and produces a compiled expression th... |
complex(3) -- Complex functions
|
These functions can only be called from languages that support the double_complex and float_complex data types. csin() and csinf() compute the sine of a complex number. ccos() and ccosf() return the c... |
Composite(3X) -- The Composite widget class
|
Composite widgets are intended to be containers for other widgets and can have an arbitrary number of children. Their responsibilities (implemented either directly by the widget class or indirectly by... |
confstr(3) -- Determine the current value of a specified system variable defined by a string value
|
The confstr() function allows an application to determine the current setting of certain system parameters, limits, or options that are defined by a string value. The function is mainly used by applic... |
Constraint(3X) -- The Constraint widget class
|
Constraint widgets maintain additional state data for each child. For example, client-defined constraints on the child's geometry may be specified. When a constrained composite widget defines constra... |
conv(3) -- Translate characters
|
The toascii(), tolower(), _tolower(), toupper(), and _toupper() functions translate all characters, including multibyte characters, to their specified character values. The toascii() function converts... |
copydvagent(3) -- Manipulate device assignment database entry (Enhanced Security)
|
The getesdvent(), getesdvnam(), and copyesdvent() functions each return a pointer to an object with the following structure containing the separated-out fields of an entry in the device assignment dat... |
copyesdfent(3) -- Manipulate system default database entry (Enhanced Security)
|
The getesdfent(), getesdfnam(), and copyesdfent() functions each return a pointer to an object with the following structure containing the separated-out fields of a line in the system default database... |
copyesdvent(3) -- Manipulate device assignment database entry (Enhanced Security)
|
The getesdvent(), getesdvnam(), and copyesdvent() functions each return a pointer to an object with the following structure containing the separated-out fields of an entry in the device assignment dat... |
copyesfient(3) -- Manipulate file control database entry (Enhanced Security)
|
The getesfient(), getesfinam(), and copyesfient() functions each return a pointer to an object with the following structure containing the separated-out fields of a line in the file control database. ... |
copyespwent(3) -- Manipulate protected password database entry (Enhanced Security)
|
The getespwent(), getespwuid(), getespwnam(), and copyespwent() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the protected pa... |
copyestcent(3) -- Manipulate terminal control database entry (Enhanced Security)
|
The getestcent(), getestcnam(), and copyestcent() functions return a pointer to an object with the following structure containing the separated-out fields of an entry in the terminal control database.... |
copysign(3) -- Related miscellaneous IEEE arithmetic functions.
|
The copysign(), copysignf(), and copysignl() functions return x with the same sign as y. IEEE 754 requires copysign(x,NaN), copysignf(x,NaN) and copysignl(x,NaN) to return +x or -x. The finite(), fini... |
copywin(3) -- Overlap and manipulate overlapped Curses windows
|
The overlay and overwrite routines overlay srcwin on top of dstwin. The scrwin and dstwin parameters do not have to be the same size; Curses copies only the text in the region where the two windows ov... |
Core(3X) -- The Core widget class
|
Core is the Xt Intrinsic base class for windowed widgets. The Object and RectObj classes provide support for windowless widgets. Classes    [Toc]    [Back] All widgets are built from Core. The class p... |
cos(3) -- Trigonometric and inverse trigonometric functions in radian and degree calculations.
|
The sin(), sinf(), and sinl() functions compute the sine of x, measured in radians. The sind(), sindf(), and sindl() functions compute the sine of x, measured in degrees. The cos(), cosf(), and cosl()... |
cosd(3) -- Trigonometric and inverse trigonometric functions in radian and degree calculations.
|
The sin(), sinf(), and sinl() functions compute the sine of x, measured in radians. The sind(), sindf(), and sindl() functions compute the sine of x, measured in degrees. The cos(), cosf(), and cosl()... |
cosh(3) -- Hyperbolic functions
|
The sinh(), sinhf(), and sinhl() functions compute the hyperbolic sine of x. Both sinh(x), sinhf(x), and sinhl(x) are defined as (exp(x) - exp(-x))/2. The cosh(), coshf(), and coshl() functions comput... |
cot(3) -- Trigonometric and inverse trigonometric functions in radian and degree calculations.
|
The sin(), sinf(), and sinl() functions compute the sine of x, measured in radians. The sind(), sindf(), and sindl() functions compute the sine of x, measured in degrees. The cos(), cosf(), and cosl()... |
cotd(3) -- Trigonometric and inverse trigonometric functions in radian and degree calculations.
|
The sin(), sinf(), and sinl() functions compute the sine of x, measured in radians. The sind(), sindf(), and sindl() functions compute the sine of x, measured in degrees. The cos(), cosf(), and cosl()... |
cpow(3) -- Complex functions
|
These functions can only be called from languages that support the double_complex and float_complex data types. csin() and csinf() compute the sine of a complex number. ccos() and ccosf() return the c... |
cpuaddset(3) -- Perform operations on CPU sets (libc library)
|
The cpusetops primitives manipulate sets of CPUs, by operating on data objects (of type cpuset_t) that are created by cpusetcreate(). The cpusetcreate() function allocates, and sets to empty, a CPU se... |
cpuandset(3) -- Perform operations on CPU sets (libc library)
|
The cpusetops primitives manipulate sets of CPUs, by operating on data objects (of type cpuset_t) that are created by cpusetcreate(). The cpusetcreate() function allocates, and sets to empty, a CPU se... |
cpucopyset(3) -- Perform operations on CPU sets (libc library)
|
The cpusetops primitives manipulate sets of CPUs, by operating on data objects (of type cpuset_t) that are created by cpusetcreate(). The cpusetcreate() function allocates, and sets to empty, a CPU se... |
cpucountset(3) -- Perform operations on CPU sets (libc library)
|
The cpusetops primitives manipulate sets of CPUs, by operating on data objects (of type cpuset_t) that are created by cpusetcreate(). The cpusetcreate() function allocates, and sets to empty, a CPU se... |
cpudelset(3) -- Perform operations on CPU sets (libc library)
|
The cpusetops primitives manipulate sets of CPUs, by operating on data objects (of type cpuset_t) that are created by cpusetcreate(). The cpusetcreate() function allocates, and sets to empty, a CPU se... |
cpudiffset(3) -- Perform operations on CPU sets (libc library)
|
The cpusetops primitives manipulate sets of CPUs, by operating on data objects (of type cpuset_t) that are created by cpusetcreate(). The cpusetcreate() function allocates, and sets to empty, a CPU se... |
cpuemptyset(3) -- Perform operations on CPU sets (libc library)
|
The cpusetops primitives manipulate sets of CPUs, by operating on data objects (of type cpuset_t) that are created by cpusetcreate(). The cpusetcreate() function allocates, and sets to empty, a CPU se... |
cpufillset(3) -- Perform operations on CPU sets (libc library)
|
The cpusetops primitives manipulate sets of CPUs, by operating on data objects (of type cpuset_t) that are created by cpusetcreate(). The cpusetcreate() function allocates, and sets to empty, a CPU se... |
cpuisemptyset(3) -- Perform operations on CPU sets (libc library)
|
The cpusetops primitives manipulate sets of CPUs, by operating on data objects (of type cpuset_t) that are created by cpusetcreate(). The cpusetcreate() function allocates, and sets to empty, a CPU se... |
cpuismember(3) -- Perform operations on CPU sets (libc library)
|
The cpusetops primitives manipulate sets of CPUs, by operating on data objects (of type cpuset_t) that are created by cpusetcreate(). The cpusetcreate() function allocates, and sets to empty, a CPU se... |
cpuorset(3) -- Perform operations on CPU sets (libc library)
|
The cpusetops primitives manipulate sets of CPUs, by operating on data objects (of type cpuset_t) that are created by cpusetcreate(). The cpusetcreate() function allocates, and sets to empty, a CPU se... |
cpusetcreate(3) -- Perform operations on CPU sets (libc library)
|
The cpusetops primitives manipulate sets of CPUs, by operating on data objects (of type cpuset_t) that are created by cpusetcreate(). The cpusetcreate() function allocates, and sets to empty, a CPU se... |
cpusetdestroy(3) -- Perform operations on CPU sets (libc library)
|
The cpusetops primitives manipulate sets of CPUs, by operating on data objects (of type cpuset_t) that are created by cpusetcreate(). The cpusetcreate() function allocates, and sets to empty, a CPU se... |
cpusetops(3) -- Perform operations on CPU sets (libc library)
|
The cpusetops primitives manipulate sets of CPUs, by operating on data objects (of type cpuset_t) that are created by cpusetcreate(). The cpusetcreate() function allocates, and sets to empty, a CPU se... |
cpuxorset(3) -- Perform operations on CPU sets (libc library)
|
The cpusetops primitives manipulate sets of CPUs, by operating on data objects (of type cpuset_t) that are created by cpusetcreate(). The cpusetcreate() function allocates, and sets to empty, a CPU se... |
cpu_foreach(3) -- enumerate members of a CPU set (libc library)
|
The cpu_foreach() function scans the specified cpuset, starting at the position saved in the cursor parameter, for members of the set and returns the first member found. If the SET_CURSOR_FIRST flag i... |
cpu_get_current(3) -- Return the caller's current CPU ID (libc library)
|
The cpu_get_current() function fetches the ID of the CPU on which the caller is executing. |
cpu_get_info(3) -- Query CPU information for the platform (libc library)
|
The cpu_get_info() function returns the following information about the platform CPU configuration in the buffer pointed to by the info parameter: Revision number. Maximum number of CPUs supported by ... |
cpu_get_max(3) -- Query CPU information for the platform (libc library)
|
The cpu_get_info() function returns the following information about the platform CPU configuration in the buffer pointed to by the info parameter: Revision number. Maximum number of CPUs supported by ... |
cpu_get_num(3) -- Query CPU information for the platform (libc library)
|
The cpu_get_info() function returns the following information about the platform CPU configuration in the buffer pointed to by the info parameter: Revision number. Maximum number of CPUs supported by ... |
cpu_get_rad(3) -- Queries the RAD associated with a CPU (libnuma library)
|
The cpu_get_rad() function returns the identifier of the Resource Affinity Domain (RAD) associated with the CPU specified by the cpu argument. |
createlabel(3) -- creates a disk label structure for a disk device
|
The createlabel() function fills in the disk label structure pointed to by the disk parameter. The resulting disk label can then be written to the disk in order to label it. The function queries the d... |
create_file_securely(3) -- Create a file in the authentication database (Enhanced Security)
|
The create_file_securely() routine creates a file as specified in the file control database, /etc/auth/system/files. It is more flexible than coding the discretionary attributes of the file, and a fur... |
create_pset(3) -- Creates a processor set
|
The create_pset() function creates an empty processor set. Processes that are assigned to an empty processor set cannot run until a processor is assigned to the set. You must have root privileges. |
crypt(3) -- DES encryption
|
The crypt() subroutine is the password encryption routine. It is based on the NBS Data Encryption Standard, with variations intended to frustrate use of hardware implementations of the DES for key sea... |
crypt16(3) -- DES encryption
|
The crypt() subroutine is the password encryption routine. It is based on the NBS Data Encryption Standard, with variations intended to frustrate use of hardware implementations of the DES for key sea... |
crypto(3) -- OpenSSL cryptographic library
|
The OpenSSL crypto library implements a wide range of cryptographic algorithms used in various Internet standards. The services provided by this library are used by the OpenSSL implementations of SSL,... |
CRYPTO_destroy_dynlockid(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. The locking_function(int mode, int n, const char *file, int line) is needed to perform ... |
CRYPTO_get_ex_data(3) -- Internal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
CRYPTO_get_new_dynlockid(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. The locking_function(int mode, int n, const char *file, int line) is needed to perform ... |
CRYPTO_lock(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. The locking_function(int mode, int n, const char *file, int line) is needed to perform ... |
CRYPTO_num_locks(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. The locking_function(int mode, int n, const char *file, int line) is needed to perform ... |
CRYPTO_set_dynlock_create_callback(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. The locking_function(int mode, int n, const char *file, int line) is needed to perform ... |
CRYPTO_set_dynlock_destroy_callback(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. The locking_function(int mode, int n, const char *file, int line) is needed to perform ... |
CRYPTO_set_dynlock_lock_callback(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. The locking_function(int mode, int n, const char *file, int line) is needed to perform ... |
CRYPTO_set_ex_data(3) -- Internal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
CRYPTO_set_id_callback(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. The locking_function(int mode, int n, const char *file, int line) is needed to perform ... |
CRYPTO_set_locking_callback(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. The locking_function(int mode, int n, const char *file, int line) is needed to perform ... |
csfgss_pPtr(3) -- get a pointer to an OID or an OID set
|
The csfgss_pPtr() function takes a text string label and returns the address of the corresponding OID mechanism or OID mechanism set in static memory. The structure returned by this function must not ... |
csf_gss_acq_user(3) -- acquire a user's credentials prior to initiating a security context
|
The csf_gss_acq_user() function is an extension that acquires user credentials using either secret-key or public-key authentication with DES or, optionally, DES3 encryption. This function constructs a... |
csf_gss_get_context_options(3) -- Obtain information about a security context
|
The csf_gss_get_context_options() function is an extension that obtains information about a security context. The application must already have initiated the context, although the context need not be ... |
csf_gss_get_OidAddress(3) -- Return a pointer to static storage that contains the requested OID
|
The csf_gss_get_OidAddress() function is an extension that returns a pointer to static storage that contains the requested OID. This function is the preferred alternative to csfgss_pPtr(). |
csf_gss_get_RfcOidSet(3) -- 0csf_gss_release_user
|
The csf_gss_release_user() function is an extension that frees the memory associated with a user context created by csf_gss_acq_user(). It can also be used to destroy the credentials cache. The applic... |
csf_gss_inq_user(3) -- Extension that obtains information about a user context
|
Extension that obtains information about a user context. The context must be acquired beforehand using the csf_gss_acq_user() function. The information includes the name of the user and the security m... |
csf_gss_release_user(3) -- Free memory associated with a user context
|
The csf_gss_release_user() function is an extension that frees the memory associated with a user context created by csf_gss_acq_user(). It can also be used to destroy the credentials cache. The applic... |
csf_gss_renew_cred(3) -- Extension that renews user credentials for the Kerberos 5 security mechanism
|
The csf_gss_renew_cred() function is an extension that renews user credentials for the Kerberos 5 security mechanism. All renewable tickets in the user's credentials cache for the specified credentia... |
csin(3) -- Complex functions
|
These functions can only be called from languages that support the double_complex and float_complex data types. csin() and csinf() compute the sine of a complex number. ccos() and ccosf() return the c... |
CSP_DecryptData(3) -- Decrypt buffer data (CDSA)
|
This function decrypts all data contained in the set of input buffers using information in the context. The CSSM_QuerySize() (CSSM API), or CSP_QuerySize() (CSP SPI), function can be used to estimate ... |
CSP_DecryptDataFinal(3) -- Finalize staged decryption process (CDSA)
|
This function finalizes the staged decryption process by returning any remaining plain text not returned in the previous staged decryption call. The plain text is returned in a single buffer. |
CSP_DecryptDataInit(3) -- Initialize the staged decrypt function(CDSA)
|
This function initializes the staged decrypt function. The CSP can require that the cryptographic context include access credentials for authentication and authorization checks when using a private ke... |
CSP_DecryptDataUpdate(3) -- Continue the staged decryption process (CDSA)
|
This function continues the staged decryption process over all data in the set of input buffers. There can be algorithm-specific and token-specific rules restricting the lengths of data in CSSM_Decryp... |
CSP_DeriveKey(3) -- Derive new symmetric key (CDSA)
|
This function derives a new symmetric key using the context and/or information from the base key in the context. The CSP can require that the cryptographic context include access credentials for authe... |
CSP_DigestData(3) -- Compute message digest (CDSA)
|
This function computes a message digest for all data contained in the set of input buffers. |
CSP_DigestDataClone(3) -- Clone a staged message digest (CDSA)
|
This function clones a given staged message digest context with its cryptographic attributes and intermediate result. |
CSP_DigestDataFinal(3) -- Finalize the staged message digest (CDSA)
|
This function finalizes the staged message digest function. |
CSP_DigestDataInit(3) -- Initialize the staged message digest (CDSA)
|
This function initializes the staged message digest function. |
CSP_EncryptData(3) -- Encrypts all buffer data (CDSA)
|
This function encrypts all data contained in the set of input buffers using information in the context. The CSSM_QuerySize() function can be used to estimate the output buffer size required. The minim... |
CSP_EncryptDataFinal(3) -- Finalize staged encryption process (CDSA)
|
This function finalizes the staged encryption process by returning any remaining cipher text not returned in the previous staged encryption call. The cipher text is returned in a single buffer. |
CSP_EncryptDataInit(3) -- Initialize the staged encrypt funciton (CDSA)
|
This function initializes the staged encrypt function. There may be algorithm-specific and token-specific rules restricting the lengths of data following data update calls making use of these paramete... |
CSP_EncryptDataUpdate(3) -- Continue the staged encryption process (CDSA)
|
This function continues the staged encryption process over all data in the set of input buffers. There can be algorithm-specific and token-specific rules restricting the lengths of data in CSSM_Encryp... |
CSP_EventNotify(3) -- Notify service module of a context event (CDSA)
|
This function is used to notify the service module of a context event related to a particular attach handle. Valid events include creation, deletion, or modification of a cryptographic context. The se... |
CSP_FreeKey(3) -- Clean up keys (CDSA)
|
This function requests the cryptographic service provider to clean up any key material associated with the key, and to possibly delete the key from the CSP completely. This function also releases the ... |
CSP_GenerateAlgorithmParams(3) -- Generate algorithm parameters (CDSA)
|
This function generates algorithm parameters for the specified context. These parameters include Diffie-Hellman key agreement parameters and DSA key generation parameters. In most cases the algorithm ... |
CSP_GenerateKey(3) -- Generate a symmetric key (CDSA)
|
This function generates a symmetric key. The KeyUsage, and KeyAttr are used to initialize the keyheader for the newly created key. These values are not retained in the cryptographic Context, which con... |
CSP_GenerateKeyPair(3) -- Generate an asymmetric key pair (CDSA)
|
This function generates an asymmetric key pair. The CSP may cache keying material associated with the new asymmetric keypair. When one or both of the keys are no longer in active use, the application ... |
CSP_GenerateMac(3) -- Compute a message authentication code (CDSA)
|
This function computes a message authentication code for all data contained in the set of input buffers. |
CSP_GenerateMacFinal(3) -- Finalize the staged message authentication code (CDSA)
|
This function finalizes the staged message authentication code function. |
CSP_GenerateMacInit(3) -- Initialize the staged message authentication code (CDSA)
|
This function initializes the staged message authentication code function. |
CSP_GenerateMacUpdate(3) -- Continue the staged process of computing a message authentication code (CDSA)
|
This function continues the staged process of computing a message authentication code over all data contained in the set of input buffers. The authentication code will be returned as a result of the f... |
CSP_GenerateRandomfunction(3) -- Generate random data (CDSA)
|
This function generates random data. |
CSP_GetOperationalStatistics(3) -- Get operational values of a subservice (CDSA)
|
Obtain the current operational values of a subservice. The information is returned in a structure of type CSSM_CSP_OPERATIONAL_STATISTICS. This information includes login status and available storage ... |
CSP_GetTimeValue(3) -- Get a CSP time value (CDSA)
|
This function returns a time value maintained by a CSP. This feature will be supported primarily by hardware tokens with an onboard real time clock. |
CSP_ObtainPrivateKeyFromPublicKey(3) -- Convert public key to private key (CDSA)
|
Given a public key this function returns a reference to the private key. The private key and its associated passphrase can be used as an input to any function requiring a private key value. |
CSP_PassThrough(3) -- Extend crypto functionality (CDSA)
|
The CSSM_CSP_PassThrough() (CSSM API), or CSP_PassThrough() (CSP SPI), function is provided to allow CSP developers to extend the crypto functionality of the CSSM API. |
CSP_QueryKeySizeInBits(3) -- Get CSP logical and effective sizes (CDSA)
|
This function queries a Cryptographic Service Provider (CSP) for the logical and effective sizes of a specified key. The cryptographic service provider (handle) and the key can be specified either in ... |
CSP_QuerySize(3) -- Get size of the output data (CDSA)
|
This function queries for the size of the output data for a cryptographic operation. If the context is an encryption or decryption context type then the Encrypt parameter will determine which operatio... |
CSP_RetrieveCounter(3) -- Get the value of a tamper resistant clock (CDSA)
|
This function returns the value of a tamper resistant clock/counter of the cryptographic device. |
CSP_RetrieveUniqueId(3) -- Get identifier (CDSA)
|
This function returns an identifier that could be used to uniquely differentiate the cryptographic device from all other devices from the same vendor or different vendors. |
CSP_SignData(3) -- Sign all buffer data (CDSA)
|
This function signs all data contained in the set of input buffers using the private key specified in the context. The CSP can require that the cryptographic context include access credentials for aut... |
CSP_SignDataFinal(3) -- Complete the final stage of the sign data (CDSA)
|
This function completes the final stage of the sign data function. |
CSP_SignDataInit(3) -- Initialize the staged sign data (CDSA)
|
This function initializes the staged sign data function. For staged operations, a combination operation selecting both a digesting algorithm and a signing algorithm must be specified. The CSP can requ... |
CSP_SignDataUpdate(3) -- Continue the staged signing process input buffer data (CDSA)
|
This function continues the staged signing process over all data contained in the set of input buffers. Signing is performed using the private key specified in the context. |
CSP_UnwrapKey(3) -- Unwrap the wrapped key (CDSA)
|
This function unwraps the wrapped key using the context. The wrapped key can be a symmetric key or a private key. If the unwrapping algorithm is a symmetric algorithm, then a symmetric context must be... |
CSP_VerifyData(3) -- Verify input buffer data (CDSA)
|
This function verifies all data contained in the set of input buffers based on the input signature. Verifying can include digesting the data and decrypting the digest (from the signature) or verifying... |
CSP_VerifyDataFinal(3) -- Finalize the staged verify data (CDSA)
|
This function finalizes the staged verify data function. |
CSP_VerifyDataInit(3) -- Initialize the staged verify data (CDSA)
|
This function initializes the staged verify data function. For staged operations, a combination operation selecting both a digesting algorithm and a verification algorithm must be specified. |
CSP_VerifyDataUpdate(3) -- Continue the staged verification (CDSA)
|
This function continues the staged verification process over all data contained in the set of input. Verification will be based on the signature presented as input when finalizing the staged verificat... |
CSP_VerifyDevice(3) -- Cause the cryptographic module to perform a self verification and integrity check (CDSA)
|
This function triggers the cryptographic module to perform self verification and integrity checking. |
CSP_VerifyMac(3) -- Verify the message authentication code (CDSA)
|
This function verifies the message authentication code over all data contained in the set of input buffers based on the input signature. |
CSP_VerifyMacFinal(3) -- Finalize the staged message authentication code (CDSA)
|
This function finalizes the staged message authentication code verification function. |
CSP_VerifyMacInit(3) -- Initialize the staged message authentication code (CDSA)
|
This function initializes the staged message authentication code verification function. |
CSP_VerifyMacUpdate(3) -- Continue the staged process of verifying the message authentication code (CDSA)
|
This function continues the staged process of verifying the message authentication code over all data in the set of input buffers. Verification will be based on the authentication code presented as in... |
CSP_WrapKey(3) -- Wrap a key using the context (CDSA)
|
This function wraps the supplied key using the context. It allows a key to be exported from a CSP. Four types of wrapping exist: Wrap a symmetric key with a symmetric key. Wrap a symmetric key with an... |
csqrt(3) -- Complex functions
|
These functions can only be called from languages that support the double_complex and float_complex data types. csin() and csinf() compute the sine of a complex number. ccos() and ccosf() return the c... |
CSSM_AC_PassThrough(3) -- Call exported module-specific operations (CDSA)
|
This function allows applications to call authorization computation module-specific operations that have been exported. Such operations might include queries or services specific to the domain represe... |
cssm_CcToHandle(3) -- Get the module attach handle (CDSA)
|
This function returns the module attach handle identifying the service module that is managing the specified cryptographic context. The entry point to this function is provided to a service module in ... |
CSSM_ChangeKeyAcl(3) -- Edit a stored ACL associated with the target key (CDSA)
|
This function edits the stored ACL associated with the target key. The ACL is modified according to the edit mode and information provided in AclEdit. The caller must be authorized to modify the targe... |
CSSM_ChangeKeyOwner(3) -- Change the owner of a key (CDSA)
|
This function takes a CSSM_ACL_OWNER_PROTOTYPE defining the new owner of the key. |
CSSM_CL_CertAbortCache(3) -- Terminate a certificate cache handle (CDSA)
|
|
CSSM_CL_CertAbortQueryfunction(3) -- Terminate a results handle (CDSA)
|
This function terminates a results handle used to access multiple certificate fields identified by a single OID. The ResultsHandle was created and returned by CSSM_CL_CertGetFirstFieldValue() (CSSM AP... |
CSSM_CL_CertCache(3) -- Cache a copy of a certificate (CDSA)
|
This function caches a copy of a certificate for subsequent accesses using the functions CSSM_CL_CertGetFirstCachedFieldValue() (CSSM API), or CL_CertGetFirstCachedFieldValue() (CL SPI), and CSSM_CL_C... |
CSSM_CL_CertCreateTemplate(3) -- Allocate and initialize memory for a certificate template (CDSA)
|
This function allocates and initializes memory for an encoded certificate template output in CertTemplate->Data. The template values are specified by the input OID/value pairs contained in CertFields.... |
CSSM_CL_CertDescribeFormat(3) -- Return a list of the CSSM_OID values (CDSA)
|
This function returns a list of the CSSM_OID values this certificate library module uses to name and reference fields of a certificate. Multiple CSSM_OID values can correspond to a single field. These... |
CSSM_CL_CertGetAllFields(3) -- Return a list of input certificate values (CDSA)
|
This function returns a list of the values stored in the input certificate. |
CSSM_CL_CertGetAllTemplateFields(3) -- Extract and return values stored in CertTemplate (CDSA)
|
This function extracts and returns a copy of the values stored in the encoded CertTemplate. The memory for the CertFields output is allocated by the service provider using the calling application's m... |
CSSM_CL_CertGetFirstCachedFieldValue(3) -- Return values from the cached certificate (CDSA)
|
This function returns a single structure containing a set of field values from the cached certificate identified by CertHandle. The selected fields are designated by the CSSM_OID CertField and returne... |
CSSM_CL_CertGetFirstFieldValue(3) -- Return the value of the certificate field (CDSA)
|
This function returns the value of the certificate field designated by the CSSM_OID CertField. The OID also identifies the data format for the field value returned to the caller. If multiple OIDs name... |
CSSM_CL_CertGetKeyInfo(3) -- Return the public key and integral information (CDSA)
|
This function returns the public key and integral information about the key from the specified certificate. The key structure returned is a compound object. It can be used in any function requiring a ... |
CSSM_CL_CertGetNextCachedFieldValue(3) -- Return the value of a certificate field (CDSA)
|
This function returns the value of a certificate field, when that field occurs multiple times in a certificate. Certificates with repeated fields (such as multiple signatures) have multiple field valu... |
CSSM_CL_CertGetNextFieldValue(3) -- Return the value of a certificate field (CDSA)
|
This function returns the value of a certificate field, when that field occurs multiple times in a certificate. Certificates with repeated fields (such as multiple signatures) have multiple field valu... |
CSSM_CL_CertGroupFromVerifiedBundle(3) -- Verify the signature of a bundle (CDSA)
|
This function accepts as input a certificate bundle (a codified and signed aggregation of the certificates in the group), verifies the signature of the bundle (if a signature is present), and returns ... |
CSSM_CL_CertGroupToSignedBundle(3) -- Convert a certificate group to a certificate bundle (CDSA)
|
This function accepts as input a certificate group (as an array of individual certificates) and returns a certificate bundle (a codified and signed aggregation of the certificates in the group). The c... |
CSSM_CL_CertSign(3) -- Sign a certificate (CDSA)
|
This function signs a certificate using the private key and signing algorithm specified in the CCHandle. The result is a signed, encoded certificate in SignedCert. The certificate field values are spe... |
CSSM_CL_CertVerify(3) -- Verify a signed certificate (CDSA)
|
This function verifies that the signed certificate has not been altered since it was signed by the designated signer. Only one signature is verified by this function. If the certificate to be verified... |
CSSM_CL_CertVerifyWithKey(3) -- Verify with a key (CDSA)
|
This function verifies that the CertToBeVerified parameter was signed using a specific private key and that the certificate has not been altered since it was signed using that private key. The public ... |
CSSM_CL_CrlAbortCache(3) -- Terminate a CRL cache handle (CDSA)
|
This function terminates a CRL cache handle created and returned by the function CSSM_CL_CrlCache() (CSSM API), or CL_CrlCache() (CL SPI). The Certificate Library module releases all cache space and s... |
CSSM_CL_CrlAbortQuery(3) -- Terminate a query (CDSA)
|
This function terminates the query initiated by CSSM_CL_CrlGetFirstFieldValue() or CSSM_CL_CrlGetFirstCachedFieldValue() function (or their CL SPI equivalents), and allows the CL to release all interm... |
CSSM_CL_CrlAddCert(3) -- Revoke an input certificate (CDSA)
|
This function revokes the input certificate by adding a record representing the certificate to the CRL. The values for the new entry in the CRL are specified by the list of OID/value input pairs. The ... |
CSSM_CL_CrlCache(3) -- Cache a copy of a certificate revocation list (CDSA)
|
This function caches a copy of a CertificateRevocationList (CRL) for subsequent accesses using the functions CSSM_CL_CrlGetFirstFieldValue() and CSSM_CL_CrlGetNextFieldValue() (or their CL SPI equival... |
CSSM_CL_CrlCreateTemplate(3) -- Create
|
This function creates an unsigned, memory-resident CRL. Fields in the CRL are initialized with the descriptive data specified by the OID/value input pairs. The specified OID/value pairs can initialize... |
CSSM_CL_CrlDescribeFormat(3) -- Return a list of the CSSM_OID values (CDSA)
|
This function returns a list of the CSSM_OID values the Certificate Library module uses to name and reference fields of a CRL. Multiple CSSM_OID values can correspond to a single field. These OIDs can... |
CSSM_CL_CrlGetAllCachedRecordFields(3) -- Return field values from a CRL record (CDSA)
|
This function returns all field values from a prelocated, cached CRL record. The scanned CRL record is identified by CrlRecordIndex, which is returned by the function CSSM_CL_IsCertInCachedCrl() (CSSM... |
CSSM_CL_CrlGetAllFields(3) -- Get the field values from the CRL (CDSA)
|
This function returns one or more structures. Each structure contains a set of field values from the encoded, packed CRL contained in Crl. Each structure is returned in the FieldValue entry of the CSS... |
CSSM_CL_CrlGetFirstCachedFieldValue(3) -- Get field values from the cached CRL (CDSA)
|
This function returns a single structure containing a set of field values from the cached CRL identified by CrlHandle parameter. The selected fields are designated by the CSSM_OID CrlField parameter a... |
CSSM_CL_CrlGetFirstFieldValue(3) -- Get the value of the first CRL field (CDSA)
|
This function returns the value of the CRL field designated by the CSSM_OID CrlField. The OID also identifies the data format for the field value returned to the caller. If multiple OIDs name the same... |
CSSM_CL_CrlGetNextCachedFieldValue(3) -- Get the value of the next cached CRL field (CDSA)
|
This function returns the value of a CRL field, when that field occurs multiple times in a CRL. CRLs with repeated fields (such as revocation records) have multiple field values corresponding to a sin... |
CSSM_CL_CrlGetNextFieldValue(3) -- Get the value of the next CRL field (CDSA)
|
This function returns the value of a CRL field, when that field occurs multiple times in a CRL. CRLs with repeated fields (such as revocation records) have multiple field values corresponding to a sin... |
CSSM_CL_CrlRemoveCert(3) -- Reinstate a certificate (CDSA)
|
This function reinstates a certificate by removing it from the specified CRL. The operation is valid only if the CRL has not been closed by the process of signing the CRL by executing CSSM_CL_CrlSign(... |
CSSM_CL_CrlSetFields(3) -- Set new field values (CDSA)
|
This function will set the fields of the input CRL to the new values, specified by the input OID/value pairs. If there is more than one possible instance of an OID (for example, as in an extension or ... |
CSSM_CL_CrlSign(3) -- Sign a CRL (CDSA)
|
This function signs a CRL using the private key and signing algorithm specified in the CCHandle parameter. The result is a signed, encoded certificate revocation list in SignedCrl. The unsigned CRL is... |
CSSM_CL_CrlVerify(3) -- Verify a signed CRL has not been altered (CDSA)
|
This function verifies that the signed CRL has not been altered since it was signed by the designated signer. It does this by verifying the digital signature over the fields specified by the VerifySco... |
CSSM_CL_CrlVerifyWithKey(3) -- Verify a CRL with a specific key (CDSA)
|
This function verifies that the CrlToBeVerified parameter was signed using a specific private key and that the certificate revocation list has not been altered since it was signed using that private k... |
CSSM_CL_FreeFields(3) -- Free fields (CDSA)
|
|
CSSM_CL_FreeFieldValue(3) -- Free field data (CDSA)
|
This function frees the data specified by Value and Value->Data. CertOrCrlOid indicates the type of the data in Value. This function should be used only to free CSSM_DATA values returned from calls CS... |
CSSM_CL_IsCertInCachedCrl(3) -- Search cached CRL for a record (CDSA)
|
This function searches the cached CRL for a record corresponding to the certificate. The result of the search is returned in CertFound. The CRL and the records within the CRL must be digitally signed.... |
CSSM_CL_IsCertInCrl(3) -- Search CRL for a certificate record (CDSA)
|
This function searches the CRL for a record corresponding to the certificate. The result of the search is returned in CertFound. The CRL and the records within the CRL must be digitally signed. This f... |
CSSM_CL_PassThrough(3) -- Extend certificate library functionality (CDSA)
|
This function allows applications to call certificate library module-specific operations. Such operations might include queries or services that are specific to the domain represented by the CL module... |
CSSM_CSP_ChangeLoginAcl(3) -- Edit a stored CSP ACL login session (CDSA)
|
This function edits the stored ACL controlling login sessions for a cryptographic service provider (CSP). The ACL is modified according to the edit mode and information provided in AclEdit. The caller... |
CSSM_CSP_ChangeLoginOwner(3) -- Define a new login owner (CDSA)
|
This function takes a CSSM_ACL_OWNER_PROTOTYPE describing the new login owner. |
CSSM_CSP_CreateAsymmetricContext(3) -- Create an asymmetric encryption cryptographic context (CDSA)
|
This function creates an asymmetric encryption cryptographic context, given a handle of a CSP, an algorithm identification number, a key, and padding. The cryptographic context handle is returned. The... |
CSSM_CSP_CreateDeriveKeyContext(3) -- Create a cryptographic context to derive a symmetric key (CDSA)
|
This function creates a cryptographic context to derive a symmetric key, given a handle of a CSP, an algorithm, the type of symmetric key to derive, the length of the derived key, and an optional seed... |
CSSM_CSP_CreateDigestContext(3) -- Create a digest cryptographic context (CDSA)
|
This function creates a digest cryptographic context, given a handle of a CSP and an algorithm identification number. The cryptographic context handle is returned. The cryptographic context handle can... |
CSSM_CSP_CreateKeyGenContext(3) -- Create a key generation cryptographic context (CDSA)
|
This function creates a key generation cryptographic context, given a handle of a CSP, an algorithm identification number, a pass phrase, a modulus size (for public or private keypair generation), a k... |
CSSM_CSP_CreateMacContext(3) -- Create a message authentication code cryptographic context (CDSA)
|
This function creates a message authentication code cryptographic context, given a handle of a CSP, algorithm identification number, and a key. The cryptographic context handle is returned. The crypto... |
CSSM_CSP_CreatePassThroughContext(3) -- Create a custom cryptographic context (CDSA)
|
This function creates a custom cryptographic context, given a handle of a CSP and a pointer to a custom input data structure. The cryptographic context handle is returned. The cryptographic context ha... |
CSSM_CSP_CreateRandomGenContext(3) -- Create a random number generation cryptographic context (CDSA)
|
This function creates a random number generation cryptographic context, given a handle of a CSP, an algorithm identification number, a seed, and the length of the random number in bytes. The cryptogra... |
CSSM_CSP_CreateSignatureContext(3) -- Create a signature cryptographic context (CDSA)
|
This function creates a signature cryptographic context for sign and verify, given a handle of a CSP, an algorithm identification number, a key, and an AccessCredentials structure. The AccessCredentia... |
CSSM_CSP_CreateSymmetricContext(3) -- Create a symmetric encryption cryptographic context (CDSA)
|
This function creates a symmetric encryption cryptographic context, given a handle of a CSP, an algorithm identification number, a key, an initial vector, padding, and the number of encryption rounds.... |
CSSM_CSP_GetLoginAcl(3) -- Get description of CSP ACL entries (CDSA)
|
This function returns a description of zero or more ACL entries managed by the CSP and used to control login sessions with the CSP. The optional input SelectionTag parameter restricts the returned des... |
CSSM_CSP_GetLoginOwner(3) -- Get login owner data (CDSA)
|
This function returns a CSSM_ACL_OWNER_PROTOTYPE describing the current login owner of the CSP. |
CSSM_CSP_GetOperationalStatistics(3) -- Get operational values of a subservice (CDSA)
|
Obtain the current operational values of a subservice. The information is returned in a structure of type CSSM_CSP_OPERATIONAL_STATISTICS. This information includes login status and available storage ... |
CSSM_CSP_Login(3) -- Log user in to the CSP (CDSA)
|
Logs the user in to the CSP, allowing for multiple login types. |
CSSM_CSP_Logout(3) -- Terminate the login session (CDSA)
|
Terminates the login session associated with the specified CSP handle. |
CSSM_CSP_ObtainPrivateKeyFromPublicKey(3) -- Convert public key to private key (CDSA)
|
Given a public key this function returns a reference to the private key. The private key and its associated passphrase can be used as an input to any function requiring a private key value. |
CSSM_CSP_PassThrough(3) -- Extend crypto functionality (CDSA)
|
The CSSM_CSP_PassThrough() (CSSM API), or CSP_PassThrough() (CSP SPI), function is provided to allow CSP developers to extend the crypto functionality of the CSSM API. |
CSSM_DecryptData(3) -- Decrypt buffer data (CDSA)
|
This function decrypts all data contained in the set of input buffers using information in the context. The CSSM_QuerySize() (CSSM API), or CSP_QuerySize() (CSP SPI), function can be used to estimate ... |
CSSM_DecryptDataFinal(3) -- Finalize staged decryption process (CDSA)
|
This function finalizes the staged decryption process by returning any remaining plain text not returned in the previous staged decryption call. The plain text is returned in a single buffer. |
CSSM_DecryptDataInit(3) -- Initialize the staged decrypt function(CDSA)
|
This function initializes the staged decrypt function. The CSP can require that the cryptographic context include access credentials for authentication and authorization checks when using a private ke... |
CSSM_DecryptDataUpdate(3) -- Continue the staged decryption process (CDSA)
|
This function continues the staged decryption process over all data in the set of input buffers. There can be algorithm-specific and token-specific rules restricting the lengths of data in CSSM_Decryp... |
CSSM_DeleteContext(3) -- Free the context structure (CDSA)
|
This function frees the context structure allocated by any of the CSSM_Createxxxxx context functions. |
CSSM_DeleteContextAttributes(3) -- Delete internal data (CDSA)
|
This function deletes internal data associated with the given attribute type of the context handle. |
cssm_DeregisterManagerServices(3) -- Deregister manager services
|
This function is used by an elective module manager to deregister its function table with CSSM core services prior to termination. This function is invoked by an elective module manager only when exit... |
CSSM_DeriveKey(3) -- Derive new symmetric key (CDSA)
|
This function derives a new symmetric key using the context and/or information from the base key in the context. The CSP can require that the cryptographic context include access credentials for authe... |
CSSM_DigestData(3) -- Compute message digest (CDSA)
|
This function computes a message digest for all data contained in the set of input buffers. |
CSSM_DigestDataClone(3) -- Clone a staged message digest (CDSA)
|
This function clones a given staged message digest context with its cryptographic attributes and intermediate result. |
CSSM_DigestDataFinal(3) -- Finalize the staged message digest (CDSA)
|
This function finalizes the staged message digest function. |
CSSM_DigestDataInit(3) -- Initialize the staged message digest (CDSA)
|
This function initializes the staged message digest function. |
CSSM_DigestDataUpdate(3) -- Continue the staged process of digesting (CDSA)
|
This function continues the staged process of digesting all data contained in the set of input buffers. The resulting digest value will be returned as part of the staged digesting process. |
CSSM_DL_Authenticate(3) -- Provide authentication credentials (CDSA)
|
This function allows the caller to provide authentication credentials to the DL module at a time other than data store creation, deletion, open, import, and export. AccessRequest defines the type of a... |
CSSM_DL_ChangeDbAcl(3) -- Edit stored ACL (CDSA)
|
This function edits the stored ACL associated with the target data base identified by DLDBHandle.DBHandle. The ACL is modified according to the edit mode and information provided in AclEdit. The calle... |
CSSM_DL_ChangeDbOwner(3) -- Define a new data base owner (CDSA)
|
This function takes a CSSM_ACL_OWNER_PROTOTYPE defining the new Owner of the Data Base. |
CSSM_DL_CreateRelation(3) -- Create a new persistent relation (CDSA)
|
This function creates a new persistent relation of the specified type by inserting it into the specified data store. The pAttributeInfo and pIndexInfo specify the values contained in the new relation ... |
CSSM_DL_DataAbortQuery(3) -- Terminate DL_DataGetFirst query (CDSA)
|
This function terminates the query initiated by DL_DataGetFirst() and allows a DL to release all intermediate state information associated with the query, and release any locks on the resource. The us... |
CSSM_DL_DataDelete(3) -- Remove data record (CDSA)
|
This function removes the data record specified by the unique record identifier from the specified data store. |
CSSM_DL_DataGetFirst(3) -- Get first data record (CDSA)
|
This function retrieves the first data record in the data store that matches the selection criteria. The selection criteria (including selection predicate and comparison values) is specified in the Qu... |
CSSM_DL_DataGetFromUniqueRecordId(3) -- Get data record (CDSA)
|
This function retrieves the data record and attributes associated with this unique record identifier. The Attributes parameter can specify a subset of the attributes to be returned. If Attributes spec... |
CSSM_DL_DataGetNext(3) -- Get next data record (CDSA)
|
This function returns the next data record referenced by the ResultsHandle. The ResultsHandle references a set of records selected by an invocation of the DataGetFirst function. The Attributes paramet... |
CSSM_DL_DataInsert(3) -- Create new persistent data record (CDSA)
|
This function creates a new persistent data record of the specified type by inserting it into the specified data store. The values contained in the new data record are specified by the Attributes and ... |
CSSM_DL_DataModify(3) -- Modify persistent data record (CDSA)
|
This function modifies the persistent data record identified by the UniqueRecordIdentifier. The modifications are specified by the Attributes and Data parameters. The ModifyMode indicates how the attr... |
CSSM_DL_DbClose(3) -- Close open data store (CDSA)
|
This function closes an open data store. |
CSSM_DL_DbCreate(3) -- Create and open new data store (CDSA)
|
This function creates and opens a new data store. The name of the new data store is specified by the input parameter DbName. The record schema for the data store is specified in the DBINFO structure. ... |
CSSM_DL_DbDelete(3) -- Delete all records (CDSA)
|
This function deletes all records from the specified data store and removes all state information associated with that data store. |
CSSM_DL_DbOpen(3) -- Open a data store (CDSA)
|
This function opens the data store with the specified logical name under the specified access mode. If user authentication credentials are required, they must be provided. Also, additional open parame... |
CSSM_DL_DestroyRelation(3) -- Destroy an existing relation (CDSA)
|
This function destroys an existing relation of the specified type by removing its entry from the specified data store. |
CSSM_DL_FreeNameList(3) -- Free the list of the logical data store names (CDSA)
|
This function frees the list of the logical data store names that was returned by CSSM_DL_GetDbNames. |
CSSM_DL_FreeUniqueRecord(3) -- Free data store memory (CDSA)
|
This function frees the memory associated with the data store unique record structure. |
CSSM_DL_GetDbAcl(3) -- Get ACL description (CDSA)
|
This function returns a description of zero or more ACL entries managed by the data storage service provider module and associated with the target database identified by DLDBHandle.DBHandle. The optio... |
CSSM_DL_GetDbNameFromHandle(3) -- Get data source name (CDSA)
|
This function retrieves the data source name corresponding to an opened data store handle. |
CSSM_DL_GetDbNames(3) -- Get list of logical data store names (CDSA)
|
This function returns the list of logical data store names for all data stores that are known by and accessible to the specified DL module. This list also includes the number of data store names in th... |
CSSM_DL_GetDbOwner(3) -- Get data base owner (CDSA)
|
This function returns a CSSM_ACL_OWNER_PROTOTYPE describing the current Owner of the Data Base. |
CSSM_DL_PassThrough(3) -- Extend data storage module functionality (CDSA)
|
This function allows applications to call data storage library module-specific operations that have been exported. Such operations may include queries or services that are specific to the domain repre... |
CSSM_EncryptData(3) -- Encrypts all buffer data (CDSA)
|
This function encrypts all data contained in the set of input buffers using information in the context. The CSSM_QuerySize() function can be used to estimate the output buffer size required. The minim... |
CSSM_EncryptDataFinal(3) -- Finalize staged encryption process (CDSA)
|
This function finalizes the staged encryption process by returning any remaining cipher text not returned in the previous staged encryption call. The cipher text is returned in a single buffer. |
CSSM_EncryptDataInit(3) -- Initialize the staged encrypt funciton (CDSA)
|
This function initializes the staged encrypt function. There may be algorithm-specific and token-specific rules restricting the lengths of data following data update calls making use of these paramete... |
CSSM_EncryptDataUpdate(3) -- Continue the staged encryption process (CDSA)
|
This function continues the staged encryption process over all data in the set of input buffers. There can be algorithm-specific and token-specific rules restricting the lengths of data in CSSM_Encryp... |
CSSM_FreeContext(3) -- Free memory associated with the context structure (CDSA)
|
This function frees the memory associated with the context structure. |
CSSM_FreeKey(3) -- Clean up keys (CDSA)
|
This function requests the cryptographic service provider to clean up any key material associated with the key, and to possibly delete the key from the CSP completely. This function also releases the ... |
CSSM_GenerateAlgorithmParams(3) -- Generate algorithm parameters (CDSA)
|
This function generates algorithm parameters for the specified context. These parameters include Diffie-Hellman key agreement parameters and DSA key generation parameters. In most cases the algorithm ... |
CSSM_GenerateKey(3) -- Generate a symmetric key (CDSA)
|
This function generates a symmetric key. The KeyUsage, and KeyAttr are used to initialize the keyheader for the newly created key. These values are not retained in the cryptographic Context, which con... |
CSSM_GenerateKeyPair(3) -- Generate an asymmetric key pair (CDSA)
|
This function generates an asymmetric key pair. The CSP may cache keying material associated with the new asymmetric keypair. When one or both of the keys are no longer in active use, the application ... |
CSSM_GenerateMac(3) -- Compute a message authentication code (CDSA)
|
This function computes a message authentication code for all data contained in the set of input buffers. |
CSSM_GenerateMacFinal(3) -- Finalize the staged message authentication code (CDSA)
|
This function finalizes the staged message authentication code function. |
CSSM_GenerateMacInit(3) -- Initialize the staged message authentication code (CDSA)
|
This function initializes the staged message authentication code function. |
CSSM_GenerateMacUpdate(3) -- Continue the staged process of computing a message authentication code (CDSA)
|
This function continues the staged process of computing a message authentication code over all data contained in the set of input buffers. The authentication code will be returned as a result of the f... |
CSSM_GenerateRandom(3) -- Generate random data (CDSA)
|
This function generates random data. |
CSSM_GetAPIMemoryFunctions(3) -- Retrieve the memory function table associated with the security service module
|
This function retrieves the memory function table associated with the security service module identified by the input handle. |
cssm_GetAppMemoryFunctions(3) -- Get service functions (CDSA)
|
This function gets a function table containing sets of service functions. Among these service functions are four application-provided memory management functions. The elective module manager can use t... |
cssm_GetAttachFunctions(3) -- Get SPI function table (CDSA)
|
This function returns an SPI function table for the service module identified by the module handle. The module must be of the type specified by the service mask. The SPFunctions parameter contains the... |
CSSM_GetContext(3) -- Get context information (CDSA)
|
This function retrieves the context information when provided with a context handle. |
CSSM_GetContextAttribute(3) -- Get context attribute (CDSA)
|
This function returns the value of a context attribute. Context references the cryptographic context to be searched for the attribute specified by AttributeType. If the specified attribute is not pres... |
CSSM_GetKeyAcl(3) -- Get ACL entries by key (CDSA)
|
This function returns a description of zero or more ACL entries managed by the CSP and associated with the target key. The optional input SelectionTag restricts the returned descriptions to those ACL ... |
CSSM_GetKeyOwner(3) -- Get data describing key owner (CDSA)
|
This function returns a CSSM_ACL_OWNER_PROTOTYPE describing the current Owner of the Key. |
CSSM_GetModuleGUIDFromHandle(3) -- Get GUID of the attached module (CDSA)
|
This function returns the GUID of the attached module identified by the specified handle. |
cssm_GetModuleInfo(3) -- Get the module handle state information
|
This function returns the state information associated with the module handle. The information returned by this function is that set by the call to the CSSM_ModuleAttach() function. The entry point to... |
CSSM_GetPrivilege(3) -- Get CSSM privilege value (CDSA)
|
The CSSM_GetPrivilege() function returns the CSSM_PRIVILEGE value currently established in the framework. |
CSSM_GetSubserviceUIDFromHandle(3) -- Complete a subservice unique identifier structure (CDSA)
|
This function completes a structure containing the persistent unique identifier of the attached module subservice, as identified by the input handle. |
CSSM_GetTimeValue(3) -- Get a CSP time value (CDSA)
|
This function returns a time value maintained by a CSP. This feature will be supported primarily by hardware tokens with an onboard real time clock. |
CSSM_Init(3) -- Initialize CSSM (CDSA)
|
This function initializes CSSM and verifies that the version of CSSM expected by the application is compatible with the version of CSSM on the system. This function should be called at least once by t... |
CSSM_Introduce(3) -- Identify an executable module (CDSA)
|
The CSSM_Introduce() function identifies a dynamically loadable executable module (for example, DLL) to the CSSM framework. CSSM uses the ModuleID information to locate the signed manifest and library... |
cssm_IsFuncCallValid(3) -- Check secure linkage (CDSA)
|
This function checks secure linkage between an application and a service module. Based on address scope of the application and the service module associated with the attach handle, CSSM determines whe... |
CSSM_ListAttachedModuleManagers(3) -- Get a list of GUIDs for the attached module manager(CDSA)
|
This function returns a list of GUIDs for the currently attached and active module managers in the CSSM environment. |
CSSM_ModuleAttach(3) -- Attach and verify a service provider module (CDSA)
|
This function attaches the service provider module and verifies that the version of the module expected by the application is compatible with the version on the system. The module can implement subser... |
CSSM_ModuleDetach(3) -- Detach application from service provider module (CDSA)
|
This function detaches the application from the service provider module. |
CSSM_ModuleLoad(3) -- Initialize the security service module (CDSA)
|
This function initializes the security service module. Initialization includes registering the application's module-event handler and enabling events with the security service service module. The app... |
CSSM_ModuleUnload(3) -- Deregister event notification callbacks (CDSA)
|
The function deregisters event notification callbacks for the caller identified by ModuleGuid. The CSSM_ModuleUnload() function is the analog call to CSSM_ModuleLoad(). If all callbacks registered wit... |
CSSM_QueryKeySizeInBits(3) -- Get CSP logical and effective sizes (CDSA)
|
This function queries a Cryptographic Service Provider (CSP) for the logical and effective sizes of a specified key. The cryptographic service provider (handle) and the key can be specified either in ... |
CSSM_QuerySize(3) -- Get size of the output data (CDSA)
|
This function queries for the size of the output data for a cryptographic operation. If the context is an encryption or decryption context type then the Encrypt parameter will determine which operatio... |
cssm_ReleaseAttachFunctions(3) -- Release lock on the SP function table (CDSA)
|
This function releases the lock on the SP function table for the service module identified by the module handle. The SPI function table was obtained by the elective module manager through the cssm_Get... |
CSSM_RetrieveCounter(3) -- Get the value of a tamper resistant clock (CDSA)
|
This function returns the value of a tamper resistant clock/counter of the cryptographic device. |
CSSM_RetrieveUniqueId(3) -- Get identifier (CDSA)
|
This function returns an identifier that could be used to uniquely differentiate the cryptographic device from all other devices from the same vendor or different vendors. |
CSSM_SetContext(3) -- Replace all context information (CDSA)
|
This function replaces all context information associated with an existing context specified by CCHandle. The contents of the basic context structure and all attributes included in that structure are ... |
CSSM_SetPrivilege(3) -- Store privilege value in CSSM framework (CDSA)
|
The CSSM_SetPrivilege() function accepts as input a privilege value and stores it in the CSSM framework. The integrity credentials of the module calling CSSM_SetPrivilege() must be verified by CSSM be... |
CSSM_SignData(3) -- Sign all buffer data (CDSA)
|
This function signs all data contained in the set of input buffers using the private key specified in the context. The CSP can require that the cryptographic context include access credentials for aut... |
CSSM_SignDataFinal(3) -- Complete the final stage of the sign data (CDSA)
|
This function completes the final stage of the sign data function. |
CSSM_SignDataInit(3) -- Initialize the staged sign data (CDSA)
|
This function initializes the staged sign data function. For staged operations, a combination operation selecting both a digesting algorithm and a signing algorithm must be specified. The CSP can requ... |
CSSM_SignDataUpdate(3) -- Continue the staged signing process input buffer data (CDSA)
|
This function continues the staged signing process over all data contained in the set of input buffers. Signing is performed using the private key specified in the context. |
CSSM_SPI_ModuleAttach(3) -- Attach a service provider module(CDSA)
|
This function is invoked by CSSM once for each invocation of CSSM_ModuleAttach(), specifying the module identified by ModuleGuid. Four entities are stakeholders in this function and each is identified... |
CSSM_SPI_ModuleDetach(3) -- Notify service module of a context event (CDSA)
|
This function is invoked by CSSM once for each invocation of CSSM_ModuleDetach() specifying the attach-session identified by ModuleHandle. The function entry point for CSSM_SPI_ModuleDetach is include... |
CSSM_SPI_ModuleLoad(3) -- Initialize process between CSSM and
|
This function completes the module initialization process between CSSM and the add-in service module. Before invoking this function, CSSM verifies the add-in service module's manifest credentials. If... |
CSSM_SPI_ModuleUnload(3) -- Disable events and deregister CSSM event notification (CDSA)
|
This function disables events and deregisters the CSSM event-notification function. The add-in service module can perform cleanup operations, reversing the initialization performed in CSSM_SPI_ModuleL... |
CSSM_Terminate(3) -- Terminate the use of CSSM (CDSA)
|
This function terminates the caller's use of CSSM. CSSM can clean up all internal states associated with the calling application. This function must be called once by each application. CSSM_Terminate... |
CSSM_TP_ApplyCrlToDb(3) -- Update persistent storage (CDSA)
|
This function updates persistent storage to reflect entries in the certificate revocation list. The TP module determines whether the memory-resident CRL is trusted, and if it should be applied to one ... |
CSSM_TP_CertCreateTemplate(3) -- Allocate and initialize template memory (CDSA)
|
This function allocates and initializes memory for an encoded certificate template output in CertTemplate->Data. The template values are specified by the input OID/value pairs contained in CertFields.... |
CSSM_TP_CertGetAllTemplateFields(3) -- Get CertTemplate field values (CDSA)
|
This function extracts and returns all field values from CertTemplate. The CertTemplate parameter is an unsigned certificate template in the format supported by the TP. Fields are returned as a set of... |
CSSM_TP_CertGroupConstruct(3) -- Construct credential (CDSA)
|
This function builds a collection of certificates that together make up a meaningful credential for a given trust domain. For example, in a hierarchical trust domain, a certificate group is a chain of... |
CSSM_TP_CertGroupPrune(3) -- Remove locally issued anchor certificates (CDSA)
|
This function removes any locally issued anchor certificates from a constructed certificate group. The prune operation can remove those certificates that have been signed by any local certificate auth... |
CSSM_TP_CertGroupToTupleGroup(3) -- Create a set of authorization tuples (CDSA)
|
This function creates a set of authorization tuples based on a set of input certificates. The certificates must be of the type managed by the Trust Policy module. The trust policy module may require t... |
CSSM_TP_CertGroupVerify(3) -- Determine if a certificate is trusted (CDSA)
|
This function determines whether the certificate is trusted. The actions performed by this function differ based on the trust policy domain. The factors include practices, procedures and policies defi... |
CSSM_TP_CertReclaimAbort(3) -- Terminate the process of reclaiming certificates (CDSA)
|
This function terminates the iterative process of reclaiming certificates and recovering their associated private keys from a protected key cache. This function must be called even if all private keys... |
CSSM_TP_CertReclaimKey(3) -- Get private key associated with a certificate (CDSA)
|
This function recovers the private key associated with a certificate and securely stores that key in the specified cryptographic service provider. The key and its associated certificate are among a se... |
CSSM_TP_CertRemoveFromCrlTemplate(3) -- Determine if the revoking certificate group can remove the subject certificate group from the CRL te...
|
The TP module determines whether the revoking certificate group can remove the subject certificate group from the CRL template. The revoker certificate group is first authenticated and its applicabili... |
CSSM_TP_CertRevoke(3) -- Determine if the revoking certificate group can revoke the subject certificate group (CDSA)
|
The TP module determines whether the revoking certificate group can revoke the subject certificate group. The revoker certificate group is first authenticated and its applicability to perform this ope... |
CSSM_TP_CertSign(3) -- Determine if signer certificate is trusted (CDSA)
|
The TP module decides whether the signer certificate is trusted to sign the CertTemplateToBeSigned. The signer certificate group is first authenticated and its applicability to perform this operation ... |
CSSM_TP_ConfirmCredResult(3) -- Confirm credentials (CDSA)
|
This function submits a vector of acknowledgements to a Certificate Authority for a set of requests and corresponding results identified by ReferenceIdentifier. The caller must execute the call sequen... |
CSSM_TP_CrlCreateTemplate(3) -- Create
|
This function creates an unsigned, memory-resident CRL template. Fields in the CRL are initialized based on the descriptive data specified by the OID/value input pairs in CrlFields and the local domai... |
CSSM_TP_CrlSign(3) -- Determine if signer certificate is trusted (CDSA)
|
The TP module decides whether the signer certificate is trusted to sign the entire certificate revocation list. The signer certificate group is first authenticated and its applicability to perform thi... |
CSSM_TP_CrlVerify(3) -- Verify integrity of the certificate revocation list (CDSA)
|
This function verifies the integrity of the certificate revocation list and determines whether it is trusted. The conditions for trust are part of the trust policy module. It can include conditions su... |
CSSM_TP_FormRequest(3) -- Get form from authority (CDSA)
|
This function returns a blank form of type FormType from an Authority. If the PreferredAuthority list is NULL, the CA module can use a default authority name and location based on FormType. The CA mod... |
CSSM_TP_FormSubmit(3) -- Submit form to ClearanceAuthority (CDSA)
|
The completed Form is submitted to a ClearanceAuthority, who is acting on behalf of a RepresentedAuthority. Typically the submitted form is requesting an authorization credential required as input to ... |
CSSM_TP_PassThrough(3) -- Extend trust policy functionality
|
This function allows applications to call trust policy module-specific operations that have been exported. Such operations may include queries or services specific to the domain represented by the TP ... |
CSSM_TP_ReceiveConfirmation(3) -- Poll for confirmation (CDSA)
|
A certificate authority uses this function to poll for confirmation from a requester who has been served by the authority. A requester sends a confirmation to the authority by successfully invoking th... |
CSSM_TP_RetrieveCredResult(3) -- Return the results of the credentials request (CDSA)
|
This function returns the results of a CSSM_TP_SubmitCredRequest() call. The single identifier ReferenceIdentifier denotes the CSSM_TP_SubmitCredRequest() invocation that initiated the request. It is ... |
CSSM_TP_SubmitCredRequest(3) -- Submit credential request (CDSA)
|
If the caller is successfully authenticated, then this function submits a request to the Authority identified by PreferredAuthority. The authority service can be local or remote. If the Authority is n... |
CSSM_TP_TupleGroupToCertGroup(3) -- Create a set of certificate templates (CDSA)
|
This function creates a set of certificate templates based on a set of input tuples. The tuples describe a set of authorizations for one or more subjects. The trust policy service provider maps these ... |
CSSM_Unintroduce(3) -- Remove module (CDSA)
|
The CSSM_Unintroduce() function removes the module referenced by ModuleID from the list of module information maintained by the CSSM framework. A caller can unintroduce modules other than itself if th... |
CSSM_UnwrapKey(3) -- Unwrap the wrapped key (CDSA)
|
This function unwraps the wrapped key using the context. The wrapped key can be a symmetric key or a private key. If the unwrapping algorithm is a symmetric algorithm, then a symmetric context must be... |
CSSM_UpdateContextAttributes(3) -- Update context attribute values (CDSA)
|
This function updates one or more context attribute values stored as part of an existing context specified by CCHandle. The basic context structure is not modified by this function. Only the context a... |
CSSM_VerifyData(3) -- Verify input buffer data (CDSA)
|
This function verifies all data contained in the set of input buffers based on the input signature. Verifying can include digesting the data and decrypting the digest (from the signature) or verifying... |
CSSM_VerifyDataFinal(3) -- Finalize the staged verify data (CDSA)
|
This function finalizes the staged verify data function. |
CSSM_VerifyDataInit(3) -- Initialize the staged verify data (CDSA)
|
This function initializes the staged verify data function. For staged operations, a combination operation selecting both a digesting algorithm and a verification algorithm must be specified. |
CSSM_VerifyDataUpdate(3) -- Continue the staged verification (CDSA)
|
This function continues the staged verification process over all data contained in the set of input. Verification will be based on the signature presented as input when finalizing the staged verificat... |
CSSM_VerifyDevice(3) -- Cause the cryptographic module to perform a self verification and integrity check (CDSA)
|
This function triggers the cryptographic module to perform self verification and integrity checking. |
CSSM_VerifyMac(3) -- Verify the message authentication code (CDSA)
|
This function verifies the message authentication code over all data contained in the set of input buffers based on the input signature. |
CSSM_VerifyMacFinal(3) -- Finalize the staged message authentication code (CDSA)
|
This function finalizes the staged message authentication code verification function. |
CSSM_VerifyMacInit(3) -- Initialize the staged message authentication code (CDSA)
|
This function initializes the staged message authentication code verification function. |
CSSM_VerifyMacUpdate(3) -- Continue the staged process of verifying the message authentication code (CDSA)
|
This function continues the staged process of verifying the message authentication code over all data in the set of input buffers. Verification will be based on the authentication code presented as in... |
CSSM_WrapKey(3) -- Wrap a key using the context (CDSA)
|
This function wraps the supplied key using the context. It allows a key to be exported from a CSP. Four types of wrapping exist: Wrap a symmetric key with a symmetric key. Wrap a symmetric key with an... |
cs_oid_cmp(3) -- compare two object identifiers (OIDs)
|
The cs_oid_cmp() function compares two OIDs and returns an integer that indicates whether the two OIDs are equal. A NULL value may be passed as either or both parameters. Two NULL pointers are equal. |
cs_oid_dup(3) -- duplicate an object identifier (OID)
|
The cs_oid_dup() function duplicates an OID and returns the copy of the original OID. Resources associated with the returned OID must be released by the application after use with a call to cs_oid_fre... |
cs_oid_free(3) -- free an object identifier (OID)
|
The cs_oid_free() function frees an OID that was allocated using the function cs_oid_dup(). A NULL value may be passed as the OID to be freed. |
cs_oid_in_set(3) -- determine if an object identifier (OID) is present in an OID set
|
The cs_oid_in_set() function searches an OID set for the specified OID. |
cs_oid_set_cmp(3) -- compare two object identifier (OID) sets
|
The cs_oid_set_cmp() function compares two OID sets and returns an integer that indicates whether the two sets are equal. The order of the elements in each set is not important. Duplicate entries in e... |
cs_oid_set_dup(3) -- duplicate an object identifier (OID) set
|
The cs_oid_set_dup() function duplicates an OID set and returns a copy of the original OID set. Resources associated with the returned OID set must be released by the application after use with a call... |
cs_oid_set_free(3) -- free an object identifier (OID) set
|
The cs_oid_set_free() function frees an OID set that was allocated using one of the following functions: cs_oid_set_dup(), cs_oid_set_insert(), cs_oid_set_isect(), cs_oid_set_union() A NULL value may ... |
cs_oid_set_insert(3) -- insert an object identifier (OID) into an OID set
|
The cs_oid_set_insert() function adds an OID to an OID set. The OID is inserted if it is not already in the set. If the set does not exist (NULL passed for the set), a new set is created. Resources as... |
cs_oid_set_isect(3) -- create an new object identifier (OID) set that is an intersection oftwo existing sets.
|
The cs_oid_set_isect() function creates a new OID set that is the intersection of two OID sets. Resources associated with the new OID set must be released by the application after use with a call to c... |
cs_oid_set_union(3) -- create an new object identifier (OID) set that is an union of two existingsets.
|
The cs_oid_set_union() function creates a new OID set that is the union of two OID sets. Resources associated with the new OID set must be released by the application after use with a call to cs_oid_s... |
ctermid(3) -- Generate the pathname for the controlling terminal
|
The ctermid() function generates a string that, when used as a pathname, refers to the current controlling terminal for the current process. If ctermid() returns a pathname, access to the file is not ... |
ctime(3) -- converts time units
|
The asctime(), ctime(), gmtime(), localtime(), mktime(), and tzset() functions convert time values between tm structures, time_t type variables, and strings. [POSIX] The asctime_r(), ctime_r(), gmtime... |
ctime64(3) -- converts time units
|
The asctime(), ctime(), gmtime(), localtime(), mktime(), and tzset() functions convert time values between tm structures, time_t type variables, and strings. [POSIX] The asctime_r(), ctime_r(), gmtime... |
ctime64_r(3) -- converts time units
|
The asctime(), ctime(), gmtime(), localtime(), mktime(), and tzset() functions convert time values between tm structures, time_t type variables, and strings. [POSIX] The asctime_r(), ctime_r(), gmtime... |
ctime_r(3) -- converts time units
|
The asctime(), ctime(), gmtime(), localtime(), mktime(), and tzset() functions convert time values between tm structures, time_t type variables, and strings. [POSIX] The asctime_r(), ctime_r(), gmtime... |
ctype(3) -- Classify characters
|
The ctype functions test for membership in a character class in the current locale. Each function tests to see if a character is part of a different character class. If the character is part of the ch... |
curses(3) -- Terminal screen-handling and optimization package
|
The Curses library routines give the user a terminal-independent method of updating character screens with reasonable optimization. A C program using these routines must be compiled with the -l curses... |
curs_addch(3) -- Add a character (with attributes) to a Curses window and advance the cursor
|
The addch, waddch, mvaddch, and mvwaddch routines put the character ch into the window at the current cursor position of the window and advance the position of the window cursor. Their function is sim... |
curs_addchstr(3) -- Add string of characters (and attributes) to a Curses window
|
All of these routines copy chstr directly into the window image structure starting at the current or specified cursor position. The four routines with n as the last argument copy at most n elements, b... |
curs_addstr(3) -- Add a string of characters to a Curses window and advance cursor
|
These routines write the characters of the character string str on the given window. The four routines with n as the last argument write at most n characters. For the other routines, the string should... |
curs_addwch(3) -- Add a wchar_t character (with attributes) to a Curses window and advance cursor
|
The addwch, waddwch, mvaddwch, and mvwaddwch routines put the character wch, holding a wchar_t character, into the window at the current cursor position of the window and advance the position of the w... |
curs_addwchstr(3) -- Add a string of wchar_t characters (and attributes) to a Curses window
|
All of these routines copy wchstr, which points to a string of wchar_t characters, directly into the window image structure starting at the current or specified cursor position. The four routines with... |
curs_addwstr(3) -- Add a string of wchar_t characters to a Curses window and advance cursor
|
These routines write all the characters of the wchar_t character string wstr on the given window. The four routines with n as the last argument write at most n wchar_t characters. For the routines wit... |
curs_add_wch(3) -- Add a complex character and rendition to a Curses window and advance the cursor
|
The add_wch, wadd_wch, mvadd_wch, and mvwadd_wch functions put the complex character wch into the window at the current or specified cursor position, of the current or specified window, and advance th... |
curs_add_wchstr(3) -- Add an array of complex characters and rendition to a Curses window
|
All of these functions copy wchstr, which points to an array of complex characters, directly into the current or specified window image structure starting at the current cursor position or the positio... |
curs_attr(3) -- Curses character and window attribute control routines
|
These routines manipulate the current attributes of the current or specified window. The current attributes of a window are applied to all characters that are written into the window with waddch, wadd... |
curs_attr_get(3) -- Functions that control Curses window attributes
|
These functions manipulate the attributes and color of the window rendition of the current or specified window. The current attributes of a window are applied to all characters that are written into t... |
curs_beep(3) -- Curses bell and screen flash routines
|
The beep and flash routines are used to alert the terminal user. The routine beep sounds the audible alarm on the terminal, if possible. If an audible alarm is not possible, the routine flashes the sc... |
curs_bkgd(3) -- Routines for manipulating the background in a Curses window
|
The bkgdset and wbkgdset routines manipulate the background of the named window. Background is defined as chtype and consists of any combination of attributes and a character. The attribute part of th... |
curs_bkgrnd(3) -- Set or get background character and rendition by using a complex character
|
By using the information in wch, the bkgrndset and wbkgrndset functions set the background rendition and manipulate the window rendition of the current or specified window. These functions turn off th... |
curs_border(3) -- Create Curses borders, and horizontal and vertical lines
|
The border, wborder, and box routines draw a border around the edges of the window. Each of the following arguments contains both a character and attributes for a particular part of the border: Left s... |
curs_border_set(3) -- Draw borders or lines by using complex characters and renditions
|
The border_set and wborder_set functions draw a border around the edges of the current or specified window. These functions do not advance the cursor position, do not perform special character process... |
curs_chgat(3) -- Change renditions of characters in a Curses window
|
These functions change the renditions of the next n characters in the current or specified window (or of the remaining characters on the line if n is -1), starting at the current or specified cursor p... |
curs_clear(3) -- Clear all or part of a Curses window
|
The erase and werase routines copy blanks to every position in the window. The clear and wclear routines are similar to erase and werase but also call clearok. The result is that the screen is cleared... |
curs_color(3) -- Curses
|
The Curses library includes routines that manipulate color-on-color alphanumeric terminals. To use these routines, applications must call start_color, usually right after initscr. Colors are always us... |
curs_delch(3) -- Delete the character under the cursor in a Curses window
|
These routines do the following: Delete the character under the cursor in the current or specified window Move all characters that are to the right of the cursor and on the same line to the left one p... |
curs_deleteln(3) -- Delete or insert lines in a Curses window
|
The deleteln and wdeleteln routines do the following: Delete the line under the cursor in the current or specified window Move all lines below the current line up one line Clear the bottom line of the... |
curs_getcchar(3) -- Get a wide character string and rendition from a cchar_t or set a cchar_t from a wide-character stri...
|
The getcchar function gets a wide-character string and rendition from a cchar_t argument. When wch is not a null pointer, the getcchar function does the following: Extracts information from a cchar_t ... |
curs_getch(3) -- Get (or push back) characters from a Curses terminal keyboard
|
The getch, wgetch, mvgetch, and mvwgetch routines read a character from the terminal associated with the Curses window. In no-delay mode, if no input is waiting, these routines return the value ERR. I... |
curs_getstr(3) -- Get character strings from a Curses terminal keyboard
|
The effect of getstr is as though a series of calls to getch were made, until a newline or carriage return is received. The resulting value is placed in the area pointed to by the character pointer st... |
curs_getwch(3) -- Get (or push back) wchar_t characters from a Curses terminal keyboard
|
The getwch, wgetwch, mvgetwch, and mvwgetwch routines read an EUC character from the terminal associated with the Curses window, transform the character into a wchar_t character, and return the wchar_... |
curs_getwstr(3) -- Get wchar_t character strings from a Curses terminal keyboard
|
The effect of getwstr is as though a series of calls to getwch were made, until a newline and carriage return is received. The resulting value is placed in the area pointed to by the wchar_t pointer w... |
curs_getyx(3) -- Get Curses cursor and window coordinates
|
The getyx macro places the cursor position of the window into the two integer variables y and x. If win is a subwindow, the getparyx macro places the beginning coordinates of the subwindow (relative t... |
curs_get_wch(3) -- Get (or push back) a wide character from Curses terminal keyboard
|
The get_wch, wget_wch, mvget_wch, and mvwget_wch functions read a character from the terminal associated with the current or specified window. In no-delay mode, if no input is waiting, these functions... |
curs_get_wstr(3) -- Get an array of wide characters from a Curses terminal keyboard
|
The effect of get_wstr is as though a series of calls to get_wch were made, until a newline, end-of-line, or endof-file character is processed. An end-of-file character is represented by WEOF, as defi... |
curs_inch(3) -- Get a character and its attributes from a Curses window
|
These routines return the character, of type chtype, at the current position in the named window. If any attributes are set for that position, their values are combined (through an inclusive OR operat... |
curs_inchstr(3) -- Get a string of characters (and attributes) from a Curses window
|
These routines return a string of type chtype, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the window. The four functions ... |
curs_initscr(3) -- Curses routines for screen initialization and manipulation
|
The initscr routine is almost always the first routine that applications call. (The exceptions are slk_init, filter, ripoffline, use_env and, for multiple-terminal applications, newterm). The initscr ... |
curs_inopts(3) -- Curses
|
The cbreak and nocbreak routines put the terminal into and out of cbreak mode, respectively. In this mode, characters typed by the user are immediately available to the program, and erase/kill charact... |
curs_insch(3) -- Insert a character before the character under the cursor in a Curses window
|
These routines insert the character ch before the character under the cursor. All characters to the right of the cursor are moved one space to the right, with the possibility of the rightmost characte... |
curs_insstr(3) -- Insert a string before the character under the cursor in a Curses window
|
These routines insert a character string (as many characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are moved to the right, with the ... |
curs_instr(3) -- Get a string of characters from a Curses window
|
These routines return the string of characters in str, starting at the current cursor position in the named window and ending at the right margin of the window. Attributes are stripped from the charac... |
curs_inswch(3) -- Insert a wchar_t character before the character under the cursor in a Curses window
|
These routines insert the character wch, which contains a wide character, before the character under the cursor. All characters to the right of the cursor are moved one space to the right, with the po... |
curs_inswstr(3) -- Insert a wchar_t string before the character under the cursor in a Curses window
|
These routines insert a wchar_t character string (as many wchar_t characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are moved to the ... |
curs_ins_wch(3) -- Insert a complex character and rendition before the character under the cursor in a Curses window
|
These functions insert the complex character wch, along with its rendition, in the current or specified window at the current or specified cursor position. These functions: Do not perform wrapping In ... |
curs_ins_wstr(3) -- Insert a wide-character string into a Curses window
|
These functions insert a wchar_t character string (as many wchar_t characters as will fit on the line) in the current or specified window immediately before the current or specified position. All char... |
curs_inwch(3) -- Get a wchar_t character and its attributes from a Curses window
|
These routines return the wide character, of type chtype, at the current or specified position in the current or specified window. If any attributes are set for that position, their values included in... |
curs_inwchstr(3) -- Get a string of wchar_t characters (and attributes) from a Curses window
|
These routines return a string of type chtype, holding wchar_t characters, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the... |
curs_inwstr(3) -- Get a string of wchar_t characters from a Curses window
|
These routines return a string of wchar_t characters in str, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the window. The f... |
curs_in_wch(3) -- Input a complex character and rendition from a Curses window
|
These functions extract the complex character and rendition from the current or specified position in the current or specified window into the object pointed to by wcval. |
curs_in_wchstr(3) -- Input an array of complex characters and renditions from a Curses window
|
These functions extract characters from the current or specified window, starting at the current or specified position and ending at the end of the line, and place them in the array pointed to by wchs... |
curs_kernel(3) -- Low-level Curses routines
|
These routines give low-level access to various Curses functionality. They are typically used inside library routines. The def_prog_mode and def_shell_mode routines save the current terminal modes as ... |
curs_move(3) -- Move the Curses window cursor
|
These routines move the cursor associated with the Curses window to line y and column x. They do not move the physical cursor of the terminal until refresh is called. The specified position is relativ... |
curs_outopts(3) -- Routines for controlling output options for a Curses terminal
|
These routines set options that deal with output within Curses. Unless stated otherwise, all options are initially FALSE. It is not necessary to turn these options off before calling endwin. The clear... |
curs_overlay(3) -- Overlap and manipulate overlapped Curses windows
|
The overlay and overwrite routines overlay srcwin on top of dstwin. The scrwin and dstwin parameters do not have to be the same size; Curses copies only the text in the region where the two windows ov... |
curs_pad(3) -- Routines that create and display Curses pads
|
The newpad routine creates and returns a pointer to a new pad data structure with the given number of lines, nlines, and columns, ncols. A pad is like a window, except that a pad is not necessarily as... |
curs_printw(3) -- Print formatted output in Curses windows
|
The printw, wprintw, mvprintw, and mvwprintw routines are analogous to printf family of routines (see printf(3)). In effect, the printw routines output the string that would be output by printf as tho... |
curs_refresh(3) -- Refresh Curses windows and lines
|
Applications must call the refresh and wrefresh routines (or the wnoutrefresh and doupdate routines) to get any output on the terminal. Other Curses routines only manipulate data structures. The wrefr... |
curs_scanw(3) -- Convert formatted input from a Curses window
|
The scanw, wscanw, and mvscanw routines correspond to scanf (see fscanf(3)). The effect of these routines is as though wgetstr were called on the window, and the resulting line were used as input for ... |
curs_scroll(3) -- Scroll a Curses window
|
The scroll routine scrolls the window up one line. This involves moving the lines in the window data structure. As an optimization, if the scrolling region of the window is the entire screen, the phys... |
curs_scr_dump(3) -- Read or write a Curses screen from or to a file
|
The scr_dump routine writes the current contents of the virtual screen to filename. The scr_restore routine sets the virtual screen to the contents of filename, which must have been written using scr_... |
curs_set(3) -- Low-level Curses routines
|
These routines give low-level access to various Curses functionality. They are typically used inside library routines. The def_prog_mode and def_shell_mode routines save the current terminal modes as ... |
curs_slk(3) -- Curses soft-label routines
|
Curses manipulates the set of soft function-key labels that exist on many terminals. For those terminals that do not support soft labels, Curses takes over the bottom line of stdscr, reducing the size... |
curs_termattrs(3) -- Routines for querying the Curses environment
|
The baudrate routine returns the output speed of the terminal. The number returned is an integer that represents bits per second (for example, 9600). The erasechar routine returns the current erase ch... |
curs_termcap(3) -- Curses interfaces that support termcap capabilities
|
These routines are obsolete and should not be used in new applications. The routines are included in the Curses library as a conversion aid for applications originally designed to use the termcap file... |
curs_terminfo(3) -- Curses interfaces to the terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
curs_touch(3) -- Curses routines that control refresh
|
The touchwin and touchline routines throw away all optimization information about which parts of the window have been touched, by pretending that the entire window has been drawn on. It is sometimes n... |
curs_util(3) -- Miscellaneous utility routines for Curses
|
The unctrl macro generates a character string that is a printable representation of the character c. Control characters are displayed in the ^X notation. Printing characters are displayed as is. The w... |
curs_window(3) -- Routines that create Curses windows
|
The newwin routine creates and returns a pointer to a new window with the given number of lines, nlines, and columns, ncols. The upper left-hand corner of the window is at line begin_y and column begi... |
cuserid(3) -- Get the alphanumeric username associated with the current process
|
The cuserid() function generates a character string representing the real or effective username of the owner of the current process. |
cvt_ftof(3) -- Converts a floating-point data type to another
|
cvt_ftof() converts one floating-point data type to another. Input_val points to the input value to be converted and output_val points to the converted result. The conversion is subject to the options... |
d2i_DHparams(3) -- Purpose to be supplied.
|
To be supplied. |
d2i_Netscape_RSA(3) -- Purpose to be supplied.
|
To be supplied. |
d2i_RSAPrivateKey(3) -- Purpose to be supplied.
|
To be supplied. |
d2i_RSAPublicKey(3) -- Purpose to be supplied.
|
To be supplied. |
d2i_SSL_SESSION(3) -- Convert SSL_SESSION object to or from ASN1 representation
|
The d2i_SSL_SESSION() function transforms the external ASN1 representation of an SSL/TLS session, stored as binary data at location pp with length length, into an SSL_SESSION object. The i2d_SSL_SESSI... |
daylight(3) -- sets and accesses time zone conversion information
|
The tzset() function uses the value of the environment variable TZ to set time conversion information used by several other functions, including ctime(), ctime_r(), getdate(), getdate_r(), localtime()... |
dbm(3) -- Database subroutines
|
The dbminit(), fetch(), store(), delete(), firstkey(), nextkey(), and forder() functions maintain key/content pairs in a database. They are obtained with the -ldbm loader option. The dbm library is pr... |
dbminit(3) -- Database subroutines
|
The dbminit(), fetch(), store(), delete(), firstkey(), nextkey(), and forder() functions maintain key/content pairs in a database. They are obtained with the -ldbm loader option. The dbm library is pr... |
dbm_clearerr(3) -- Database subroutines
|
The dbm_open(), dbm_close(), dbm_fetch(), dbm_store(), dbm_delete(), dbm_firstkey(), dbm_nextkey(), dbm_forder(), dbm_setpblksiz(), dbm_error(), and dbm_clearerr() functions maintain key/content pairs... |
dbm_close(3) -- Database subroutines
|
The dbm_open(), dbm_close(), dbm_fetch(), dbm_store(), dbm_delete(), dbm_firstkey(), dbm_nextkey(), dbm_forder(), dbm_setpblksiz(), dbm_error(), and dbm_clearerr() functions maintain key/content pairs... |
dbm_delete(3) -- Database subroutines
|
The dbm_open(), dbm_close(), dbm_fetch(), dbm_store(), dbm_delete(), dbm_firstkey(), dbm_nextkey(), dbm_forder(), dbm_setpblksiz(), dbm_error(), and dbm_clearerr() functions maintain key/content pairs... |
dbm_error(3) -- Database subroutines
|
The dbm_open(), dbm_close(), dbm_fetch(), dbm_store(), dbm_delete(), dbm_firstkey(), dbm_nextkey(), dbm_forder(), dbm_setpblksiz(), dbm_error(), and dbm_clearerr() functions maintain key/content pairs... |
dbm_fetch(3) -- Database subroutines
|
The dbm_open(), dbm_close(), dbm_fetch(), dbm_store(), dbm_delete(), dbm_firstkey(), dbm_nextkey(), dbm_forder(), dbm_setpblksiz(), dbm_error(), and dbm_clearerr() functions maintain key/content pairs... |
dbm_firstkey(3) -- Database subroutines
|
The dbm_open(), dbm_close(), dbm_fetch(), dbm_store(), dbm_delete(), dbm_firstkey(), dbm_nextkey(), dbm_forder(), dbm_setpblksiz(), dbm_error(), and dbm_clearerr() functions maintain key/content pairs... |
dbm_forder(3) -- Database subroutines
|
The dbm_open(), dbm_close(), dbm_fetch(), dbm_store(), dbm_delete(), dbm_firstkey(), dbm_nextkey(), dbm_forder(), dbm_setpblksiz(), dbm_error(), and dbm_clearerr() functions maintain key/content pairs... |
dbm_nextkey(3) -- Database subroutines
|
The dbm_open(), dbm_close(), dbm_fetch(), dbm_store(), dbm_delete(), dbm_firstkey(), dbm_nextkey(), dbm_forder(), dbm_setpblksiz(), dbm_error(), and dbm_clearerr() functions maintain key/content pairs... |
dbm_open(3) -- Database subroutines
|
The dbm_open(), dbm_close(), dbm_fetch(), dbm_store(), dbm_delete(), dbm_firstkey(), dbm_nextkey(), dbm_forder(), dbm_setpblksiz(), dbm_error(), and dbm_clearerr() functions maintain key/content pairs... |
dbm_setpblksiz(3) -- Database subroutines
|
The dbm_open(), dbm_close(), dbm_fetch(), dbm_store(), dbm_delete(), dbm_firstkey(), dbm_nextkey(), dbm_forder(), dbm_setpblksiz(), dbm_error(), and dbm_clearerr() functions maintain key/content pairs... |
dbm_store(3) -- Database subroutines
|
The dbm_open(), dbm_close(), dbm_fetch(), dbm_store(), dbm_delete(), dbm_firstkey(), dbm_nextkey(), dbm_forder(), dbm_setpblksiz(), dbm_error(), and dbm_clearerr() functions maintain key/content pairs... |
dbopen(3) -- database access methods
|
The dbopen() function is the library interface to database files. The supported file formats are btree, hashed, and UNIX file oriented. The btree format is a representation of a sorted, balanced tree ... |
DecryptData(3) -- Decrypt buffer data (CDSA)
|
This function decrypts all data contained in the set of input buffers using information in the context. The CSSM_QuerySize() (CSSM API), or CSP_QuerySize() (CSP SPI), function can be used to estimate ... |
DecryptDataFinal(3) -- Finalize staged decryption process (CDSA)
|
This function finalizes the staged decryption process by returning any remaining plain text not returned in the previous staged decryption call. The plain text is returned in a single buffer. |
DecryptDataInit(3) -- Initialize the staged decrypt function(CDSA)
|
This function initializes the staged decrypt function. The CSP can require that the cryptographic context include access credentials for authentication and authorization checks when using a private ke... |
DecryptDataInitP(3) -- Intialize the staged decrypt function with privilege (CDSA)
|
This function is similar to CSSM_DecryptDataInit(). It also accepts a USEE tag as a privilege request parameter. CSSM checks that either its own privilege set or the application's privilege set (if t... |
DecryptDataP(3) -- Decrypt data with privilege (CDSA)
|
This function is similar to CSSM_DecryptData(). It also accepts a USEE tag as a privilege request parameter. CSSM checks that either its privilege set or the application's privilege set (if the appli... |
DecryptDataUpdate(3) -- Continue the staged decryption process (CDSA)
|
This function continues the staged decryption process over all data in the set of input buffers. There can be algorithm-specific and token-specific rules restricting the lengths of data in CSSM_Decryp... |
def_prog_mode(3) -- Low-level Curses routines
|
These routines give low-level access to various Curses functionality. They are typically used inside library routines. The def_prog_mode and def_shell_mode routines save the current terminal modes as ... |
def_shell_mode(3) -- Low-level Curses routines
|
These routines give low-level access to various Curses functionality. They are typically used inside library routines. The def_prog_mode and def_shell_mode routines save the current terminal modes as ... |
delay_output(3) -- Miscellaneous utility routines for Curses
|
The unctrl macro generates a character string that is a printable representation of the character c. Control characters are displayed in the ^X notation. Printing characters are displayed as is. The w... |
delch(3) -- Delete the character under the cursor in a Curses window
|
These routines do the following: Delete the character under the cursor in the current or specified window Move all characters that are to the right of the cursor and on the same line to the left one p... |
delete(3) -- Database subroutines
|
The dbminit(), fetch(), store(), delete(), firstkey(), nextkey(), and forder() functions maintain key/content pairs in a database. They are obtained with the -ldbm loader option. The dbm library is pr... |
deleteln(3) -- Delete or insert lines in a Curses window
|
The deleteln and wdeleteln routines do the following: Delete the line under the cursor in the current or specified window Move all lines below the current line up one line Clear the bottom line of the... |
delproplist(3) -- removes Extended File Attributes from a file
|
The delproplist() function removes one or more Extended File Attributes, whose names are specified in the structure pointed to by args, from the Property List of the file pointed to by path. An Extend... |
delscreen(3) -- Curses routines for screen initialization and manipulation
|
The initscr routine is almost always the first routine that applications call. (The exceptions are slk_init, filter, ripoffline, use_env and, for multiple-terminal applications, newterm). The initscr ... |
delwin(3) -- Routines that create Curses windows
|
The newwin routine creates and returns a pointer to a new window with the given number of lines, nlines, and columns, ncols. The upper left-hand corner of the window is at line begin_y and column begi... |
del_curterm(3) -- Curses interfaces to the terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
DeregisterDispatchTable(3) -- Invalidate CSSM pointers to EMM (CDSA)
|
This EMM-defined function is invoked by CSSM once for each CSSM_ModuleDetach() operation issued against a service provider of the type managed by the EMM. CSSM uses this function to inform the EMM tha... |
DeriveKey(3) -- Derive new symmetric key (CDSA)
|
This function derives a new symmetric key using the context and/or information from the base key in the context. The CSP can require that the cryptographic context include access credentials for authe... |
derwin(3) -- Routines that create Curses windows
|
The newwin routine creates and returns a pointer to a new window with the given number of lines, nlines, and columns, ncols. The upper left-hand corner of the window is at line begin_y and column begi... |
des(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
destroy_pset(3) -- Destroys a processor set
|
The destroy_pset() function destroys a processor set. A processor that belongs to a destroyed processor set is returned to the default processor set. You must have root privileges. |
des_cbc_cksum(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_cfb64_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_cfb_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_crypt(3) -- Data Encryption Standard (DES) encryption library routines (Auth)
|
The des_crypt() routines are designed to provide the cryptographic routines which are used to support authentication. Specifically, des_quad_cksum() and des_key_sched() are designed to be used with th... |
des_ecb2_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_ecb3_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_ecb_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_ede2_cbc_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_ede2_cfb64_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_ede2_ofb64_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_ede3_cbcm_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_ede3_cbc_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_ede3_cfb64_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_ede3_ofb64_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_enc_read(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_enc_write(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_fcrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_is_weak_key(3) -- Data Encryption Standard (DES) encryption library routines (Auth)
|
The des_crypt() routines are designed to provide the cryptographic routines which are used to support authentication. Specifically, des_quad_cksum() and des_key_sched() are designed to be used with th... |
des_key_sched(3) -- Data Encryption Standard (DES) encryption library routines (Auth)
|
The des_crypt() routines are designed to provide the cryptographic routines which are used to support authentication. Specifically, des_quad_cksum() and des_key_sched() are designed to be used with th... |
des_ncbc_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_ofb64_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_ofb_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_pcbc_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_quad_cksum(3) -- Data Encryption Standard (DES) encryption library routines (Auth)
|
The des_crypt() routines are designed to provide the cryptographic routines which are used to support authentication. Specifically, des_quad_cksum() and des_key_sched() are designed to be used with th... |
des_random_key(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_read_2passwords(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_read_password(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_read_pw_string(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_set_key(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_set_key_checked(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_set_key_unchecked(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_set_odd_parity(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_string_to_2keys(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
des_string_to_key(3) -- Data Encryption Standard (DES) encryption library routines (Auth)
|
The des_crypt() routines are designed to provide the cryptographic routines which are used to support authentication. Specifically, des_quad_cksum() and des_key_sched() are designed to be used with th... |
des_xcbc_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key; the second... |
dh(3) -- Diffie-Hellman key agreement
|
These functions implement the Diffie-Hellman key agreement protocol. The generation of shared DH parameters is described in DH_generate_parameters(3). See DH_generate_key(3) for a description of how t... |
DHparams_print(3) -- Print cryptographic parameters
|
A human-readable hexadecimal output of the components of the RSA key, DSA parameters or key or DH parameters is printed to bp or fp. The output lines are indented by offset spaces. |
DHparams_print_fp(3) -- Print cryptographic parameters
|
A human-readable hexadecimal output of the components of the RSA key, DSA parameters or key or DH parameters is printed to bp or fp. The output lines are indented by offset spaces. |
DH_check(3) -- Generate and check
|
The DH_generate_parameters() function generates DiffieHellman parameters that can be shared among a group of users, and returns them in a newly allocated DH structure. The pseudo-random number generat... |
DH_compute_key(3) -- Perform Diffie-Hellman key exchange
|
The DH_generate_key() function performs the first step of a Diffie-Hellman key exchange by generating private and public DH values. By calling DH_compute_key(), these are combined with the other party... |
DH_free(3) -- Allocate and free DH objects
|
The DH_new() function allocates and initializes a DH structure. The DH_free() function frees the DH structure and its components. The values are erased before the memory is returned to the system. |
DH_generate_key(3) -- Perform Diffie-Hellman key exchange
|
The DH_generate_key() function performs the first step of a Diffie-Hellman key exchange by generating private and public DH values. By calling DH_compute_key(), these are combined with the other party... |
DH_generate_parameters(3) -- Generate and check
|
The DH_generate_parameters() function generates DiffieHellman parameters that can be shared among a group of users, and returns them in a newly allocated DH structure. The pseudo-random number generat... |
DH_get_default_openssl_method(3) -- Select DH method
|
A DH_METHOD specifies the functions that OpenSSL uses for Diffie-Hellman operations. By modifying the method, alternative implementations such as hardware accelerators may be used. Initially, the defa... |
DH_get_ex_data(3) -- Add application specific data to DH structures
|
These functions handle application specific data in DH structures. Their usage is identical to that of RSA_get_ex_new_index(), RSA_set_ex_data(), and RSA_get_ex_data() as described in RSA_get_ex_new_i... |
DH_get_ex_new_index(3) -- Add application specific data to DH structures
|
These functions handle application specific data in DH structures. Their usage is identical to that of RSA_get_ex_new_index(), RSA_set_ex_data(), and RSA_get_ex_data() as described in RSA_get_ex_new_i... |
DH_new(3) -- Allocate and free DH objects
|
The DH_new() function allocates and initializes a DH structure. The DH_free() function frees the DH structure and its components. The values are erased before the memory is returned to the system. |
DH_new_method(3) -- Select DH method
|
A DH_METHOD specifies the functions that OpenSSL uses for Diffie-Hellman operations. By modifying the method, alternative implementations such as hardware accelerators may be used. Initially, the defa... |
DH_OpenSSL(3) -- Select DH method
|
A DH_METHOD specifies the functions that OpenSSL uses for Diffie-Hellman operations. By modifying the method, alternative implementations such as hardware accelerators may be used. Initially, the defa... |
DH_set_default_openssl_method(3) -- Select DH method
|
A DH_METHOD specifies the functions that OpenSSL uses for Diffie-Hellman operations. By modifying the method, alternative implementations such as hardware accelerators may be used. Initially, the defa... |
DH_set_ex_data(3) -- Add application specific data to DH structures
|
These functions handle application specific data in DH structures. Their usage is identical to that of RSA_get_ex_new_index(), RSA_set_ex_data(), and RSA_get_ex_data() as described in RSA_get_ex_new_i... |
DH_set_method(3) -- Select DH method
|
A DH_METHOD specifies the functions that OpenSSL uses for Diffie-Hellman operations. By modifying the method, alternative implementations such as hardware accelerators may be used. Initially, the defa... |
DH_size(3) -- Get Diffie-Hellman prime size
|
This DH_size() function returns the Diffie-Hellman size in bytes. It can be used to determine how much memory must be allocated for the shared secret computed by DH_compute_key(). The dh->p must not b... |
difftime(3) -- compares time values
|
The difftime() function returns a signed time value in seconds that is the difference between the values of the time1 and time2 parameters, also expressed in seconds. The difftime64() function works e... |
difftime64(3) -- compares time values
|
The difftime() function returns a signed time value in seconds that is the difference between the values of the time1 and time2 parameters, also expressed in seconds. The difftime64() function works e... |
DigestData(3) -- Compute message digest (CDSA)
|
This function computes a message digest for all data contained in the set of input buffers. |
DigestDataClone(3) -- Clone a staged message digest (CDSA)
|
This function clones a given staged message digest context with its cryptographic attributes and intermediate result. |
DigestDataFinal(3) -- Finalize the staged message digest (CDSA)
|
This function finalizes the staged message digest function. |
DigestDataInit(3) -- Initialize the staged message digest (CDSA)
|
This function initializes the staged message digest function. |
DigestDataUpdate(3) -- Continue the staged process of digesting (CDSA)
|
This function continues the staged process of digesting all data contained in the set of input buffers. The resulting digest value will be returned as part of the staged digesting process. |
dirname(3) -- Return the base filename or directory portion of a pathname
|
The basename() and dirname() functions complement each other. The basename() function reads path and returns a pointer to the final component of the pathname, deleting any trailing / (slash) character... |
dirname_r(3) -- Return the base filename or directory portion of a pathname
|
The basename() and dirname() functions complement each other. The basename() function reads path and returns a pointer to the final component of the pathname, deleting any trailing / (slash) character... |
disassembler(3) -- disassemble a machine instruction and print the results
|
The disassembler() routine disassembles and prints a machine instruction on stdout. The program must be linked with the object file access routine library libmld.a. |
dispcrypt(3) -- encrypt a password, dispatching based on the associated algorithm (Enhanced Security)
|
The dispcrypt() function applies the specified encryption algorithm to the given password string and salt value, and returns the encrypted form of the password. The return value is static data which i... |
div(3) -- Computes absolute value and division of integers
|
The abs() function returns the absolute value of its integer operand. The div() function computes the quotient and remainder of the division of the numerator numerator by the denominator denominator. ... |
dladdr(3) -- translate address to symbolic information
|
The dladdr() function is one of a family of routines that give the user direct access to the dynamic linking facilities. It can only be used in dynamically linked processes. The dladdr() function dete... |
dlclose(3) -- close a dlopen() object
|
The dlclose() function is used to inform the system that the object referenced by a handle returned from a previous dlopen() invocation is no longer needed by the application. The use of dlclose() ref... |
dlerror(3) -- get diagnostic information
|
The dlerror() function returns a null-terminated character string (with no trailing newline) that describes the last error that occurred in dynamic linking processing for a call to dlopen(), dlclose()... |
dlopen(3) -- gain access to an executable object file
|
The dlopen function provides an interface to the dynamic library loader to allow shared libraries to be loaded and called at run time. The dlopen() function attempts to load the specified file in the ... |
dlsym(3) -- obtain the address of a symbol from a dlopen() object
|
The dlsym() function allows a process to obtain the address of a symbol defined within an object made accessible by a dlopen() call. The dlsym() function will search for the named symbol in all object... |
DL_Authenticate(3) -- Provide authentication credentials (CDSA)
|
This function allows the caller to provide authentication credentials to the DL module at a time other than data store creation, deletion, open, import, and export. AccessRequest defines the type of a... |
DL_ChangeDbAcl(3) -- Edit stored ACL (CDSA)
|
This function edits the stored ACL associated with the target data base identified by DLDBHandle.DBHandle. The ACL is modified according to the edit mode and information provided in AclEdit. The calle... |
DL_ChangeDbOwner(3) -- Define a new data base owner (CDSA)
|
This function takes a CSSM_ACL_OWNER_PROTOTYPE defining the new Owner of the Data Base. |
DL_CreateRelation(3) -- Create a new persistent relation (CDSA)
|
This function creates a new persistent relation of the specified type by inserting it into the specified data store. The pAttributeInfo and pIndexInfo specify the values contained in the new relation ... |
DL_DataAbortQuery(3) -- Terminate DL_DataGetFirst query (CDSA)
|
This function terminates the query initiated by DL_DataGetFirst() and allows a DL to release all intermediate state information associated with the query, and release any locks on the resource. The us... |
DL_DataDelete(3) -- Remove data record (CDSA)
|
This function removes the data record specified by the unique record identifier from the specified data store. |
DL_DataGetFirst(3) -- Get first data record (CDSA)
|
This function retrieves the first data record in the data store that matches the selection criteria. The selection criteria (including selection predicate and comparison values) is specified in the Qu... |
DL_DataGetFromUniqueRecordId(3) -- Get data record (CDSA)
|
This function retrieves the data record and attributes associated with this unique record identifier. The Attributes parameter can specify a subset of the attributes to be returned. If Attributes spec... |
DL_DataGetNext(3) -- Get next data record (CDSA)
|
This function returns the next data record referenced by the ResultsHandle. The ResultsHandle references a set of records selected by an invocation of the DataGetFirst function. The Attributes paramet... |
DL_DataInsert(3) -- Create new persistent data record (CDSA)
|
This function creates a new persistent data record of the specified type by inserting it into the specified data store. The values contained in the new data record are specified by the Attributes and ... |
DL_DataModify(3) -- Modify persistent data record (CDSA)
|
This function modifies the persistent data record identified by the UniqueRecordIdentifier. The modifications are specified by the Attributes and Data parameters. The ModifyMode indicates how the attr... |
DL_DbClose(3) -- Close open data store (CDSA)
|
This function closes an open data store. |
DL_DbCreate(3) -- Create and open new data store (CDSA)
|
This function creates and opens a new data store. The name of the new data store is specified by the input parameter DbName. The record schema for the data store is specified in the DBINFO structure. ... |
DL_DbDelete(3) -- Delete all records (CDSA)
|
This function deletes all records from the specified data store and removes all state information associated with that data store. |
DL_DbOpen(3) -- Open a data store (CDSA)
|
This function opens the data store with the specified logical name under the specified access mode. If user authentication credentials are required, they must be provided. Also, additional open parame... |
DL_DestroyRelation(3) -- Destroy an existing relation (CDSA)
|
This function destroys an existing relation of the specified type by removing its entry from the specified data store. |
DL_FreeNameList(3) -- Free the list of the logical data store names (CDSA)
|
This function frees the list of the logical data store names that was returned by CSSM_DL_GetDbNames. |
DL_FreeUniqueRecord(3) -- Free data store memory (CDSA)
|
This function frees the memory associated with the data store unique record structure. |
DL_GetDbAcl(3) -- Get ACL description (CDSA)
|
This function returns a description of zero or more ACL entries managed by the data storage service provider module and associated with the target database identified by DLDBHandle.DBHandle. The optio... |
DL_GetDbNameFromHandle(3) -- Get data source name (CDSA)
|
This function retrieves the data source name corresponding to an opened data store handle. |
DL_GetDbNames(3) -- Get list of logical data store names (CDSA)
|
This function returns the list of logical data store names for all data stores that are known by and accessible to the specified DL module. This list also includes the number of data store names in th... |
DL_GetDbOwner(3) -- Get data base owner (CDSA)
|
This function returns a CSSM_ACL_OWNER_PROTOTYPE describing the current Owner of the Data Base. |
DL_PassThrough(3) -- Extend data storage module functionality (CDSA)
|
This function allows applications to call data storage library module-specific operations that have been exported. Such operations may include queries or services that are specific to the domain repre... |
dmapi(3) -- Describes the contents of the Data Management Applications Programming Interface (DMAPI)
|
DMAPI is a Common Applications Environment (CAE) standard that allows data management applications to interface with the underlying operating system. An example of a data management application is a h... |
dn_comp(3) -- Compress a domain name
|
The dn_comp() (domain name compression) function compresses the domain name pointed to by the expanded_name parameter and stores it in the area pointed to by the compressed_name parameter. The dn_comp... |
dn_expand(3) -- Expand a compressed domain name
|
The dn_expand() function expands a compressed domain name to a full domain name, converting the expanded names to uppercase. The dn_expand() function is one of a set of subroutines that form the resol... |
dn_find(3) -- Search for an expanded domain name
|
The dn_find() (domain name find) function searches for an expanded domain name from a list of previously compressed names. An application program calls the dn_find() function indirectly using the dn_c... |
dn_skipname(3) -- Skip over a compressed domain name
|
The dn_skipname() function skips over a compressed domain name. The dn_skipname() function is one of a set of subroutines that form the resolver, a set of functions that resolve domain names. Global i... |
doupdate(3) -- Refresh Curses windows and lines
|
Applications must call the refresh and wrefresh routines (or the wnoutrefresh and doupdate routines) to get any output on the terminal. Other Curses routines only manipulate data structures. The wrefr... |
drand48(3) -- Generate uniformly distributed pseudorandom number sequences
|
This family of functions generates pseudorandom numbers using the linear congruential algorithm and 48-bit integer arithmetic. The drand48() and erand48() functions return nonnegative, double-precisio... |
drand48_r(3) -- Generate uniformly distributed pseudorandom number sequences
|
This family of functions generates pseudorandom numbers using the linear congruential algorithm and 48-bit integer arithmetic. The drand48() and erand48() functions return nonnegative, double-precisio... |
drem(3) -- Compute the floating-point remainder
|
The fmod(), fmodf(), and fmodl() functions return the remainder r = x - n*y, where n = trunc(x/y). The result has the same sign as x and magnitude less than the magnitude of y. The remainder is comput... |
dsa(3) -- Digital Signature Algorithm
|
These functions implement the Digital Signature Algorithm (DSA). The generation of shared DSA parameters is described in DSA_generate_parameters(3); DSA_generate_key(3) describes how to generate a sig... |
DSAparams_print(3) -- Print cryptographic parameters
|
A human-readable hexadecimal output of the components of the RSA key, DSA parameters or key or DH parameters is printed to bp or fp. The output lines are indented by offset spaces. |
DSAparams_print_fp(3) -- Print cryptographic parameters
|
A human-readable hexadecimal output of the components of the RSA key, DSA parameters or key or DH parameters is printed to bp or fp. The output lines are indented by offset spaces. |
DSA_do_sign(3) -- Raw DSA signature operations
|
The DSA_do_sign() function computes a digital signature on the len byte message digest dgst using the private key dsa and returns it in a newly allocated DSA_SIG structure. The DSA_sign_setup() functi... |
DSA_do_verify(3) -- Raw DSA signature operations
|
The DSA_do_sign() function computes a digital signature on the len byte message digest dgst using the private key dsa and returns it in a newly allocated DSA_SIG structure. The DSA_sign_setup() functi... |
DSA_dup_DH(3) -- Create a DH structure out of DSA structure
|
The DSA_dup_DH() function duplicates DSA parameters/keys as DH parameters/keys. The q is lost during that conversion, but the resulting DH parameters contain its length. |
DSA_free(3) -- Allocate and free DSA objects
|
The DSA_new() function allocates and initializes a DSA structure. The DSA_free() function frees the DSA structure and its components. The values are erased before the memory is returned to the system. |
DSA_generate_key(3) -- Generate DSA key pair
|
The DSA_generate_key() function expects a to contain DSA parameters. It generates a new key pair and stores it in a->pub_key and a->priv_key. The PRNG must be seeded prior to calling DSA_generate_key(... |
DSA_generate_parameters(3) -- Generate DSA parameters
|
The DSA_generate_parameters() function generates primes p and q and a generator g for use in the DSA. The value of bits is the length of the prime to be generated; the DSS allows a maximum of 1024 bit... |
DSA_get_default_openssl_method(3) -- Select DSA method
|
A DSA_METHOD specifies the functions that OpenSSL uses for DSA operations. By modifying the method, alternative implementations such as hardware accelerators can be used. Initially, the default is the... |
DSA_get_ex_data(3) -- Add application specific data to DSA structures
|
These functions handle application specific data in DSA structures. Their usage is identical to that of RSA_get_ex_new_index(), RSA_set_ex_data(), and RSA_get_ex_data(), as described in RSA_get_ex_new... |
DSA_get_ex_new_index(3) -- Add application specific data to DSA structures
|
These functions handle application specific data in DSA structures. Their usage is identical to that of RSA_get_ex_new_index(), RSA_set_ex_data(), and RSA_get_ex_data(), as described in RSA_get_ex_new... |
DSA_new(3) -- Allocate and free DSA objects
|
The DSA_new() function allocates and initializes a DSA structure. The DSA_free() function frees the DSA structure and its components. The values are erased before the memory is returned to the system. |
DSA_new_method(3) -- Select DSA method
|
A DSA_METHOD specifies the functions that OpenSSL uses for DSA operations. By modifying the method, alternative implementations such as hardware accelerators can be used. Initially, the default is the... |
DSA_OpenSSL(3) -- Select DSA method
|
A DSA_METHOD specifies the functions that OpenSSL uses for DSA operations. By modifying the method, alternative implementations such as hardware accelerators can be used. Initially, the default is the... |
DSA_print(3) -- Print cryptographic parameters
|
A human-readable hexadecimal output of the components of the RSA key, DSA parameters or key or DH parameters is printed to bp or fp. The output lines are indented by offset spaces. |
DSA_print_fp(3) -- Print cryptographic parameters
|
A human-readable hexadecimal output of the components of the RSA key, DSA parameters or key or DH parameters is printed to bp or fp. The output lines are indented by offset spaces. |
DSA_set_default_openssl_method(3) -- Select DSA method
|
A DSA_METHOD specifies the functions that OpenSSL uses for DSA operations. By modifying the method, alternative implementations such as hardware accelerators can be used. Initially, the default is the... |
DSA_set_ex_data(3) -- Add application specific data to DSA structures
|
These functions handle application specific data in DSA structures. Their usage is identical to that of RSA_get_ex_new_index(), RSA_set_ex_data(), and RSA_get_ex_data(), as described in RSA_get_ex_new... |
DSA_set_method(3) -- Select DSA method
|
A DSA_METHOD specifies the functions that OpenSSL uses for DSA operations. By modifying the method, alternative implementations such as hardware accelerators can be used. Initially, the default is the... |
DSA_sign(3) -- DSA signatures
|
The DSA_sign() function computes a digital signature on the len byte message digest (dgst) using the private key dsa and places its ASN.1 DER encoding at sigret. The length of the signature is placed ... |
DSA_sign_setup(3) -- DSA signatures
|
The DSA_sign() function computes a digital signature on the len byte message digest (dgst) using the private key dsa and places its ASN.1 DER encoding at sigret. The length of the signature is placed ... |
DSA_SIG_free(3) -- Allocate and free DSA signature objects
|
TheDSA_SIG_new() function allocates and initializes a DSA_SIG structure. The DSA_SIG_free() function frees the DSA_SIG structure and its components. The values are erased before the memory is returned... |
DSA_SIG_new(3) -- Allocate and free DSA signature objects
|
TheDSA_SIG_new() function allocates and initializes a DSA_SIG structure. The DSA_SIG_free() function frees the DSA_SIG structure and its components. The values are erased before the memory is returned... |
DSA_size(3) -- Get DSA signature size
|
The DSA_size() function returns the size of an ASN.1 encoded DSA signature in bytes. It can be used to determine how much memory must be allocated for a DSA signature. The dsa->q must not be NULL. |
DSA_verify(3) -- DSA signatures
|
The DSA_sign() function computes a digital signature on the len byte message digest (dgst) using the private key dsa and places its ASN.1 DER encoding at sigret. The length of the signature is placed ... |
dupwin(3) -- Routines that create Curses windows
|
The newwin routine creates and returns a pointer to a new window with the given number of lines, nlines, and columns, ncols. The upper left-hand corner of the window is at line begin_y and column begi... |
DXmActivateWidget(3X) -- Allows the application to simulate push button activation.
|
The DXmActivateWidget routine allows an application to generate the same highlighting and callbacks that would occur if the user clicked on a push button. Using this routine in your application enable... |
DXmChildren(3X) -- Returns a list of the widget's children.
|
The DXmChildren routine returns a list of the widget's children. Note that children must request geometry management changes from their parent and that a parent widget can resize its children. You ca... |
DXmColorMixGetNewColor(3X) -- Retrieves (returns) the color mixing widget's current new color red, green, and blue values.
|
DXmColorMixGetNewColor allows the calling application or routine to quickly obtain the current color value from the color mixing widget. Note that if your application uses the default color mixing sub... |
DXmColorMixSetNewColor(3X) -- Sets the new color red, green, and blue values in the color mixing widget.
|
The DXmColorMixSetNewColor routine allows the application or a user-supplied color mixer subwidget to pass the current color value to the color mixing widget. Note that your application will perform t... |
DXmCreateColorMix(3X) -- Creates a color mixing widget, without
|
The DXmCreateColorMix routine uses the same arguments and resources as the DXmCreateColorMixDialog routine to create a color mixing widget, but does not include a pop-up dialog box. Note, however, tha... |
DXmCreateColorMixDialog(3X) -- Creates a color mixing widget with a dialog box.
|
DXmCreateColorMixDialog allows your DECwindows Motif applications to query users for a color. The color mixing widget provides users with immediate feedback, displaying each new color as it is selecte... |
DXmCreateCSText(3X) -- Creates a compound string text widget.
|
The DXmCreateCSText routine creates a compound string text widget that provides your application with text editing capabilities, including the ability for users to enter and edit text in the same char... |
DXmCreateCursor(3X) -- Creates a specific cursor.
|
The DXmCreateCursor routine enables you to create a cursor that displays as a watch, question mark, or caution ("do not enter") symbol (these are the most frequently used cursor symbols). |
DXmCreateHelpDialog(3X) -- Creates the Help widget with a dialog box.
|
The DXmCreateHelpDialog routine creates a help widget that includes its own dialog box. The help widget is a modeless widget that enables the application to display appropriate user assistance informa... |
DXmCreatePrintBox(3X) -- Creates the print widget without a dialog box.
|
The DXmCreatePrintBox routine uses the same arguments and resources as the DXmCreatePrintDialog routine to create a print widget, but does not include a dialog box. See the DXmCreatePrintDialog(3X) fo... |
DXmCreatePrintDialog(3X) -- Creates the print widget with a dialog box.
|
The DXmCreatePrintDialog routine creates the print widget, which is a modeless widget that provides applications with a fast, convenient method of printing one or more files in multiple formats. Resou... |
DXmCreateScrolledCSText(3X) -- Creates a compound string text widget with scroll bars.
|
The DXmCreateScrolledCSText routine creates a compound string text widget with scroll bars. The routine uses the same arguments and resources as the DXmCreateCSText routine to create a compound string... |
DXmCreateSvn(3X) -- Creates an SVN widget
|
The DXmCreateSvn routine allows you to create a hierarchical structure of information that is presented to a user in an organized manner and in a way that lets the user navigate in, and select from, t... |
DXmCSContainsStringCharSet(3X) -- Examines XmString segments for ISO_LATIN_1 characters.
|
The DXmCSContainsStringCharSet routine examines all XmString segments in the application for characters belonging to the ISO_LATIN_1 character set. |
DXmCSTextClearSelection(3X) -- Clears (cancels) the global selection highlighted in the compound string text widget.
|
The DXmCSTextClearSelection routine clears (cancels) the global selection highlighted in the compound string text widget. |
DXmCSTextCopy(3X) -- Copies the currently selected (highlighted) text to the clipboard.
|
The DXmCSTextCopy function copies the selected (highlighted) text in the compound string text widget to the clipboard, returning the success or failure of that operation. |
DXmCSTextCut(3X) -- Deletes the currently selected (highlighted) text after copying it to the clipboard.
|
The DXmCSTextCut routine deletes the selected text in the compound string text widget after copying the text to the clipboard, returning the success or failure of that operation. |
DXmCSTextDisableRedisplay(3X) -- A Text function that temporarily prevents visual update of the DXmCSText widget
|
DXmCSTextDisableRedisplay prevents redisplay of the specified DXmCSText widget even though its visual attributes have been modified. The visual appearance of the widget remains unchanged until DXmCSTe... |
DXmCSTextEnableRedisplay(3X) -- A Text function that forces the visual update of DXmCSText widget.
|
DXmCSTextEnableRedisplay is used in conjunction with DXmCSTextDisableRedisplay, which suppresses visual update of DXmCSText. When DXmCSTextEnableRedisplay is called, it determines if any visual attrib... |
DXmCSTextGetEditable(3X) -- Indicates whether the text in the compound string text widget can be edited by the user.
|
The DXmCSTextGetEditable routine indicates, by returning True or False, whether the text in the compound string text widget can be edited by the user. |
DXmCSTextGetInsertionPosition(3X) -- Retrieves (returns) the logical position of the insertion cursor.
|
The DXmCSTextGetInsertionPosition routine retrieves the logical position of the insertion cursor by returning an integer that indicates the distance (in number of characters) between the cursor and th... |
DXmCSTextGetLastPosition(3X) -- Retrieves (returns) the logical position of the last character in the text.
|
The DXmCSTextGetLastPosition routine retrieves the logical position of the last character in the text by returning an integer. The position may correspond to a line feed. |
DXmCSTextGetMaxLength(3X) -- Retrieves (returns) current maximum allowable length of the text in the compound string text widget.
|
The DXmCSTextGetMaxLength routine retrieves the current maximum allowable length of the text in the compound string text widget by returning an integer. |
DXmCSTextGetSelection(3X) -- Retrieves the text selected in the compound string text widget.
|
The DXmCSTextGetSelection routine retrieves the text selected (highlighted) in the compound string text widget. It returns a Null pointer if no text is selected in the widget. The application is respo... |
DXmCSTextGetSelectionInfo(3X) -- Retrieves (returns) the left and right positions of the currently selected text.
|
The DXmCSTextGetSelectionInfo routine, when True, returns the left and right logical positions corresponding to the currently selected (highlighted) text. If no text is selected, this routine returns ... |
DXmCSTextGetString(3X) -- Retrieves all the text from the compound string text widget.
|
The DXmCSTextGetString routine retrieves the current compound string from the compound string text widget. The application is responsible for freeing the storage associated with the compound string by... |
DXmCSTextGetTopPosition(3X) -- Retrieves (returns) the logical position of the first character in the displayed text.
|
The DXmCSTextGetTopPosition routine returns the logical position of the first character in the displayed text. If the direction is left-to-right, the first character is at the top-left of the display.... |
DXmCSTextHasSelection(3X) -- Indicates whether the compound string text widget currently owns the primary selection.
|
The DXmCSTextHasSelection routine returns True if the compound string text widget currently owns the primary selection and False if it does not. |
DXmCSTextHorizontalScroll(3X) -- Scrolls text horizontally.
|
The DXmCSTextHorizontalScroll routine scrolls text horizontally (left or right) by the given number of pixels. DXmCSTextHorizontalScroll(3X) |
DXmCSTextInsert(3X) -- Inserts new text into the CSText widget.
|
The DXmCSTextInsert routine inserts new text into the compound string text widget at the specified logical position, returning the success or failure of that operation. |
DXmCSTextNumLines(3X) -- Retrieves (returns) the number of visible lines in the compound string text widget.
|
The DXmCSTextNumLines routine returns an integer that represents the number of lines in the compound string text widget that are visible to the user. |
DXmCSTextPaste(3X) -- Pastes the data from the clipboard into the text at the current cursor position.
|
The DXmCSTextPaste routine pastes the data from the clipboard into the text at the current cursor position, returning the success or failure of that operation. |
DXmCSTextPosToXY(3X) -- Retrieves (returns) the x and y position of a specified character in the text.
|
The DXmCSTextPosToXY routine converts the logical position of a specified character in the text to the corresponding x and y coordinates. |
DXmCSTextRemove(3X) -- Removes the currently selected (highlighted) text.
|
The DXmCSTextRemove routine removes the currently selected (highlighted) text, returning the success or failure of that operation. |
DXmCSTextReplace(3X) -- Replaces a specified segment of text in a compound string text widget.
|
The DXmCSTextReplace routine replaces part of the text in the compound string text widget. Within the widget, positions are numbered starting at 0 and increasing sequentially. For example, to replace ... |
DXmCSTextSetAddMode(3X) -- Controls whether the CSText widget is in Add Mode.
|
The DXmCSTextSetAddMode routine controls whether the CSText widget is in Add Mode, which, when True, allows the user to move the insertion cursor without affecting the primary selection. DXmCSTextSetA... |
DXmCSTextSetEditable(3X) -- Specifies whether the text in the widget can be edited by the user.
|
The DXmCSTextSetEditable specifies whether text in the compound string text widget can be edited by the user, returning either True or False to indicate the permission state. |
DXmCSTextSetHighlight(3X) -- Changes the highlighting of the compound string text located between two specified logical positions...
|
The DXmCSTextSetHighlight routine changes the highlighting of the compound string text located between two specified positions, by removing the highlighting or by implementing underlining or reverse v... |
DXmCSTextSetInsertionPosition(3X) -- Sets the insertion cursor to the specified logical position in the text.
|
The DXmCSTextSetInsertionPosition routine sets the insertion cursor to the specified logical position (indicated by number of characters) in the text. |
DXmCSTextSetMaxLength(3X) -- Sets the maximum allowable length of the text in the compound string text widget.
|
The DXmCSTextSetMaxLength routine sets the maximum allowable length of the text in the compound string text widget. It prohibits the user from entering text longer than this limit. |
DXmCSTextSetSelection(3X) -- Designates the specified text as the current primary selection by highlighting it in the compound st...
|
The DXmCSTextSetSelection routine designates the specified text as the current primary selection by highlighting it in the compound string text widget. Within the text window, first marks the position... |
DXmCSTextSetString(3X) -- Replaces all the text in the compound string text widget with new text.
|
The DXmCSTextSetString routine replaces all the text in the compound string text widget with new text specified by the value parameter. |
DXmCSTextSetTopPosition(3X) -- Sets the logical position of the first character in the displayed text.
|
The DXmCSTextSetTopPosition routine sets the logical position of the first character in the displayed text. If the direction is left-to-right, the first character is at the top-left of the display. If... |
DXmCSTextShowPosition(3X) -- Displays text located at a specified position.
|
The DXmCSTextShowPosition displays the text located at a specified position, which is the logical position of a character in that text. DXmCSTextShowPosition(3X) |
DXmCSTextVerticalScroll(3X) -- Scrolls text vertically.
|
The DXmCSTextVerticalScroll routine scrolls text vertically by the given number of lines. |
DXmCSTextXYToPos(3X) -- Retrieves (returns) the position in the text of the character nearest to a specified x and y positio...
|
The DXmCSTextXYToPos routine returns an integer that identifies the position in the text of the character that is nearest to a specified x and y position. |
DXmCvtCStoFC(3X) -- Converts a compound string to a file-compatible format string. Currently uses text format.
|
The DXmCvtCStoFC routine converts a compound string to a file-compatible format string. It currently uses text format. The user must free the string by using the Intrinsic routine XtFree. |
DXmCvtCStoOS(3X) -- Converts a compound string to an operatingsystem specific format. Currently uses text format.
|
The DXmCvtCStoOS routine converts a compound string to an operating-system specific format. It currently uses text format. The user must free the string by using the Intrinsic routine XtFree. |
DXmCvtFCtoCS(3X) -- Converts a string in the file-compatible format to a compound string.
|
The DXmCvtFCtoCS routine converts a string in the filecompatible format to a compound string. The user must free the string by using the Toolkit routine XmStringFree. |
DXmCvtOStoCS(3X) -- Converts a string in the operating-systemspecific format to a compound string.
|
The DXmCvtOStoCS routine converts a string in the operating-system-specific format to a compound string. The user must free the string by using the Toolkit routine XmStringFree. |
DXmDisplayCSMessage(3X) -- Displays a compound string message.
|
The DXmDisplayCSMessage routine accepts an array of compound strings, formats them, and, if necessary, creates a message box. A return of 0 (Null) indicates that the message box could not be created. |
DXmFindFontFallback(3X) -- Associates the given XLFD font name with a new XLFD font name.
|
The DXmFindFontFallback routine associates the given XLFD (X Logical Font Description) font name with a new XLFD font name. This routine does not load the generated font, nor guarantee that it will lo... |
DXmFormSpaceButtonsEqually(3X) -- Sets push buttons in a form widget to be equally spaced and sized.
|
The DXmFormSpaceButtonsEqually routine enables you to set the push buttons in a form widget to be equally spaced and sized. Your application must call this routine after the dialog box is managed. DXm... |
DXmGetLocaleString(3X) -- Provides locale-sensitive Motif compound string version of Toolkit ASCII default values.
|
The DXmGetLocaleString routine provides a locale-sensitive Motif compound string version of Toolkit ASCII default values, such as "OK" or "Cancel". You can specify the part of speech (adjective, a... |
DXmHelpOnContext(3X) -- Enters the application into context sensitive help mode and either calls a help callback (if one exi...
|
The DXmHelpOnContext routine enters context sensitive help mode, changing the cursor to the help cursor (?) and then waiting for an MB1 click on a widget. If the selected widget has a help callback, t... |
DXmHelpSystemClose(3X) -- Closes all of the remaining topic and navigation windows in Bookreader.
|
Note This routine is not supported on all operating systems. Within the DECwindows Motif Help System, the DXmHelpSystemClose routine closes all of the remaining topic and navigation windows in the Boo... |
DXmHelpSystemDisplay(3X) -- Displays a topic or directory of the help file in Bookreader.
|
Note This routine is not supported on all operating systems. The DXmHelpSystemDisplay routine (which you use instead of a call to the help widget) displays a topic or directory of the help file in Boo... |
DXmHelpSystemOpen(3X) -- Completes initialization operations required by LinkWorks and prepares to display a topic from the s...
|
Note This routine is not supported on all operating systems. Within the DECwindows Motif Help System, the DXmHelpSystemOpen routine completes all of the initialization operations required by LinkWorks... |
DXmInitialize(3X) -- Prepares an application to use MRM widgetfetching facilities for the proprietary (DXm) Motif widgets...
|
The DXmInitialize routine performs a function similar to the MrmInitialize function, but for the DXm widgets. Calling DXmInitialize is equivalent to calling MrmRegisterClass for each of the DXm widget... |
DXmLoadQueryFont(3X) -- Loads the font specified by the font name or generates a new font name.
|
The DXmLoadQueryFont routine loads the font specified by the font name or, if the font fails to load, generates a new font name, and loads that font instead. |
DXmNumChildren(3X) -- Returns the number of children that belong to the widget.
|
The DXmNumChildren routine returns a positive integer that represents the number of children that belong to the widget. |
DXmPrintWgtAugmentList(3X) -- Defines additional print formats and lets you add new options to the print widget option menus.
|
The DXmPrintWgtAugmentList routine defines additional print formats and lets you add new options to the print widget option menus. Note that the return value (an integer) is not required when adding p... |
DXmPrintWgtPrintJob(3X) -- Submits files to the print service.
|
The DXmPrintWgtPrintJob routine completes the submission of the identified files to the appropriate print service and returns the success of the print job to the application. |
DXmSvnAddEntries(3X) -- Opens new entries in the structure.
|
The DXmSvnAddEntries routine enables an application to process the expansion of an entry. The value supplied for count determines how many entries the application should open. The actual text of the e... |
DXmSvnAutoScrollCheck(3X) -- Controls whether the DxmSvnAutoScrollDisplay routine should be called.
|
The DXmSvnAutoScrollCheck routine determines whether the cursor is currently in an area where automatic scrolling (initiated when the user moves an entry outside the window) can occur. This routine re... |
DXmSvnAutoScrollDisplay(3X) -- Automatically scrolls the screen one unit based on the cursor position.
|
The DXmSvnAutoScrollDisplay routine automatically scrolls the screen one unit based on the current cursor location. If the cursor is not in a location that permits automatic scrolling, this call is ig... |
DXmSvnClearHighlight(3X) -- Removes (clears) highlighting from a specified entry.
|
The DXmSvnClearHighlight routine removes (clears) highlighting from a specified entry in the structure. If the entry is not currently highlighted, this call is ignored. Make this call in your applicat... |
DXmSvnClearHighlighting(3X) -- Removes (clears) all highlighting from the entries.
|
The DXmSvnClearHighlighting routine removes (clears) all highlighting from all entries in the structure. If there are currently no highlighted entries, this call is ignored. Make this call in your app... |
DXmSvnClearSelection(3X) -- Clears (cancels) the selection of a specified entry.
|
The DXmSvnClearSelection routine clears, or cancels, the selection of a particular entry in the structure. If the entry is not currently selected, the call is ignored. Make this call in your applicati... |
DXmSvnClearSelections(3X) -- Clears all selections.
|
The DXmSvnClearSelections routine clears (cancels) all of the entries in the structure. If no entries are currently selected, the call is ignored. (Use the DXmSvnGetSelections, DXmSvnClearSelections, ... |
DXmSvnDeleteEntries(3X) -- Deletes entries from the structure.
|
The DXmSvnDeleteEntries routine enables an application to process the removal (collapse) of an entry. This routine specifies how many entries to delete and after which entry those deletions should beg... |
DXmSvnDisableDisplay(3X) -- Temporarily disables the SVN widget from generating a display.
|
The DXmSvnDisableDisplay routine allows your application to make changes to the SVN widget without the user making additional changes. For example, the DXmSvnDisableDisplay routine must be called when... |
DXmSvnEnableDisplay(3X) -- Reenables the SVN widget.
|
The DXmSvnEnableDisplay routine reenables the SVN widget, which then determines whether to update the display (make changes visible to the user) based on activities recorded while the SVN widget was i... |
DXmSvnFlushEntry(3X) -- Displays the specified entry on the screen if it is the next logically displayed entry.
|
The DXmSvnFlushEntry routine displays (or "flushes") an entry on the screen (in outline mode only) if the entry number passed to the routine is one integer greater than the entry number of the last ... |
DXmSvnGetComponentNumber(3X) -- Retrieves (returns) the component number containing a supplied tag value.
|
The DXmSvnGetComponentNumber routine is called whenever the application requires the component number that is associated with a particular tag value. If the specified tag value is not found, then a va... |
DXmSvnGetComponentTag(3X) -- Retrieves (returns) a component tag for a specified component number.
|
The DXmSvnGetComponentTag routine retrieves (returns) a component tag for a specified component number whenever the application requires that information. You can set the value for this tag by using t... |
DXmSvnGetComponentText(3X) -- Retrieves (returns) the address of a compound string.
|
The DXmSvnGetComponentText routine returns the address of a compound string that was previously stored from a call to the DXmSvnSetComponentText routine. |
DXmSvnGetComponentWidth(3X) -- Retrieves (returns) the width of a specified component.
|
The DXmSvnGetComponentWidth routine is called whenever the application requires the component width that is associated with a particular component number. You can set the value for the width by using ... |
DXmSvnGetDisplayed(3X) -- Retrieves (returns) displayed entry numbers and related information necessary to draw a correspondin...
|
The DXmSvnGetDisplayed routine returns information about the entries that the SVN widget is currently displaying. This information can then be used to keep a simultaneous display up to date with the S... |
DXmSvnGetEntryLevel(3X) -- Retrieves (returns) the level of an entry in the display.
|
The DXmSvnGetEntryLevel routine is called whenever the application requires the level number for a given entry number. |
DXmSvnGetEntryNumber(3X) -- Retrieves (returns) an entry number for a specified entry tag value.
|
The DXmSvnGetEntryNumber routine retrieves (returns) an entry number for a specified entry tag value whenever the application requires that information. |
DXmSvnGetEntryPosition(3X) -- Retrieves (returns) the position of an entry in the display.
|
The DXmSvnGetEntryPosition routine allows an application to determine the position of entries. The routine interprets the x and y coordinates differently, depending on the application's mode: Outline... |
DXmSvnGetEntrySensitivity(3X) -- Retrieves (returns) the sensitivity of an entry in the display.
|
The DXmSvnGetEntrySensitivity routine returns the sensitivity state (which indicates whether the user can select an entry) whenever the application requires that information for a given entry. |
DXmSvnGetEntryTag(3X) -- Retrieves (returns) an entry's tag for a specified entry number.
|
The DXmSvnGetEntryTag routine retrieves an entry tag value for a specified entry number. The routine returns a value of 0 if the entry tag value has never been specified for the given entry number in ... |
DXmSvnGetHighlighted(3X) -- Retrieves (returns) a list of entries currently highlighted by the user.
|
The DXmSvnGetHighlighted routine returns a list of entries that are currently highlighted by the user. Make this call in your application between calls to DXmSvnDisableDisplay and DXmSvnEnableDisplay ... |
DXmSvnGetNumDisplayed(3X) -- Retrieves (returns) the number of entries currently being displayed in the window.
|
The DXmSvnGetNumDisplayed routine returns the number of entries currently being displayed in the SVN window. Use this routine to determine the number of entries required in the arrays being passed to ... |
DXmSvnGetNumHighlighted(3X) -- Retrieves (returns) the number of highlighted entries.
|
The DXmSvnGetNumHighlighted routine returns the number of entries currently highlighted by the user. Use this routine to determine the number of entries required in the array being passed to the DXmSv... |
DXmSvnGetNumSelections(3X) -- Retrieves (returns) the number of selected entries.
|
The DXmSvnGetNumSelections routine returns the number of entries currently selected by the user. Use this routine to determine the number of entries required in the array being passed to the DXmSvnGet... |
DXmSvnGetPrimaryWorkWidget(3X) -- Retrieves (returns) the identifier (widget ID) of the primary SVN work widget.
|
The DXmSvnGetPrimaryWorkWidget routine is a read-only routine that returns the identifier (widget ID) of the primary work widget (window). |
DXmSvnGetSecondaryWorkWidget(3X) -- Retrieves (returns) the identifier (widget ID) of the secondary SVN work widget.
|
The DXmSvnGetSecondaryWorkWidget routine is a read-only routine that returns the identifier (widget ID) of the secondary work widget (window). |
DXmSvnGetSelections(3X) -- Retrieves (returns) a list of selected entry numbers.
|
The DXmSvnGetSelections routine returns a list of entries that are currently selected by the user. Make this call in your application between calls to DXmSvnDisableDisplay and DXmSvnEnableDisplay to e... |
DXmSvnGetTreePosition(3X) -- Retrieves (returns) the position of the display window for future use.
|
The DXmSvnGetTreePosition routine obtains the upper-left coordinate position of the display window that is within the virtual display. It thus provides a way for applications to determine the exact po... |
DXmSvnHideHighlighting(3X) -- Specifies that the SVN widget show highlighted entries in the default format, without using highligh...
|
The DXmSvnHideHighlighting routine specifies that the SVN widget show highlighted entries in the default format, without drawing highlighting graphics around those entries. Make this call in your appl... |
DXmSvnHideSelections(3X) -- Specifies that the SVN widget show selected entries in the default format, without drawing selection...
|
The DXmSvnHideSelections routine specifies that the SVN widget show selected entries in the default format (reverse video in outline mode), without drawing selection graphics on the entries even if th... |
DXmSvnHighlightAll(3X) -- Highlights all entries.
|
The DXmSvnHighlightAll routine allows an application to highlight all entries in the structure using a command from the application's menu. The entries are displayed in a rectangular box (drawn with ... |
DXmSvnHighlightEntry(3X) -- Highlights a specified entry.
|
The DXmSvnHighlightEntry routine designates a particular entry as highlighted. If the entry is already highlighted, this call is ignored. Make this call in your application between calls to DXmSvnDisa... |
DXmSvnInsertComponent(3X) -- Inserts a new component into each SVN entry.
|
The DXmSvnInsertComponent routine inserts a new component for each entry currently recognized by the SVN widget. All entries that are currently valid become invalid during this operation. Note the fol... |
DXmSvnInvalidateEntry(3X) -- Specifies that the SVN widget redisplay (update) an entry.
|
The DXmSvnInvalidateEntry routine allows an application to modify an underlying entry (for example, changing the text or highlighting) by directing the SVN widget to issue the DXmSvnNgetEntryCallback ... |
DXmSvnMapPosition(3X) -- Associates the x and y position with an entry number.
|
The DXmSvnMapPosition routine uses a supplied x and y coordinate to determine which entry the user was positioned over when the mouse button was pressed or released. DXmSvnMapPosition(3X) |
DXmSvnPositionDisplay(3X) -- Displays a specified entry.
|
The DXmSvnPositionDisplay routine ensures that the entries being displayed contain a specified entry. This routine allows the application to position a particular entry at the top, middle, or bottom o... |
DXmSvnRemoveComponent(3X) -- Removes a component from each SVN entry.
|
The DXmSvnRemoveComponent routine removes a new component for any entry currently recognized by the SVN widget. All entries that are currently valid continue to be valid after the component is removed... |
DXmSvnSelectAll(3X) -- Selects all entries.
|
The DXmSvnSelectAll routine allows the application to designate all entries in the structure as selected (they are displayed using reverse video) using a command from the application's menu. Make thi... |
DXmSvnSelectComponent(3X) -- Selects an entry using a specific component.
|
The DXmSvnSelectComponent routine designates a specified entry as selected. It differs from the DXmSvnSelectEntry routine because it associates a specific component with the selection. If the entry is... |
DXmSvnSelectEntry(3X) -- Selects a specified entry.
|
The DXmSvnSelectEntry routine designates a particular entry as selected. If the entry is already selected, this call is ignored. Make this call in your application between calls to DXmSvnDisableDispla... |
DXmSvnSetApplDragging(3X) -- Turns application dragging mode on or off in the SVN widget.
|
The DXmSvnSetApplDragging routine either turns application dragging mode on or off. When application dragging mode is on (on_off is set to 1), the application controls dragging operations by calling t... |
DXmSvnSetComponentHidden(3X) -- Controls which modes the SVN widget uses to display a particular component.
|
The DXmSvnSetComponentHidden routine enables an application to prevent a component (excluding subwidgets) from being displayed in a particular mode, thus making that component "hidden". By default, ... |
DXmSvnSetComponentPixmap(3X) -- Adds a pixmap component to an entry.
|
The DXmSvnSetComponentPixmap routine sets a component of an entry to be a pixmap. Make this call in your application between calls to DXmSvnDisableDisplay and DXmSvnEnableDisplay. If your application ... |
DXmSvnSetComponentTag(3X) -- Sets the tag of a component.
|
The DXmSvnSetComponentTag routine sets the widget level component tag data. (The SVN widget never examines this tag.) This tag may be lost if the corresponding component is removed with the DXmSvnRemo... |
DXmSvnSetComponentText(3X) -- Adds a read-only component string to an entry.
|
The DXmSvnSetComponentText routine sets a component of an entry to be a read-only compound string. Make this call in your application between calls to DXmSvnDisableDisplay and DXmSvnEnableDisplay. If ... |
DXmSvnSetComponentWidget(3X) -- Adds an SVN subwidget component to an entry.
|
The DXmSvnSetComponentWidget routine sets a component of an entry to be a subwidget, which enables an application to put read-write text or a push button in an entry. The application is responsible fo... |
DXmSvnSetComponentWidth(3X) -- Sets the width of a component.
|
The DXmSvnSetComponentWidth routine sets the widget level component width data. This width is used only when the widget is displaying in column mode. If a component found in this column is larger than... |
DXmSvnSetEntry(3X) -- Provides the SVN widget with new entry level information.
|
The DXmSvnSetEntry routine enables an application to respond to a DXmSvnCRGetEntry callback requesting the information for an entry. You can specify a subset of the information allowed on this call by... |
DXmSvnSetEntryIndexWindow(3X) -- Controls whether the SVN widget displays the entry in the index window.
|
The DXmSvnSetEntryIndexWindow routine enables an application to respond to a DXmSvnCRGetEntry callback requesting the information for an entry. It provides some of the functions of the DXmSvnSetEntry ... |
DXmSvnSetEntryNumComponents(3X) -- Provides the SVN widget with the number of components for an entry.
|
The DXmSvnSetEntryNumComponents routine enables an application to respond to a DXmSvnCRGetEntry callback requesting information for an entry. It provides some of the functions of the DXmSvnSetEntry ro... |
DXmSvnSetEntryPosition(3X) -- Sets the position of an entry in
|
The DXmSvnSetEntryPosition routine allows an application to implement the layout of the tree when the tree style is DXmSvnKuserDefinedTree. The application can explicitly position an entry, whether th... |
DXmSvnSetEntrySensitivity(3X) -- Controls whether the user can select a particular entry.
|
The DXmSvnSetEntrySensitivity routine changes the sensitivity of an entry ("sensitivity" means whether the SVN widget will allow the user to select a particular entry). When using this routine, note... |
DXmSvnSetEntryTag(3X) -- Assigns an entry tag to a specified entry.
|
The DXmSvnSetEntryTag routine assigns an entry tag to a specified entry, enabling an application to respond to a DXmSvnNgetEntryCallback callback requesting information about that entry. The function ... |
DXmSvnSetTreePosition(3X) -- Sets the position of the tree in tree display mode.
|
The DXmSvnSetTreePosition routine enables applications to set the exact position of the display from previously stored coordinates. It is valid to call this routine only when the DXmSvnNdisplayMode re... |
DXmSvnShowHighlighting(3X) -- Specifies that the SVN widget use highlight graphics when showing highlighted entries.
|
The DXmSvnShowHighlighting routine shows all highlighting by displaying a box (drawn with dashes) around an entry. Make this call in your application between calls to DXmSvnDisableDisplay and DXmSvnEn... |
DXmSvnShowSelections(3X) -- Specifies that the SVN widget use selection graphics when displaying selected entries.
|
The DXmSvnShowSelections routine allows the SVN widget to use reverse video selection graphics when displaying selected entries. Make this call in your application between calls to DXmSvnDisableDispla... |
DXmSvnValidateAll(3X) -- Ensures that all entries are valid.
|
The DXmSvnValidateAll routine examines all entries to ensure that each is valid. If other entries are added while a particular entry is being validated, the routine validates those new entries as well... |
echo(3) -- Curses
|
The cbreak and nocbreak routines put the terminal into and out of cbreak mode, respectively. In this mode, characters typed by the user are immediately available to the program, and erase/kill charact... |
echochar(3) -- Add a character (with attributes) to a Curses window and advance the cursor
|
The addch, waddch, mvaddch, and mvwaddch routines put the character ch into the window at the current cursor position of the window and advance the position of the window cursor. Their function is sim... |
echowchar(3) -- Add a wchar_t character (with attributes) to a Curses window and advance cursor
|
The addwch, waddwch, mvaddwch, and mvwaddwch routines put the character wch, holding a wchar_t character, into the window at the current cursor position of the window and advance the position of the w... |
echo_wchar(3) -- Add a complex character and rendition to a Curses window and advance the cursor
|
The add_wch, wadd_wch, mvadd_wch, and mvwadd_wch functions put the complex character wch into the window at the current or specified cursor position, of the current or specified window, and advance th... |
ecvt(3) -- Convert a floatingpoint number to a string
|
The ecvt(), fcvt(), and gcvt() functions convert floatingpoint numbers to null-terminated strings. The ecvt() function converts the value specified by the value parameter to a null-terminated string o... |
ecvt_r(3) -- Convert a floatingpoint number to a string
|
The ecvt(), fcvt(), and gcvt() functions convert floatingpoint numbers to null-terminated strings. The ecvt() function converts the value specified by the value parameter to a null-terminated string o... |
edata(3) -- locations in program and definitions
|
These names refer neither to routines nor to locations with interesting contents except for _procedure_table, _procedure_string_table, and, for Tru64 UNIX, __istart and __fstart. Except for eprol, the... |
encrypt(3) -- DES encryption
|
The crypt() subroutine is the password encryption routine. It is based on the NBS Data Encryption Standard, with variations intended to frustrate use of hardware implementations of the DES for key sea... |
EncryptData(3) -- Encrypts all buffer data (CDSA)
|
This function encrypts all data contained in the set of input buffers using information in the context. The CSSM_QuerySize() function can be used to estimate the output buffer size required. The minim... |
EncryptDataFinal(3) -- Finalize staged encryption process (CDSA)
|
This function finalizes the staged encryption process by returning any remaining cipher text not returned in the previous staged encryption call. The cipher text is returned in a single buffer. |
EncryptDataInit(3) -- Initialize the staged encrypt funciton (CDSA)
|
This function initializes the staged encrypt function. There may be algorithm-specific and token-specific rules restricting the lengths of data following data update calls making use of these paramete... |
EncryptDataInitP(3) -- Initialize the staged encrypt function with privilege (CDSA)
|
This function is similar to CSSM_EncryptDataInit(). It also accepts a USEE tag as a privilege request parameter. CSSM checks that either its privilege set or the application's privilege set (if the a... |
EncryptDataP(3) -- Encrypt data with privilege (CDSA)
|
This function is similar to CSSM_EncryptData(). It also accepts a USEE tag as a privilege request parameter. CSSM checks that either its own privilege set or the application's privilege set (if the a... |
EncryptDataUpdate(3) -- Continue the staged encryption process (CDSA)
|
This function continues the staged encryption process over all data in the set of input buffers. There can be algorithm-specific and token-specific rules restricting the lengths of data in CSSM_Encryp... |
end(3) -- locations in program and definitions
|
These names refer neither to routines nor to locations with interesting contents except for _procedure_table, _procedure_string_table, and, for Tru64 UNIX, __istart and __fstart. Except for eprol, the... |
enddvagent(3) -- Manipulate device assignment database entry (Enhanced Security)
|
The getesdvent(), getesdvnam(), and copyesdvent() functions each return a pointer to an object with the following structure containing the separated-out fields of an entry in the device assignment dat... |
endfsent(3) -- Get information about a file system
|
For the following functions, entries are read from the /etc/fstab file. The getfsent() function reads the next line of the file, opening the file if necessary. The setfsent() function opens the file o... |
endfsent_r(3) -- Get information about a file system
|
For the following functions, entries are read from the /etc/fstab file. The getfsent() function reads the next line of the file, opening the file if necessary. The setfsent() function opens the file o... |
endgrent(3) -- Access group information in the user database
|
The getgrent(), getgrgid(), getgrnam(), setgrent(), endgrent(), and fgetgrent() functions may be used to access the basic group attributes. The setgrent() function opens the user database (if not alre... |
endgrent_r(3) -- Access group information in the user database
|
The getgrent(), getgrgid(), getgrnam(), setgrent(), endgrent(), and fgetgrent() functions may be used to access the basic group attributes. The setgrent() function opens the user database (if not alre... |
endhostent(3) -- End retrieval of network host entries
|
The endhostent() function closes the network hosts database (either the local /etc/hosts file or one of the files distributed by BIND or NIS), previously opened with the gethostbyaddr() or gethostbyna... |
endhostent_r(3) -- End retrieval of network host entries
|
The endhostent() function closes the network hosts database (either the local /etc/hosts file or one of the files distributed by BIND or NIS), previously opened with the gethostbyaddr() or gethostbyna... |
endnetent(3) -- Open, rewind, or close the networks file
|
The setnetent() (set network entry) function opens the either the local /etc/networks file or the NIS distributed networks file and sets the file marker at the beginning of the file. To determine whic... |
endnetent_r(3) -- Open, rewind, or close the networks file
|
The setnetent() (set network entry) function opens the either the local /etc/networks file or the NIS distributed networks file and sets the file marker at the beginning of the file. To determine whic... |
endnetgrent(3) -- Get network group entry
|
The innetgr() routine accesses the netgroup file and checks to see if the specified input parameters match an entry in the file. The routine returns 1 if it matches an entry, or 0 if it does not. Any ... |
endprdfent(3) -- Manipulate system default database entry (Enhanced Security)
|
The getesdfent(), getesdfnam(), and copyesdfent() functions each return a pointer to an object with the following structure containing the separated-out fields of a line in the system default database... |
endprfient(3) -- Manipulate file control database entry (Enhanced Security)
|
The getesfient(), getesfinam(), and copyesfient() functions each return a pointer to an object with the following structure containing the separated-out fields of a line in the file control database. ... |
endprotoent(3) -- Close the network protocols database file
|
The endprotoent() function closes either the local /etc/protocols file or the NIS distributed protocols file, previously opened with the getprotoent(), getprotobyname(), or getprotobynumber() function... |
endprotoent_r(3) -- Close the network protocols database file
|
The endprotoent() function closes either the local /etc/protocols file or the NIS distributed protocols file, previously opened with the getprotoent(), getprotobyname(), or getprotobynumber() function... |
endprpwent(3) -- Manipulate protected password database entry (Enhanced Security)
|
The getespwent(), getespwuid(), getespwnam(), and copyespwent() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the protected pa... |
endprtcent(3) -- Manipulate terminal control database entry (Enhanced Security)
|
The getestcent(), getestcnam(), and copyestcent() functions return a pointer to an object with the following structure containing the separated-out fields of an entry in the terminal control database.... |
endpwent(3) -- Access user attribute information in the user database
|
The endpwent(), fgetpwent(), getpwent(), getpwnam(), getpwuid(), putpwent(), and setpwent() functions may be used to access the basic user attributes. The getpwent(), getpwnam(), and getpwuid() functi... |
endpwent_r(3) -- Access user attribute information in the user database
|
The endpwent(), fgetpwent(), getpwent(), getpwnam(), getpwuid(), putpwent(), and setpwent() functions may be used to access the basic user attributes. The getpwent(), getpwnam(), and getpwuid() functi... |
endrpcent(3) -- get rpc entry
|
The getrpcent(), getrpcbynumber(), and getrpcbyname() functions return pointers to an object with the following structure containing the broken-out fields of a line in the rpc database: struct rpcent ... |
endservent(3) -- Close the network services database file.
|
The endservent() function closes either the local /etc/services file or the NIS distributed services file, previously opened with the getservent(), getservbyname(), or getservbyport() function. To det... |
endservent_r(3) -- Close the network services database file.
|
The endservent() function closes either the local /etc/services file or the NIS distributed services file, previously opened with the getservent(), getservbyname(), or getservbyport() function. To det... |
endttyent(3) -- Get a /etc/securettys file entry
|
The getttyent() and getttynam() functions each return a pointer to an object that has the following ttyent fields. These fields describe a line from the secure tty description file. The members of the... |
endttyent_r(3) -- Get a /etc/securettys file entry
|
The getttyent() and getttynam() functions each return a pointer to an object that has the following ttyent fields. These fields describe a line from the secure tty description file. The members of the... |
endusershell(3) -- Get the names of legal user shells
|
The getusershell() function returns a pointer to a string that contains the name of a legal user shell as defined by the system manager in the /etc/shells file. If the /etc/shells file does not exist,... |
endusershell_r(3) -- Get the names of legal user shells
|
The getusershell() function returns a pointer to a string that contains the name of a legal user shell as defined by the system manager in the /etc/shells file. If the /etc/shells file does not exist,... |
endutent(3) -- Access utmp file entries
|
The getutent(), getutid(), and getutline() functions return a pointer to a utmp structure. The getutent() function reads the next entry from a file similar to the utmp file. If the file is not already... |
endutent_r(3) -- Access utmp file entries
|
The getutent(), getutid(), and getutline() functions return a pointer to a utmp structure. The getutent() function reads the next entry from a file similar to the utmp file. If the file is not already... |
endutxent(3) -- Access user accounting database functions
|
These functions provide access to the user accounting database. The getutxent() function reads the next entry from the user accounting database. If the database is not already open, getutxent() opens ... |
endwin(3) -- Curses routines for screen initialization and manipulation
|
The initscr routine is almost always the first routine that applications call. (The exceptions are slk_init, filter, ripoffline, use_env and, for multiple-terminal applications, newterm). The initscr ... |
enter_quiet_zone(3) -- Prevent keyboard interruption of program actions (Enhanced Security)
|
The enter_quiet_zone() function sets the appropriate signals to a state that prevents keyboard interruption of program actions. If this function is called multiple times without an intervening exit_qu... |
eprol(3) -- locations in program and definitions
|
These names refer neither to routines nor to locations with interesting contents except for _procedure_table, _procedure_string_table, and, for Tru64 UNIX, __istart and __fstart. Except for eprol, the... |
erand48(3) -- Generate uniformly distributed pseudorandom number sequences
|
This family of functions generates pseudorandom numbers using the linear congruential algorithm and 48-bit integer arithmetic. The drand48() and erand48() functions return nonnegative, double-precisio... |
erand48_r(3) -- Generate uniformly distributed pseudorandom number sequences
|
This family of functions generates pseudorandom numbers using the linear congruential algorithm and 48-bit integer arithmetic. The drand48() and erand48() functions return nonnegative, double-precisio... |
erase(3) -- Clear all or part of a Curses window
|
The erase and werase routines copy blanks to every position in the window. The clear and wclear routines are similar to erase and werase but also call clearok. The result is that the screen is cleared... |
erasechar(3) -- Routines for querying the Curses environment
|
The baudrate routine returns the output speed of the terminal. The number returned is an integer that represents bits per second (for example, 9600). The erasechar routine returns the current erase ch... |
erasewchar(3) -- Routines for querying the Curses environment
|
The baudrate routine returns the output speed of the terminal. The number returned is an integer that represents bits per second (for example, 9600). The erasechar routine returns the current erase ch... |
erf(3) -- Error functions
|
The erf(), erff(), and erfl() functions return the error function of x, where erf(x), erff(x), and erfl(x) equal (2/sqrt(pi)) times the area under the curve e**(-t**2) between 0 and x. The erfc(), erf... |
erfc(3) -- Error functions
|
The erf(), erff(), and erfl() functions return the error function of x, where erf(x), erff(x), and erfl(x) equal (2/sqrt(pi)) times the area under the curve e**(-t**2) between 0 and x. The erfc(), erf... |
err(3) -- Error codes
|
When a call to the OpenSSL library fails, this is usually signalled by the return value, and an error code is stored in an error queue associated with the current thread. The err library provides func... |
ERR_add_error_data(3) -- Record an error
|
The ERR_put_error() function adds an error code to the thread's error queue. It signals that the error of reason code reason occurred in function func of library lib, in line number line of file. Thi... |
ERR_clear_error(3) -- Clear the error queue
|
The ERR_clear_error() function empties the current thread's error queue. |
ERR_error_string(3) -- Obtain human-readable error message
|
The ERR_error_string() function generates a human-readable string representing the error code e, and places it at buf. The buf must be at least 120 bytes long. If buf is NULL, the error string is plac... |
ERR_error_string_n(3) -- Obtain human-readable error message
|
The ERR_error_string() function generates a human-readable string representing the error code e, and places it at buf. The buf must be at least 120 bytes long. If buf is NULL, the error string is plac... |
ERR_free_strings(3) -- Load and free error strings
|
The ERR_load_crypto_strings() function registers the error strings for all libcrypto functions. The SSL_load_error_strings() function does the same, but also registers the libssl error strings. One of... |
ERR_func_error_string(3) -- Obtain human-readable error message
|
The ERR_error_string() function generates a human-readable string representing the error code e, and places it at buf. The buf must be at least 120 bytes long. If buf is NULL, the error string is plac... |
ERR_get_error(3) -- Obtain error code and data
|
The ERR_get_error() function returns the last error code from the thread's error queue and removes the entry. This function can be called repeatedly until there are no more error codes to return. The... |
ERR_get_error_line(3) -- Obtain error code and data
|
The ERR_get_error() function returns the last error code from the thread's error queue and removes the entry. This function can be called repeatedly until there are no more error codes to return. The... |
ERR_get_error_line_data(3) -- Obtain error code and data
|
The ERR_get_error() function returns the last error code from the thread's error queue and removes the entry. This function can be called repeatedly until there are no more error codes to return. The... |
ERR_GET_FUNC(3) -- Get library, function and reason code
|
The error code returned by the ERR_get_error() function consists of a library number, function code and reason code. The ERR_GET_LIB(), ERR_GET_FUNC(), and ERR_GET_REASON() macros can be used to extra... |
ERR_GET_LIB(3) -- Get library, function and reason code
|
The error code returned by the ERR_get_error() function consists of a library number, function code and reason code. The ERR_GET_LIB(), ERR_GET_FUNC(), and ERR_GET_REASON() macros can be used to extra... |
ERR_get_next_error_library(3) -- Load arbitrary error strings
|
The ERR_load_strings() function registers error strings for library number lib. The str is an array of error string data: typedef struct ERR_string_data_st { unsigned long error; char *string; } ERR_S... |
ERR_GET_REASON(3) -- Get library, function and reason code
|
The error code returned by the ERR_get_error() function consists of a library number, function code and reason code. The ERR_GET_LIB(), ERR_GET_FUNC(), and ERR_GET_REASON() macros can be used to extra... |
ERR_lib_error_string(3) -- Obtain human-readable error message
|
The ERR_error_string() function generates a human-readable string representing the error code e, and places it at buf. The buf must be at least 120 bytes long. If buf is NULL, the error string is plac... |
ERR_load_crypto_strings(3) -- Load and free error strings
|
The ERR_load_crypto_strings() function registers the error strings for all libcrypto functions. The SSL_load_error_strings() function does the same, but also registers the libssl error strings. One of... |
ERR_load_SSL_strings(3) -- Load error strings
|
The ERR_load_crypto_strings() function registers the error strings for all libcrypto functions. The ERR_load_SSL_strings() function registers the error strings for all libssl functions. The SSL_load_e... |
ERR_load_strings(3) -- Load arbitrary error strings
|
The ERR_load_strings() function registers error strings for library number lib. The str is an array of error string data: typedef struct ERR_string_data_st { unsigned long error; char *string; } ERR_S... |
ERR_PACK(3) -- Load arbitrary error strings
|
The ERR_load_strings() function registers error strings for library number lib. The str is an array of error string data: typedef struct ERR_string_data_st { unsigned long error; char *string; } ERR_S... |
ERR_peek_error(3) -- Obtain error code and data
|
The ERR_get_error() function returns the last error code from the thread's error queue and removes the entry. This function can be called repeatedly until there are no more error codes to return. The... |
ERR_peek_error_line(3) -- Obtain error code and data
|
The ERR_get_error() function returns the last error code from the thread's error queue and removes the entry. This function can be called repeatedly until there are no more error codes to return. The... |
ERR_peek_error_line_data(3) -- Obtain error code and data
|
The ERR_get_error() function returns the last error code from the thread's error queue and removes the entry. This function can be called repeatedly until there are no more error codes to return. The... |
ERR_print_errors(3) -- Print error messages
|
ERR_print_errors() is a convenience function that prints the error strings for all errors that OpenSSL has recorded to bp, thus emptying the error queue. The ERR_print_errors_fp() function is the same... |
ERR_print_errors_fp(3) -- Print error messages
|
ERR_print_errors() is a convenience function that prints the error strings for all errors that OpenSSL has recorded to bp, thus emptying the error queue. The ERR_print_errors_fp() function is the same... |
ERR_put_error(3) -- Record an error
|
The ERR_put_error() function adds an error code to the thread's error queue. It signals that the error of reason code reason occurred in function func of library lib, in line number line of file. Thi... |
ERR_reason_error_string(3) -- Obtain human-readable error message
|
The ERR_error_string() function generates a human-readable string representing the error code e, and places it at buf. The buf must be at least 120 bytes long. If buf is NULL, the error string is plac... |
ERR_remove_state(3) -- Free a thread's error queue
|
The ERR_remove_state() function frees the error queue associated with thread pid. If pid == 0, the current thread will have its error queue removed. Since error queue data structures are allocated aut... |
escap_cmp_fields(3) -- parser routines for
|
The escap_parse_fields() routine parses the text in buffer according to the field information in partab, storing the results in the data area referenced by fieldptr and the flags for which fields are ... |
escap_copy_fields(3) -- parser routines for
|
The escap_parse_fields() routine parses the text in buffer according to the field information in partab, storing the results in the data area referenced by fieldptr and the flags for which fields are ... |
escap_parse_fields(3) -- parser routines for
|
The escap_parse_fields() routine parses the text in buffer according to the field information in partab, storing the results in the data area referenced by fieldptr and the flags for which fields are ... |
escap_print_fields(3) -- parser routines for
|
The escap_parse_fields() routine parses the text in buffer according to the field information in partab, storing the results in the data area referenced by fieldptr and the flags for which fields are ... |
escap_size_data(3) -- parser routines for
|
The escap_parse_fields() routine parses the text in buffer according to the field information in partab, storing the results in the data area referenced by fieldptr and the flags for which fields are ... |
etext(3) -- locations in program and definitions
|
These names refer neither to routines nor to locations with interesting contents except for _procedure_table, _procedure_string_table, and, for Tru64 UNIX, __istart and __fstart. Except for eprol, the... |
ethers(3) -- Ethernet address mapping operations
|
These routines are useful for mapping 48-bit Ethernet numbers to their ASCII representations or their corresponding host names, and vice versa. The mapping is obtained from the /etc/ethers database; s... |
ether_aton(3) -- Ethernet address mapping operations
|
These routines are useful for mapping 48-bit Ethernet numbers to their ASCII representations or their corresponding host names, and vice versa. The mapping is obtained from the /etc/ethers database; s... |
ether_hostton(3) -- Ethernet address mapping operations
|
These routines are useful for mapping 48-bit Ethernet numbers to their ASCII representations or their corresponding host names, and vice versa. The mapping is obtained from the /etc/ethers database; s... |
ether_line(3) -- Ethernet address mapping operations
|
These routines are useful for mapping 48-bit Ethernet numbers to their ASCII representations or their corresponding host names, and vice versa. The mapping is obtained from the /etc/ethers database; s... |
ether_ntoa(3) -- Ethernet address mapping operations
|
These routines are useful for mapping 48-bit Ethernet numbers to their ASCII representations or their corresponding host names, and vice versa. The mapping is obtained from the /etc/ethers database; s... |
ether_ntohost(3) -- Ethernet address mapping operations
|
These routines are useful for mapping 48-bit Ethernet numbers to their ASCII representations or their corresponding host names, and vice versa. The mapping is obtained from the /etc/ethers database; s... |
EventNotifyManager(3) -- Receive an event notification (CDSA)
|
This function receives an event notification from another module manager. The source manager is identified by its service mask. The specified event type is interpreted by the received and the appropri... |
EvmConnCheck(3) -- Maintains connection with the EVM daemon
|
The EvmConnCheck() routine checks whether there is any I/O activity outstanding on the connection. If there is, IOWaiting is set to EvmTRUE. The program should then call EvmConnDispatch() to handle it... |
EvmConnControl(3) -- Controls information for an EVM connection
|
The EvmConnControl() routine allows you to set or get control information for a connection. The following table shows the available values for the request argument and the associated value of the arg ... |
EvmConnCreate(3) -- Establish or destroy connection with the EVM daemon
|
The EvmConnCreate() routine establishes a connection between a client process and the EVM daemon. If the connection is successful, a pointer to a new connection context is returned in the connection a... |
EvmConnCreatePoster(3) -- Establish or destroy connection with the EVM daemon
|
The EvmConnCreate() routine establishes a connection between a client process and the EVM daemon. If the connection is successful, a pointer to a new connection context is returned in the connection a... |
EvmConnCreateSubscriber(3) -- Establish or destroy connection with the EVM daemon
|
The EvmConnCreate() routine establishes a connection between a client process and the EVM daemon. If the connection is successful, a pointer to a new connection context is returned in the connection a... |
EvmConnDestroy(3) -- Establish or destroy connection with the EVM daemon
|
The EvmConnCreate() routine establishes a connection between a client process and the EVM daemon. If the connection is successful, a pointer to a new connection context is returned in the connection a... |
EvmConnDispatch(3) -- Maintains connection with the EVM daemon
|
The EvmConnCheck() routine checks whether there is any I/O activity outstanding on the connection. If there is, IOWaiting is set to EvmTRUE. The program should then call EvmConnDispatch() to handle it... |
EvmConnFdGet(3) -- Establish or destroy connection with the EVM daemon
|
The EvmConnCreate() routine establishes a connection between a client process and the EVM daemon. If the connection is successful, a pointer to a new connection context is returned in the connection a... |
EvmConnFlush(3) -- Maintains connection with the EVM daemon
|
The EvmConnCheck() routine checks whether there is any I/O activity outstanding on the connection. If there is, IOWaiting is set to EvmTRUE. The program should then call EvmConnDispatch() to handle it... |
EvmConnRegistrationGet(3) -- Establishes a subscription for event notification
|
To receive notification of events as they happen, a program must establish a listening connection to the EVM daemon, using the EvmConnCreate(3) routine. The program must then call EvmConnSubscribe() t... |
EvmConnSubscribe(3) -- Establishes a subscription for event notification
|
To receive notification of events as they happen, a program must establish a listening connection to the EVM daemon, using the EvmConnCreate(3) routine. The program must then call EvmConnSubscribe() t... |
EvmConnTemplateScan(3) -- Establishes a subscription for event notification
|
To receive notification of events as they happen, a program must establish a listening connection to the EVM daemon, using the EvmConnCreate(3) routine. The program must then call EvmConnSubscribe() t... |
EvmConnWait(3) -- Maintains connection with the EVM daemon
|
The EvmConnCheck() routine checks whether there is any I/O activity outstanding on the connection. If there is, IOWaiting is set to EvmTRUE. The program should then call EvmConnDispatch() to handle it... |
EvmEventCreate(3) -- Creates and destroys events
|
The EvmEventCreate() routine creates an empty event. The newly created event is returned in the event reference argument. The EvmEventCreateVa() routine creates an event and adds the supplied items in... |
EvmEventCreateVa(3) -- Creates and destroys events
|
The EvmEventCreate() routine creates an empty event. The newly created event is returned in the event reference argument. The EvmEventCreateVa() routine creates an event and adds the supplied items in... |
EvmEventDestroy(3) -- Creates and destroys events
|
The EvmEventCreate() routine creates an empty event. The newly created event is returned in the event reference argument. The EvmEventCreateVa() routine creates an event and adds the supplied items in... |
EvmEventDump(3) -- Dumps an event in displayable form
|
The EvmEventDump() routine dumps an event in display format. All data items and variables contained in the event are displayed. |
EvmEventDup(3) -- Creates and destroys events
|
The EvmEventCreate() routine creates an empty event. The newly created event is returned in the event reference argument. The EvmEventCreateVa() routine creates an event and adds the supplied items in... |
EvmEventFormat(3) -- Format events for display
|
Information contained in an event must be formatted to present it in human-readable form. The event poster supplies formatting information through the event's format data item, and the routines descr... |
EvmEventFormatFromTemplate(3) -- Format events for display
|
Information contained in an event must be formatted to present it in human-readable form. The event poster supplies formatting information through the event's format data item, and the routines descr... |
EvmEventNameMatch(3) -- Match event name
|
Because special matching rules apply when deciding whether a candidate event name matches a known name, the EVM name matching functions should be used for matching purposes, rather than the C string c... |
EvmEventNameMatchStr(3) -- Match event name
|
Because special matching rules apply when deciding whether a candidate event name matches a known name, the EVM name matching functions should be used for matching purposes, rather than the C string c... |
EvmEventPost(3) -- Posts an event
|
An EVM client program uses the routines described on this page to pass events to the EVM daemon, for distribution to subscribers. EvmEventPost() posts an event that has already been created with EvmEv... |
EvmEventPostVa(3) -- Posts an event
|
An EVM client program uses the routines described on this page to pass events to the EVM daemon, for distribution to subscribers. EvmEventPost() posts an event that has already been created with EvmEv... |
EvmEventRead(3) -- Performs I/O of events to and from a file
|
The EvmEventRead() routine creates a new event structure and populates it with an event read from the supplied file descriptor (fd). The EvmEventDestroy() routine must be used to destroy the new event... |
EvmEventValidate(3) -- Performs a data integrity check on an event.
|
The EvmEventValidate() routine performs a data integrity check on an event. This is intended to validate an event that has just been received over a connection or retrieved from storage. It should not... |
EvmEventWrite(3) -- Performs I/O of events to and from a file
|
The EvmEventRead() routine creates a new event structure and populates it with an event read from the supplied file descriptor (fd). The EvmEventDestroy() routine must be used to destroy the new event... |
EvmFilterCreate(3) -- Event filter evaluator routines
|
The filter evaluation routines are used to check whether an event matches a given event filter. Although most EVM clients do not need to use these functions directly, they are useful to clients that p... |
EvmFilterDestroy(3) -- Event filter evaluator routines
|
The filter evaluation routines are used to check whether an event matches a given event filter. Although most EVM clients do not need to use these functions directly, they are useful to clients that p... |
EvmFilterIsFile(3) -- Event filter evaluator routines
|
The filter evaluation routines are used to check whether an event matches a given event filter. Although most EVM clients do not need to use these functions directly, they are useful to clients that p... |
EvmFilterReadFile(3) -- Event filter evaluator routines
|
The filter evaluation routines are used to check whether an event matches a given event filter. Although most EVM clients do not need to use these functions directly, they are useful to clients that p... |
EvmFilterSet(3) -- Event filter evaluator routines
|
The filter evaluation routines are used to check whether an event matches a given event filter. Although most EVM clients do not need to use these functions directly, they are useful to clients that p... |
EvmFilterTest(3) -- Event filter evaluator routines
|
The filter evaluation routines are used to check whether an event matches a given event filter. Although most EVM clients do not need to use these functions directly, they are useful to clients that p... |
EvmItemGet(3) -- Create and manipulate event items
|
Routines in this reference page deal with manipulating data in the standard items in an event. The EvmItemSet() routine sets the value of the event data item specified by item_id to the item_value sup... |
EvmItemListFree(3) -- Create and manipulate event items
|
Routines in this reference page deal with manipulating data in the standard items in an event. The EvmItemSet() routine sets the value of the event data item specified by item_id to the item_value sup... |
EvmItemListGet(3) -- Create and manipulate event items
|
Routines in this reference page deal with manipulating data in the standard items in an event. The EvmItemSet() routine sets the value of the event data item specified by item_id to the item_value sup... |
EvmItemRelease(3) -- Create and manipulate event items
|
Routines in this reference page deal with manipulating data in the standard items in an event. The EvmItemSet() routine sets the value of the event data item specified by item_id to the item_value sup... |
EvmItemSet(3) -- Create and manipulate event items
|
Routines in this reference page deal with manipulating data in the standard items in an event. The EvmItemSet() routine sets the value of the event data item specified by item_id to the item_value sup... |
EvmItemSetVa(3) -- Create and manipulate event items
|
Routines in this reference page deal with manipulating data in the standard items in an event. The EvmItemSet() routine sets the value of the event data item specified by item_id to the item_value sup... |
EvmSrvMessageGet(3) -- Event service functions
|
The EvmSrvStart() routine creates a service connection to the EVM daemon, requesting that the service identified as service_name be started. If the service is known to the daemon, it is started as a c... |
EvmSrvStart(3) -- Event service functions
|
The EvmSrvStart() routine creates a service connection to the EVM daemon, requesting that the service identified as service_name be started. If the service is known to the daemon, it is started as a c... |
EvmStatusTextGet(3) -- Formats text version of EVM status code
|
The EvmStatusTextGet() routine takes an EVM API status code as input, and returns a string describing the status. This string can be used for error display or debugging purposes. The string returned i... |
EvmVarFormat(3) -- Format events for display
|
Information contained in an event must be formatted to present it in human-readable form. The event poster supplies formatting information through the event's format data item, and the routines descr... |
EvmVarGet(3) -- Manipulate event variables
|
The EvmVarSet() routine sets the value of a variable data item, indicated by v_name, in an event. This routine is used both for adding a variable and for altering its value. If the v_name variable is ... |
EvmVarGetOpaque(3) -- Manipulate event variables
|
The EvmVarSet() routine sets the value of a variable data item, indicated by v_name, in an event. This routine is used both for adding a variable and for altering its value. If the v_name variable is ... |
EvmVarGetString(3) -- Manipulate event variables
|
The EvmVarSet() routine sets the value of a variable data item, indicated by v_name, in an event. This routine is used both for adding a variable and for altering its value. If the v_name variable is ... |
EvmVarGetType(3) -- Manipulate event variables
|
The EvmVarSet() routine sets the value of a variable data item, indicated by v_name, in an event. This routine is used both for adding a variable and for altering its value. If the v_name variable is ... |
EvmVarGetXxx(3) -- Manipulate event variables
|
The EvmVarSet() routine sets the value of a variable data item, indicated by v_name, in an event. This routine is used both for adding a variable and for altering its value. If the v_name variable is ... |
EvmVarListFree(3) -- Manipulate event variables
|
The EvmVarSet() routine sets the value of a variable data item, indicated by v_name, in an event. This routine is used both for adding a variable and for altering its value. If the v_name variable is ... |
EvmVarListGet(3) -- Manipulate event variables
|
The EvmVarSet() routine sets the value of a variable data item, indicated by v_name, in an event. This routine is used both for adding a variable and for altering its value. If the v_name variable is ... |
EvmVarRelease(3) -- Manipulate event variables
|
The EvmVarSet() routine sets the value of a variable data item, indicated by v_name, in an event. This routine is used both for adding a variable and for altering its value. If the v_name variable is ... |
EvmVarSet(3) -- Manipulate event variables
|
The EvmVarSet() routine sets the value of a variable data item, indicated by v_name, in an event. This routine is used both for adding a variable and for altering its value. If the v_name variable is ... |
EvmVarSetOpaque(3) -- Manipulate event variables
|
The EvmVarSet() routine sets the value of a variable data item, indicated by v_name, in an event. This routine is used both for adding a variable and for altering its value. If the v_name variable is ... |
EvmVarSetStringI18N(3) -- Manipulate event variables
|
The EvmVarSet() routine sets the value of a variable data item, indicated by v_name, in an event. This routine is used both for adding a variable and for altering its value. If the v_name variable is ... |
EvmVarSetXxx(3) -- Manipulate event variables
|
The EvmVarSet() routine sets the value of a variable data item, indicated by v_name, in an event. This routine is used both for adding a variable and for altering its value. If the v_name variable is ... |
evp(3) -- High-level cryptographic functions
|
The EVP library provides a high-level interface to cryptographic functions. EVP_Seal... and EVP_Open... provide public key encryption and decryption to implement digital envelopes. The EVP_Sign... and... |
EVP_CipherFinal(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CipherInit(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CipherUpdate(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_asn1_to_param(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_block_size(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_CTX_block_size(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_CTX_cipher(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_CTX_cleanup(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_CTX_ctrl(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_CTX_flags(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_CTX_get_app_data(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_CTX_iv_length(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_CTX_key_length(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_CTX_mode(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_CTX_nid(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_CTX_set_app_data(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_CTX_set_key_length(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_CTX_type(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_flags(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_iv_length(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_key_length(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_mode(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_nid(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_param_to_asn1(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_CIPHER_type(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_DecryptFinal(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_DecryptInit(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_DecryptUpdate(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_DigestFinal(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_DigestInit(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_DigestUpdate(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_dss(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_dss1(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_EncryptFinal(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_EncryptInit(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_EncryptUpdate(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_get_cipherbyname(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_get_cipherbynid(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_get_cipherbyobj(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. The EVP_EncryptInit() function initializes a cipher context ctx for encryption with cipher type. The type is usually su... |
EVP_get_digestbyname(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_get_digestbynid(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_get_digestbyobj(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_MAX_MD_SIZE(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_md2(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_md5(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_mdc2(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_MD_block_size(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_MD_CTX_block_size(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_MD_CTX_copy(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_MD_CTX_md(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_MD_CTX_size(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_MD_CTX_type(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_md_null(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_MD_pkey_type(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_MD_size(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_MD_type(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_OpenFinal(3) -- EVP envelope decryption
|
The EVP envelope routines are a high level interface to envelope decryption. They decrypt a public key encrypted symmetric key and then decrypt data using it. The EVP_OpenInit() function initializes a... |
EVP_OpenInit(3) -- EVP envelope decryption
|
The EVP envelope routines are a high level interface to envelope decryption. They decrypt a public key encrypted symmetric key and then decrypt data using it. The EVP_OpenInit() function initializes a... |
EVP_OpenUpdate(3) -- EVP envelope decryption
|
The EVP envelope routines are a high level interface to envelope decryption. They decrypt a public key encrypted symmetric key and then decrypt data using it. The EVP_OpenInit() function initializes a... |
EVP_ripemd160(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_SealFinal(3) -- EVP envelope encryption
|
The EVP envelope routines are a high level interface to envelope encryption. They generate a random key and then envelope it by using public key encryption. Data can then be encrypted using this key. ... |
EVP_SealInit(3) -- EVP envelope encryption
|
The EVP envelope routines are a high level interface to envelope encryption. They generate a random key and then envelope it by using public key encryption. Data can then be encrypted using this key. ... |
EVP_SealUpdate(3) -- EVP envelope encryption
|
The EVP envelope routines are a high level interface to envelope encryption. They generate a random key and then envelope it by using public key encryption. Data can then be encrypted using this key. ... |
EVP_sha(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_sha1(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. The EVP_DigestInit() function initializes a digest context ctx to use a digest type. This will typically be supplied by a functio... |
EVP_SignFinal(3) -- EVP signing functions
|
The EVP signature routines are a high level interface to digital signatures. The EVP_SignInit() function initializes a signing context ctx to using digest type. This typically will be supplied by a fu... |
EVP_SignInit(3) -- EVP signing functions
|
The EVP signature routines are a high level interface to digital signatures. The EVP_SignInit() function initializes a signing context ctx to using digest type. This typically will be supplied by a fu... |
EVP_SignUpdate(3) -- EVP signing functions
|
The EVP signature routines are a high level interface to digital signatures. The EVP_SignInit() function initializes a signing context ctx to using digest type. This typically will be supplied by a fu... |
EVP_VerifyFinal(3) -- EVP signature verification functions
|
The EVP signature verification routines are a high level interface to digital signatures. The EVP_VerifyInit() function initializes a verification context ctx to using digest type. This will typically... |
EVP_VerifyInit(3) -- EVP signature verification functions
|
The EVP signature verification routines are a high level interface to digital signatures. The EVP_VerifyInit() function initializes a verification context ctx to using digest type. This will typically... |
EVP_VerifyUpdate(3) -- EVP signature verification functions
|
The EVP signature verification routines are a high level interface to digital signatures. The EVP_VerifyInit() function initializes a verification context ctx to using digest type. This will typically... |
exception_dispatcher(3) -- routines to search and call handlers for exceptions.
|
These routines allow user and compiler generated code to initiate the exception process. Typically, programs written in the C programming language use these routines within the structured exception ha... |
exception_intro(3) -- an overview of exception support supplied in libexc.a
|
The exception mechanism used on Tru64 UNIX requires no execution time in user code. The only costs before an exception occurs are one-time registering and deregistering of modules with the run-time ex... |
exc_add_gp_range(3) -- routines to support mapping program counters to the data structures defined at run time
|
The exception system needs to access procedure-specific information at run time in order to perform unwinds and call handlers. You find this information by mapping a PC to a procedure and its structur... |
exc_add_pc_range(3) -- routines to support mapping program counters to the data structures defined at run time
|
The exception system needs to access procedure-specific information at run time in order to perform unwinds and call handlers. You find this information by mapping a PC to a procedure and its structur... |
exc_add_pc_range_table(3) -- routines to support mapping program counters to the data structures defined at run time
|
The exception system needs to access procedure-specific information at run time in order to perform unwinds and call handlers. You find this information by mapping a PC to a procedure and its structur... |
exc_capture_context(3) -- entry points that support resuming execution of user code
|
The exc_resume() and exc_continue() functions perform essentially the same operation as longjmp(3). The exc_resume() function is a libexc entry point. The exc_capture_context() function saves the curr... |
exc_continue(3) -- entry points that support resuming execution of user code
|
The exc_resume() and exc_continue() functions perform essentially the same operation as longjmp(3). The exc_resume() function is a libexc entry point. The exc_capture_context() function saves the curr... |
exc_dispatch_exception(3) -- routines to search and call handlers for exceptions.
|
These routines allow user and compiler generated code to initiate the exception process. Typically, programs written in the C programming language use these routines within the structured exception ha... |
exc_find_frame_ptr(3) -- routines to unwind a context
|
All of the unwind routines perform a virtual unwind. Unlike the routines described in exc_resume(3), these routines do not actually unwind a procedure call by modifying the real registers and other ma... |
exc_longjmp(3) -- entry points that support resuming execution of user code
|
The exc_resume() and exc_continue() functions perform essentially the same operation as longjmp(3). The exc_resume() function is a libexc entry point. The exc_capture_context() function saves the curr... |
exc_lookup_function_entry(3) -- routines to support mapping program counters to the data structures defined at run time
|
The exception system needs to access procedure-specific information at run time in order to perform unwinds and call handlers. You find this information by mapping a PC to a procedure and its structur... |
exc_lookup_function_table(3) -- routines to support mapping program counters to the data structures defined at run time
|
The exception system needs to access procedure-specific information at run time in order to perform unwinds and call handlers. You find this information by mapping a PC to a procedure and its structur... |
exc_lookup_gp(3) -- routines to support mapping program counters to the data structures defined at run time
|
The exception system needs to access procedure-specific information at run time in order to perform unwinds and call handlers. You find this information by mapping a PC to a procedure and its structur... |
exc_raise_exception(3) -- routines to search and call handlers for exceptions.
|
These routines allow user and compiler generated code to initiate the exception process. Typically, programs written in the C programming language use these routines within the structured exception ha... |
exc_raise_signal_exception(3) -- routines to search and call handlers for exceptions.
|
These routines allow user and compiler generated code to initiate the exception process. Typically, programs written in the C programming language use these routines within the structured exception ha... |
exc_raise_status_exception(3) -- routines to search and call handlers for exceptions.
|
These routines allow user and compiler generated code to initiate the exception process. Typically, programs written in the C programming language use these routines within the structured exception ha... |
exc_remote_lookup_function_entry(3) -- routines to support mapping program counters to the data structures defined at run time
|
The exception system needs to access procedure-specific information at run time in order to perform unwinds and call handlers. You find this information by mapping a PC to a procedure and its structur... |
exc_remote_virtual_unwind(3) -- routines to unwind a context
|
All of the unwind routines perform a virtual unwind. Unlike the routines described in exc_resume(3), these routines do not actually unwind a procedure call by modifying the real registers and other ma... |
exc_remove_gp_range(3) -- routines to support mapping program counters to the data structures defined at run time
|
The exception system needs to access procedure-specific information at run time in order to perform unwinds and call handlers. You find this information by mapping a PC to a procedure and its structur... |
exc_remove_pc_range_table(3) -- routines to support mapping program counters to the data structures defined at run time
|
The exception system needs to access procedure-specific information at run time in order to perform unwinds and call handlers. You find this information by mapping a PC to a procedure and its structur... |
exc_resume(3) -- entry points that support resuming execution of user code
|
The exc_resume() and exc_continue() functions perform essentially the same operation as longjmp(3). The exc_resume() function is a libexc entry point. The exc_capture_context() function saves the curr... |
exc_set_last_chance_handler(3) -- support routines for unhandled exceptions
|
When called as the result of an exception, exc_dispatch_exception(3) attempts to find a handler to process the exception by searching the stack frames of procedures in the call chain. It does this by ... |
exc_unwind(3) -- entry points that support resuming execution of user code
|
The exc_resume() and exc_continue() functions perform essentially the same operation as longjmp(3). The exc_resume() function is a libexc entry point. The exc_capture_context() function saves the curr... |
exc_virtual_unwind(3) -- routines to unwind a context
|
All of the unwind routines perform a virtual unwind. Unlike the routines described in exc_resume(3), these routines do not actually unwind a procedure call by modifying the real registers and other ma... |
exit_quiet_zone(3) -- Prevent keyboard interruption of program actions (Enhanced Security)
|
The enter_quiet_zone() function sets the appropriate signals to a state that prevents keyboard interruption of program actions. If this function is called multiple times without an intervening exit_qu... |
exp(3) -- Exponential, logarithm, and power functions
|
The exp(), expf(), and expl() functions compute the value of the exponential function, defined as e**x, where e is the constant used as a base for natural logarithms. The expm1(), expm1f(), and expm1l... |
expacct(3) -- Expand accounting record
|
The expacct() function converts acct structure members that have been packed into a pseudo floating-point format from the compressed data type comp_t to data type double. |
expm1(3) -- Exponential, logarithm, and power functions
|
The exp(), expf(), and expl() functions compute the value of the exponential function, defined as e**x, where e is the constant used as a base for natural logarithms. The expm1(), expm1f(), and expm1l... |
fabs(3) -- Calculate Euclidean distance and absolute value
|
The hypot(), hypotf(), and hypotl() functions compute the length of the hypotenuse of a right triangle, where x and y represent the perpendicular sides of the triangle. The hypot(x,y), hypotf(x,y) and... |
fattach(3) -- Attach a STREAMS-based file descriptor to a file in the file system name space
|
The fattach() function associates a STREAMS-based file descriptor to the file pointed to by the path parameter. A successful call to the fattach() function causes all pathnames that name the file name... |
fclose(3) -- Close or flush a stream
|
The fclose() function writes buffered data to the stream specified by the stream parameter, and then closes the associated file. The function is automatically called for all open files when the exit()... |
fclose_unlocked(3) -- Close or flush a stream
|
The fclose() function writes buffered data to the stream specified by the stream parameter, and then closes the associated file. The function is automatically called for all open files when the exit()... |
fcvt(3) -- Convert a floatingpoint number to a string
|
The ecvt(), fcvt(), and gcvt() functions convert floatingpoint numbers to null-terminated strings. The ecvt() function converts the value specified by the value parameter to a null-terminated string o... |
fcvt_r(3) -- Convert a floatingpoint number to a string
|
The ecvt(), fcvt(), and gcvt() functions convert floatingpoint numbers to null-terminated strings. The ecvt() function converts the value specified by the value parameter to a null-terminated string o... |
fdelproplist(3) -- removes Extended File Attributes from a file
|
The delproplist() function removes one or more Extended File Attributes, whose names are specified in the structure pointed to by args, from the Property List of the file pointed to by path. An Extend... |
fdetach(3) -- Detach a STREAMS-based file descriptor from a file in the file system name space
|
The fdetach() function disassociates a STREAMS-based file descriptor from the file pointed to by the path parameter. The STREAMS-based file descriptor was associated with the file by a prior fattach()... |
fdopen(3) -- Open a stream
|
The fopen() function opens the file named by the path parameter and associates a stream with it, returning a pointer to the FILE structure of this stream. The mode parameter controls the access allowe... |
feof(3) -- Test for EOF on a stream
|
The feof() function tests the EOF (end-of-file) condition on the specified stream. |
ferror(3) -- Test the error indicator on a stream
|
The ferror() function tests whether input/output errors have occurred on the specified stream. |
fetch(3) -- Database subroutines
|
The dbminit(), fetch(), store(), delete(), firstkey(), nextkey(), and forder() functions maintain key/content pairs in a database. They are obtained with the -ldbm loader option. The dbm library is pr... |
fflush(3) -- Close or flush a stream
|
The fclose() function writes buffered data to the stream specified by the stream parameter, and then closes the associated file. The function is automatically called for all open files when the exit()... |
fflush_unlocked(3) -- Close or flush a stream
|
The fclose() function writes buffered data to the stream specified by the stream parameter, and then closes the associated file. The function is automatically called for all open files when the exit()... |
ffs(3) -- Find first set bit
|
The ffs() function finds the first bit set (beginning with the least significant bit) and returns the index of that bit. Bits are numbered starting at 1 (the least significant bit). If pattern is 0 (z... |
fgetc(3) -- Get a byte or word from an input stream
|
The getc() function returns the next byte from the input specified by the stream parameter and moves the file pointer, if defined, ahead one byte in stream. The getc() function may be a macro (dependi... |
fgetgrent(3) -- Access group information in the user database
|
The getgrent(), getgrgid(), getgrnam(), setgrent(), endgrent(), and fgetgrent() functions may be used to access the basic group attributes. The setgrent() function opens the user database (if not alre... |
fgetgrent_r(3) -- Access group information in the user database
|
The getgrent(), getgrgid(), getgrnam(), setgrent(), endgrent(), and fgetgrent() functions may be used to access the basic group attributes. The setgrent() function opens the user database (if not alre... |
fgetpos(3) -- Reposition the file pointer of a stream
|
The fseek() function sets the position of the next input or output operation on the I/O stream specified by the stream parameter. The position of the next operation is determined by the offset paramet... |
fgetproplist(3) -- gets the Extended File Attributes of a file
|
The getproplist() function gets the Extended File Attributes of a file pointed to by *path and places them in the Extended File Attribute buffer pointed to by nbytes. Which Extended File Attributes wi... |
fgetpwent(3) -- Access user attribute information in the user database
|
The endpwent(), fgetpwent(), getpwent(), getpwnam(), getpwuid(), putpwent(), and setpwent() functions may be used to access the basic user attributes. The getpwent(), getpwnam(), and getpwuid() functi... |
fgetpwent_r(3) -- Access user attribute information in the user database
|
The endpwent(), fgetpwent(), getpwent(), getpwnam(), getpwuid(), putpwent(), and setpwent() functions may be used to access the basic user attributes. The getpwent(), getpwnam(), and getpwuid() functi... |
fgets(3) -- Get a string from a stream
|
The gets() function reads bytes from the standard input stream, stdin, into the array pointed to by the string parameter. Data is read until a newline character is read or an end-of-file condition is ... |
fgetwc(3) -- Get a wide character from an input stream
|
The fgetwc() function gets the next character from the input stream specified by the stream parameter, converts it to a wide-character code, and advances the associated file position indicator for the... |
fgetws(3) -- Get a string from a stream
|
The fgetws() function reads characters from stream, converts them into the corresponding wide characters, and stores the result in the wchar_t array pointed to by the wcs parameter. The function reads... |
fileno(3) -- Map a stream pointer to a file descriptor
|
The fileno() function returns the integer file descriptor associated with the stream pointed to by stream. |
filter(3) -- Miscellaneous utility routines for Curses
|
The unctrl macro generates a character string that is a printable representation of the character c. Control characters are displayed in the ^X notation. Printing characters are displayed as is. The w... |
find_rpd(3) -- routines to support mapping program counters to the data structures defined at run time
|
The exception system needs to access procedure-specific information at run time in order to perform unwinds and call handlers. You find this information by mapping a PC to a procedure and its structur... |
finite(3) -- Related miscellaneous IEEE arithmetic functions.
|
The copysign(), copysignf(), and copysignl() functions return x with the same sign as y. IEEE 754 requires copysign(x,NaN), copysignf(x,NaN) and copysignl(x,NaN) to return +x or -x. The finite(), fini... |
firstkey(3) -- Database subroutines
|
The dbminit(), fetch(), store(), delete(), firstkey(), nextkey(), and forder() functions maintain key/content pairs in a database. They are obtained with the -ldbm loader option. The dbm library is pr... |
flash(3) -- Curses bell and screen flash routines
|
The beep and flash routines are used to alert the terminal user. The routine beep sounds the audible alarm on the terminal, if possible. If an audible alarm is not possible, the routine flashes the sc... |
flockfile(3) -- locking functions
|
The flockfile(), ftrylockfile, and funlockfile functions provide for explicit application-level locking of stdio (FILE*) objects. These functions can be used by a thread to delineate a sequence of I/O... |
floor(3) -- Round floatingpoint
|
The floor(), floorf(), and floorl() functions return the largest floating-point integer value less than or equal to x. The ceil(), ceilf(), and ceill() functions return the smallest floating-point int... |
flushinp(3) -- Miscellaneous utility routines for Curses
|
The unctrl macro generates a character string that is a printable representation of the character c. Control characters are displayed in the ^X notation. Printing characters are displayed as is. The w... |
fmin(3) -- Perform multiple precision integer arithmetic
|
These functions perform arithmetic on integers of arbitrary length. The integers are stored using the defined type MINT. Pointers to a MINT can be initialized using theitom() function, which sets the ... |
fmod(3) -- Compute the floating-point remainder
|
The fmod(), fmodf(), and fmodl() functions return the remainder r = x - n*y, where n = trunc(x/y). The result has the same sign as x and magnitude less than the magnitude of y. The remainder is comput... |
fmout(3) -- Perform multiple precision integer arithmetic
|
These functions perform arithmetic on integers of arbitrary length. The integers are stored using the defined type MINT. Pointers to a MINT can be initialized using theitom() function, which sets the ... |
fmtmsg(3) -- Display a message in the specified format
|
The fmtmsg() function writes a formatted message to either standard error, the system console, or both. Any message typically written to standard error (stderr) by printf() can also be displayed using... |
fnmatch(3) -- Match filename patterns
|
The fnmatch() function checks the string specified by the string parameter to see if it matches the pattern specified by the pattern parameter. This routine follows the match criteria of the glob() fu... |
fold_string_w(3) -- maps one wide-character string to another, performing the specified Unicode character transformation
|
The fold_string_w() function maps one wide-character string to another and performs the specified Unicode character transformation. The function then stores the transformed wide-character string in th... |
fopen(3) -- Open a stream
|
The fopen() function opens the file named by the path parameter and associates a stream with it, returning a pointer to the FILE structure of this stream. The mode parameter controls the access allowe... |
forder(3) -- Database subroutines
|
The dbminit(), fetch(), store(), delete(), firstkey(), nextkey(), and forder() functions maintain key/content pairs in a database. They are obtained with the -ldbm loader option. The dbm library is pr... |
forkpty(3) -- Open and fork pseudoterminals
|
The openpty() function opens the pty master/slave pair and sets the terminal attributes of the slave pseudoterminal according to the specifications in the termp and winp parameters. The forkpty() func... |
fprintf(3) -- Print formatted output
|
The format parameter is a character string that contains two types of objects: Literal characters, which are copied to the output stream. Conversion specifications, each of which causes zero or more i... |
fputc(3) -- Write a byte or a word to a stream
|
The putc() function writes the byte c (converted to an unsigned char) to the output specified by the stream parameter. The byte is written at the position at which the file pointer is currently pointi... |
fputs(3) -- Writes a string to a stream
|
The puts() function writes the null-terminated string pointed to by the string parameter, followed by a newline character, to the standard output stream, stdout. The fputs() function writes the null-t... |
fputwc(3) -- Write a wide character to a stream
|
The fputwc() function converts the wchar_t specified by the wc parameter to its equivalent multibyte character and then writes the multibyte character to the file or terminal associated with the strea... |
fputws(3) -- Write a wide-character string to a stream
|
The fputws() function reads the wchar_t string pointed to by the wcs parameter, converts each wide character to a multibyte character, and writes the result to the output stream pointed to by the stre... |
fp_class(3) -- Related miscellaneous IEEE arithmetic functions.
|
The copysign(), copysignf(), and copysignl() functions return x with the same sign as y. IEEE 754 requires copysign(x,NaN), copysignf(x,NaN) and copysignl(x,NaN) to return +x or -x. The finite(), fini... |
fread(3) -- Perform input/output operations
|
The fread() function copies num_items of data of length size from the input stream into an array beginning at the location pointed to by the pointer r parameter. The fread() function stops copying byt... |
fread_unlocked(3) -- Perform input/output operations
|
The fread() function copies num_items of data of length size from the input stream into an array beginning at the location pointed to by the pointer r parameter. The fread() function stops copying byt... |
free(3) -- Provide a memory allocator
|
The malloc() and free() functions provide a simple, general-purpose memory allocation package. Note See also the subsection "Using the densemalloc Library" for information on using libdensemalloc to... |
freeaddrinfo(3) -- Free system resources used by an address information structure
|
The freeaddrinfo() routine frees one or more addrinfo structures and any dynamic storage associated with the structures. The process continues until the routine encounters a NULL ai_next pointer. |
freehostent(3) -- Return hostent structures and dynamic storage to the system
|
The freehostent() function frees hostent structures and dynamic memory to the system. You should use this return to free hostent structures that were returned by the getipnodebyname() and getipnodebya... |
FreeKey(3) -- Clean up keys (CDSA)
|
This function requests the cryptographic service provider to clean up any key material associated with the key, and to possibly delete the key from the CSP completely. This function also releases the ... |
freopen(3) -- Open a stream
|
The fopen() function opens the file named by the path parameter and associates a stream with it, returning a pointer to the FILE structure of this stream. The mode parameter controls the access allowe... |
frexp(3) -- Manipulate floating-point numbers
|
Every nonzero number can be written uniquely as the normalized mantissa (fraction) z times 2 raised to the power p, where the absolute value of z is in the range [0.5, 1.0), and the exponent p, is an ... |
fscanf(3) -- Convert formatted input
|
The scanf(), fscanf(), and sscanf() functions read character data, interpret it according to a format, and store the converted results into specified memory locations. The format parameter contains co... |
fseek(3) -- Reposition the file pointer of a stream
|
The fseek() function sets the position of the next input or output operation on the I/O stream specified by the stream parameter. The position of the next operation is determined by the offset paramet... |
fseeko(3) -- Reposition the file pointer of a stream
|
The fseek() function sets the position of the next input or output operation on the I/O stream specified by the stream parameter. The position of the next operation is determined by the offset paramet... |
fseek_unlocked(3) -- Reposition the file pointer of a stream
|
The fseek() function sets the position of the next input or output operation on the I/O stream specified by the stream parameter. The position of the next operation is determined by the offset paramet... |
fsetpos(3) -- Reposition the file pointer of a stream
|
The fseek() function sets the position of the next input or output operation on the I/O stream specified by the stream parameter. The position of the next operation is determined by the offset paramet... |
fsetproplist(3) -- assigns Extended File Attributes to a file
|
The setproplist() function assigns a buffer of Extended File Attributes, pointed to by nbytes, to a file pointed to by *path. The Extended File Attribute buffer is defined in sys/proplist.h. An Extend... |
fs_config_get_devs(3) -- Obtains a list of devices in an AdvFS domain configuration.
|
Use this function to obtain a list of devices from which an AdvFS domain is built. The list, expressed in XML markup, contains physical disks used directly by AdvFS volumes and those used to make up L... |
fs_get_dom_list(3) -- Obtains a list of all AdvFS domains on the current system.
|
This function obtains a list of both active and inactive AdvFS domain names on a system. |
fs_get_fset_list(3) -- Obtains a list of all the filesets in an AdvFS domain.
|
This function obtains a list of names of all filesets in a named AdvFS domain. Names of both mounted filesets and unmounted filesets are returned. Both active and inactive domains can be queried. |
fs_restore_config(3) -- Restores an AdvFS domain configuration.
|
The fs_restore_config function recreates the configuration of an AdvFS domain by remapping it on cloned disks. You can capture the configuration by using the fs_save_config function and restore it on ... |
fs_save_config(3) -- Saves an AdvFS domain configuration.
|
This function saves the configuration of an AdvFS domain, including information about its filesets and volumes. Filesets and volumes can remain online while the configuration is captured. Valid names ... |
ftell(3) -- Reposition the file pointer of a stream
|
The fseek() function sets the position of the next input or output operation on the I/O stream specified by the stream parameter. The position of the next operation is determined by the offset paramet... |
ftello(3) -- Reposition the file pointer of a stream
|
The fseek() function sets the position of the next input or output operation on the I/O stream specified by the stream parameter. The position of the next operation is determined by the offset paramet... |
ftok(3) -- Generate a standard interprocess communication key
|
The ftok() function returns a key, based on the path_name and project_id parameters, that is usable in subsequent calls to the msgget(), semget(), and shmget() functions. The ftok() function returns t... |
ftrylockfilefunlockfile(3) -- locking functions
|
The flockfile(), ftrylockfile, and funlockfile functions provide for explicit application-level locking of stdio (FILE*) objects. These functions can be used by a thread to delineate a sequence of I/O... |
ftw(3) -- Walks a file tree
|
The ftw() function recursively searches the directory hierarchy that descends from the directory specified by the path parameter. For each object in the hierarchy, the ftw() function calls the functio... |
fwide(3) -- Set stream orientation to byte or wide-character
|
The fwide() function, depending on the value of the mode parameter, sets or queries the orientation of a stream of data specified by a FILE structure. If the stream has no orientation, a positive or n... |
fwprintf(3) -- Print formatted output for wide characters
|
The wprintf() function converts, formats, and writes its value parameters, under control of the format parameter, to the standard output stream stdout. The fwprintf() function converts, formats, and w... |
fwrite(3) -- Perform input/output operations
|
The fread() function copies num_items of data of length size from the input stream into an array beginning at the location pointed to by the pointer r parameter. The fread() function stops copying byt... |
fwrite_unlocked(3) -- Perform input/output operations
|
The fread() function copies num_items of data of length size from the input stream into an array beginning at the location pointed to by the pointer r parameter. The fread() function stops copying byt... |
fwscanf(3) -- Convert formatted wide-character input
|
The wscanf(), fwscanf(), and swscanf() functions read wide-character data, interpret it according to a format, and store the converted results into specified memory locations. The format parameter con... |
gai_strerror(3) -- Print an error message string based on a return code from the getaddrinfo or getnameinfo routine
|
The gai_strerror() routine returns a pointer to a string that describes the error based on an EAI_xxx value returned by the getaddrinfo() or getnameinfo() routine. |
gamma(3) -- Compute the logarithm of the gamma function
|
The lgamma(), lgammaf(), and lgammal() functions return the logarithm of the absolute value of gamma of x, or ln(|G(x)|), where G is the gamma function. The sign of gamma of x is returned in the exter... |
gcd(3) -- Perform multiple precision integer arithmetic
|
These functions perform arithmetic on integers of arbitrary length. The integers are stored using the defined type MINT. Pointers to a MINT can be initialized using theitom() function, which sets the ... |
gcvt(3) -- Convert a floatingpoint number to a string
|
The ecvt(), fcvt(), and gcvt() functions convert floatingpoint numbers to null-terminated strings. The ecvt() function converts the value specified by the value parameter to a null-terminated string o... |
GenerateAlgorithmParams(3) -- Generate algorithm parameters (CDSA)
|
This function generates algorithm parameters for the specified context. These parameters include Diffie-Hellman key agreement parameters and DSA key generation parameters. In most cases the algorithm ... |
GenerateKey(3) -- Generate a symmetric key (CDSA)
|
This function generates a symmetric key. The KeyUsage, and KeyAttr are used to initialize the keyheader for the newly created key. These values are not retained in the cryptographic Context, which con... |
GenerateKeyP(3) -- Generate a key with privilege (CDSA)
|
This function is similar to the CSSM_GenerateKey() function. It also accepts a USEE tag as a privilege request parameter. CSSM checks that either its own privilege set or the application's privilege ... |
GenerateKeyPair(3) -- Generate an asymmetric key pair (CDSA)
|
This function generates an asymmetric key pair. The CSP may cache keying material associated with the new asymmetric keypair. When one or both of the keys are no longer in active use, the application ... |
GenerateKeyPairP(3) -- Generate an asymmetric key pair with privilege (CDSA)
|
This function is similar to the CSSM_GenerateKeyPair() function. It also accepts a USEE tag as a privilege request parameter. CSSM checks that either its own privilege set or the application's privil... |
GenerateMac(3) -- Compute a message authentication code (CDSA)
|
This function computes a message authentication code for all data contained in the set of input buffers. |
GenerateMacFinal(3) -- Finalize the staged message authentication code (CDSA)
|
This function finalizes the staged message authentication code function. |
GenerateMacInit(3) -- Initialize the staged message authentication code (CDSA)
|
This function initializes the staged message authentication code function. |
GenerateMacUpdate(3) -- Continue the staged process of computing a message authentication code (CDSA)
|
This function continues the staged process of computing a message authentication code over all data contained in the set of input buffers. The authentication code will be returned as a result of the f... |
GenerateRandom(3) -- Generate random data (CDSA)
|
This function generates random data. |
getaddrinfo(3) -- Get address information for a network node and service
|
The getaddrinfo() routine can perform the following: Takes the service location (node name) and returns all addresses that are supported for this name and specified parameters. Takes the service name ... |
getbegyx(3) -- Get Curses cursor and window coordinates
|
The getyx macro places the cursor position of the window into the two integer variables y and x. If win is a subwindow, the getparyx macro places the beginning coordinates of the subwindow (relative t... |
getbkgd(3) -- Routines for manipulating the background in a Curses window
|
The bkgdset and wbkgdset routines manipulate the background of the named window. Background is defined as chtype and consists of any combination of attributes and a character. The attribute part of th... |
getbkgrnd(3) -- Set or get background character and rendition by using a complex character
|
By using the information in wch, the bkgrndset and wbkgrndset functions set the background rendition and manipulate the window rendition of the current or specified window. These functions turn off th... |
getc(3) -- Get a byte or word from an input stream
|
The getc() function returns the next byte from the input specified by the stream parameter and moves the file pointer, if defined, ahead one byte in stream. The getc() function may be a macro (dependi... |
getcchar(3) -- Get a wide character string and rendition from a cchar_t or set a cchar_t from a wide-character stri...
|
The getcchar function gets a wide-character string and rendition from a cchar_t argument. When wch is not a null pointer, the getcchar function does the following: Extracts information from a cchar_t ... |
getch(3) -- Get (or push back) characters from a Curses terminal keyboard
|
The getch, wgetch, mvgetch, and mvwgetch routines read a character from the terminal associated with the Curses window. In no-delay mode, if no input is waiting, these routines return the value ERR. I... |
getchar(3) -- Get a byte or word from an input stream
|
The getc() function returns the next byte from the input specified by the stream parameter and moves the file pointer, if defined, ahead one byte in stream. The getc() function may be a macro (dependi... |
getchar_unlocked(3) -- Get a byte or word from an input stream
|
The getc() function returns the next byte from the input specified by the stream parameter and moves the file pointer, if defined, ahead one byte in stream. The getc() function may be a macro (dependi... |
getclock(3) -- Get current value of system-wide clock
|
The getclock() function sets the current value of the clock specified by clktyp into the location pointed to by the tp parameter. The clktyp parameter is given as a symbolic constant name, as defined ... |
getcwd(3) -- Get the pathname of the current directory
|
The getcwd() function returns a pointer to a string containing the absolute pathname of the current directory. The getwd() function is called to obtain the pathname. [Tru64 UNIX] If the buffer paramet... |
getc_unlocked(3) -- Get a byte or word from an input stream
|
The getc() function returns the next byte from the input specified by the stream parameter and moves the file pointer, if defined, ahead one byte in stream. The getc() function may be a macro (dependi... |
getdate(3) -- Convert formatted string into time/date structure
|
The getdate() function fills a struct tm based on a combination of the supplied string argument and the template file of allowable formats for that argument. The template file is obtained from the DAT... |
getdate_r(3) -- Convert formatted string into time/date structure
|
The getdate() function fills a struct tm based on a combination of the supplied string argument and the template file of allowable formats for that argument. The template file is obtained from the DAT... |
getdiskbyname(3) -- Get the disk description using a disk name
|
Operations supported by the getdiskbyname function are also supported by the createlabel function. See createlabel(3). The getdiskbyname and getdiskbyname_r functions are supported only for backward c... |
getdvagent(3) -- Manipulate device assignment database entry (Enhanced Security)
|
The getesdvent(), getesdvnam(), and copyesdvent() functions each return a pointer to an object with the following structure containing the separated-out fields of an entry in the device assignment dat... |
getdvagnam(3) -- Manipulate device assignment database entry (Enhanced Security)
|
The getesdvent(), getesdvnam(), and copyesdvent() functions each return a pointer to an object with the following structure containing the separated-out fields of an entry in the device assignment dat... |
getenv(3) -- Return the value of an environment variable
|
The getenv() function searches the environment list for a string of the form name=value, and returns a pointer to a string containing the corresponding value for name. The returned string should not b... |
getesdfent(3) -- Manipulate system default database entry (Enhanced Security)
|
The getesdfent(), getesdfnam(), and copyesdfent() functions each return a pointer to an object with the following structure containing the separated-out fields of a line in the system default database... |
getesdfnam(3) -- Manipulate system default database entry (Enhanced Security)
|
The getesdfent(), getesdfnam(), and copyesdfent() functions each return a pointer to an object with the following structure containing the separated-out fields of a line in the system default database... |
getesdvent(3) -- Manipulate device assignment database entry (Enhanced Security)
|
The getesdvent(), getesdvnam(), and copyesdvent() functions each return a pointer to an object with the following structure containing the separated-out fields of an entry in the device assignment dat... |
getesdvnam(3) -- Manipulate device assignment database entry (Enhanced Security)
|
The getesdvent(), getesdvnam(), and copyesdvent() functions each return a pointer to an object with the following structure containing the separated-out fields of an entry in the device assignment dat... |
getesfient(3) -- Manipulate file control database entry (Enhanced Security)
|
The getesfient(), getesfinam(), and copyesfient() functions each return a pointer to an object with the following structure containing the separated-out fields of a line in the file control database. ... |
getesfinam(3) -- Manipulate file control database entry (Enhanced Security)
|
The getesfient(), getesfinam(), and copyesfient() functions each return a pointer to an object with the following structure containing the separated-out fields of a line in the file control database. ... |
getespwent(3) -- Manipulate protected password database entry (Enhanced Security)
|
The getespwent(), getespwuid(), getespwnam(), and copyespwent() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the protected pa... |
getespwnam(3) -- Manipulate protected password database entry (Enhanced Security)
|
The getespwent(), getespwuid(), getespwnam(), and copyespwent() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the protected pa... |
getespwuid(3) -- Manipulate protected password database entry (Enhanced Security)
|
The getespwent(), getespwuid(), getespwnam(), and copyespwent() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the protected pa... |
getestcent(3) -- Manipulate terminal control database entry (Enhanced Security)
|
The getestcent(), getestcnam(), and copyestcent() functions return a pointer to an object with the following structure containing the separated-out fields of an entry in the terminal control database.... |
getestcnam(3) -- Manipulate terminal control database entry (Enhanced Security)
|
The getestcent(), getestcnam(), and copyestcent() functions return a pointer to an object with the following structure containing the separated-out fields of an entry in the terminal control database.... |
getfsent(3) -- Get information about a file system
|
For the following functions, entries are read from the /etc/fstab file. The getfsent() function reads the next line of the file, opening the file if necessary. The setfsent() function opens the file o... |
getfsent_r(3) -- Get information about a file system
|
For the following functions, entries are read from the /etc/fstab file. The getfsent() function reads the next line of the file, opening the file if necessary. The setfsent() function opens the file o... |
getfsfile(3) -- Get information about a file system
|
For the following functions, entries are read from the /etc/fstab file. The getfsent() function reads the next line of the file, opening the file if necessary. The setfsent() function opens the file o... |
getfsfile_r(3) -- Get information about a file system
|
For the following functions, entries are read from the /etc/fstab file. The getfsent() function reads the next line of the file, opening the file if necessary. The setfsent() function opens the file o... |
getfsspec(3) -- Get information about a file system
|
For the following functions, entries are read from the /etc/fstab file. The getfsent() function reads the next line of the file, opening the file if necessary. The setfsent() function opens the file o... |
getfsspec_r(3) -- Get information about a file system
|
For the following functions, entries are read from the /etc/fstab file. The getfsent() function reads the next line of the file, opening the file if necessary. The setfsent() function opens the file o... |
getgrent(3) -- Access group information in the user database
|
The getgrent(), getgrgid(), getgrnam(), setgrent(), endgrent(), and fgetgrent() functions may be used to access the basic group attributes. The setgrent() function opens the user database (if not alre... |
getgrent_r(3) -- Access group information in the user database
|
The getgrent(), getgrgid(), getgrnam(), setgrent(), endgrent(), and fgetgrent() functions may be used to access the basic group attributes. The setgrent() function opens the user database (if not alre... |
getgrgid(3) -- Access group information in the user database
|
The getgrent(), getgrgid(), getgrnam(), setgrent(), endgrent(), and fgetgrent() functions may be used to access the basic group attributes. The setgrent() function opens the user database (if not alre... |
getgrgid_r(3) -- Access group information in the user database
|
The getgrent(), getgrgid(), getgrnam(), setgrent(), endgrent(), and fgetgrent() functions may be used to access the basic group attributes. The setgrent() function opens the user database (if not alre... |
getgrnam(3) -- Access group information in the user database
|
The getgrent(), getgrgid(), getgrnam(), setgrent(), endgrent(), and fgetgrent() functions may be used to access the basic group attributes. The setgrent() function opens the user database (if not alre... |
getgrnam_r(3) -- Access group information in the user database
|
The getgrent(), getgrgid(), getgrnam(), setgrent(), endgrent(), and fgetgrent() functions may be used to access the basic group attributes. The setgrent() function opens the user database (if not alre... |
gethostbyaddr(3) -- Get a network host entry by address
|
The gethostbyaddr() routine returns a pointer to a structure of type hostent. Its members specify data obtained from either the local /etc/hosts file or one of the files distributed by DNS/BIND or NIS... |
gethostbyaddr_r(3) -- Get a network host entry by address
|
The gethostbyaddr() routine returns a pointer to a structure of type hostent. Its members specify data obtained from either the local /etc/hosts file or one of the files distributed by DNS/BIND or NIS... |
gethostbyname(3) -- Get a network host entry by name
|
The gethostbyname() function returns a pointer to a structure of type hostent. Its members specify data obtained from either the local /etc/hosts file or one of the files distributed by DNS/BIND or NI... |
gethostbyname_r(3) -- Get a network host entry by name
|
The gethostbyname() function returns a pointer to a structure of type hostent. Its members specify data obtained from either the local /etc/hosts file or one of the files distributed by DNS/BIND or NI... |
gethostent(3) -- Open a network host file
|
The gethostent() (get host entry) function reads the next line of the either the local /etc/hosts file or one of the files distributed by BIND or NIS, opening it if necessary, returning a hostent stru... |
gethostent_r(3) -- Open a network host file
|
The gethostent() (get host entry) function reads the next line of the either the local /etc/hosts file or one of the files distributed by BIND or NIS, opening it if necessary, returning a hostent stru... |
gethostsex(3) -- get the byte sex of the host machine
|
The gethostsex() function returns one of two constants, BIGENDIAN or LITTLEENDIAN, for the sex of the host machine. These constants are in sex.h. gethostsex(3) |
getipnodebyaddr(3) -- Get a network host entry by address
|
The use of this routine is deprecated. Use the getnameinfo(3) routine instead; it is also protocol-independent. The getipnodebyaddr() routine is an evolution of the gethostbyaddr() routine that enable... |
getipnodebyname(3) -- Get a network host entry by name for a specific address family
|
The use of this routine is deprecated. Use the getaddrinfo(3) routine instead; it is also protocol-independent. The getipnodebyname() routine is an evolution of the gethostbyname() routine that enable... |
getluid(3) -- Get or set the login UID (Enhanced Security)
|
The getluid() function gets the login UID associated with the process. The login UID is recorded with most audit events generated by the process, and is sometimes referred to as the audit UID (AUID). ... |
getmaxyx(3) -- Get Curses cursor and window coordinates
|
The getyx macro places the cursor position of the window into the two integer variables y and x. If win is a subwindow, the getparyx macro places the beginning coordinates of the subwindow (relative t... |
getmntinfo(3) -- Get information about mounted file systems
|
The getmntinfo() function returns an array of statfs structures describing each currently mounted file system (see the statfs() reference page). The getmntinfo() function takes a struct statfs **mntbu... |
getmntinfo_r(3) -- Get information about mounted file systems
|
The getmntinfo() function returns an array of statfs structures describing each currently mounted file system (see the statfs() reference page). The getmntinfo() function takes a struct statfs **mntbu... |
getnameinfo(3) -- Get a node name and service name for an address and port number
|
The getnameinfo() routine looks up an IP address and port number in a sockaddr structure specified by sa and returns node name and service name text strings in the buffers pointed to by the node and s... |
getnetbyaddr(3) -- Get a network entry by address
|
The getnetbyaddr() function returns a pointer to a structure of type netent. Its members specify data obtained from either the local /etc/networks file or the NIS distributed networks file. To determi... |
getnetbyaddr_r(3) -- Get a network entry by address
|
The getnetbyaddr() function returns a pointer to a structure of type netent. Its members specify data obtained from either the local /etc/networks file or the NIS distributed networks file. To determi... |
getnetbyname(3) -- Get a network entry by name
|
The getnetbyname() function returns a pointer to a structure of type netent. Its members specify data in fields from either the local /etc/networks file or the NIS distributed network database. To det... |
getnetbyname_r(3) -- Get a network entry by name
|
The getnetbyname() function returns a pointer to a structure of type netent. Its members specify data in fields from either the local /etc/networks file or the NIS distributed network database. To det... |
getnetent(3) -- Get a network entry
|
The getnetent() function retrieves network information by opening and sequentially reading either the local /etc/networks file or the NIS distributed networks file for the requested information. To de... |
getnetent_r(3) -- Get a network entry
|
The getnetent() function retrieves network information by opening and sequentially reading either the local /etc/networks file or the NIS distributed networks file for the requested information. To de... |
getnetgrent(3) -- Get network group entry
|
The innetgr() routine accesses the netgroup file and checks to see if the specified input parameters match an entry in the file. The routine returns 1 if it matches an entry, or 0 if it does not. Any ... |
getnetname(3) -- miscellaneous library routines for ONC remote procedure calls
|
The RPC routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the... |
getnstr(3) -- Get character strings from a Curses terminal keyboard
|
The effect of getstr is as though a series of calls to getch were made, until a newline or carriage return is received. The resulting value is placed in the area pointed to by the character pointer st... |
getnwstr(3) -- Get wchar_t character strings from a Curses terminal keyboard
|
The effect of getwstr is as though a series of calls to getwch were made, until a newline and carriage return is received. The resulting value is placed in the area pointed to by the wchar_t pointer w... |
getn_wstr(3) -- Get an array of wide characters from a Curses terminal keyboard
|
The effect of get_wstr is as though a series of calls to get_wch were made, until a newline, end-of-line, or endof-file character is processed. An end-of-file character is represented by WEOF, as defi... |
GetOperationalStatistics(3) -- Get operational values of a subservice (CDSA)
|
Obtain the current operational values of a subservice. The information is returned in a structure of type CSSM_CSP_OPERATIONAL_STATISTICS. This information includes login status and available storage ... |
getopt(3) -- Get option letters from the argument vector
|
The getopt() function parses argument lists. It returns the next option character in the argv parameter list that matches a character in the optstring parameter. If that option takes an argument, the ... |
getparyx(3) -- Get Curses cursor and window coordinates
|
The getyx macro places the cursor position of the window into the two integer variables y and x. If win is a subwindow, the getparyx macro places the beginning coordinates of the subwindow (relative t... |
getpass(3) -- Reads a password
|
The getpass() function opens the process' controlling terminal file, flushes output, disables echoing, and reads up to a newline character or an end-of-file (EOF) character. The terminal state is the... |
getprdfent(3) -- Manipulate system default database entry (Enhanced Security)
|
The getesdfent(), getesdfnam(), and copyesdfent() functions each return a pointer to an object with the following structure containing the separated-out fields of a line in the system default database... |
getprdfnam(3) -- Manipulate system default database entry (Enhanced Security)
|
The getesdfent(), getesdfnam(), and copyesdfent() functions each return a pointer to an object with the following structure containing the separated-out fields of a line in the system default database... |
getprfient(3) -- Manipulate file control database entry (Enhanced Security)
|
The getesfient(), getesfinam(), and copyesfient() functions each return a pointer to an object with the following structure containing the separated-out fields of a line in the file control database. ... |
getprfinam(3) -- Manipulate file control database entry (Enhanced Security)
|
The getesfient(), getesfinam(), and copyesfient() functions each return a pointer to an object with the following structure containing the separated-out fields of a line in the file control database. ... |
getproplist(3) -- gets the Extended File Attributes of a file
|
The getproplist() function gets the Extended File Attributes of a file pointed to by *path and places them in the Extended File Attribute buffer pointed to by nbytes. Which Extended File Attributes wi... |
getprotobyname(3) -- Get a protocol entry by protocol name
|
The getprotobyname() function returns a pointer to a structure of type protoent. Its members specify data in fields from a record line in either the local /etc/protocols file or the NIS network protoc... |
getprotobyname_r(3) -- Get a protocol entry by protocol name
|
The getprotobyname() function returns a pointer to a structure of type protoent. Its members specify data in fields from a record line in either the local /etc/protocols file or the NIS network protoc... |
getprotobynumber(3) -- Get a protocol entry by number
|
The getprotobynumber() function returns a pointer to a structure of type protoent. Its members specify data in fields from a record line in either the local /etc/protocols file or NIS distributed netw... |
getprotobynumber_r(3) -- Get a protocol entry by number
|
The getprotobynumber() function returns a pointer to a structure of type protoent. Its members specify data in fields from a record line in either the local /etc/protocols file or NIS distributed netw... |
getprotoent(3) -- Get a protocol entry
|
The getprotoent() (get protocol entry) function retrieves protocol information from either the local /etc/protocols file or the NIS distributed networks file for the requested information. To determin... |
getprotoent_r(3) -- Get a protocol entry
|
The getprotoent() (get protocol entry) function retrieves protocol information from either the local /etc/protocols file or the NIS distributed networks file for the requested information. To determin... |
getprpwent(3) -- Manipulate protected password database entry (Enhanced Security)
|
The getespwent(), getespwuid(), getespwnam(), and copyespwent() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the protected pa... |
getprpwnam(3) -- Manipulate protected password database entry (Enhanced Security)
|
The getespwent(), getespwuid(), getespwnam(), and copyespwent() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the protected pa... |
getprpwuid(3) -- Manipulate protected password database entry (Enhanced Security)
|
The getespwent(), getespwuid(), getespwnam(), and copyespwent() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the protected pa... |
getprtcent(3) -- Manipulate terminal control database entry (Enhanced Security)
|
The getestcent(), getestcnam(), and copyestcent() functions return a pointer to an object with the following structure containing the separated-out fields of an entry in the terminal control database.... |
getprtcnam(3) -- Manipulate terminal control database entry (Enhanced Security)
|
The getestcent(), getestcnam(), and copyestcent() functions return a pointer to an object with the following structure containing the separated-out fields of an entry in the terminal control database.... |
getpw(3) -- get name from uid
|
The getpw() routine has been superseded by getpwuid(). See getpwent(3). The getpw() routine searches the password file for the (numerical) uid, and fills in buf with the corresponding line; it returns... |
getpwent(3) -- Access user attribute information in the user database
|
The endpwent(), fgetpwent(), getpwent(), getpwnam(), getpwuid(), putpwent(), and setpwent() functions may be used to access the basic user attributes. The getpwent(), getpwnam(), and getpwuid() functi... |
getpwent_r(3) -- Access user attribute information in the user database
|
The endpwent(), fgetpwent(), getpwent(), getpwnam(), getpwuid(), putpwent(), and setpwent() functions may be used to access the basic user attributes. The getpwent(), getpwnam(), and getpwuid() functi... |
getpwnam(3) -- Access user attribute information in the user database
|
The endpwent(), fgetpwent(), getpwent(), getpwnam(), getpwuid(), putpwent(), and setpwent() functions may be used to access the basic user attributes. The getpwent(), getpwnam(), and getpwuid() functi... |
getpwnam_r(3) -- Access user attribute information in the user database
|
The endpwent(), fgetpwent(), getpwent(), getpwnam(), getpwuid(), putpwent(), and setpwent() functions may be used to access the basic user attributes. The getpwent(), getpwnam(), and getpwuid() functi... |
getpwuid(3) -- Access user attribute information in the user database
|
The endpwent(), fgetpwent(), getpwent(), getpwnam(), getpwuid(), putpwent(), and setpwent() functions may be used to access the basic user attributes. The getpwent(), getpwnam(), and getpwuid() functi... |
getpwuid_r(3) -- Access user attribute information in the user database
|
The endpwent(), fgetpwent(), getpwent(), getpwnam(), getpwuid(), putpwent(), and setpwent() functions may be used to access the basic user attributes. The getpwent(), getpwnam(), and getpwuid() functi... |
getrpcbyname(3) -- get rpc entry
|
The getrpcent(), getrpcbynumber(), and getrpcbyname() functions return pointers to an object with the following structure containing the broken-out fields of a line in the rpc database: struct rpcent ... |
getrpcbynumber(3) -- get rpc entry
|
The getrpcent(), getrpcbynumber(), and getrpcbyname() functions return pointers to an object with the following structure containing the broken-out fields of a line in the rpc database: struct rpcent ... |
getrpcent(3) -- get rpc entry
|
The getrpcent(), getrpcbynumber(), and getrpcbyname() functions return pointers to an object with the following structure containing the broken-out fields of a line in the rpc database: struct rpcent ... |
getrpcport(3) -- get RPC port number
|
The getrpcport() routine returns the port number for version versnum of the RPC program prognam running on host and using protocol proto. It returns 0 if it cannot contact the portmapper or if prognam... |
gets(3) -- Get a string from a stream
|
The gets() function reads bytes from the standard input stream, stdin, into the array pointed to by the string parameter. Data is read until a newline character is read or an end-of-file condition is ... |
getservbyname(3) -- Get a service entry by name
|
The getservbyname() function returns a pointer to a structure of type servent. Its members specify data in fields from a record line in either the local /etc/services file or the NIS distributed netwo... |
getservbyname_r(3) -- Get a service entry by name
|
The getservbyname() function returns a pointer to a structure of type servent. Its members specify data in fields from a record line in either the local /etc/services file or the NIS distributed netwo... |
getservbyport(3) -- Get a service entry by port number
|
The getservbyport() function returns a pointer to a structure of type servent. Its members specify data in fields from a record line in either the local /etc/services file or the NIS distributed netwo... |
getservbyport_r(3) -- Get a service entry by port number
|
The getservbyport() function returns a pointer to a structure of type servent. Its members specify data in fields from a record line in either the local /etc/services file or the NIS distributed netwo... |
getservent(3) -- Get a services file entry from the /etc/services file.
|
The getservent() (get service entry) function opens and reads the next line of either the local /etc/services file or the NIS distributed services file for the requested information. To determine whic... |
getservent_r(3) -- Get a services file entry from the /etc/services file.
|
The getservent() (get service entry) function opens and reads the next line of either the local /etc/services file or the NIS distributed services file for the requested information. To determine whic... |
getstr(3) -- Get character strings from a Curses terminal keyboard
|
The effect of getstr is as though a series of calls to getch were made, until a newline or carriage return is received. The resulting value is placed in the area pointed to by the character pointer st... |
getsubopt(3) -- Parse suboption arguments from a command line
|
The getsubopt() function parses suboption arguments in a option argument that was initially parsed by the getopt() function. These suboption arguments must be separated by commas and may consist of ei... |
getsvc(3) -- Get a pointer to the svcinfo structure.
|
The getsvc() function retrieves information from the system about the svcinfo structure by returning a pointer to the structure. This structure is initialized the first time a getsvc() call is made. T... |
gettimer(3) -- Get value of a per-process timer
|
The gettimer() function gets the current value of a perprocess timer. |
GetTimeValue(3) -- Get a CSP time value (CDSA)
|
This function returns a time value maintained by a CSP. This feature will be supported primarily by hardware tokens with an onboard real time clock. |
getttyent(3) -- Get a /etc/securettys file entry
|
The getttyent() and getttynam() functions each return a pointer to an object that has the following ttyent fields. These fields describe a line from the secure tty description file. The members of the... |
getttyent_r(3) -- Get a /etc/securettys file entry
|
The getttyent() and getttynam() functions each return a pointer to an object that has the following ttyent fields. These fields describe a line from the secure tty description file. The members of the... |
getttynam(3) -- Get a /etc/securettys file entry
|
The getttyent() and getttynam() functions each return a pointer to an object that has the following ttyent fields. These fields describe a line from the secure tty description file. The members of the... |
getttynam_r(3) -- Get a /etc/securettys file entry
|
The getttyent() and getttynam() functions each return a pointer to an object that has the following ttyent fields. These fields describe a line from the secure tty description file. The members of the... |
gettxt(3) -- Retrieves a text string from a message catalog
|
A message catalog contains text strings that can be accessed by programs. Message catalogs are created using the gencat and mkcatdefs commands. The gettxt() function searches a message catalog for a s... |
getusershell(3) -- Get the names of legal user shells
|
The getusershell() function returns a pointer to a string that contains the name of a legal user shell as defined by the system manager in the /etc/shells file. If the /etc/shells file does not exist,... |
getusershell_r(3) -- Get the names of legal user shells
|
The getusershell() function returns a pointer to a string that contains the name of a legal user shell as defined by the system manager in the /etc/shells file. If the /etc/shells file does not exist,... |
getutent(3) -- Access utmp file entries
|
The getutent(), getutid(), and getutline() functions return a pointer to a utmp structure. The getutent() function reads the next entry from a file similar to the utmp file. If the file is not already... |
getutent_r(3) -- Access utmp file entries
|
The getutent(), getutid(), and getutline() functions return a pointer to a utmp structure. The getutent() function reads the next entry from a file similar to the utmp file. If the file is not already... |
getutid(3) -- Access utmp file entries
|
The getutent(), getutid(), and getutline() functions return a pointer to a utmp structure. The getutent() function reads the next entry from a file similar to the utmp file. If the file is not already... |
getutid_r(3) -- Access utmp file entries
|
The getutent(), getutid(), and getutline() functions return a pointer to a utmp structure. The getutent() function reads the next entry from a file similar to the utmp file. If the file is not already... |
getutline(3) -- Access utmp file entries
|
The getutent(), getutid(), and getutline() functions return a pointer to a utmp structure. The getutent() function reads the next entry from a file similar to the utmp file. If the file is not already... |
getutline_r(3) -- Access utmp file entries
|
The getutent(), getutid(), and getutline() functions return a pointer to a utmp structure. The getutent() function reads the next entry from a file similar to the utmp file. If the file is not already... |
getutxent(3) -- Access user accounting database functions
|
These functions provide access to the user accounting database. The getutxent() function reads the next entry from the user accounting database. If the database is not already open, getutxent() opens ... |
getutxid(3) -- Access user accounting database functions
|
These functions provide access to the user accounting database. The getutxent() function reads the next entry from the user accounting database. If the database is not already open, getutxent() opens ... |
getutxline(3) -- Access user accounting database functions
|
These functions provide access to the user accounting database. The getutxent() function reads the next entry from the user accounting database. If the database is not already open, getutxent() opens ... |
getvfsbyname(3) -- Get the virtual file system type number
|
The getvfsbyname() function returns the type number of the virtual system type identified by typename. |
getvfsbynumber(3) -- Get the virtual file system type name
|
The getvfsbynumber() function returns the symbolic name for the virtual file system type identified by typeno. The type number of a mounted file system can be determined with the statfs() function. |
getw(3) -- Get a byte or word from an input stream
|
The getc() function returns the next byte from the input specified by the stream parameter and moves the file pointer, if defined, ahead one byte in stream. The getc() function may be a macro (dependi... |
getwc(3) -- Get a wide character from an input stream
|
The fgetwc() function gets the next character from the input stream specified by the stream parameter, converts it to a wide-character code, and advances the associated file position indicator for the... |
getwch(3) -- Get (or push back) wchar_t characters from a Curses terminal keyboard
|
The getwch, wgetwch, mvgetwch, and mvwgetwch routines read an EUC character from the terminal associated with the Curses window, transform the character into a wchar_t character, and return the wchar_... |
getwchar(3) -- Get a wide character from an input stream
|
The fgetwc() function gets the next character from the input stream specified by the stream parameter, converts it to a wide-character code, and advances the associated file position indicator for the... |
getwc_unlocked(3) -- Get a wide character from an input stream
|
The fgetwc() function gets the next character from the input stream specified by the stream parameter, converts it to a wide-character code, and advances the associated file position indicator for the... |
getwd(3) -- Get current directory pathname
|
The getwd() function determines the absolute pathname of the current directory, then copies that pathname into the array pointed to by the path_name parameter. The maximum pathname length, in characte... |
getwin(3) -- Miscellaneous utility routines for Curses
|
The unctrl macro generates a character string that is a printable representation of the character c. Control characters are displayed in the ^X notation. Printing characters are displayed as is. The w... |
getwstr(3) -- Get wchar_t character strings from a Curses terminal keyboard
|
The effect of getwstr is as though a series of calls to getwch were made, until a newline and carriage return is received. The resulting value is placed in the area pointed to by the wchar_t pointer w... |
getyx(3) -- Get Curses cursor and window coordinates
|
The getyx macro places the cursor position of the window into the two integer variables y and x. If win is a subwindow, the getparyx macro places the beginning coordinates of the subwindow (relative t... |
get_crypt_name(3) -- determine the encryption types available (Enhanced Security)
|
The get_num_crypts() function returns the number of encryption algorithms which the current system supports. This value is non-negative, and at least four. The get_crypt_name() function returns a poin... |
get_myaddress(3) -- miscellaneous library routines for ONC remote procedure calls
|
The RPC routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the... |
get_num_crypts(3) -- determine the encryption types available (Enhanced Security)
|
The get_num_crypts() function returns the number of encryption algorithms which the current system supports. This value is non-negative, and at least four. The get_crypt_name() function returns a poin... |
get_proplist_entry(3) -- initializes pointers to the corresponding entries in an Extended File Attribute buffer
|
The get_proplist_entry() function initializes the **name, **value_size, and **value parameters with the corresponding values in the Extended File Attribute buffer pointed to by **bufptr. The function ... |
get_seed_es(3) -- Obtain a drand48 seed value for an extended profile (Enhanced Security)
|
Returns a hashed value of the protected profile for use in random-number generation, such as that used with lrand48 or drand48 and so forth. The get_seed_es() function is used by the login and passwd ... |
get_wch(3) -- Get (or push back) a wide character from Curses terminal keyboard
|
The get_wch, wget_wch, mvget_wch, and mvwget_wch functions read a character from the terminal associated with the current or specified window. In no-delay mode, if no input is waiting, these functions... |
get_wstr(3) -- Get an array of wide characters from a Curses terminal keyboard
|
The effect of get_wstr is as though a series of calls to get_wch were made, until a newline, end-of-line, or endof-file character is processed. An end-of-file character is represented by WEOF, as defi... |
glAccum(3) -- operate on the accumulation buffer
|
The accumulation buffer is an extended-range color buffer. Images are not rendered into it. Rather, images rendered into one of the color buffers are added to the contents of the accumulation buffer a... |
glAlphaFunc(3) -- specify the alpha test function
|
The alpha test discards fragments depending on the outcome of a comparison between an incoming fragment's alpha value and a constant reference value. glAlphaFunc() specifies the reference value and t... |
glAreTexturesResident(3) -- determine if textures are loaded in texture memory
|
GL establishes a ``working set'' of textures that are resident in texture memory. These textures can be bound to a texture target much more efficiently than textures that are not resident. glAreText... |
glArrayElement(3) -- render a vertex using the specified vertex array element
|
glArrayElement() commands are used within glBegin()/glEnd() pairs to specify vertex and attribute data for point, line, and polygon primitives. If GL_VERTEX_ARRAY is enabled when glArrayElement() is c... |
glBegin(3) -- delimit the vertices of a primitive or a group of like primglBeginitives
|
glBegin() and glEnd() delimit the vertices that define a primitive or a group of like primitives. glBegin() accepts a single argument that specifies in which of ten ways the vertices are interpreted. ... |
glBindTexture(3) -- bind a named texture to a texturing target
|
glBindTexture() lets you create or use a named texture. Calling glBindTexture() with target set to GL_TEXTURE_1D, GL_TEXTURE_2D, GL_TEXTURE_3D and texture set to the name of the newtexture binds the t... |
glBitmap(3) -- draw a bitmap
|
A bitmap is a binary image. When drawn, the bitmap is positioned relative to the current raster position, and frame buffer pixels corresponding to 1's in the bitmap are written using the current rast... |
glBlendFunc(3) -- specify pixel arithmetic
|
In RGBA mode, pixels can be drawn using a function that blends the incoming (source) RGBA values with the RGBA values that are already in the frame buffer (the destination values). Blending is initial... |
glCallList(3) -- execute a display list
|
glCallList() causes the named display list to be executed. The commands saved in the display list are executed in order, just as if they were called without using a display list. If list has not been ... |
glCallLists(3) -- execute a list of display lists
|
glCallLists() causes each display list in the list of names passed as lists to be executed. As a result, the commands saved in each display list are executed in order, just as if they were called with... |
glClear(3) -- clear buffers to preset values
|
glClear() sets the bitplane area of the window to values previously selected by glClearColor(), glClearIndex(), glClearDepth(), glClearStencil(), and glClearAccum(). Multiple color buffers can be clea... |
glClearAccum(3) -- specify clear values for the accumulation buffer
|
glClearAccum() specifies the red, green, blue, and alpha values used by glClear() to clear the accumulation buffer. Values specified by glClearAccum() are clamped to the range [-1, 1]. |
glClearColor(3) -- specify clear values for the color buffers
|
glClearColor() specifies the red, green, blue, and alpha values used by glClear() to clear the color buffers. Values specified by glClearColor() are clamped to the range [0, 1]. |
glClearDepth(3) -- specify the clear value for the depth buffer
|
glClearDepth() specifies the depth value used by glClear() to clear the depth buffer. Values specified by glClearDepth() are clamped to the range [0, 1]. |
glClearIndex(3) -- specify the clear value for the color index buffers
|
glClearIndex() specifies the index used by glClear() to clear the color index buffers. c is not clamped. Rather, c is converted to a fixed-point value with unspecified precision to the right of the bi... |
glClearStencil(3) -- specify the clear value for the stencil buffer
|
glClearStencil() specifies the index used by glClear() to clear the stencil buffer. s is masked with 2 sup m-1, where m is the number of bits in the stencil buffer. |
glClipPlane(3) -- specify a plane against which all geometry is clipped
|
Geometry is always clipped against the boundaries of a six-plane frustum in x, y, and z. glClipPlane allows the specification of additional planes, not necessarily perpendicular to the x, y, or z axis... |
glColor(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor3b(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor3bv(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor3d(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor3dv(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor3f(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor3fv(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor3i(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor3iv(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor3s(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor3sv(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor3ub(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor3ubv(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor3ui(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor3uiv(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor3us(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor3usv(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor4b(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor4bv(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor4d(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor4dv(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor4f(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor4fv(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor4i(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor4iv(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor4s(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor4sv(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor4ub(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor4ubv(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor4ui(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor4uiv(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor4us(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColor4usv(3) -- set the current color
|
The GL stores both a current single-valued color index and a current four-valued RGBA color. glColor() sets a new four-valued RGBA color. glColor() has two major variants: glColor3() and glColor4(). g... |
glColorMask(3) -- enable and disable writing of frame buffer color components
|
glColorMask() specifies whether the individual color components in the frame buffer can or cannot be written. If red is GL_FALSE, for example, no change is made to the red component of any pixel in an... |
glColorMaterial(3) -- cause a material color to track the current color
|
glColorMaterial() specifies which material parameters track the current color. When GL_COLOR_MATERIAL is enabled, the material parameter or parameters specified by mode, of the material or materials s... |
glColorPointer(3) -- define an array of colors
|
glColorPointer() specifies the location and data of an array of color components to use when rendering. size specifies the number of components per color, and must be 3 or 4. type specifies the data t... |
glCopyPixels(3) -- copy pixels in the frame buffer
|
glCopyPixels() copies a screen-aligned rectangle of pixels from the specified frame buffer location to a region relative to the current raster position. Its operation is well defined only if the entir... |
glCopyTexImage1D(3) -- copy pixels into a 1D texture image
|
glCopyTexImage1D() defines a one-dimensional texture image with pixels from the current GL_READ_BUFFER. The screen-aligned pixel row with left corner at (x, y) and with a length of width+2*border defi... |
glCopyTexImage2D(3) -- copy pixels into a 2D texture image
|
glCopyTexImage2D defines a two-dimensional texture image with pixels from the current GL_READ_BUFFER. The screen-aligned pixel rectangle with lower left corner at (x, y) and with a width of width+2*bo... |
glCopyTexSubImage1D(3) -- copy a one-dimensional texture subimage
|
glCopyTexSubImage1D() replaces a portion of a one-dimensional texture image with pixels from the current GL_READ_BUFFER (rather than from main memory, as is the case for glTexSubImage1D). The screen-a... |
glCopyTexSubImage2D(3) -- copy a two-dimensional texture subimage
|
glCopyTexSubImage2D() replaces a rectangular portion of a two-dimensional texture image with pixels from the current GL_READ_BUFFER (rather than from main memory, as is the case for glTexSubImage2D())... |
glCopyTexSubImage3D(3) -- copy a three-dimensional texture subimage
|
glCopyTexSubImage3D() replaces a rectangular portion of a three-dimensional texture image with pixels from the current GL_READ_BUFFER (rather than from main memory, as is the case for glTexSubImage3D(... |
glCullFace(3) -- specify whether front- or back-facing facets can be culled
|
glCullFace() specifies whether front- or back-facing facets are culled (as specified by mode) when facet culling is enabled. Facet culling is initially disabled. To enable and disable facet culling, c... |
glDeleteLists(3) -- delete a contiguous group of display lists
|
glDeleteLists() causes a contiguous group of display lists to be deleted. list is the name of the first display list to be deleted, and range is the number of display lists to delete. All display list... |
glDeleteTextures(3) -- delete named textures
|
glDeleteTextures() deletes n textures named by the elements of the array textures. After a texture is deleted, it has no contents or dimensionality, and its name is free for reuse (for example by glGe... |
glDepthFunc(3) -- specify the value used for depth buffer comparisons
|
glDepthFunc() specifies the function used to compare each incoming pixel depth value with the depth value present in the depth buffer. The comparison is performed only if depth testing is enabled. (Se... |
glDepthMask(3) -- enable or disable writing into the depth buffer
|
glDepthMask() specifies whether the depth buffer is enabled for writing. If option is GL_FALSE, depth buffer writing is disabled. Otherwise, it is enabled. Initially, depth buffer writing is enabled. |
glDepthRange(3) -- specify mapping of depth values from normalized device coordinates to window coordinates
|
After clipping and division by w, depth coordinates range from -1 to 1, corresponding to the near and far clipping planes. glDepthRange() specifies a linear mapping of the normalized depth coordinates... |
glDisable(3) -- enable or disable server-side GL capabilities
|
glEnable() and glDisable() enable and disable various capabilities. Use glIsEnabled() or glGet() to determine the current setting of any capability. The initial value for each capability with the exce... |
glDisableClientState(3) -- enable or disable
|
glEnableClientState() and glDisableClientState() enable or disable individual client-side capabilities. By default, all client-side capabilities are disabled. Both glEnableClientState() and glDisableC... |
glDrawArrays(3) -- render primitives from array data
|
glDrawArrays() specifies multiple geometric primitives with very few subroutine calls. Instead of calling a GL procedure to pass each individual vertex, normal, texture coordinate, edge option, or col... |
glDrawBuffer(3) -- specify which color buffers are to be drawn into
|
When colors are written to the frame buffer, they are written into the color buffers specified by glDrawBuffer(). The specifications are as follows: No color buffers are written. Only the front left c... |
glDrawElements(3) -- render primitives from array data
|
glDrawElements() specifies multiple geometric primitives with very few subroutine calls. Instead of calling a GL function to pass each individual vertex, normal, texture coordinate, edge option, or co... |
glDrawPixels(3) -- write a block of pixels to the frame buffer
|
glDrawPixels() reads pixel data from memory and writes it into the frame buffer relative to the current raster position, provided that the raster position is valid. Use glRasterPos() to set the curren... |
glDrawRangeElements(3) -- render primitives from array data
|
glDrawRangeElements() is a restricted form of glDrawElements(). mode, start, end, and count match the corresponding arguments to glDrawElements(), with the additional constraint that all values in the... |
glEdgeFlag(3) -- option edges as either boundary or nonboundary
|
Each vertex of a polygon, separate triangle, or separate quadrilateral specified between a glBegin()/glEnd() pair is marked as the start of either a boundary or nonboundary edge. If the current edge o... |
glEdgeFlagPointer(3) -- define an array of edge options
|
glEdgeFlagPointer() specifies the location and data of an array of boolean edge options to use when rendering. stride specifies the byte stride from one edge option to the next allowing vertexes and a... |
glEdgeFlagv(3) -- option edges as either boundary or nonboundary
|
Each vertex of a polygon, separate triangle, or separate quadrilateral specified between a glBegin()/glEnd() pair is marked as the start of either a boundary or nonboundary edge. If the current edge o... |
glEnable(3) -- enable or disable server-side GL capabilities
|
glEnable() and glDisable() enable and disable various capabilities. Use glIsEnabled() or glGet() to determine the current setting of any capability. The initial value for each capability with the exce... |
glEnableClientState(3) -- enable or disable
|
glEnableClientState() and glDisableClientState() enable or disable individual client-side capabilities. By default, all client-side capabilities are disabled. Both glEnableClientState() and glDisableC... |
glEnd(3) -- delimit the vertices of a primitive or a group of like primglBeginitives
|
glBegin() and glEnd() delimit the vertices that define a primitive or a group of like primitives. glBegin() accepts a single argument that specifies in which of ten ways the vertices are interpreted. ... |
glEndList(3) -- create or replace a display list
|
Display lists are groups of GL commands that have been stored for subsequent execution. Display lists are created with glNewList(). All subsequent commands are placed in the display list, in the order... |
glEvalCoord(3) -- evaluate enabled one- and twodimensional maps
|
glEvalCoord1() evaluates enabled one-dimensional maps at argument u. glEvalCoord2() does the same for two-dimensional maps using two domain values, u and v. To define a map, call glMap1() and glMap2()... |
glEvalCoord1d(3) -- evaluate enabled one- and twodimensional maps
|
glEvalCoord1() evaluates enabled one-dimensional maps at argument u. glEvalCoord2() does the same for two-dimensional maps using two domain values, u and v. To define a map, call glMap1() and glMap2()... |
glEvalCoord1dv(3) -- evaluate enabled one- and twodimensional maps
|
glEvalCoord1() evaluates enabled one-dimensional maps at argument u. glEvalCoord2() does the same for two-dimensional maps using two domain values, u and v. To define a map, call glMap1() and glMap2()... |
glEvalCoord1f(3) -- evaluate enabled one- and twodimensional maps
|
glEvalCoord1() evaluates enabled one-dimensional maps at argument u. glEvalCoord2() does the same for two-dimensional maps using two domain values, u and v. To define a map, call glMap1() and glMap2()... |
glEvalCoord1fv(3) -- evaluate enabled one- and twodimensional maps
|
glEvalCoord1() evaluates enabled one-dimensional maps at argument u. glEvalCoord2() does the same for two-dimensional maps using two domain values, u and v. To define a map, call glMap1() and glMap2()... |
glEvalCoord2d(3) -- evaluate enabled one- and twodimensional maps
|
glEvalCoord1() evaluates enabled one-dimensional maps at argument u. glEvalCoord2() does the same for two-dimensional maps using two domain values, u and v. To define a map, call glMap1() and glMap2()... |
glEvalCoord2dv(3) -- evaluate enabled one- and twodimensional maps
|
glEvalCoord1() evaluates enabled one-dimensional maps at argument u. glEvalCoord2() does the same for two-dimensional maps using two domain values, u and v. To define a map, call glMap1() and glMap2()... |
glEvalCoord2f(3) -- evaluate enabled one- and twodimensional maps
|
glEvalCoord1() evaluates enabled one-dimensional maps at argument u. glEvalCoord2() does the same for two-dimensional maps using two domain values, u and v. To define a map, call glMap1() and glMap2()... |
glEvalCoord2fv(3) -- evaluate enabled one- and twodimensional maps
|
glEvalCoord1() evaluates enabled one-dimensional maps at argument u. glEvalCoord2() does the same for two-dimensional maps using two domain values, u and v. To define a map, call glMap1() and glMap2()... |
glEvalMesh(3) -- compute a one- or two-dimensional grid of points or lines
|
glMapGrid() and glEvalMesh() are used in tandem to efficiently generate and evaluate a series of evenly-spaced map domain values. glEvalMesh() steps through the integer domain of a one- or two-dimensi... |
glEvalMesh2(3) -- compute a one- or two-dimensional grid of points or lines
|
glMapGrid() and glEvalMesh() are used in tandem to efficiently generate and evaluate a series of evenly-spaced map domain values. glEvalMesh() steps through the integer domain of a one- or two-dimensi... |
glEvalPoint(3) -- generate and evaluate a single point in a mesh
|
glMapGrid() and glEvalMesh() are used in tandem to efficiently generate and evaluate a series of evenly spaced map domain values. glEvalPoint() can be used to evaluate a single grid point in the same ... |
glEvalPoint1(3) -- generate and evaluate a single point in a mesh
|
glMapGrid() and glEvalMesh() are used in tandem to efficiently generate and evaluate a series of evenly spaced map domain values. glEvalPoint() can be used to evaluate a single grid point in the same ... |
glEvalPoint2(3) -- generate and evaluate a single point in a mesh
|
glMapGrid() and glEvalMesh() are used in tandem to efficiently generate and evaluate a series of evenly spaced map domain values. glEvalPoint() can be used to evaluate a single grid point in the same ... |
glFeedbackBuffer(3) -- controls feedback mode
|
The glFeedbackBuffer() function controls feedback. Feedback, like selection, is a GL mode. The mode is selected by calling glRenderMode() with GL_FEEDBACK. When the GL is in feedback mode, no pixels a... |
glFinish(3) -- block until all GL execution is complete
|
glFinish() does not return until the effects of all previously called GL commands are complete. Such effects include all changes to GL state, all changes to connection state, and all changes to the fr... |
glFlush(3) -- force execution of GL commands in finite time
|
Different GL implementations buffer commands in several different locations, including network buffers and the graphics accelerator itself. glFlush() empties all of these buffers, causing all issued c... |
glFog(3) -- specify fog parameters
|
Fog is initially disabled. While enabled, fog affects rasterized geometry, bitmaps, and pixel blocks, but not buffer clear operations. To enable and disable fog, call glEnable() and glDisable() with a... |
glFogf(3) -- specify fog parameters
|
Fog is initially disabled. While enabled, fog affects rasterized geometry, bitmaps, and pixel blocks, but not buffer clear operations. To enable and disable fog, call glEnable() and glDisable() with a... |
glFogfv(3) -- specify fog parameters
|
Fog is initially disabled. While enabled, fog affects rasterized geometry, bitmaps, and pixel blocks, but not buffer clear operations. To enable and disable fog, call glEnable() and glDisable() with a... |
glFogi(3) -- specify fog parameters
|
Fog is initially disabled. While enabled, fog affects rasterized geometry, bitmaps, and pixel blocks, but not buffer clear operations. To enable and disable fog, call glEnable() and glDisable() with a... |
glFogiv(3) -- specify fog parameters
|
Fog is initially disabled. While enabled, fog affects rasterized geometry, bitmaps, and pixel blocks, but not buffer clear operations. To enable and disable fog, call glEnable() and glDisable() with a... |
glFrontFace(3) -- define front- and back-facing polygons
|
In a scene composed entirely of opaque closed surfaces, back-facing polygons are never visible. Eliminating these invisible polygons has the obvious benefit of speeding up the rendering of the image. ... |
glFrustum(3) -- multiply the current matrix by a perspective matrix
|
glFrustum() describes a perspective matrix that produces a perspective projection. The current matrix (see glMatrixMode()) is multiplied by this matrix and the result replaces the current matrix, as i... |
glGenLists(3) -- generate a contiguous set of empty display lists
|
glGenLists() has one argument, range. It returns an integer n such that range contiguous empty display lists, named n, n+1, ..., n+range -1, are created. If range is 0, if there is no group of range c... |
glGenTextures(3) -- generate texture names
|
glGenTextures() returns n texture names in textures. There is no guarantee that the names form a contiguous set of integers; however, it is guaranteed that none of the returned names was in use immedi... |
glGet(3) -- return the value or values of a selected parameter
|
These four commands return values for simple state variables in GL. pname is a symbolic constant indicating the state variable to be returned, and params is a pointer to an array of the indicated type... |
glGetBooleanv(3) -- return the value or values of a selected parameter
|
These four commands return values for simple state variables in GL. pname is a symbolic constant indicating the state variable to be returned, and params is a pointer to an array of the indicated type... |
glGetClipPlane(3) -- return the coefficients of the specified clipping plane
|
glGetClipPlane() returns in equation the four coefficients of the plane equation for plane. |
glGetDoublev(3) -- return the value or values of a selected parameter
|
These four commands return values for simple state variables in GL. pname is a symbolic constant indicating the state variable to be returned, and params is a pointer to an array of the indicated type... |
glGetError(3) -- return error information
|
glGetError() returns the value of the error option. Each detectable error is assigned a numeric code and symbolic name. When an error occurs, the error option is set to the appropriate error code valu... |
glGetFloatv(3) -- return the value or values of a selected parameter
|
These four commands return values for simple state variables in GL. pname is a symbolic constant indicating the state variable to be returned, and params is a pointer to an array of the indicated type... |
glGetIntegerv(3) -- return the value or values of a selected parameter
|
These four commands return values for simple state variables in GL. pname is a symbolic constant indicating the state variable to be returned, and params is a pointer to an array of the indicated type... |
glGetLight(3) -- return light source parameter values
|
glGetLight() returns in params the value or values of a light source parameter. light names the light and is a symbolic name of the form GL_LIGHTi for 0 <= i < GL_MAX_LIGHTS, where GL_MAX_LIGHTS is an... |
glGetLightfv(3) -- return light source parameter values
|
glGetLight() returns in params the value or values of a light source parameter. light names the light and is a symbolic name of the form GL_LIGHTi for 0 <= i < GL_MAX_LIGHTS, where GL_MAX_LIGHTS is an... |
glGetLightiv(3) -- return light source parameter values
|
glGetLight() returns in params the value or values of a light source parameter. light names the light and is a symbolic name of the form GL_LIGHTi for 0 <= i < GL_MAX_LIGHTS, where GL_MAX_LIGHTS is an... |
glGetMap(3) -- return evaluator parameters
|
glMap1() and glMap2() define evaluators. glGetMap() returns evaluator parameters. target chooses a map, query selects a specific parameter, and v points to storage where the values will be returned. T... |
glGetMapdv(3) -- return evaluator parameters
|
glMap1() and glMap2() define evaluators. glGetMap() returns evaluator parameters. target chooses a map, query selects a specific parameter, and v points to storage where the values will be returned. T... |
glGetMapfv(3) -- return evaluator parameters
|
glMap1() and glMap2() define evaluators. glGetMap() returns evaluator parameters. target chooses a map, query selects a specific parameter, and v points to storage where the values will be returned. T... |
glGetMapiv(3) -- return evaluator parameters
|
glMap1() and glMap2() define evaluators. glGetMap() returns evaluator parameters. target chooses a map, query selects a specific parameter, and v points to storage where the values will be returned. T... |
glGetMaterial(3) -- return material parameters
|
glGetMaterial() returns in params the value or values of parameter pname of material face. Six parameters are defined: params returns four integer or floating-point values representing the ambient ref... |
glGetMaterialfv(3) -- return material parameters
|
glGetMaterial() returns in params the value or values of parameter pname of material face. Six parameters are defined: params returns four integer or floating-point values representing the ambient ref... |
glGetMaterialiv(3) -- return material parameters
|
glGetMaterial() returns in params the value or values of parameter pname of material face. Six parameters are defined: params returns four integer or floating-point values representing the ambient ref... |
glGetPixelMap(3) -- return the specified pixel map
|
See the glPixelMap() reference page for a description of the acceptable values for the map parameter. glGetPixelMap() returns in values the contents of the pixel map specified in map. Pixel maps are u... |
glGetPixelMapfv(3) -- return the specified pixel map
|
See the glPixelMap() reference page for a description of the acceptable values for the map parameter. glGetPixelMap() returns in values the contents of the pixel map specified in map. Pixel maps are u... |
glGetPixelMapuiv(3) -- return the specified pixel map
|
See the glPixelMap() reference page for a description of the acceptable values for the map parameter. glGetPixelMap() returns in values the contents of the pixel map specified in map. Pixel maps are u... |
glGetPixelMapusv(3) -- return the specified pixel map
|
See the glPixelMap() reference page for a description of the acceptable values for the map parameter. glGetPixelMap() returns in values the contents of the pixel map specified in map. Pixel maps are u... |
glGetPointerv(3) -- return the address of the specified pointer
|
glGetPointerv() returns pointer information. pname is a symbolic constant indicating the pointer to be returned, and params is a pointer to a location in which to place the returned data. |
glGetPolygonStipple(3) -- return the polygon stipple pattern
|
glGetPolygonStipple() returns to mask a 32 times 32 polygon stipple pattern. The pattern is packed into memory as if glReadPixels() with both height and width of 32, type of GL_BITMAP, and format of G... |
glGetString(3) -- return a string describing the current GL connection
|
glGetString() returns a pointer to a static string describing some aspect of the current GL connection. name can be one of the following: Returns the company responsible for this GL implementation. Th... |
glGetTexEnv(3) -- return texture environment parameters
|
glGetTexEnv() returns in params selected values of a texture environment that was specified with glTexEnv(). target specifies a texture environment. Currently, only one texture environment is defined ... |
glGetTexEnvfv(3) -- return texture environment parameters
|
glGetTexEnv() returns in params selected values of a texture environment that was specified with glTexEnv(). target specifies a texture environment. Currently, only one texture environment is defined ... |
glGetTexEnviv(3) -- return texture environment parameters
|
glGetTexEnv() returns in params selected values of a texture environment that was specified with glTexEnv(). target specifies a texture environment. Currently, only one texture environment is defined ... |
glGetTexGen(3) -- return texture coordinate generation parameters
|
glGetTexGen() returns in params selected parameters of a texture coordinate generation function that was specified using glTexGen(). coord names one of the (s, t, r, q) texture coordinates, using the ... |
glGetTexGendfv(3) -- return texture coordinate generation parameters
|
glGetTexGen() returns in params selected parameters of a texture coordinate generation function that was specified using glTexGen(). coord names one of the (s, t, r, q) texture coordinates, using the ... |
glGetTexGendv(3) -- return texture coordinate generation parameters
|
glGetTexGen() returns in params selected parameters of a texture coordinate generation function that was specified using glTexGen(). coord names one of the (s, t, r, q) texture coordinates, using the ... |
glGetTexGeniv(3) -- return texture coordinate generation parameters
|
glGetTexGen() returns in params selected parameters of a texture coordinate generation function that was specified using glTexGen(). coord names one of the (s, t, r, q) texture coordinates, using the ... |
glGetTexImage(3) -- return a texture image
|
glGetTexImage() returns a texture image into pixels. target specifies whether the desired texture image is one specified by glTexImage1D() (GL_TEXTURE_1D), glTexImage2D() (GL_TEXTURE_2D), or glTexImag... |
glGetTexLevelParameter(3) -- return texture parameter values for a specific level of detail
|
glGetTexLevelParameter() returns in params texture parameter values for a specific level-of-detail value, specified as level. target defines the target texture, either GL_TEXTURE_1D, GL_TEXTURE_2D, GL... |
glGetTexLevelParameterfv(3) -- return texture parameter values for a specific level of detail
|
glGetTexLevelParameter() returns in params texture parameter values for a specific level-of-detail value, specified as level. target defines the target texture, either GL_TEXTURE_1D, GL_TEXTURE_2D, GL... |
glGetTexLevelParameteriv(3) -- return texture parameter values for a specific level of detail
|
glGetTexLevelParameter() returns in params texture parameter values for a specific level-of-detail value, specified as level. target defines the target texture, either GL_TEXTURE_1D, GL_TEXTURE_2D, GL... |
glGetTexParameter(3) -- return texture parameter values
|
glGetTexParameter() returns in params the value or values of the texture parameter specified as pname. target defines the target texture, either GL_TEXTURE_1D, GL_TEXTURE_2D, or GL_TEXTURE_3D to speci... |
glGetTexParameterfv(3) -- return texture parameter values
|
glGetTexParameter() returns in params the value or values of the texture parameter specified as pname. target defines the target texture, either GL_TEXTURE_1D, GL_TEXTURE_2D, or GL_TEXTURE_3D to speci... |
glGetTexParameteriv(3) -- return texture parameter values
|
glGetTexParameter() returns in params the value or values of the texture parameter specified as pname. target defines the target texture, either GL_TEXTURE_1D, GL_TEXTURE_2D, or GL_TEXTURE_3D to speci... |
glHint(3) -- specify implementation-specific hints
|
Certain aspects of GL behavior, when there is room for interpretation, can be controlled with hints. A hint is specified with two arguments. target is a symbolic constant indicating the behavior to be... |
glIndex(3) -- set the current color index
|
glIndex() updates the current (single-valued) color index. It takes one argument, the new value for the current color index. The current index is stored as a floating-point value. Integer values are c... |
glIndexd(3) -- set the current color index
|
glIndex() updates the current (single-valued) color index. It takes one argument, the new value for the current color index. The current index is stored as a floating-point value. Integer values are c... |
glIndexdv(3) -- set the current color index
|
glIndex() updates the current (single-valued) color index. It takes one argument, the new value for the current color index. The current index is stored as a floating-point value. Integer values are c... |
glIndexf(3) -- set the current color index
|
glIndex() updates the current (single-valued) color index. It takes one argument, the new value for the current color index. The current index is stored as a floating-point value. Integer values are c... |
glIndexfv(3) -- set the current color index
|
glIndex() updates the current (single-valued) color index. It takes one argument, the new value for the current color index. The current index is stored as a floating-point value. Integer values are c... |
glIndexi(3) -- set the current color index
|
glIndex() updates the current (single-valued) color index. It takes one argument, the new value for the current color index. The current index is stored as a floating-point value. Integer values are c... |
glIndexiv(3) -- set the current color index
|
glIndex() updates the current (single-valued) color index. It takes one argument, the new value for the current color index. The current index is stored as a floating-point value. Integer values are c... |
glIndexMask(3) -- control the writing of individual bits in the color index buffers
|
glIndexMask() controls the writing of individual bits in the color index buffers. The least significant n bits of mask, where n is the number of bits in a color index buffer, specify a mask. Where a 1... |
glIndexPointer(3) -- define an array of color indexes
|
glIndexPointer() specifies the location and data of an array of color indexes to use when rendering. type specifies the data type of each color index and stride gives the byte stride from one color in... |
glIndexs(3) -- set the current color index
|
glIndex() updates the current (single-valued) color index. It takes one argument, the new value for the current color index. The current index is stored as a floating-point value. Integer values are c... |
glIndexsv(3) -- set the current color index
|
glIndex() updates the current (single-valued) color index. It takes one argument, the new value for the current color index. The current index is stored as a floating-point value. Integer values are c... |
glIndexub(3) -- set the current color index
|
glIndex() updates the current (single-valued) color index. It takes one argument, the new value for the current color index. The current index is stored as a floating-point value. Integer values are c... |
glIndexubv(3) -- set the current color index
|
glIndex() updates the current (single-valued) color index. It takes one argument, the new value for the current color index. The current index is stored as a floating-point value. Integer values are c... |
glInitNames(3) -- initialize the name stack
|
The name stack is used during selection mode to allow sets of rendering commands to be uniquely identified. It consists of an ordered set of unsigned integers. glInitNames() causes the name stack to b... |
glInterleavedArrays(3) -- simultaneously specify and enable several interleaved arrays
|
glInterleavedArrays() lets you specify and enable individual color, normal, texture and vertex arrays whose elements are part of a larger aggregate array element. For some implementations, this is mor... |
glIsEnabled(3) -- test whether a capability is enabled
|
glIsEnabled() returns GL_TRUE if cap is an enabled capability and returns GL_FALSE otherwise. Initially all capabilities except GL_DITHER are disabled; GL_DITHER is initially enabled. The following ca... |
glIsList(3) -- determine if a name corresponds to a displaylist
|
glIsList() returns GL_TRUE if list is the name of a display list and returns GL_FALSE otherwise. |
glIsTexture(3) -- determine if a name corresponds to a texture
|
glIsTexture() returns GL_TRUE if texture is currently the name of a texture. If texture is zero, or is a non-zero value that is not currently the name of a texture, or if an error occurs, glIsTexture(... |
glLight(3) -- set light source parameters
|
glLight() sets the values of individual light source parameters. light names the light and is a symbolic name of the form GL_LIGHTi, where 0 <= i < GL_MAX_LIGHTS. pname specifies one of ten light sour... |
glLightf(3) -- set light source parameters
|
glLight() sets the values of individual light source parameters. light names the light and is a symbolic name of the form GL_LIGHTi, where 0 <= i < GL_MAX_LIGHTS. pname specifies one of ten light sour... |
glLightfv(3) -- set light source parameters
|
glLight() sets the values of individual light source parameters. light names the light and is a symbolic name of the form GL_LIGHTi, where 0 <= i < GL_MAX_LIGHTS. pname specifies one of ten light sour... |
glLighti(3) -- set light source parameters
|
glLight() sets the values of individual light source parameters. light names the light and is a symbolic name of the form GL_LIGHTi, where 0 <= i < GL_MAX_LIGHTS. pname specifies one of ten light sour... |
glLightiv(3) -- set light source parameters
|
glLight() sets the values of individual light source parameters. light names the light and is a symbolic name of the form GL_LIGHTi, where 0 <= i < GL_MAX_LIGHTS. pname specifies one of ten light sour... |
glLightModel(3) -- set the lighting model parameters
|
glLightModel() sets the lighting model parameter. pname names a parameter and params gives the new value. There are three lighting model parameters: params contains four integer or floating-point valu... |
glLightModelf(3) -- set the lighting model parameters
|
glLightModel() sets the lighting model parameter. pname names a parameter and params gives the new value. There are three lighting model parameters: params contains four integer or floating-point valu... |
glLightModelfv(3) -- set the lighting model parameters
|
glLightModel() sets the lighting model parameter. pname names a parameter and params gives the new value. There are three lighting model parameters: params contains four integer or floating-point valu... |
glLightModeli(3) -- set the lighting model parameters
|
glLightModel() sets the lighting model parameter. pname names a parameter and params gives the new value. There are three lighting model parameters: params contains four integer or floating-point valu... |
glLightModeliv(3) -- set the lighting model parameters
|
glLightModel() sets the lighting model parameter. pname names a parameter and params gives the new value. There are three lighting model parameters: params contains four integer or floating-point valu... |
glLineStipple(3) -- specify the line stipple pattern
|
Line stippling masks out certain fragments produced by rasterization; those fragments will not be drawn. The masking is achieved by using three parameters: the 16-bit line stipple pattern pattern, the... |
glLineWidth(3) -- specify the width of rasterized lines
|
glLineWidth() specifies the rasterized width of both aliased and antialiased lines. Using a line width other than 1 has different effects, depending on whether line antialiasing is enabled. To enable ... |
glListBase(3) -- set the display-list base for glCallLists
|
glCallLists() specifies an array of offsets. Display-list names are generated by adding base to each offset. Names that reference valid display lists are executed; the others are ignored. |
glLoadIdentity(3) -- replace the current matrix with the identity matrix
|
glLoadIdentity() replaces the current matrix with the identity matrix. It is semantically equivalent to calling glLoadMatrix() with the identity matrix 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 1 but in some case... |
glLoadMatrix(3) -- replace the current matrix with the specified matrix
|
glLoadMatrix() replaces the current matrix with the one whose elements are specified by m. The current matrix is the projection matrix, modelview matrix, or texture matrix, depending on the current ma... |
glLoadMatrixd(3) -- replace the current matrix with the specified matrix
|
glLoadMatrix() replaces the current matrix with the one whose elements are specified by m. The current matrix is the projection matrix, modelview matrix, or texture matrix, depending on the current ma... |
glLoadMatrixf(3) -- replace the current matrix with the specified matrix
|
glLoadMatrix() replaces the current matrix with the one whose elements are specified by m. The current matrix is the projection matrix, modelview matrix, or texture matrix, depending on the current ma... |
glLoadName(3) -- load a name onto the name stack
|
The name stack is used during selection mode to allow sets of rendering commands to be uniquely identified. It consists of an ordered set of unsigned integers. glLoadName() causes name to replace the ... |
glLogicOp(3) -- specify a logical pixel operation for color index rendering
|
glLogicOp() specifies a logical operation that, when enabled, is applied between the incoming color index or RGBA color and the color index or RGBA color at the corresponding location in the frame buf... |
glMap1(3) -- define a one-dimensional evaluator
|
Evaluators provide a way to use polynomial or rational polynomial mapping to produce vertices, normals, texture coordinates, and colors. The values produced by an evaluator are sent to further stages ... |
glMap1d(3) -- define a one-dimensional evaluator
|
Evaluators provide a way to use polynomial or rational polynomial mapping to produce vertices, normals, texture coordinates, and colors. The values produced by an evaluator are sent to further stages ... |
glMap1f(3) -- define a one-dimensional evaluator
|
Evaluators provide a way to use polynomial or rational polynomial mapping to produce vertices, normals, texture coordinates, and colors. The values produced by an evaluator are sent to further stages ... |
glMap2(3) -- define a two-dimensional evaluator
|
Evaluators provide a way to use polynomial or rational polynomial mapping to produce vertices, normals, texture coordinates, and colors. The values produced by an evaluator are sent on to further stag... |
glMap2d(3) -- define a two-dimensional evaluator
|
Evaluators provide a way to use polynomial or rational polynomial mapping to produce vertices, normals, texture coordinates, and colors. The values produced by an evaluator are sent on to further stag... |
glMap2f(3) -- define a two-dimensional evaluator
|
Evaluators provide a way to use polynomial or rational polynomial mapping to produce vertices, normals, texture coordinates, and colors. The values produced by an evaluator are sent on to further stag... |
glMapGrid(3) -- define a one- or two-dimensional mesh
|
glMapGrid() and glEvalMesh() are used together to efficiently generate and evaluate a series of evenly-spaced map domain values. glEvalMesh() steps through the integer domain of a one- or two-dimensio... |
glMapGrid1d(3) -- define a one- or two-dimensional mesh
|
glMapGrid() and glEvalMesh() are used together to efficiently generate and evaluate a series of evenly-spaced map domain values. glEvalMesh() steps through the integer domain of a one- or two-dimensio... |
glMapGrid1f(3) -- define a one- or two-dimensional mesh
|
glMapGrid() and glEvalMesh() are used together to efficiently generate and evaluate a series of evenly-spaced map domain values. glEvalMesh() steps through the integer domain of a one- or two-dimensio... |
glMapGrid2d(3) -- define a one- or two-dimensional mesh
|
glMapGrid() and glEvalMesh() are used together to efficiently generate and evaluate a series of evenly-spaced map domain values. glEvalMesh() steps through the integer domain of a one- or two-dimensio... |
glMapGrid2f(3) -- define a one- or two-dimensional mesh
|
glMapGrid() and glEvalMesh() are used together to efficiently generate and evaluate a series of evenly-spaced map domain values. glEvalMesh() steps through the integer domain of a one- or two-dimensio... |
glMaterial(3) -- specify material parameters for the lighting model
|
glMaterial() assigns values to material parameters. There are two matched sets of material parameters. One, the front-facing set, is used to shade points, lines, bitmaps, and all polygons (when two-si... |
glMaterialf(3) -- specify material parameters for the lighting model
|
glMaterial() assigns values to material parameters. There are two matched sets of material parameters. One, the front-facing set, is used to shade points, lines, bitmaps, and all polygons (when two-si... |
glMaterialfv(3) -- specify material parameters for the lighting model
|
glMaterial() assigns values to material parameters. There are two matched sets of material parameters. One, the front-facing set, is used to shade points, lines, bitmaps, and all polygons (when two-si... |
glMateriali(3) -- specify material parameters for the lighting model
|
glMaterial() assigns values to material parameters. There are two matched sets of material parameters. One, the front-facing set, is used to shade points, lines, bitmaps, and all polygons (when two-si... |
glMaterialiv(3) -- specify material parameters for the lighting model
|
glMaterial() assigns values to material parameters. There are two matched sets of material parameters. One, the front-facing set, is used to shade points, lines, bitmaps, and all polygons (when two-si... |
glMatrixMode(3) -- specify which matrix is the current matrix
|
glMatrixMode() sets the current matrix mode. mode can assume one of four values: Applies subsequent matrix operations to the modelview matrix stack. Applies subsequent matrix operations to the project... |
glMultMatrix(3) -- multiply the current matrix with the specified matrix
|
glMultMatrix() multiplies the current matrix with the one specified using m, and replaces the current matrix with the product. The current matrix is determined by the current matrix mode (see glMatrix... |
glMultMatrixd(3) -- multiply the current matrix with the specified matrix
|
glMultMatrix() multiplies the current matrix with the one specified using m, and replaces the current matrix with the product. The current matrix is determined by the current matrix mode (see glMatrix... |
glMultMatrixf(3) -- multiply the current matrix with the specified matrix
|
glMultMatrix() multiplies the current matrix with the one specified using m, and replaces the current matrix with the product. The current matrix is determined by the current matrix mode (see glMatrix... |
glNewList(3) -- create or replace a display list
|
Display lists are groups of GL commands that have been stored for subsequent execution. Display lists are created with glNewList(). All subsequent commands are placed in the display list, in the order... |
glNormal(3) -- set the current normal vector
|
The current normal is set to the given coordinates whenever glNormal() is issued. Byte, short, or integer arguments are converted to floating-point with a linear mapping that maps the most positive re... |
glNormal3b(3) -- set the current normal vector
|
The current normal is set to the given coordinates whenever glNormal() is issued. Byte, short, or integer arguments are converted to floating-point with a linear mapping that maps the most positive re... |
glNormal3bv(3) -- set the current normal vector
|
The current normal is set to the given coordinates whenever glNormal() is issued. Byte, short, or integer arguments are converted to floating-point with a linear mapping that maps the most positive re... |
glNormal3d(3) -- set the current normal vector
|
The current normal is set to the given coordinates whenever glNormal() is issued. Byte, short, or integer arguments are converted to floating-point with a linear mapping that maps the most positive re... |
glNormal3dv(3) -- set the current normal vector
|
The current normal is set to the given coordinates whenever glNormal() is issued. Byte, short, or integer arguments are converted to floating-point with a linear mapping that maps the most positive re... |
glNormal3f(3) -- set the current normal vector
|
The current normal is set to the given coordinates whenever glNormal() is issued. Byte, short, or integer arguments are converted to floating-point with a linear mapping that maps the most positive re... |
glNormal3fv(3) -- set the current normal vector
|
The current normal is set to the given coordinates whenever glNormal() is issued. Byte, short, or integer arguments are converted to floating-point with a linear mapping that maps the most positive re... |
glNormal3i(3) -- set the current normal vector
|
The current normal is set to the given coordinates whenever glNormal() is issued. Byte, short, or integer arguments are converted to floating-point with a linear mapping that maps the most positive re... |
glNormal3iv(3) -- set the current normal vector
|
The current normal is set to the given coordinates whenever glNormal() is issued. Byte, short, or integer arguments are converted to floating-point with a linear mapping that maps the most positive re... |
glNormal3s(3) -- set the current normal vector
|
The current normal is set to the given coordinates whenever glNormal() is issued. Byte, short, or integer arguments are converted to floating-point with a linear mapping that maps the most positive re... |
glNormal3sv(3) -- set the current normal vector
|
The current normal is set to the given coordinates whenever glNormal() is issued. Byte, short, or integer arguments are converted to floating-point with a linear mapping that maps the most positive re... |
glNormalPointer(3) -- define an array of normals
|
glNormalPointer() specifies the location and data of an array of normals to use when rendering. type specifies the data type of the normal coordinates and stride gives the byte stride from one normal ... |
glob(3) -- Generate pathnames matching a pattern
|
The glob() function constructs a list of accessible files that match the pattern parameter. The glob() function matches all accessible pathnames against this pattern and develops a list of all pathnam... |
globfree(3) -- Generate pathnames matching a pattern
|
The glob() function constructs a list of accessible files that match the pattern parameter. The glob() function matches all accessible pathnames against this pattern and develops a list of all pathnam... |
glOrtho(3) -- multiply the current matrix with an orthographic matrix
|
glOrtho() describes a transformation that produces a parallel projection. The current matrix (see glMatrixMode()) is multiplied by this matrix and the result replaces the current matrix, as if glMultM... |
glPassThrough(3) -- place a marker in the feedback buffer
|
Feedback is a GL render mode. The mode is selected by calling glRenderMode() with GL_FEEDBACK. When the GL is in feedback mode, no pixels are produced by rasterization. Instead, information about prim... |
glPixelMap(3) -- set up pixel transfer maps
|
glPixelMap() sets up translation tables, or maps, used by glCopyPixels(), glCopyTexImage1D(), glCopyTexImage2D(), glCopyTexSubImage1D(), glCopyTexSubImage2D(), glCopyTexSubImage3D(), glDrawPixels(), g... |
glPixelMapfv(3) -- set up pixel transfer maps
|
glPixelMap() sets up translation tables, or maps, used by glCopyPixels(), glCopyTexImage1D(), glCopyTexImage2D(), glCopyTexSubImage1D(), glCopyTexSubImage2D(), glCopyTexSubImage3D(), glDrawPixels(), g... |
glPixelMapuiv(3) -- set up pixel transfer maps
|
glPixelMap() sets up translation tables, or maps, used by glCopyPixels(), glCopyTexImage1D(), glCopyTexImage2D(), glCopyTexSubImage1D(), glCopyTexSubImage2D(), glCopyTexSubImage3D(), glDrawPixels(), g... |
glPixelMapusv(3) -- set up pixel transfer maps
|
glPixelMap() sets up translation tables, or maps, used by glCopyPixels(), glCopyTexImage1D(), glCopyTexImage2D(), glCopyTexSubImage1D(), glCopyTexSubImage2D(), glCopyTexSubImage3D(), glDrawPixels(), g... |
glPixelStore(3) -- set pixel storage modes
|
glPixelStore() sets pixel storage modes that affect the operation of subsequent glDrawPixels() and glReadPixels() as well as the unpacking of polygon stipple patterns (see glPolygonStipple()), bitmaps... |
glPixelStoref(3) -- set pixel storage modes
|
glPixelStore() sets pixel storage modes that affect the operation of subsequent glDrawPixels() and glReadPixels() as well as the unpacking of polygon stipple patterns (see glPolygonStipple()), bitmaps... |
glPixelStorei(3) -- set pixel storage modes
|
glPixelStore() sets pixel storage modes that affect the operation of subsequent glDrawPixels() and glReadPixels() as well as the unpacking of polygon stipple patterns (see glPolygonStipple()), bitmaps... |
glPixelTransfer(3) -- set pixel transfer modes
|
glPixelTransfer() sets pixel transfer modes that affect the operation of subsequent glCopyPixels(), glCopyTexImage1D(), glCopyTexImage2D(), glCopyTexSubImage1D(), glCopyTexSubImage2D(), glCopyTexSubIm... |
glPixelTransferf(3) -- set pixel transfer modes
|
glPixelTransfer() sets pixel transfer modes that affect the operation of subsequent glCopyPixels(), glCopyTexImage1D(), glCopyTexImage2D(), glCopyTexSubImage1D(), glCopyTexSubImage2D(), glCopyTexSubIm... |
glPixelTransferi(3) -- set pixel transfer modes
|
glPixelTransfer() sets pixel transfer modes that affect the operation of subsequent glCopyPixels(), glCopyTexImage1D(), glCopyTexImage2D(), glCopyTexSubImage1D(), glCopyTexSubImage2D(), glCopyTexSubIm... |
glPixelZoom(3) -- specify the pixel zoom factors
|
glPixelZoom() specifies values for the x and y zoom factors. During the execution of glDrawPixels() or glCopyPixels(), if (xr , yr ) is the current raster position, and a given element is in the mth r... |
glPointSize(3) -- specify the diameter of rasterized points
|
glPointSize() specifies the rasterized diameter of both aliased and antialiased points. Using a point size other than 1 has different effects, depending on whether point antialiasing is enabled. To en... |
glPolygonMode(3) -- select a polygon rasterization mode
|
glPolygonMode() controls the interpretation of polygons for rasterization. face describes which polygons mode applies to: front-facing polygons (GL_FRONT), back-facing polygons (GL_BACK), or both (GL_... |
glPolygonOffset(3) -- set the scale and units used to calculate depth values
|
When GL_POLYGON_OFFSET_FILL, GL_POLYGON_OFFSET_LINE, or GL_POLYGON_OFFSET_POINT is enabled, each fragment's depth value will be offset after it is interpolated from the depth values of the appropriat... |
glPolygonStipple(3) -- set the polygon stippling pattern
|
Polygon stippling, like line stippling (see glLineStipple()), masks out certain fragments produced by rasterization, creating a pattern. Stippling is independent of polygon antialiasing. mask is a poi... |
glPopAttrib(3) -- push and pop the server attribute stack
|
glPushAttrib() takes one argument, a mask that indicates which groups of state variables to save on the attribute stack. Symbolic constants are used to set bits in the mask. mask is typically construc... |
glPopClientAttrib(3) -- push and pop the client attribute stack
|
glPushClientAttrib() takes one argument, a mask that indicates which groups of client-state variables to save on the client attribute stack. Symbolic constants are used to set bits in the mask. mask i... |
glPopMatrix(3) -- push and pop the current matrix stack
|
There is a stack of matrices for each of the matrix modes. In GL_MODELVIEW mode, the stack depth is at least 32. In the other modes, GL_COLOR, const(PROJECTION), and GL_TEXTURE, the depth is at least ... |
glPopName(3) -- push and pop the name stack
|
The name stack is used during selection mode to allow sets of rendering commands to be uniquely identified. It consists of an ordered set of unsigned integers and is initially empty. glPushName() caus... |
glPrioritizeTextures(3) -- set texture residence priority
|
glPrioritizeTextures() assigns the n texture priorities given in priorities to the n textures named in textures. The GL establishes a ``working set'' of textures that are resident in texture memory.... |
glPushAttrib(3) -- push and pop the server attribute stack
|
glPushAttrib() takes one argument, a mask that indicates which groups of state variables to save on the attribute stack. Symbolic constants are used to set bits in the mask. mask is typically construc... |
glPushClientAttrib(3) -- push and pop the client attribute stack
|
glPushClientAttrib() takes one argument, a mask that indicates which groups of client-state variables to save on the client attribute stack. Symbolic constants are used to set bits in the mask. mask i... |
glPushMatrix(3) -- push and pop the current matrix stack
|
There is a stack of matrices for each of the matrix modes. In GL_MODELVIEW mode, the stack depth is at least 32. In the other modes, GL_COLOR, const(PROJECTION), and GL_TEXTURE, the depth is at least ... |
glPushName(3) -- push and pop the name stack
|
The name stack is used during selection mode to allow sets of rendering commands to be uniquely identified. It consists of an ordered set of unsigned integers and is initially empty. glPushName() caus... |
glRasterPos(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos2d(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos2dv(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos2f(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos2fv(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos2i(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos2iv(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos2s(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos2sv(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos3d(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos3dv(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos3f(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos3fv(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos3i(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos3iv(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos3s(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos3sv(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos4d(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos4dv(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos4f(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos4fv(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos4i(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos4iv(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos4s(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glRasterPos4sv(3) -- specify the raster position for pixel operations
|
The GL maintains a 3D position in window coordinates. This position, called the raster position, is used to position pixel and bitmap write operations. It is maintained with subpixel accuracy. See glB... |
glReadBuffer(3) -- select a color buffer source for pixels
|
glReadBuffer() specifies a color buffer as the source for subsequent glReadPixels(), glCopyTexImage1D(), glCopyTexImage2D(), glCopyTexSubImage1D(), glCopyTexSubImage2D(), glCopyTexSubImage3D(), and gl... |
glReadPixels(3) -- read a block of pixels from the frame buffer
|
glReadPixels() returns pixel data from the frame buffer, starting with the pixel whose lower left corner is at location (x, y), into client memory starting at location pixels. Several parameters contr... |
glRect(3) -- draw a rectangle
|
glRect() supports efficient specification of rectangles as two corner points. Each rectangle command takes four arguments, organized either as two consecutive pairs of (x,y) coordinates, or as two poi... |
glRectd(3) -- draw a rectangle
|
glRect() supports efficient specification of rectangles as two corner points. Each rectangle command takes four arguments, organized either as two consecutive pairs of (x,y) coordinates, or as two poi... |
glRectdv(3) -- draw a rectangle
|
glRect() supports efficient specification of rectangles as two corner points. Each rectangle command takes four arguments, organized either as two consecutive pairs of (x,y) coordinates, or as two poi... |
glRectf(3) -- draw a rectangle
|
glRect() supports efficient specification of rectangles as two corner points. Each rectangle command takes four arguments, organized either as two consecutive pairs of (x,y) coordinates, or as two poi... |
glRectfv(3) -- draw a rectangle
|
glRect() supports efficient specification of rectangles as two corner points. Each rectangle command takes four arguments, organized either as two consecutive pairs of (x,y) coordinates, or as two poi... |
glRecti(3) -- draw a rectangle
|
glRect() supports efficient specification of rectangles as two corner points. Each rectangle command takes four arguments, organized either as two consecutive pairs of (x,y) coordinates, or as two poi... |
glRectiv(3) -- draw a rectangle
|
glRect() supports efficient specification of rectangles as two corner points. Each rectangle command takes four arguments, organized either as two consecutive pairs of (x,y) coordinates, or as two poi... |
glRects(3) -- draw a rectangle
|
glRect() supports efficient specification of rectangles as two corner points. Each rectangle command takes four arguments, organized either as two consecutive pairs of (x,y) coordinates, or as two poi... |
glRectsv(3) -- draw a rectangle
|
glRect() supports efficient specification of rectangles as two corner points. Each rectangle command takes four arguments, organized either as two consecutive pairs of (x,y) coordinates, or as two poi... |
glRenderMode(3) -- set rasterization mode
|
glRenderMode() sets the rasterization mode. It takes one argument, mode, which can assume one of three predefined values: Render mode. Primitives are rasterized, producing pixel fragments, which are w... |
glRotate(3) -- multiply the current matrix by a rotation matrix
|
glRotate() produces a rotation of angle degrees around the vector (x, y, z). The current matrix (see glMatrixMode()) is multiplied by a rotation matrix with the product replacing the current matrix, a... |
glRotated(3) -- multiply the current matrix by a rotation matrix
|
glRotate() produces a rotation of angle degrees around the vector (x, y, z). The current matrix (see glMatrixMode()) is multiplied by a rotation matrix with the product replacing the current matrix, a... |
glRotatef(3) -- multiply the current matrix by a rotation matrix
|
glRotate() produces a rotation of angle degrees around the vector (x, y, z). The current matrix (see glMatrixMode()) is multiplied by a rotation matrix with the product replacing the current matrix, a... |
glScale(3) -- multiply the current matrix by a general scaling matrix
|
glScale() produces a nonuniform scaling along the x, y, and z axes. The three parameters indicate the desired scale factor along each of the three axes. The current matrix (see glMatrixMode()) is mult... |
glScaled(3) -- multiply the current matrix by a general scaling matrix
|
glScale() produces a nonuniform scaling along the x, y, and z axes. The three parameters indicate the desired scale factor along each of the three axes. The current matrix (see glMatrixMode()) is mult... |
glScalef(3) -- multiply the current matrix by a general scaling matrix
|
glScale() produces a nonuniform scaling along the x, y, and z axes. The three parameters indicate the desired scale factor along each of the three axes. The current matrix (see glMatrixMode()) is mult... |
glScissor(3) -- define the scissor box
|
glScissor() defines a rectangle, called the scissor box, in window coordinates. The first two arguments, x and y, specify the lower left corner of the box. width and height specify the width and heigh... |
glSelectBuffer(3) -- establish a buffer for selection mode values
|
glSelectBuffer() has two arguments: buffer is a pointer to an array of unsigned integers, and size indicates the size of the array. buffer returns values from the name stack (see glInitNames(), glLoad... |
glShadeModel(3) -- select flat or smooth shading
|
GL primitives can have either flat or smooth shading. Smooth shading, the default, causes the computed colors of vertices to be interpolated as the primitive is rasterized, typically assigning differe... |
glStencilFunc(3) -- set function and reference value for stencil testing
|
Stenciling, like depth-buffering, enables and disables drawing on a per-pixel basis. You draw into the stencil planes using GL drawing primitives, then render geometry and images, using the stencil pl... |
glStencilMask(3) -- control the writing of individual bits in the stencil planes
|
glStencilMask() controls the writing of individual bits in the stencil planes. The least significant n bits of mask, where n is the number of bits in the stencil buffer, specify a mask. Where a 1 appe... |
glStencilOp(3) -- set stencil test actions
|
Stenciling, like depth-buffering, enables and disables drawing on a per-pixel basis. You draw into the stencil planes using GL drawing primitives, then render geometry and images, using the stencil pl... |
glTexCoord(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord13s(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord13sv(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord1d(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord1dv(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord1f(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord1fv(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord1i(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord1iv(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord1s(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord1sv(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord2d(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord2dv(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord2f(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord2fv(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord2i(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord2iv(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord2s(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord2sv(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord3d(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord3dv(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord3f(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord3fv(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord3i(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord3iv(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord4d(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord4dv(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord4f(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord4fv(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord4i(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord4iv(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord4s(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoord4sv(3) -- set the current texture coordinates
|
glTexCoord() specifies texture coordinates in one, two, three, or four dimensions. glTexCoord1() sets the current texture coordinates to (s, 0, 0, 1); a call to glTexCoord2() sets them to (s, t, 0, 1)... |
glTexCoordPointer(3) -- define an array of texture coordinates
|
glTexCoordPointer() specifies the location and data of an array of texture coordinates to use when rendering. size specifies the number of coordinates per element, and must be 1, 2, 3, or 4. type spec... |
glTexEnv(3) -- set texture environment parameters
|
A texture environment specifies how texture values are interpreted when a fragment is textured. target must be GL_TEXTURE_ENV. pname can be either GL_TEXTURE_ENV_MODE or GL_TEXTURE_ENV_COLOR. If pname... |
glTexEnvf(3) -- set texture environment parameters
|
A texture environment specifies how texture values are interpreted when a fragment is textured. target must be GL_TEXTURE_ENV. pname can be either GL_TEXTURE_ENV_MODE or GL_TEXTURE_ENV_COLOR. If pname... |
glTexEnvfv(3) -- set texture environment parameters
|
A texture environment specifies how texture values are interpreted when a fragment is textured. target must be GL_TEXTURE_ENV. pname can be either GL_TEXTURE_ENV_MODE or GL_TEXTURE_ENV_COLOR. If pname... |
glTexEnvi(3) -- set texture environment parameters
|
A texture environment specifies how texture values are interpreted when a fragment is textured. target must be GL_TEXTURE_ENV. pname can be either GL_TEXTURE_ENV_MODE or GL_TEXTURE_ENV_COLOR. If pname... |
glTexEnviv(3) -- set texture environment parameters
|
A texture environment specifies how texture values are interpreted when a fragment is textured. target must be GL_TEXTURE_ENV. pname can be either GL_TEXTURE_ENV_MODE or GL_TEXTURE_ENV_COLOR. If pname... |
glTexGen(3) -- control the generation of texture coordinates
|
glTexGen() selects a texture-coordinate generation function or supplies coefficients for one of the functions. coord names one of the (s, t, r, q) texture coordinates; it must be one of the symbols GL... |
glTexGend(3) -- control the generation of texture coordinates
|
glTexGen() selects a texture-coordinate generation function or supplies coefficients for one of the functions. coord names one of the (s, t, r, q) texture coordinates; it must be one of the symbols GL... |
glTexGendv(3) -- control the generation of texture coordinates
|
glTexGen() selects a texture-coordinate generation function or supplies coefficients for one of the functions. coord names one of the (s, t, r, q) texture coordinates; it must be one of the symbols GL... |
glTexGenf(3) -- control the generation of texture coordinates
|
glTexGen() selects a texture-coordinate generation function or supplies coefficients for one of the functions. coord names one of the (s, t, r, q) texture coordinates; it must be one of the symbols GL... |
glTexGenfv(3) -- control the generation of texture coordinates
|
glTexGen() selects a texture-coordinate generation function or supplies coefficients for one of the functions. coord names one of the (s, t, r, q) texture coordinates; it must be one of the symbols GL... |
glTexGeni(3) -- control the generation of texture coordinates
|
glTexGen() selects a texture-coordinate generation function or supplies coefficients for one of the functions. coord names one of the (s, t, r, q) texture coordinates; it must be one of the symbols GL... |
glTexGeniv(3) -- control the generation of texture coordinates
|
glTexGen() selects a texture-coordinate generation function or supplies coefficients for one of the functions. coord names one of the (s, t, r, q) texture coordinates; it must be one of the symbols GL... |
glTexImage1D(3) -- specify a one-dimensional texture image
|
Texturing maps a portion of a specified texture image onto each graphical primitive for which texturing is enabled. To enable and disable one-dimensional texturing, call glEnable() and glDisable() wit... |
glTexImage2D(3) -- specify a two-dimensional texture image
|
Texturing maps a portion of a specified texture image onto each graphical primitive for which texturing is enabled. To enable and disable two-dimensional texturing, call glEnable() and glDisable() wit... |
glTexImage3D(3) -- specify a three-dimensional texture image
|
Texturing maps a portion of a specified texture image onto each graphical primitive for which texturing is enabled. To enable and disable three-dimensional texturing, call glEnable() and glDisable() w... |
glTexParameter(3) -- set texture parameters
|
Texture mapping is a technique that applies an image onto an object's surface as if the image were a decal or cellophane shrink-wrap. The image is created in texture space, with an (s, t) coordinate ... |
glTexSubImage1D(3) -- specify a one-dimensional texture subimage
|
Texturing maps a portion of a specified texture image onto each graphical primitive for which texturing is enabled. To enable or disable one-dimensional texturing, call glEnable() and glDisable() with... |
glTexSubImage2D(3) -- specify a two-dimensional texture subimage
|
Texturing maps a portion of a specified texture image onto each graphical primitive for which texturing is enabled. To enable and disable two-dimensional texturing, call glEnable() and glDisable() wit... |
glTexSubImage3D(3) -- specify a three-dimensional texture subimage
|
Texturing maps a portion of a specified texture image onto each graphical primitive for which texturing is enabled. To enable and disable three-dimensional texturing, call glEnable() and glDisable() w... |
glTranslate(3) -- multiply the current matrix by a translation matrix
|
glTranslate() produces a translation by (x,y,z). The current matrix (see glMatrixMode()) is multiplied by this translation matrix, with the product replacing the current matrix, as if glMultMatrix() w... |
glTranslated(3) -- multiply the current matrix by a translation matrix
|
glTranslate() produces a translation by (x,y,z). The current matrix (see glMatrixMode()) is multiplied by this translation matrix, with the product replacing the current matrix, as if glMultMatrix() w... |
glTranslatef(3) -- multiply the current matrix by a translation matrix
|
glTranslate() produces a translation by (x,y,z). The current matrix (see glMatrixMode()) is multiplied by this translation matrix, with the product replacing the current matrix, as if glMultMatrix() w... |
gluBeginCurve(3) -- delimit a NURBS curve definition
|
Use gluBeginCurve() to mark the beginning of a NURBS curve definition. After calling gluBeginCurve(), make one or more calls to gluNurbsCurve() to define the attributes of the curve. Exactly one of th... |
gluBeginPolygon(3) -- delimit a polygon description
|
gluBeginPolygon() and gluEndPolygon() delimit the definition of a nonconvex polygon. To define such a polygon, first call gluBeginPolygon(). Then define the contours of the polygon by calling gluTessV... |
gluBeginSurface(3) -- delimit a NURBS surface definition
|
Use gluBeginSurface() to mark the beginning of a NURBS surface definition. After calling gluBeginSurface(), make one or more calls to gluNurbsSurface() to define the attributes of the surface. Exactly... |
gluBeginTrim(3) -- delimit a NURBS trimming loop definition
|
Use gluBeginTrim() to mark the beginning of a trimming loop, and gluEndTrim() to mark the end of a trimming loop. A trimming loop is a set of oriented curve segments (forming a closed curve) that defi... |
gluBuild1DMipmaps(3) -- builds a 1-D mipmap
|
gluBuild1DMipmaps() builds a series of prefiltered 1-D texture maps of decreasing resolutions called a mipmap. This is used for the antialiasing of texture mapped primitives. A return value of 0 indic... |
gluBuild2DMipmaps(3) -- builds a 2-D mipmap
|
gluBuild2DMipmaps() builds a series of prefiltered 2-D texture maps of decreasing resolutions called a mipmap. This is used for the antialiasing of texture mapped primitives. A return value of 0 indic... |
gluCylinder(3) -- draw a cylinder
|
gluCylinder() draws a cylinder oriented along the z axis. The base of the cylinder is placed at z = 0, and the top at z = height. Like a sphere, a cylinder is subdivided around the z axis into slices,... |
gluDeleteNurbsRenderer(3) -- destroy a NURBS object
|
gluDeleteNurbsRenderer() destroys the NURBS object (which was created with gluNewNurbsRenderer()) and frees any memory it uses. Once gluDeleteNurbsRenderer() has been called, nurb cannot be used again... |
gluDeleteQuadric(3) -- destroy a quadrics object
|
gluDeleteQuadric() destroys the quadrics object (created with gluNewQuadric()) and frees any memory it uses. Once gluDeleteQuadric() has been called, quad cannot be used again. |
gluDeleteTess(3) -- destroy a tessellation object
|
gluDeleteTess() destroys the indicated tessellation object (which was created with gluNewTess()) and frees any memory that it used. |
gluDisk(3) -- draw a disk
|
gluDisk() renders a disk on the z = 0 plane. The disk has a radius of outer, and contains a concentric circular hole with a radius of inner. If inner is 0, then no hole is generated. The disk is subdi... |
gluEndCurve(3) -- delimit a NURBS curve definition
|
Use gluBeginCurve() to mark the beginning of a NURBS curve definition. After calling gluBeginCurve(), make one or more calls to gluNurbsCurve() to define the attributes of the curve. Exactly one of th... |
gluEndPolygon(3) -- delimit a polygon description
|
gluBeginPolygon() and gluEndPolygon() delimit the definition of a nonconvex polygon. To define such a polygon, first call gluBeginPolygon(). Then define the contours of the polygon by calling gluTessV... |
gluEndSurface(3) -- delimit a NURBS surface definition
|
Use gluBeginSurface() to mark the beginning of a NURBS surface definition. After calling gluBeginSurface(), make one or more calls to gluNurbsSurface() to define the attributes of the surface. Exactly... |
gluEndTrim(3) -- delimit a NURBS trimming loop definition
|
Use gluBeginTrim() to mark the beginning of a trimming loop, and gluEndTrim() to mark the end of a trimming loop. A trimming loop is a set of oriented curve segments (forming a closed curve) that defi... |
gluErrorString(3) -- produce an error string from a GL or GLU error code
|
gluErrorString() produces an error string from a GL or GLU error code. The string is in ISO Latin 1 format. For example, gluErrorString()(GL_OUT_OF_MEMORY) returns the string out of memory. The standa... |
gluGetNurbsProperty(3) -- get a NURBS property
|
gluGetNurbsProperty() retrieves properties stored in a NURBS object. These properties affect the way that NURBS curves and surfaces are rendered. See the gluNurbsProperty() reference page for informat... |
gluGetString(3) -- return a string describing the GLU version or GLU extensions
|
gluGetString() returns a pointer to a static string describing the GLU version or the GLU extensions that are supported. The version number is one of the following forms: major_number.minor_number maj... |
gluGetTessProperty(3) -- get a tessellation object property
|
gluGetTessProperty() retrieves properties stored in a tessellation object. These properties affect the way that tessellation objects are interpreted and rendered. See the gluTessProperty() reference p... |
gluLoadSamplingMatrices(3) -- load NURBS sampling and culling matrices
|
gluLoadSamplingMatrices() uses model, perspective, and view to recompute the sampling and culling matrices stored in nurb. The sampling matrix determines how finely a NURBS curve or surface must be te... |
gluLookAt(3) -- define a viewing transformation
|
gluLookAt() creates a viewing matrix derived from an eye point, a reference point indicating the center of the scene, and an UP vector. The matrix maps the reference point to the negative z axis and t... |
gluNewNurbsRenderer(3) -- create a NURBS object
|
gluNewNurbsRenderer() creates and returns a pointer to a new NURBS object. This object must be referred to when calling NURBS rendering and control functions. A return value of 0 means that there is n... |
gluNewQuadric(3) -- create a quadrics object
|
gluNewQuadric() creates and returns a pointer to a new quadrics object. This object must be referred to when calling quadrics rendering and control functions. A return value of 0 means that there is n... |
gluNewTess(3) -- create a tessellation object
|
gluNewTess() creates and returns a pointer to a new tessellation object. This object must be referred to when calling tessellation functions. A return value of 0 means that there is not enough memory ... |
gluNextContour(3) -- mark the beginning of another contour
|
gluNextContour() is used in describing polygons with multiple contours. After the first contour has been described through a series of gluTessVertex() calls, a gluNextContour() call indicates that the... |
gluNurbsCallback(3) -- define a callback for a NURBS object
|
gluNurbsCallback() is used to define a callback to be used by a NURBS object. If the specified callback is already defined, then it is replaced. If CallBackFunc is NULL, then this callback will not ge... |
gluNurbsCallbackDataEXT(3) -- set a user data pointer
|
gluNurbsCallbackDataEXT() is used to pass a pointer to the application's data to NURBS tessellator. A copy of this pointer will be passed by the tessellator in the NURBS callback functions (set by gl... |
gluNurbsCurve(3) -- define the shape of a NURBS curve
|
Use gluNurbsCurve() to describe a NURBS curve. When gluNurbsCurve() appears between a gluBeginCurve()/gluEndCurve() pair, it is used to describe a curve to be rendered. Positional, texture, and color ... |
gluNurbsProperty(3) -- set a NURBS property
|
gluNurbsProperty() is used to control properties stored in a NURBS object. These properties affect the way that a NURBS curve is rendered. The accepted values for property are as follows: value should... |
gluNurbsSurface(3) -- define the shape of a NURBS surface
|
Use gluNurbsSurface() within a NURBS (Non-Uniform Rational B-Spline) surface definition to describe the shape of a NURBS surface (before any trimming). To mark the beginning of a NURBS surface definit... |
gluOrtho2D(3) -- define a 2D orthographic projection matrix
|
gluOrtho2D() sets up a two-dimensional orthographic viewing region. This is equivalent to calling glOrtho() with near = -1 and far = 1. |
gluPartialDisk(3) -- draw an arc of a disk
|
gluPartialDisk() renders a partial disk on the $ z = 0 $ plane. A partial disk is similar to a full disk, except that only the subset of the disk from start through start + sweep is included (where 0 ... |
gluPerspective(3) -- set up a perspective projection matrix
|
gluPerspective() specifies a viewing frustum into the world coordinate system. In general, the aspect ratio in gluPerspective() should match the aspect ratio of the associated viewport. For example, $... |
gluPickMatrix(3) -- define a picking region
|
gluPickMatrix() creates a projection matrix that can be used to restrict drawing to a small region of the viewport. This is typically useful to determine what objects are being drawn near the cursor. ... |
gluProject(3) -- map object coordinates to window coordinates
|
gluProject() transforms the specified object coordinates into window coordinates using model, proj, and view. The result is stored in winX, winY, and winZ. A return value of GL_TRUE indicates success,... |
gluPwlCurve(3) -- describe a piecewise linear NURBS trimming curve
|
gluPwlCurve() describes a piecewise linear trimming curve for a NURBS surface. A piecewise linear curve consists of a list of coordinates of points in the parameter space for the NURBS surface to be t... |
gluQuadricCallback(3) -- define a callback for a quadrics object
|
gluQuadricCallback() is used to define a new callback to be used by a quadrics object. If the specified callback is already defined, then it is replaced. If CallBackFunc is NULL, then any existing cal... |
gluQuadricDrawStyle(3) -- specify the draw style desired for quadrics
|
gluQuadricDrawStyle() specifies the draw style for quadrics rendered with quad. The legal values are as follows: Quadrics are rendered with polygon primitives. The polygons are drawn in a counterclock... |
gluQuadricNormals(3) -- specify what kind of normals are desired for quadrics
|
gluQuadricNormals() specifies what kind of normals are desired for quadrics rendered with quad. The legal values are as follows: No normals are generated. One normal is generated for every facet of a ... |
gluQuadricOrientation(3) -- specify inside/outside orientation for quadrics
|
gluQuadricOrientation() specifies what kind of orientation is desired for quadrics rendered with quad. The orientation values are as follows: Quadrics are drawn with normals pointing outward (the init... |
gluQuadricTexture(3) -- specify if texturing is desired for quadrics
|
gluQuadricTexture() specifies if texture coordinates should be generated for quadrics rendered with quad. If the value of texture is GL_TRUE, then texture coordinates are generated, and if texture is ... |
gluScaleImage(3) -- scale an image to an arbitrary size
|
gluScaleImage() scales a pixel image using the appropriate pixel store modes to unpack data from the source image and pack data into the destination image. When shrinking an image, gluScaleImage() use... |
gluSphere(3) -- draw a sphere
|
gluSphere() draws a sphere of the given radius centered around the origin. The sphere is subdivided around the z axis into slices and along the z axis into stacks (similar to lines of longitude and la... |
gluTessBeginContour(3) -- delimit a contour description
|
gluTessBeginContour() and gluTessEndContour() delimit the definition of a polygon contour. Within each gluTessBeginContour()/gluTessEndContour() pair, there can be zero or more calls to gluTessVertex(... |
gluTessBeginPolygon(3) -- delimit a polygon description
|
gluTessBeginPolygon() and gluTessEndPolygon() delimit the definition of a convex, concave or self-intersecting polygon. Within each gluTessBeginPolygon()/gluTessEndPolygon() pair, there must be one or... |
gluTessCallback(3) -- define a callback for a tessellation object
|
gluTessCallback() is used to indicate a callback to be used by a tessellation object. If the specified callback is already defined, then it is replaced. If CallBackFunc is NULL, then the existing call... |
gluTessEndContour(3) -- delimit a contour description
|
gluTessBeginContour() and gluTessEndContour() delimit the definition of a polygon contour. Within each gluTessBeginContour()/gluTessEndContour() pair, there can be zero or more calls to gluTessVertex(... |
gluTessEndPolygon(3) -- delimit a polygon description
|
gluTessBeginPolygon() and gluTessEndPolygon() delimit the definition of a convex, concave or self-intersecting polygon. Within each gluTessBeginPolygon()/gluTessEndPolygon() pair, there must be one or... |
gluTessNormal(3) -- specify a normal for a polygon
|
gluTessNormal() describes a normal for a polygon that the program is defining. All input data will be projected onto a plane perpendicular to one of the three coordinate axes before tessellation and a... |
gluTessProperty(3) -- set a tessellation object property
|
gluTessProperty() is used to control properties stored in a tessellation object. These properties affect the way that the polygons are interpreted and rendered. The legal values for which are as follo... |
gluTessVertex(3) -- specify a vertex on a polygon
|
gluTessVertex() describes a vertex on a polygon that the program defines. Successive gluTessVertex() calls describe a closed contour. For example, to describe a quadrilateral gluTessVertex() should be... |
gluUnProject(3) -- map window coordinates to object coordinates
|
gluUnProject() maps the specified window coordinates into object coordinates using model, proj, and view. The result is stored in objX, objY, and objZ. A return value of GL_TRUE indicates success; a r... |
glVertex(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex2d(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex2dv(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex2f(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex2fv(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex2i(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex2iv(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex2s(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex2sv(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex3d(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex3dv(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex3f(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex3fv(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex3i(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex3iv(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex3s(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex3sv(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex4d(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex4dv(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex4f(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex4fv(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex4i(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex4iv(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex4s(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertex4sv(3) -- specify a vertex
|
glVertex() commands are used within glBegin()/glEnd() pairs to specify point, line, and polygon vertices. The current color, normal, and texture coordinates are associated with the vertex when glVerte... |
glVertexPointer(3) -- define an array of vertex data
|
glVertexPointer() specifies the location and data of an array of vertex coordinates to use when rendering. size specifies the number of coordinates per vertex and type the data type of the coordinates... |
glViewport(3) -- set the viewport
|
glViewport() specifies the affine transformation of x and y from normalized device coordinates to window coordinates. Let (x[n]d, y[n]d) be normalized device coordinates. Then the window coordinates (... |
glXChooseVisual(3) -- return a visual that matches specified attributes
|
glXChooseVisual() returns a pointer to an XVisualInfo structure describing the visual that best meets a minimum specification. The boolean GLX attributes of the visual that is returned will match the ... |
glXCopyContext(3) -- copy state from one rendering context to another
|
glXCopyContext() copies selected groups of state variables from src to dst. mask indicates which groups of state variables are to be copied. mask contains the bitwise OR of the same symbolic names tha... |
glXCreateContext(3) -- create a new GLX rendering context
|
glXCreateContext() creates a GLX rendering context and returns its handle. This context can be used to render into both windows and GLX pixmaps. If glXCreateContext() fails to create a rendering conte... |
glXCreateGLXPixmap(3) -- create an off-screen GLX rendering area
|
glXCreateGLXPixmap() creates an off-screen rendering area and returns its XID. Any GLX rendering context that was created with respect to vis can be used to render into this off-screen area. Use glXMa... |
glXDestroyContext(3) -- destroy a GLX context
|
If the GLX rendering context ctx is not current to any thread, glXDestroyContext() destroys it immediately. Otherwise, ctx is destroyed when it becomes not current to any thread. In either case, the r... |
glXDestroyGLXPixmap(3) -- destroy a GLX pixmap
|
If the GLX pixmap pix is not current to any client, glXDestroyGLXPixmap() destroys it immediately. Otherwise, pix is destroyed when it becomes not current to any client. In either case, the resource I... |
glXFreeContextEXT(3) -- free client-side memory for imported context
|
glXFreeContextEXT() frees the client-side part of a GLXContext that was created with glXImportContext(). glXFreeContextEXT() does not free the server-side context information or the XID associated wit... |
glXGetClientString(3) -- return a string describing the client
|
glXGetClientString() returns a string describing some aspect of the client library. The possible values for name are GLX_VENDOR, GLX_VERSION, and GLX_EXTENSIONS. If name is not set to one of these val... |
glXGetConfig(3) -- return information about GLX visuals
|
glXGetConfig() sets value to the attrib value of windows or GLX pixmaps created with respect to vis. glXGetConfig() returns an error code if it fails for any reason. Otherwise, zero is returned. attri... |
glXGetContextIDEXT(3) -- get the XID for a context.
|
glXGetContextIDEXT() returns the XID associated with a GLXContext. No round trip is forced to the server; unlike most X calls that return a value, glXGetContextIDEXT() does not flush any pending event... |
glXGetCurrentContext(3) -- return the current context
|
glXGetCurrentContext() returns the current context, as specified by glXMakeCurrent(). If there is no current context, NULL is returned. glXGetCurrentContext() returns client-side information. It does ... |
glXGetCurrentDisplay(3) -- get display for current context
|
glXGetCurrentDisplay() returns the display for the current context. If no context is current, NULL is returned. glXGetCurrentDisplay() returns client-side information. It does not make a round trip to... |
glXGetCurrentDrawable(3) -- return the current drawable
|
glXGetCurrentDrawable() returns the current drawable, as specified by glXMakeCurrent(). If there is no current drawable, None is returned. glXGetCurrentDrawable() returns client-side information. It d... |
glXImportContextEXT(3) -- import another process's indirect rendering context.
|
glXImportContextEXT() creates a GLXContext given the XID of an existing GLXContext. It may be used in place of glXCreateContext(), to share another process's indirect rendering context. Only the serv... |
glXIntro(3) -- Introduction to OpenGL in the X window system
|
|
glXIsDirect(3) -- indicate whether direct rendering is enabled
|
glXIsDirect() returns True if ctx is a direct rendering context, False otherwise. Direct rendering contexts pass rendering commands directly from the calling process's address space to the rendering ... |
glXMakeCurrent(3) -- attach a GLX context to a window or a GLX pixmap
|
glXMakeCurrent() does two things: It makes ctx the current GLX rendering context of the calling thread, replacing the previously current context if there was one, and it attaches ctx to a GLX drawable... |
glXQueryContextInfoEXT(3) -- query context information
|
glXQueryContextInfoEXT() returns the the visual id, screen number, and share list of ctx. This call may cause a round trip to the server. glXQueryContextInfoEXT() is part of the EXT_import_context ext... |
glXQueryExtension(3) -- indicate whether the GLX extension is supported
|
glXQueryExtension() returns True if the X server of connection dpy supports the GLX extension, False otherwise. If True is returned, then errorBase and eventBase return the error base and event base o... |
glXQueryExtensionsString(3) -- return list of supported extensions
|
glXQueryExtensionsString() returns a pointer to a string describing which GLX extensions are supported on the connection. The string is null-terminated and contains a space-separated list of extension... |
glXQueryServerString(3) -- return string describing the server
|
glXQueryServerString() returns a pointer to a static, null-terminated string describing some aspect of the server's GLX extension. The possible values for name and the format of the strings is the sa... |
glXQueryVersion(3) -- return the version numbers of the GLX extension
|
glXQueryVersion() returns the major and minor version numbers of the GLX extension implemented by the server associated with connection dpy. Implementations with the same major version number are upwa... |
glXSwapBuffers(3) -- exchange front and back buffers
|
glXSwapBuffers() promotes the contents of the back buffer of drawable to become the contents of the front buffer of drawable. The contents of the back buffer then become undefined. The update typicall... |
glXUseXFont(3) -- create bitmap display lists from an X font
|
glXUseXFont() generates count display lists, named listBase through listBase+count-1, each containing a single glBitmap() command. The parameters of the glBitmap() command of display list listBase+i a... |
glXWaitGL(3) -- complete GL execution prior to subsequent X calls
|
GL rendering calls made prior to glXWaitGL() are guaranteed to be executed before X rendering calls made after glXWaitGL(). Although this same result can be achieved using glFinish(), glXWaitGL() does... |
glXWaitX(3) -- complete X execution prior to subsequent GL calls
|
X rendering calls made prior to glXWaitX() are guaranteed to be executed before GL rendering calls made after glXWaitX(). Although the same result can be achieved using XSync, glXWaitX() does not requ... |
gmtime(3) -- converts time units
|
The asctime(), ctime(), gmtime(), localtime(), mktime(), and tzset() functions convert time values between tm structures, time_t type variables, and strings. [POSIX] The asctime_r(), ctime_r(), gmtime... |
gmtime64(3) -- converts time units
|
The asctime(), ctime(), gmtime(), localtime(), mktime(), and tzset() functions convert time values between tm structures, time_t type variables, and strings. [POSIX] The asctime_r(), ctime_r(), gmtime... |
gmtime64_r(3) -- converts time units
|
The asctime(), ctime(), gmtime(), localtime(), mktime(), and tzset() functions convert time values between tm structures, time_t type variables, and strings. [POSIX] The asctime_r(), ctime_r(), gmtime... |
gmtime_r(3) -- converts time units
|
The asctime(), ctime(), gmtime(), localtime(), mktime(), and tzset() functions convert time values between tm structures, time_t type variables, and strings. [POSIX] The asctime_r(), ctime_r(), gmtime... |
grantpt(3) -- Permit access to the slave pseudoterminal device
|
The grantpt() function modifies the ownership and mode of the slave pseudoterminal device associated with its master pseudoterminal counterpart. The modifications of mode and ownership are performed a... |
gr_idtoname(3) -- Map between user and group names and IDs (Enhanced Security)
|
The mapping functions provide an efficient mapping between user and group names and identifiers (IDs). These functions maintain a separate binary database, which is automatically updated each time the... |
gr_nametoid(3) -- Map between user and group names and IDs (Enhanced Security)
|
The mapping functions provide an efficient mapping between user and group names and identifiers (IDs). These functions maintain a separate binary database, which is automatically updated each time the... |
gsignal(3) -- Set and raise a software signal
|
These functions are obsolete and are retained for compatibility with earlier versions of the operating system. The ssignal() and gsignal() functions implement a facility similar to that of the signal(... |
gsignal_r(3) -- Set and raise a software signal
|
These functions are obsolete and are retained for compatibility with earlier versions of the operating system. The ssignal() and gsignal() functions implement a facility similar to that of the signal(... |
gss_accept_sec_context(3) -- Establish a remotely-initiated security context.
|
The gss_accept_sec_context() function allows establishment of a remotely-initiated security context between an application and its peer. A security context must be established prior to exchanging secu... |
gss_acquire_cred(3) -- Acquire credentials for a specific internal name.
|
The gss_acquire_cred() function allows an application to acquire credentials by principal name. The credentials must already exist in a credentials cache created by a kinit command, HP Credentials Man... |
gss_add_cred(3) -- Obtain credentials that allow a user to accept security contexts.
|
The gss_add_cred() function allows an application to construct credentials iteratively by adding credential elements for different security mechanisms. It can be used to: Create new credentials contai... |
gss_add_oid_set_member(3) -- Construct a set of OISDs.
|
The gss_add_oid_set_member() function adds an object identifier to an OID set. Use this function to construct the set of OIDs for Kerberos 5 that is input to gss_acquire_cred(). This function copies t... |
gss_canonicalize_name(3) -- Extract single mechanism name from
|
The gss_canonicalize_name() function reduces an internal form name that contains elements corresponding to multiple security mechanisms, to a mechanism name (MN) that is mechanism-specific. This funct... |
gss_close(3) -- Application Security SDK supports this function only for compatibility. This function is not require...
|
|
gss_compare_name(3) -- Compare two internal form names.
|
The gss_compare_name() function compares two internal form names to determine if they are the same. When a name is created using a function such as gss_import_name(), an aggregate structure is built w... |
gss_context_time(3) -- Determine remaining lifetime of security context.
|
The gss_context_time() function returns the number of seconds remaining in the security context's lifetime. The HP Application Security SDK does not support context expiration. A security context est... |
gss_create_empty_oid_set(3) -- Eatablish an OID set containing no OIDs.
|
The gss_create_empty_oid_set() function establishes an OID set containing no object identifiers. Use this function in conjunction with gss_add_oid_set_member() to construct a set of OIDs for Kerberos ... |
gss_delete_sec_context(3) -- Release a security context.
|
The gss_delete_sec_context() function releases a security context. The security context is then unusable for further message protection. Local data structures associated with the security context are ... |
gss_display_name(3) -- Convert internal form name to plain text.
|
The gss_display_name() function converts an internal form name to text. This allows an application to obtain a printable representation of the internal name. The syntax of a printable name is defined ... |
gss_display_status(3) -- Convert GSS-API return codes to text.
|
The gss_display_status() function returns text representations of GSS-API status codes for display to the user or for logging purposes. Since some status codes may indicate multiple errors, applicatio... |
gss_duplicate_name(3) -- Copy existing internal form name.
|
The gss_duplicate_name() function creates an exact copy of an existing internal form name. The new name is independent of the original name. This means both names must both be released after use, and ... |
gss_export_name(3) -- Produce a contiguous string representation of a mechanism name.
|
The gss_export_name() function produces a contiguous string representation of a mechanism name. The input_name parameter must specify a valid MN (that is, an internal form name generated by gss_accept... |
gss_export_sec_context(3) -- Prepare security context for transfer to another process.
|
The gss_export_sec_context() function prepares a security context for transfer to another process. It is typically used by the context acceptor in an application where a single process receives incomi... |
gss_get_mic(3) -- generate a checksum for a supplied message. Does not include the message
|
The gss_get_mic() function generates a checksum, called a message integrity code (MIC), for the supplied message. The checksum is placed in a token that is transferred to the peer application when the... |
gss_import_name(3) -- Convert text name to internal form name.
|
The gss_import_name() function converts a text name into an internal form name. The name type describes the parsing syntax, or rule, to use with the text name. The internal form of the name is returne... |
gss_import_sec_context(3) -- Import a security context established by another process.
|
The gss_import_sec_context() function allows a process to import a security context established by another process. A given interprocess token should be imported only once. Note Because of the way seq... |
gss_indicate_mechs(3) -- Return an OID set of the available security mecahnisms.
|
The gss_indicate_mechs() function returns an OID set of the available security mechanisms. The HP implementation of GSS-API supports Kerberos 5. |
gss_init_sec_context(3) -- Initiate a security context between an application and its peer.
|
The gss_init_sec_context() function initiates the establishment of a security context between an application and its peer. A security context must be established prior to exchanging secured messages. ... |
gss_inquire_context(3) -- Obtain information about an existing security context.
|
The gss_inquire_context() function obtains information about a security context. The application must already have initiated the context, although the context need not be fully established. When the a... |
gss_inquire_cred(3) -- Obtain information about credentials.
|
The gss_inquire_cred() function obtains information about credentials. This information includes the principal name whose identity the credentials represent, the remaining validity period (initiators ... |
gss_inquire_cred_by_mech(3) -- obtain information about credentials for a specific security mechanism
|
The gss_inquire_cred_by_mech() function obtains information about credentials for a specified security mechanism. This information includes the principal name whose identity the credentials represent,... |
gss_inquire_mechs_for_name(3) -- Identify security mechanisms that can process a given name.
|
The gss_inquire_mechs_for_name() function identifies the mechanisms that can process the specified name. Since Kerberos 5 is the only security mechanism supported by the HP Application Security Toolki... |
gss_inquire_names_for_mech(3) -- Identify name types supported by a specific security mechanism.
|
The gss_inquire_names_for_mech() function identifies the name types that are supported by a particular mechanism. Since Kerberos 5 is the only security mechanism supported by the HP Application Securi... |
gss_oid_to_str(3) -- Display OID as a string.
|
The function gss_oid_to_str() returns a string representing the input OID in numeric ANS.1 syntax format (enclosed in curly-braces, space-delimited, e.g. "{2 16 840 1 113687 1 2 1}"). The string is ... |
gss_open(3) -- Application Security SDK supports this function only for compatibility. This function is not require...
|
|
gss_process_context_token(3) -- Process token received from peer application.
|
The gss_process_context_token() function processes a token sent asynchronously from the peer application. Note This function performs no action in the HP implementation of the GSS-API. It is included ... |
gss_release_buffer(3) -- Free storage associated with buffer.
|
The gss_release_buffer() function frees storage associated with a buffer. The storage must have been allocated by a GSS-API function call. Use this function to prevent memory leaks. Passing in a NULL ... |
gss_release_cred(3) -- Free resource associated with credential.
|
The gss_release_cred() function informs the GSS-API that the specified credentials handle is no longer required and frees associated resources. The data structure housing a copy of the credentials wit... |
gss_release_name(3) -- Delete an internal form name.
|
The gss_release_name() function deletes an internal form name. The HP implementation of GSS-API sets the name to GSS_C_NO_NAME upon successful completion of this call. Use this function to free the GS... |
gss_release_oid(3) -- Free storage of an OID object.
|
Allows the caller to release the storage associated with an OBJECT IDENTIFIER buffer allocated by another GSS_API call. This call's specific behavior depends on the language and programming environme... |
gss_release_oid_set(3) -- Free the storage associated with an OID set
|
The gss_release_oid_set() function frees the storage associated with an OID set created previously with a GSS-API function call. Use this function to prevent memory leaks. This function frees the stor... |
gss_seal(3) -- Application Security SDK supports this function only for compatibility with earlier versions. HP rec...
|
|
gss_sign(3) -- Application Security SDK supports this function only for compatibility with earlier versions. HP rec...
|
|
gss_str_to_oid(3) -- Construct OID from string.
|
The function gss_str_to_oid() constructs and returns an OID from its printable form. The OID is suitable for release using the function gss_release_oid(). If the input oid_str cannot be translated int... |
gss_test_oid_set_member(3) -- Determine if an OID is a member of a set.
|
The gss_test_oid_set_member() function interrogates an OID set to determine whether a specified OID is a member. Use this function with OID sets returned by a GSS-API function call. |
gss_unseal(3) -- Application Security SDK supports this function only for compatibility with earlier versions. HP rec...
|
|
gss_unwrap(3) -- Converts a protected message to a usable form.
|
The gss_unwrap() function converts a previously protected message back to a usable form by: Verifying the checksum to check message integrity. Decrypting the message if confidentiality was used. This ... |
gss_verify(3) -- Application Security SDK supports this function only for compatibility with earlier versions. HP rec...
|
|
gss_verify_mic(3) -- Verify checksum of a message.
|
The gss_verify_mic() function verifies that the checksum fits the specified message. This function is used in conjunction with gss_get_mic() to protect messages when they are transferred between an ap... |
gss_wrap(3) -- generate a checksum for the supplied message. Can also include the message
|
The gss_wrap() function generates a checksum, called a message integrity code (MIC), for the supplied message. The checksum and the message are placed in a token that is transferred to the peer applic... |
gss_wrap_size_limit(3) -- set the maximum input message size for the required maximum output token
|
The gss_wrap_size_limit() function allows an application to set the maximum input message size for the required maximum output token size. This call is intended for use by applications that communicat... |
gtty(3) -- set and get terminal state
|
The stty() subroutine sets the state of the terminal associated with fd. The gtty() subroutine retrieves the state of the terminal associated with fd. To set the state of a terminal, the stty() call m... |
halfdelay(3) -- Curses
|
The cbreak and nocbreak routines put the terminal into and out of cbreak mode, respectively. In this mode, characters typed by the user are immediately available to the program, and erase/kill charact... |
hash(3) -- hash database access method
|
The routine dbopen() is the library interface to database files. One of the supported file formats is hash files. The general description of the database access methods is in dbopen(3); this manual pa... |
has_colors(3) -- Curses
|
The Curses library includes routines that manipulate color-on-color alphanumeric terminals. To use these routines, applications must call start_color, usually right after initscr. Colors are always us... |
has_ic(3) -- Routines for querying the Curses environment
|
The baudrate routine returns the output speed of the terminal. The number returned is an integer that represents bits per second (for example, 9600). The erasechar routine returns the current erase ch... |
has_il(3) -- Routines for querying the Curses environment
|
The baudrate routine returns the output speed of the terminal. The number returned is an integer that represents bits per second (for example, 9600). The erasechar routine returns the current erase ch... |
hcreate(3) -- Manage hash tables
|
The hsearch(), hcreate(), and hdestroy() functions are used to manage hash table operations: The hcreate() function initializes the hash table. You must call the hcreate() function before calling the ... |
hcreate_r(3) -- Manage hash tables
|
The hsearch(), hcreate(), and hdestroy() functions are used to manage hash table operations: The hcreate() function initializes the hash table. You must call the hcreate() function before calling the ... |
hdestroy(3) -- Manage hash tables
|
The hsearch(), hcreate(), and hdestroy() functions are used to manage hash table operations: The hcreate() function initializes the hash table. You must call the hcreate() function before calling the ... |
hdestroy_r(3) -- Manage hash tables
|
The hsearch(), hcreate(), and hdestroy() functions are used to manage hash table operations: The hcreate() function initializes the hash table. You must call the hcreate() function before calling the ... |
hline(3) -- Create Curses borders, and horizontal and vertical lines
|
The border, wborder, and box routines draw a border around the edges of the window. Each of the following arguments contains both a character and attributes for a particular part of the border: Left s... |
hline_set(3) -- Draw borders or lines by using complex characters and renditions
|
The border_set and wborder_set functions draw a border around the edges of the current or specified window. These functions do not advance the cursor position, do not perform special character process... |
HMAC(3) -- HMAC message authentication code
|
HMAC is a message authentication code (MAC), i.e. a keyed hash function used for message authentication, which is based on a hash function. The HMAC() function computes the message authentication code... |
HMAC_cleanup(3) -- HMAC message authentication code
|
HMAC is a message authentication code (MAC), i.e. a keyed hash function used for message authentication, which is based on a hash function. The HMAC() function computes the message authentication code... |
HMAC_Final(3) -- HMAC message authentication code
|
HMAC is a message authentication code (MAC), i.e. a keyed hash function used for message authentication, which is based on a hash function. The HMAC() function computes the message authentication code... |
HMAC_Init(3) -- HMAC message authentication code
|
HMAC is a message authentication code (MAC), i.e. a keyed hash function used for message authentication, which is based on a hash function. The HMAC() function computes the message authentication code... |
HMAC_Update(3) -- HMAC message authentication code
|
HMAC is a message authentication code (MAC), i.e. a keyed hash function used for message authentication, which is based on a hash function. The HMAC() function computes the message authentication code... |
host2netname(3) -- miscellaneous library routines for ONC remote procedure calls
|
The RPC routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the... |
hostalias(3) -- Search for host aliases
|
The hostalias() function searches for the alias associated with the name. The HOSTALIASES environment variable defines the name of a file in which aliases are kept, in the form: host alias |
hsearch(3) -- Manage hash tables
|
The hsearch(), hcreate(), and hdestroy() functions are used to manage hash table operations: The hcreate() function initializes the hash table. You must call the hcreate() function before calling the ... |
hsearch_r(3) -- Manage hash tables
|
The hsearch(), hcreate(), and hdestroy() functions are used to manage hash table operations: The hcreate() function initializes the hash table. You must call the hcreate() function before calling the ... |
htonl(3) -- Convert an unsigned 32-bit integer from host byte
|
The htonl() (host-to-network long) function converts an unsigned 32-bit integer from host byte order to Internet network-byte order. The Internet network requires address and port reference data in ne... |
htons(3) -- Convert an unsigned short (16-bit) integer from host byte order to network byte order
|
The htons() (host-to-network short) function converts an unsigned short (16-bit) integer from host byte order to Internet network-byte order. The Internet network requires address and port reference d... |
hypot(3) -- Calculate Euclidean distance and absolute value
|
The hypot(), hypotf(), and hypotl() functions compute the length of the hypotenuse of a right triangle, where x and y represent the perpendicular sides of the triangle. The hypot(x,y), hypotf(x,y) and... |
i2d_DHparams(3) -- Purpose to be supplied.
|
To be supplied. |
i2d_Netscape_RSA(3) -- Purpose to be supplied.
|
To be supplied. |
i2d_RSAPrivateKey(3) -- Purpose to be supplied.
|
To be supplied. |
i2d_RSAPublicKey(3) -- Purpose to be supplied.
|
To be supplied. |
i2d_SSL_SESSION(3) -- Convert SSL_SESSION object to or from ASN1 representation
|
The d2i_SSL_SESSION() function transforms the external ASN1 representation of an SSL/TLS session, stored as binary data at location pp with length length, into an SSL_SESSION object. The i2d_SSL_SESSI... |
iconv(3) -- Convert a string of characters from one codeset to another codeset
|
The iconv() function converts a string of characters in inbuf into a different codeset and returns the results in outbuf. The required converter is identified by cd, which must be a valid descriptor r... |
iconv_close(3) -- Close a specified codeset converter
|
The iconv_close() function closes a converter previously opened with iconv_open() and deallocates any resources used by the specified converter. |
iconv_open(3) -- Open a character codeset converter
|
The iconv_open() function initializes a codeset converter. This converter is used by the iconv function to convert characters from one codeset to another. The iconv_open() function finds the converter... |
idaddset(3) -- Perform operations on ID sets (libc library)
|
The ID set operation primitives manipulate sets of member IDs by operating on objects (of type idset_t) that are created by idsetcreate(). Unlike a CPU set or RAD set, whose members are CPU or RAD ide... |
idandset(3) -- Perform operations on ID sets (libc library)
|
The ID set operation primitives manipulate sets of member IDs by operating on objects (of type idset_t) that are created by idsetcreate(). Unlike a CPU set or RAD set, whose members are CPU or RAD ide... |
idcok(3) -- Routines for controlling output options for a Curses terminal
|
These routines set options that deal with output within Curses. Unless stated otherwise, all options are initially FALSE. It is not necessary to turn these options off before calling endwin. The clear... |
idcopyset(3) -- Perform operations on ID sets (libc library)
|
The ID set operation primitives manipulate sets of member IDs by operating on objects (of type idset_t) that are created by idsetcreate(). Unlike a CPU set or RAD set, whose members are CPU or RAD ide... |
idcountset(3) -- Perform operations on ID sets (libc library)
|
The ID set operation primitives manipulate sets of member IDs by operating on objects (of type idset_t) that are created by idsetcreate(). Unlike a CPU set or RAD set, whose members are CPU or RAD ide... |
iddelset(3) -- Perform operations on ID sets (libc library)
|
The ID set operation primitives manipulate sets of member IDs by operating on objects (of type idset_t) that are created by idsetcreate(). Unlike a CPU set or RAD set, whose members are CPU or RAD ide... |
iddiffset(3) -- Perform operations on ID sets (libc library)
|
The ID set operation primitives manipulate sets of member IDs by operating on objects (of type idset_t) that are created by idsetcreate(). Unlike a CPU set or RAD set, whose members are CPU or RAD ide... |
idemptyset(3) -- Perform operations on ID sets (libc library)
|
The ID set operation primitives manipulate sets of member IDs by operating on objects (of type idset_t) that are created by idsetcreate(). Unlike a CPU set or RAD set, whose members are CPU or RAD ide... |
identity(3) -- Get or check user or group IDs (Enhanced Security)
|
The identity functions provide a way to recall the IDs of a process at the time the program started. They are useful when interrogating the invoking environment of a program after any setuid() or setg... |
idfillset(3) -- Perform operations on ID sets (libc library)
|
The ID set operation primitives manipulate sets of member IDs by operating on objects (of type idset_t) that are created by idsetcreate(). Unlike a CPU set or RAD set, whose members are CPU or RAD ide... |
idisemptyset(3) -- Perform operations on ID sets (libc library)
|
The ID set operation primitives manipulate sets of member IDs by operating on objects (of type idset_t) that are created by idsetcreate(). Unlike a CPU set or RAD set, whose members are CPU or RAD ide... |
idismember(3) -- Perform operations on ID sets (libc library)
|
The ID set operation primitives manipulate sets of member IDs by operating on objects (of type idset_t) that are created by idsetcreate(). Unlike a CPU set or RAD set, whose members are CPU or RAD ide... |
idlok(3) -- Routines for controlling output options for a Curses terminal
|
These routines set options that deal with output within Curses. Unless stated otherwise, all options are initially FALSE. It is not necessary to turn these options off before calling endwin. The clear... |
idorset(3) -- Perform operations on ID sets (libc library)
|
The ID set operation primitives manipulate sets of member IDs by operating on objects (of type idset_t) that are created by idsetcreate(). Unlike a CPU set or RAD set, whose members are CPU or RAD ide... |
idsetcreate(3) -- Perform operations on ID sets (libc library)
|
The ID set operation primitives manipulate sets of member IDs by operating on objects (of type idset_t) that are created by idsetcreate(). Unlike a CPU set or RAD set, whose members are CPU or RAD ide... |
idsetdestroy(3) -- Perform operations on ID sets (libc library)
|
The ID set operation primitives manipulate sets of member IDs by operating on objects (of type idset_t) that are created by idsetcreate(). Unlike a CPU set or RAD set, whose members are CPU or RAD ide... |
idsetops(3) -- Perform operations on ID sets (libc library)
|
The ID set operation primitives manipulate sets of member IDs by operating on objects (of type idset_t) that are created by idsetcreate(). Unlike a CPU set or RAD set, whose members are CPU or RAD ide... |
idxorset(3) -- Perform operations on ID sets (libc library)
|
The ID set operation primitives manipulate sets of member IDs by operating on objects (of type idset_t) that are created by idsetcreate(). Unlike a CPU set or RAD set, whose members are CPU or RAD ide... |
id_foreach(3) -- enumerate members of an ID set (libc library)
|
The id_foreach() function scans the specified idset, starting at the position saved in the cursor parameter, for members of the set and returns the first member found. If the SET_CURSOR_FIRST flag is ... |
ieee(3) -- libc ieee trap enable support routines
|
These routines support the implementation of the IEEE Standard for Binary Floating-Point Arithmetic. IEEE-format floating-point operations are subject to the following traps: Invalid operation Divisio... |
ieee_functions(3) -- Related miscellaneous IEEE arithmetic functions.
|
The copysign(), copysignf(), and copysignl() functions return x with the same sign as y. IEEE 754 requires copysign(x,NaN), copysignf(x,NaN) and copysignl(x,NaN) to return +x or -x. The finite(), fini... |
ieee_get_fp_control(3) -- libc ieee trap enable support routines
|
These routines support the implementation of the IEEE Standard for Binary Floating-Point Arithmetic. IEEE-format floating-point operations are subject to the following traps: Invalid operation Divisio... |
ieee_get_state_at_signal(3) -- libc ieee trap enable support routines
|
These routines support the implementation of the IEEE Standard for Binary Floating-Point Arithmetic. IEEE-format floating-point operations are subject to the following traps: Invalid operation Divisio... |
ieee_ignore_state_at_signal(3) -- libc ieee trap enable support routines
|
These routines support the implementation of the IEEE Standard for Binary Floating-Point Arithmetic. IEEE-format floating-point operations are subject to the following traps: Invalid operation Divisio... |
ieee_set_fp_control(3) -- libc ieee trap enable support routines
|
These routines support the implementation of the IEEE Standard for Binary Floating-Point Arithmetic. IEEE-format floating-point operations are subject to the following traps: Invalid operation Divisio... |
ieee_set_state_at_signal(3) -- libc ieee trap enable support routines
|
These routines support the implementation of the IEEE Standard for Binary Floating-Point Arithmetic. IEEE-format floating-point operations are subject to the following traps: Invalid operation Divisio... |
if_freenameindex(3) -- Free dynamic memory allocated to the array of interface names and indexes
|
The if_freenameindex() function frees dynamic memory allocated to the array of interface names and indexes that the if_nameindex() function returned. |
if_indextoname(3) -- Map an interface index to an interface name
|
The if_indextoname() function maps an interface index number to its corresponding interface name. |
if_nameindex(3) -- Return an array of all interface names and indexes
|
The if_nameindex() function dynamically allocates memory for an array of if_nameindex structures, one structure for each interface. A structure with a zero (0) if_index value and a NULL if_name value ... |
if_nametoindex(3) -- Map an interface name to an interface index
|
The if_nametoindex() function maps an interface name to its corresponding interface index number. |
ilogb(3) -- Returns an unbiased exponent
|
The ilogb(), ilogbf(), and ilogbl() functions return the integral part of the base r logarithm of (|x|) as a signed integral value for non-zero x, where r is the radix of the machine's floating point... |
immedok(3) -- Routines for controlling output options for a Curses terminal
|
These routines set options that deal with output within Curses. Unless stated otherwise, all options are initially FALSE. It is not necessary to turn these options off before calling endwin. The clear... |
inch(3) -- Get a character and its attributes from a Curses window
|
These routines return the character, of type chtype, at the current position in the named window. If any attributes are set for that position, their values are combined (through an inclusive OR operat... |
inchnstr(3) -- Get a string of characters (and attributes) from a Curses window
|
These routines return a string of type chtype, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the window. The four functions ... |
inchstr(3) -- Get a string of characters (and attributes) from a Curses window
|
These routines return a string of type chtype, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the window. The four functions ... |
index(3) -- Search for character in string
|
The index() function locates the first occurrence of the integer specified by the c parameter, which is converted to an unsigned char, in the string pointed to by the s parameter. The terminating null... |
inet6_opt_append(3) -- Return the length of an IPv6 extension header with a new option and append the option
|
The inet6_opt_append() function when called with extbuf as a NULL pointer and extlen as 0, returns the updated number of bytes in an extension header. If you specify extbuf as a valid pointer and vali... |
inet6_opt_find(3) -- Find a specific option in an extension header
|
The inet6_opt_find() function searches a received option extension header for an option specified by type. If it finds the specified option, it returns the option length and a pointer to the option da... |
inet6_opt_finish(3) -- Return the total length of an IPv6 extension header, including padding, and initialize the option
|
The inet6_opt_finish() function when called with extbuf as a NULL pointer and extlen as 0, returns the total number of bytes in an extension header, including final padding. If you specify extbuf as a... |
inet6_opt_get_val(3) -- Extract data items from the data portion of an IPv6 option
|
The inet6_opt_get_val() function copies data items from data buffer databuf beginning at offset to the location val. In addition, it returns the offset for the next data field to assist you in extract... |
inet6_opt_init(3) -- Return the length of an IPv6 extension header with no options and initialize the header
|
The inet6_opt_init() function when called with extbuf as a NULL pointer and extlen as 0, returns the number of bytes in an extension header that has no options. If you specify extbuf as a valid pointe... |
inet6_opt_next(3) -- Parse received option extension headers
|
The inet6_opt_next() function parses a received option extension header and returns the next option. In addition, it returns an offset to the next option that you specify in the prevlen parameter to s... |
inet6_opt_set_val(3) -- Insert data items into the data portion of the IPv6 option
|
The inet6_opt_set_val() function copies data items at the location val into a data buffer databuf beginning at offset. In addition, it returns the offset for the next data field to assist you in compo... |
inet6_rth_add(3) -- Add an IPv6 address to the Routing header under construction
|
The inet6_rth_add() function adds IPv6 address to the end of the Routing header under construction. The address pointed to by addr cannot be either an IPv6 V4-mapped address or an IPv6 multicast addre... |
inet6_rth_getaddr(3) -- Retrieve an address for an index from an IPv6 Routing header
|
The inet6_rth_getaddr() function uses a specified index value and retrieves a pointer to an address in a Routing header specified by bp. Call inet6_rth_segments() before calling this function in order... |
inet6_rth_init(3) -- Initialize an IPv6 Routing header buffer
|
The inet6_rth_init() function initializes a buffer and buffer data for an IPv6 Routing header. The function sets the ip60r_segleft, ip6r0_nxt, and ip6r0_reserved members in the ip6_rthdr0 structure to... |
inet6_rth_reverse(3) -- Reverse the order of addresses in an IPv6 Routing header
|
The inet6_rth_reverse() function reads an IPv6 Routing header and writes a new Routing header, reversing the order of addresses in the new header. The in and out parameters can point to the same buffe... |
inet6_rth_segments(3) -- Return the number of segments (addresses) in an IPv6 Routing header
|
The inet6_rth_segments() function returns the number of segments (or addresses) in an IPv6 Routing header. |
inet6_rth_space(3) -- Return the number of bytes required for an IPv6 Routing header
|
The inet6_rth_space() function determines the amount of space, in bytes, required for a Routing header. Although the function returns the amount of space required, it does not allocate buffer space. T... |
inet_addr(3) -- Translate an Internet network address string to an Internet address integer
|
The inet_addr() function translates a dot-formatted Internet character address string to an Internet address integer. The Internet address integer is returned as a network byte-ordered integer. Values... |
inet_lnaof(3) -- Translate an Internet address integer into its host (local) address component
|
The inet_lnaof() function translates an Internet network byte-ordered address into its host (local) address component. The host address is returned in host byte-order. |
inet_makeaddr(3) -- Translate an Internet network address and
|
The inet_makeaddr() function translates a network number and a local host address into their equivalent Internet address. The Internet address is returned in network-byte order. |
inet_netof(3) -- Translate an Internet address into its network address component
|
The inet_netof() function translates an Internet address into its network address component. The network address integer is returned in host-byte order. |
inet_network(3) -- Translate an Internet dot-formatted address string to a network address integer
|
The inet_network() function translates a dot-formatted Internet network character address string to a network byte-ordered address (most significant byte leftmost, least significant byte rightmost). V... |
inet_ntoa(3) -- Translate an Internet address into a dot-formatted character string
|
The inet_ntoa() function translates an Internet network byte-ordered address into a dot-formatted character string. |
inet_ntop(3) -- Convert a numeric address to a text string
|
The use of this routine is deprecated. Use the getnameinfo(3) routine instead. The inet_ntop() function converts a binary Internet address value to a formatted text string. |
inet_pton(3) -- Convert a text string to a numeric address
|
The use of this routine is deprecated. Use the getaddrinfo(3) routine instead; it is also protocol-independent. The inet_pton() function converts a text string to a numeric value in Internet network-b... |
initgroups(3) -- Initialize concurrent group set
|
The initgroups() function reads the defined group membership of the specified user and sets the concurrent group set of the current process to that value. The base_gid parameter is always included in ... |
Initialize(3) -- Verify module version (CDSA)
|
This function checks whether the current version of the module is compatible with the CSSM version specified as input and performs any module-manager-specific setup activities. |
initprivs(3) -- Initializes privileges (Enhanced Security)
|
The initprivs() function initializes the privilege library. The only privilege currently available is that of root. |
initscr(3) -- Curses routines for screen initialization and manipulation
|
The initscr routine is almost always the first routine that applications call. (The exceptions are slk_init, filter, ripoffline, use_env and, for multiple-terminal applications, newterm). The initscr ... |
initstate(3) -- Generate pseudo-random number
|
The random() and srandom() functions are random number generators that have virtually the same calling sequence and initialization properties as the rand() and srand() functions, but produce sequences... |
initstate_r(3) -- Generate pseudo-random number
|
The random() and srandom() functions are random number generators that have virtually the same calling sequence and initialization properties as the rand() and srand() functions, but produce sequences... |
init_color(3) -- Curses
|
The Curses library includes routines that manipulate color-on-color alphanumeric terminals. To use these routines, applications must call start_color, usually right after initscr. Colors are always us... |
init_pair(3) -- Curses
|
The Curses library includes routines that manipulate color-on-color alphanumeric terminals. To use these routines, applications must call start_color, usually right after initscr. Colors are always us... |
innetgr(3) -- Get network group entry
|
The innetgr() routine accesses the netgroup file and checks to see if the specified input parameters match an entry in the file. The routine returns 1 if it matches an entry, or 0 if it does not. Any ... |
innstr(3) -- Get a string of characters from a Curses window
|
These routines return the string of characters in str, starting at the current cursor position in the named window and ending at the right margin of the window. Attributes are stripped from the charac... |
innwstr(3) -- Get a string of wchar_t characters from a Curses window
|
These routines return a string of wchar_t characters in str, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the window. The f... |
insch(3) -- Insert a character before the character under the cursor in a Curses window
|
These routines insert the character ch before the character under the cursor. All characters to the right of the cursor are moved one space to the right, with the possibility of the rightmost characte... |
insdelln(3) -- Delete or insert lines in a Curses window
|
The deleteln and wdeleteln routines do the following: Delete the line under the cursor in the current or specified window Move all lines below the current line up one line Clear the bottom line of the... |
insertln(3) -- Delete or insert lines in a Curses window
|
The deleteln and wdeleteln routines do the following: Delete the line under the cursor in the current or specified window Move all lines below the current line up one line Clear the bottom line of the... |
insnstr(3) -- Insert a string before the character under the cursor in a Curses window
|
These routines insert a character string (as many characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are moved to the right, with the ... |
insnwstr(3) -- Insert a wchar_t string before the character under the cursor in a Curses window
|
These routines insert a wchar_t character string (as many wchar_t characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are moved to the ... |
insque(3) -- Insert or removes an element in a queue
|
The insque() and remque() functions manipulate queues built from doubly-linked lists. The queue can be either circular or linear. An application using these functions must define a structure in which ... |
insstr(3) -- Insert a string before the character under the cursor in a Curses window
|
These routines insert a character string (as many characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are moved to the right, with the ... |
instr(3) -- Get a string of characters from a Curses window
|
These routines return the string of characters in str, starting at the current cursor position in the named window and ending at the right margin of the window. Attributes are stripped from the charac... |
inswch(3) -- Insert a wchar_t character before the character under the cursor in a Curses window
|
These routines insert the character wch, which contains a wide character, before the character under the cursor. All characters to the right of the cursor are moved one space to the right, with the po... |
inswstr(3) -- Insert a wchar_t string before the character under the cursor in a Curses window
|
These routines insert a wchar_t character string (as many wchar_t characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are moved to the ... |
ins_nwstr(3) -- Insert a wide-character string into a Curses window
|
These functions insert a wchar_t character string (as many wchar_t characters as will fit on the line) in the current or specified window immediately before the current or specified position. All char... |
ins_wch(3) -- Insert a complex character and rendition before the character under the cursor in a Curses window
|
These functions insert the complex character wch, along with its rendition, in the current or specified window at the current or specified cursor position. These functions: Do not perform wrapping In ... |
ins_wstr(3) -- Insert a wide-character string into a Curses window
|
These functions insert a wchar_t character string (as many wchar_t characters as will fit on the line) in the current or specified window immediately before the current or specified position. All char... |
intrflush(3) -- Curses
|
The cbreak and nocbreak routines put the terminal into and out of cbreak mode, respectively. In this mode, characters typed by the user are immediately available to the program, and erase/kill charact... |
intro(3) -- Introduction to library functions
|
Section 3 reference pages describe functions that may be found in various libraries. The library functions are those other than the functions that directly invoke Tru64 UNIX system primitives, describ... |
invert(3) -- Perform multiple precision integer arithmetic
|
These functions perform arithmetic on integers of arbitrary length. The integers are stored using the defined type MINT. Pointers to a MINT can be initialized using theitom() function, which sets the ... |
inwch(3) -- Get a wchar_t character and its attributes from a Curses window
|
These routines return the wide character, of type chtype, at the current or specified position in the current or specified window. If any attributes are set for that position, their values included in... |
inwchnstr(3) -- Get a string of wchar_t characters (and attributes) from a Curses window
|
These routines return a string of type chtype, holding wchar_t characters, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the... |
inwchstr(3) -- Get a string of wchar_t characters (and attributes) from a Curses window
|
These routines return a string of type chtype, holding wchar_t characters, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the... |
inwstr(3) -- Get a string of wchar_t characters from a Curses window
|
These routines return a string of wchar_t characters in str, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the window. The f... |
in_wch(3) -- Input a complex character and rendition from a Curses window
|
These functions extract the complex character and rendition from the current or specified position in the current or specified window into the object pointed to by wcval. |
in_wchnstr(3) -- Input an array of complex characters and renditions from a Curses window
|
These functions extract characters from the current or specified window, starting at the current or specified position and ending at the end of the line, and place them in the array pointed to by wchs... |
in_wchstr(3) -- Input an array of complex characters and renditions from a Curses window
|
These functions extract characters from the current or specified window, starting at the current or specified position and ending at the end of the line, and place them in the array pointed to by wchs... |
isalnum(3) -- Classify characters
|
The ctype functions test for membership in a character class in the current locale. Each function tests to see if a character is part of a different character class. If the character is part of the ch... |
isalpha(3) -- Classify characters
|
The ctype functions test for membership in a character class in the current locale. Each function tests to see if a character is part of a different character class. If the character is part of the ch... |
isascii(3) -- Classify characters
|
The ctype functions test for membership in a character class in the current locale. Each function tests to see if a character is part of a different character class. If the character is part of the ch... |
isastream(3) -- Determine if a file descriptor refers to a STREAMS file
|
The isastream() function tests whether a file descriptor it encounters is actually a STREAMS file. |
isatty(3) -- Get the name of a terminal
|
The ttyname() function gets the name of a terminal. It returns a pointer to a string containing the null-terminated pathname of the terminal device associated with the file-descriptor parameter. The i... |
iscntrl(3) -- Classify characters
|
The ctype functions test for membership in a character class in the current locale. Each function tests to see if a character is part of a different character class. If the character is part of the ch... |
isdigit(3) -- Classify characters
|
The ctype functions test for membership in a character class in the current locale. Each function tests to see if a character is part of a different character class. If the character is part of the ch... |
isendwin(3) -- Curses routines for screen initialization and manipulation
|
The initscr routine is almost always the first routine that applications call. (The exceptions are slk_init, filter, ripoffline, use_env and, for multiple-terminal applications, newterm). The initscr ... |
isfdtype(3) -- Test a file descriptor for a specific file type
|
The isfdtype() function tests whether a file descriptor has a specific file type. |
isgraph(3) -- Classify characters
|
The ctype functions test for membership in a character class in the current locale. Each function tests to see if a character is part of a different character class. If the character is part of the ch... |
islower(3) -- Classify characters
|
The ctype functions test for membership in a character class in the current locale. Each function tests to see if a character is part of a different character class. If the character is part of the ch... |
isnan(3) -- Related miscellaneous IEEE arithmetic functions.
|
The copysign(), copysignf(), and copysignl() functions return x with the same sign as y. IEEE 754 requires copysign(x,NaN), copysignf(x,NaN) and copysignl(x,NaN) to return +x or -x. The finite(), fini... |
isprint(3) -- Classify characters
|
The ctype functions test for membership in a character class in the current locale. Each function tests to see if a character is part of a different character class. If the character is part of the ch... |
ispunct(3) -- Classify characters
|
The ctype functions test for membership in a character class in the current locale. Each function tests to see if a character is part of a different character class. If the character is part of the ch... |
isspace(3) -- Classify characters
|
The ctype functions test for membership in a character class in the current locale. Each function tests to see if a character is part of a different character class. If the character is part of the ch... |
isupper(3) -- Classify characters
|
The ctype functions test for membership in a character class in the current locale. Each function tests to see if a character is part of a different character class. If the character is part of the ch... |
iswalnum(3) -- Classify a wide character
|
These functions test a wide character wc for membership in a character class in the current locale. Each function tests to see if a wide character is part of a different character class. If the wide c... |
iswalpha(3) -- Classify a wide character
|
These functions test a wide character wc for membership in a character class in the current locale. Each function tests to see if a wide character is part of a different character class. If the wide c... |
iswcntrl(3) -- Classify a wide character
|
These functions test a wide character wc for membership in a character class in the current locale. Each function tests to see if a wide character is part of a different character class. If the wide c... |
iswctype(3) -- Determine the properties of a wide character
|
The iswctype() function tests the wide character specified by the wc parameter to determine if it has the property specified by the wc_prop parameter. The wctype() function associates a character prop... |
iswdigit(3) -- Classify a wide character
|
These functions test a wide character wc for membership in a character class in the current locale. Each function tests to see if a wide character is part of a different character class. If the wide c... |
iswgraphiswlower(3) -- Classify a wide character
|
These functions test a wide character wc for membership in a character class in the current locale. Each function tests to see if a wide character is part of a different character class. If the wide c... |
iswprint(3) -- Classify a wide character
|
These functions test a wide character wc for membership in a character class in the current locale. Each function tests to see if a wide character is part of a different character class. If the wide c... |
iswpunct(3) -- Classify a wide character
|
These functions test a wide character wc for membership in a character class in the current locale. Each function tests to see if a wide character is part of a different character class. If the wide c... |
iswspace(3) -- Classify a wide character
|
These functions test a wide character wc for membership in a character class in the current locale. Each function tests to see if a wide character is part of a different character class. If the wide c... |
iswupper(3) -- Classify a wide character
|
These functions test a wide character wc for membership in a character class in the current locale. Each function tests to see if a wide character is part of a different character class. If the wide c... |
iswxdigit(3) -- Classify a wide character
|
These functions test a wide character wc for membership in a character class in the current locale. Each function tests to see if a wide character is part of a different character class. If the wide c... |
isxdigit(3) -- Classify characters
|
The ctype functions test for membership in a character class in the current locale. Each function tests to see if a character is part of a different character class. If the character is part of the ch... |
is_linetouched(3) -- Curses routines that control refresh
|
The touchwin and touchline routines throw away all optimization information about which parts of the window have been touched, by pretending that the entire window has been drawn on. It is sometimes n... |
is_starting_egid(3) -- Get or check user or group IDs (Enhanced Security)
|
The identity functions provide a way to recall the IDs of a process at the time the program started. They are useful when interrogating the invoking environment of a program after any setuid() or setg... |
is_starting_euid(3) -- Get or check user or group IDs (Enhanced Security)
|
The identity functions provide a way to recall the IDs of a process at the time the program started. They are useful when interrogating the invoking environment of a program after any setuid() or setg... |
is_starting_luid(3) -- Get or check user or group IDs (Enhanced Security)
|
The identity functions provide a way to recall the IDs of a process at the time the program started. They are useful when interrogating the invoking environment of a program after any setuid() or setg... |
is_starting_rgid(3) -- Get or check user or group IDs (Enhanced Security)
|
The identity functions provide a way to recall the IDs of a process at the time the program started. They are useful when interrogating the invoking environment of a program after any setuid() or setg... |
is_starting_ruid(3) -- Get or check user or group IDs (Enhanced Security)
|
The identity functions provide a way to recall the IDs of a process at the time the program started. They are useful when interrogating the invoking environment of a program after any setuid() or setg... |
is_wintouched(3) -- Curses routines that control refresh
|
The touchwin and touchline routines throw away all optimization information about which parts of the window have been touched, by pretending that the entire window has been drawn on. It is sometimes n... |
itom(3) -- Perform multiple precision integer arithmetic
|
These functions perform arithmetic on integers of arbitrary length. The integers are stored using the defined type MINT. Pointers to a MINT can be initialized using theitom() function, which sets the ... |
itrunc(3) -- truncate a floating-point number
|
The itrunc() function returns the signed integer nearest to the double-precision floating value x in the direction of 0.0. This effectively truncates x by discarding its fraction component. The uitrun... |
j0(3) -- Compute Bessel functions
|
The j0(), j0f(), j0l(), j1(), j1f(), and j1l() functions return the value of the Bessel function of the first kind of orders 0 (zero) and 1, respectively. The jn(), jnf(), and jnl() functions return t... |
j1(3) -- Compute Bessel functions
|
The j0(), j0f(), j0l(), j1(), j1f(), and j1l() functions return the value of the Bessel function of the first kind of orders 0 (zero) and 1, respectively. The jn(), jnf(), and jnl() functions return t... |
jn(3) -- Compute Bessel functions
|
The j0(), j0f(), j0l(), j1(), j1f(), and j1l() functions return the value of the Bessel function of the first kind of orders 0 (zero) and 1, respectively. The jn(), jnf(), and jnl() functions return t... |
jrand48(3) -- Generate uniformly distributed pseudorandom number sequences
|
This family of functions generates pseudorandom numbers using the linear congruential algorithm and 48-bit integer arithmetic. The drand48() and erand48() functions return nonnegative, double-precisio... |
jrand48_r(3) -- Generate uniformly distributed pseudorandom number sequences
|
This family of functions generates pseudorandom numbers using the linear congruential algorithm and 48-bit integer arithmetic. The drand48() and erand48() functions return nonnegative, double-precisio... |
keyname(3) -- Miscellaneous utility routines for Curses
|
The unctrl macro generates a character string that is a printable representation of the character c. Control characters are displayed in the ^X notation. Printing characters are displayed as is. The w... |
keypad(3) -- Curses
|
The cbreak and nocbreak routines put the terminal into and out of cbreak mode, respectively. In this mode, characters typed by the user are immediately available to the program, and erase/kill charact... |
key_name(3) -- Miscellaneous utility routines for Curses
|
The unctrl macro generates a character string that is a printable representation of the character c. Control characters are displayed in the ^X notation. Printing characters are displayed as is. The w... |
killchar(3) -- Routines for querying the Curses environment
|
The baudrate routine returns the output speed of the terminal. The number returned is an integer that represents bits per second (for example, 9600). The erasechar routine returns the current erase ch... |
killwchar(3) -- Routines for querying the Curses environment
|
The baudrate routine returns the output speed of the terminal. The number returned is an integer that represents bits per second (for example, 9600). The erasechar routine returns the current erase ch... |
knlist(3) -- look up symbols in the currently running kernel
|
The knlist() library routine looks up addresses of kernel symbols in the currently running kernel. In addition to finding symbols associated with the kernel image, knlist() will also find symbols defi... |
l64a(3) -- convert long integer and base-64 ASCII string
|
These functions are used to maintain numbers stored in base-64 ASCII characters. The a64l() function converts a character string to a long integer. The l64a() function converts a long integer to a cha... |
labs(3) -- Computes absolute value and division of integers
|
The abs() function returns the absolute value of its integer operand. The div() function computes the quotient and remainder of the division of the numerator numerator by the denominator denominator. ... |
lcong48(3) -- Generate uniformly distributed pseudorandom number sequences
|
This family of functions generates pseudorandom numbers using the linear congruential algorithm and 48-bit integer arithmetic. The drand48() and erand48() functions return nonnegative, double-precisio... |
lcong48_r(3) -- Generate uniformly distributed pseudorandom number sequences
|
This family of functions generates pseudorandom numbers using the linear congruential algorithm and 48-bit integer arithmetic. The drand48() and erand48() functions return nonnegative, double-precisio... |
ldaclose(3) -- close a common object file
|
The ldopen() and ldclose() functions provide uniform access to simple object files and object files that are members of archive files. An archive of common object files can be processed as if it is a ... |
ldahread(3) -- read the archive header of a member of an archive file
|
If TYPE(ldptr) is the archive file magic number, ldahread() reads the archive header of the common object file currently associated with ldptr into the area of memory beginning at arhead. The ldahread... |
ldaopen(3) -- open a common object file for reading
|
The ldopen() and ldclose() routines provide uniform access to simple object files and to object files that are members of archive files. An archive of common object files can be processed as if it wer... |
ldclose(3) -- close a common object file
|
The ldopen() and ldclose() functions provide uniform access to simple object files and object files that are members of archive files. An archive of common object files can be processed as if it is a ... |
ldexp(3) -- Manipulate floating-point numbers
|
Every nonzero number can be written uniquely as the normalized mantissa (fraction) z times 2 raised to the power p, where the absolute value of z is in the range [0.5, 1.0), and the exponent p, is an ... |
ldfhread(3) -- read the file header of a common object file
|
The ldfhread() routine reads the file header of the common object file currently associated with ldptr. It reads the file header into the area of memory beginning at filehead. The ldfhread() routine r... |
ldgetaux(3) -- retrieves an auxiliary entry
|
The ldgetaux() routine returns a pointer to the auxiliary table entry (AUXU) indexed by iaux. The entry is contained in a static buffer. Because the buffer can be overwritten by later calls to ldgetau... |
ldgetname(3) -- retrieve symbol name for object file symbol table entry
|
The ldgetname() routine returns a pointer to the name associated with symbol. The pointer is returned as a string in a static buffer. Because the buffer can be overwritten by later calls to ldgetname(... |
ldgetpd(3) -- retrieves procedure descriptor given a procedure descriptor index
|
The ldgetpd() routine returns a SUCCESS or FAILURE depending on whether the procedure descriptor with index ipd can be accessed. If it can be accessed, the structure pointed to by ppd is filled with t... |
ldiv(3) -- Computes absolute value and division of integers
|
The abs() function returns the absolute value of its integer operand. The div() function computes the quotient and remainder of the division of the numerator numerator by the denominator denominator. ... |
ldlseek(3) -- seek to line number entries of a section of a common object file
|
The ldlseek() routine seeks to the line number entries of the section specified by sectindx of the common object file currently associated with ldptr. The ldnlseek() routine seeks to the line number e... |
ldnlseek(3) -- seek to line number entries of a section of a common object file
|
The ldlseek() routine seeks to the line number entries of the section specified by sectindx of the common object file currently associated with ldptr. The ldnlseek() routine seeks to the line number e... |
ldnrseek(3) -- seek to relocation entries of a section of a common object file
|
The ldrseek() function seeks to the relocation entries of the section specified by sectindx of the common object file currently associated with ldptr. The ldnrseek() function seeks to the relocation e... |
ldnshread(3) -- read an indexed/named section header of a common object file
|
The ldshread() routine reads the section header specified by sectindx of the common object file currently associated with ldptr into the area of memory beginning at secthead. The ldnshread() routine r... |
ldnsseek(3) -- seek to an indexed/named section of a common object file
|
The ldsseek() routine seeks to the section specified by sectindx of the common object file currently associated with ldptr. The ldnsseek() routine seeks to the section specified by sectname. Both rout... |
ldohseek(3) -- seek to the optional file header of a common object file
|
The ldohseek() routine seeks to the optional file header of the common object file currently associated with ldptr. It returns SUCCESS or FAILURE. If the object file has no optional header or if it ca... |
ldopen(3) -- open a common object file for reading
|
The ldopen() and ldclose() routines provide uniform access to simple object files and to object files that are members of archive files. An archive of common object files can be processed as if it wer... |
ldrseek(3) -- seek to relocation entries of a section of a common object file
|
The ldrseek() function seeks to the relocation entries of the section specified by sectindx of the common object file currently associated with ldptr. The ldnrseek() function seeks to the relocation e... |
ldr_atexit(3) -- Run termination functions for shared libraries
|
The ldr_atexit() function runs termination functions for a process' shared libraries and executable file. These termination functions are determined when a shared library or shared executable file is... |
ldr_inq_module(3) -- Return information about a loaded module
|
The ldr_inq_module() function returns information about a specified module contained within the address space of the specified process into the variable pointed to by the info parameter. The info_size... |
ldr_inq_region(3) -- Return module information about a region in a loaded module
|
The ldr_inq_region() function returns information about a specified region within a specified module. The module is contained within the address space of the specified process. The returned informatio... |
ldr_next_module(3) -- Return the next module ID for a process
|
The ldr_next_module() function returns the next module ID for the specified process, given a specified module ID. It iterates through the module IDs of all modules currently loaded in a specified proc... |
ldr_xattach(3) -- Attache to another process to permit loading/unloading of modules in that process' address space
|
The ldr_xattach() function is used to permit a process to load, unload, query, or retrieve the contents of another process' address space. |
ldr_xdetach(3) -- Detache from an attached process
|
The ldr_xdetach() function detaches the calling process from process, with which it had been associated for crossprocess loading and debugging. This procedure should be used only if a ldr_xattach() wa... |
ldshread(3) -- read an indexed/named section header of a common object file
|
The ldshread() routine reads the section header specified by sectindx of the common object file currently associated with ldptr into the area of memory beginning at secthead. The ldnshread() routine r... |
ldsseek(3) -- seek to an indexed/named section of a common object file
|
The ldsseek() routine seeks to the section specified by sectindx of the common object file currently associated with ldptr. The ldnsseek() routine seeks to the section specified by sectname. Both rout... |
ldtbread(3) -- read an indexed symbol table entry of a common object file
|
The ldtbread() routine reads the symbol table entry specified by symindex of the common object file currently associated with ldptr into the area of memory beginning at symbol. It returns SUCCESS or F... |
ldtbseek(3) -- seek to the symbol table of a common object file
|
The ldtbseek() routine seeks to the symbol table of the object file currently associated with ldptr. It returns SUCCESS or FAILURE. It fails if the symbol table has been stripped from the object file ... |
leaveok(3) -- Routines for controlling output options for a Curses terminal
|
These routines set options that deal with output within Curses. Unless stated otherwise, all options are initially FALSE. It is not necessary to turn these options off before calling endwin. The clear... |
len(3) -- return length of Fortran string
|
The len() routine returns the length of string ch. len(3) |
lfind(3) -- Perform a linear search and update
|
The lsearch() function performs a linear search of a table. This function returns a pointer into a table indicating where a specified key is located in the table. When the key is not found in the tabl... |
lgamma(3) -- Compute the logarithm of the gamma function
|
The lgamma(), lgammaf(), and lgammal() functions return the logarithm of the absolute value of gamma of x, or ln(|G(x)|), where G is the gamma function. The sign of gamma of x is returned in the exter... |
lhash(3) -- Dynamic hash table
|
This library implements dynamic hash tables. The hash table entries can be arbitrary structures. Usually they consist of key and value fields. The lh_new() function creates a new LHASH structure. The ... |
lh_delete(3) -- Dynamic hash table
|
This library implements dynamic hash tables. The hash table entries can be arbitrary structures. Usually they consist of key and value fields. The lh_new() function creates a new LHASH structure. The ... |
lh_doall(3) -- Dynamic hash table
|
This library implements dynamic hash tables. The hash table entries can be arbitrary structures. Usually they consist of key and value fields. The lh_new() function creates a new LHASH structure. The ... |
lh_doall_arg(3) -- Dynamic hash table
|
This library implements dynamic hash tables. The hash table entries can be arbitrary structures. Usually they consist of key and value fields. The lh_new() function creates a new LHASH structure. The ... |
lh_error(3) -- Dynamic hash table
|
This library implements dynamic hash tables. The hash table entries can be arbitrary structures. Usually they consist of key and value fields. The lh_new() function creates a new LHASH structure. The ... |
lh_free(3) -- Dynamic hash table
|
This library implements dynamic hash tables. The hash table entries can be arbitrary structures. Usually they consist of key and value fields. The lh_new() function creates a new LHASH structure. The ... |
lh_insert(3) -- Dynamic hash table
|
This library implements dynamic hash tables. The hash table entries can be arbitrary structures. Usually they consist of key and value fields. The lh_new() function creates a new LHASH structure. The ... |
lh_new(3) -- Dynamic hash table
|
This library implements dynamic hash tables. The hash table entries can be arbitrary structures. Usually they consist of key and value fields. The lh_new() function creates a new LHASH structure. The ... |
lh_node_stats(3) -- LHASH statistics
|
The LHASH structure records statistics about most aspects of accessing the hash table. It is a legacy of Eric Young who wrote the library for the purpose of implementing a useful algorithm rather than... |
lh_node_stats_bio(3) -- LHASH statistics
|
The LHASH structure records statistics about most aspects of accessing the hash table. It is a legacy of Eric Young who wrote the library for the purpose of implementing a useful algorithm rather than... |
lh_node_usage_stats(3) -- LHASH statistics
|
The LHASH structure records statistics about most aspects of accessing the hash table. It is a legacy of Eric Young who wrote the library for the purpose of implementing a useful algorithm rather than... |
lh_node_usage_stats_bio(3) -- LHASH statistics
|
The LHASH structure records statistics about most aspects of accessing the hash table. It is a legacy of Eric Young who wrote the library for the purpose of implementing a useful algorithm rather than... |
lh_retrieve(3) -- Dynamic hash table
|
This library implements dynamic hash tables. The hash table entries can be arbitrary structures. Usually they consist of key and value fields. The lh_new() function creates a new LHASH structure. The ... |
lh_stats(3) -- LHASH statistics
|
The LHASH structure records statistics about most aspects of accessing the hash table. It is a legacy of Eric Young who wrote the library for the purpose of implementing a useful algorithm rather than... |
lh_stats_bio(3) -- LHASH statistics
|
The LHASH structure records statistics about most aspects of accessing the hash table. It is a legacy of Eric Young who wrote the library for the purpose of implementing a useful algorithm rather than... |
libAF(3) -- Provide Attribute File Library functions to manipulate file attributes
|
The libAF() functions are provided for programs that use attribute files. These functions perform the following: Closes the specified attribute file. Gets the attribute value matching name from the at... |
libcfg(3) -- introduction to the Configuration Management Library
|
The configuration management library (libcfg.a) provides routines that allow applications to manage static and dynamic kernel subsystems. Applications use the libcfg routines to communicate with the c... |
libcssm(3) -- Common Data Security Architecture (CDSA) implemented as
|
CDSA is a multiplatform, industry standard security infrastructure. It provides a standards-based, stable programming interface that applications can use to access operating system security services, ... |
libcssm_intro(3) -- Common Data Security Architecture (CDSA) implemented as
|
CDSA is a multiplatform, industry standard security infrastructure. It provides a standards-based, stable programming interface that applications can use to access operating system security services, ... |
libexc(3) -- an overview of exception support supplied in libexc.a
|
The exception mechanism used on Tru64 UNIX requires no execution time in user code. The only costs before an exception occurs are one-time registering and deregistering of modules with the run-time ex... |
libpw(3) -- Provide functions for compatibility with existing programs
|
The libpw functions are provided for compatibility with existing programs. Their use in new programs is not recommended. Determines whether string contains character. Determines the offset in string1 ... |
libPW(3) -- Provide functions for compatibility with existing programs
|
The libpw functions are provided for compatibility with existing programs. Their use in new programs is not recommended. Determines whether string contains character. Determines the offset in string1 ... |
libst(3) -- symbol table and object file access library
|
The library libst.a contains a collection of functions for accessing object file data and symbol table information. These functions effectively insulate the calling program from knowledge of the overa... |
libst_intro(3) -- symbol table and object file access library
|
The library libst.a contains a collection of functions for accessing object file data and symbol table information. These functions effectively insulate the calling program from knowledge of the overa... |
lio_listio(3) -- Initiates a list of asynchronous I/O requests
|
The lio_listio function allows the calling process to initiate a list of I/O requests with a single function call. The mode argument determines whether the function returns after the I/O operations ar... |
localeconv(3) -- Retrieve locale-dependent formatting parameters
|
The localeconv() function provides access to the object that specifies the current locale's conventions for the format of numeric quantities. The lconv structure contains values appropriate for forma... |
localtime(3) -- converts time units
|
The asctime(), ctime(), gmtime(), localtime(), mktime(), and tzset() functions convert time values between tm structures, time_t type variables, and strings. [POSIX] The asctime_r(), ctime_r(), gmtime... |
localtime64(3) -- converts time units
|
The asctime(), ctime(), gmtime(), localtime(), mktime(), and tzset() functions convert time values between tm structures, time_t type variables, and strings. [POSIX] The asctime_r(), ctime_r(), gmtime... |
localtime64_r(3) -- converts time units
|
The asctime(), ctime(), gmtime(), localtime(), mktime(), and tzset() functions convert time values between tm structures, time_t type variables, and strings. [POSIX] The asctime_r(), ctime_r(), gmtime... |
localtime_r(3) -- converts time units
|
The asctime(), ctime(), gmtime(), localtime(), mktime(), and tzset() functions convert time values between tm structures, time_t type variables, and strings. [POSIX] The asctime_r(), ctime_r(), gmtime... |
locked_out_acct_es(3) -- determine if passwordmanagement disallows user login (Enhanced Security)
|
The locked_out_acct_es() function determines whether the password management values for an extended profile prohibit the user from logging in. This routine is called as part of the login processing un... |
locked_out_es(3) -- determine if passwordmanagement disallows user login (Enhanced Security)
|
The locked_out_acct_es() function determines whether the password management values for an extended profile prohibit the user from logging in. This routine is called as part of the login processing un... |
lockf(3) -- Lock and unlocks regions of open file descriptors
|
The lockf() function locks and unlocks sections of an open file. Unlike the fcntl() function, however, its interface is limited to setting only write (exclusive) locks. Although the lockf() and fcntl(... |
log(3) -- Exponential, logarithm, and power functions
|
The exp(), expf(), and expl() functions compute the value of the exponential function, defined as e**x, where e is the constant used as a base for natural logarithms. The expm1(), expm1f(), and expm1l... |
log10(3) -- Exponential, logarithm, and power functions
|
The exp(), expf(), and expl() functions compute the value of the exponential function, defined as e**x, where e is the constant used as a base for natural logarithms. The expm1(), expm1f(), and expm1l... |
log1p(3) -- Exponential, logarithm, and power functions
|
The exp(), expf(), and expl() functions compute the value of the exponential function, defined as e**x, where e is the constant used as a base for natural logarithms. The expm1(), expm1f(), and expm1l... |
log2(3) -- Exponential, logarithm, and power functions
|
The exp(), expf(), and expl() functions compute the value of the exponential function, defined as e**x, where e is the constant used as a base for natural logarithms. The expm1(), expm1f(), and expm1l... |
logb(3) -- Manipulate floating-point numbers
|
Every nonzero number can be written uniquely as the normalized mantissa (fraction) z times 2 raised to the power p, where the absolute value of z is in the range [0.5, 1.0), and the exponent p, is an ... |
longjmp(3) -- Save and restores the current execution context
|
The setjmp() and longjmp() functions are useful when handling errors and interrupts encountered in low-level functions of a program. The setjmp() function saves the current stack context and signal ma... |
longname(3) -- Routines for querying the Curses environment
|
The baudrate routine returns the output speed of the terminal. The number returned is an integer that represents bits per second (for example, 9600). The erasechar routine returns the current erase ch... |
lrand48(3) -- Generate uniformly distributed pseudorandom number sequences
|
This family of functions generates pseudorandom numbers using the linear congruential algorithm and 48-bit integer arithmetic. The drand48() and erand48() functions return nonnegative, double-precisio... |
lrand48_r(3) -- Generate uniformly distributed pseudorandom number sequences
|
This family of functions generates pseudorandom numbers using the linear congruential algorithm and 48-bit integer arithmetic. The drand48() and erand48() functions return nonnegative, double-precisio... |
lsearch(3) -- Perform a linear search and update
|
The lsearch() function performs a linear search of a table. This function returns a pointer into a table indicating where a specified key is located in the table. When the key is not found in the tabl... |
madd(3) -- Perform multiple precision integer arithmetic
|
These functions perform arithmetic on integers of arbitrary length. The integers are stored using the defined type MINT. Pointers to a MINT can be initialized using theitom() function, which sets the ... |
mallinfo(3) -- Provide a memory allocator
|
The malloc() and free() functions provide a simple, general-purpose memory allocation package. Note See also the subsection "Using the densemalloc Library" for information on using libdensemalloc to... |
malloc(3) -- Provide a memory allocator
|
The malloc() and free() functions provide a simple, general-purpose memory allocation package. Note See also the subsection "Using the densemalloc Library" for information on using libdensemalloc to... |
mallopt(3) -- Provide a memory allocator
|
The malloc() and free() functions provide a simple, general-purpose memory allocation package. Note See also the subsection "Using the densemalloc Library" for information on using libdensemalloc to... |
mblen(3) -- Determine the length in bytes of a multibyte character
|
The mblen() function determines the number of bytes in a multibyte character. The behavior of the mblen() function is affected by the LC_CTYPE category of the current locale. In locales with shift-sta... |
mbrlen(3) -- Determine the length in bytes of a multibyte character
|
The mblen() function determines the number of bytes in a multibyte character. The behavior of the mblen() function is affected by the LC_CTYPE category of the current locale. In locales with shift-sta... |
mbrtowc(3) -- Convert a multibyte character to a wide character
|
The mbtowc() function converts a multibyte character to a wide character and returns the number of bytes of the multibyte character, which is stored as an output variable. In locales with shift-state ... |
mbsinit(3) -- Determine whether a multibyte-character string is in the initial conversion state
|
The mbsinit() function determines whether the sequence of characters being converted is in the initial conversion state; that is, the function determines whether the multibyte encoding for the current... |
mbsrtowcs(3) -- Convert a multibyte character string
|
The mbstowcs() function converts a multibyte-character string into a wide-character string, which is stored at a specified location. The function does not examine or convert any characters that follow... |
mbstowcs(3) -- Convert a multibyte character string
|
The mbstowcs() function converts a multibyte-character string into a wide-character string, which is stored at a specified location. The function does not examine or convert any characters that follow... |
mbtowc(3) -- Convert a multibyte character to a wide character
|
The mbtowc() function converts a multibyte character to a wide character and returns the number of bytes of the multibyte character, which is stored as an output variable. In locales with shift-state ... |
mcmp(3) -- Perform multiple precision integer arithmetic
|
These functions perform arithmetic on integers of arbitrary length. The integers are stored using the defined type MINT. Pointers to a MINT can be initialized using theitom() function, which sets the ... |
MD2(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. The MD2(), MD4(), and MD5() functions compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (whi... |
MD2_Final(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. The MD2(), MD4(), and MD5() functions compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (whi... |
MD2_Init(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. The MD2(), MD4(), and MD5() functions compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (whi... |
MD2_Update(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. The MD2(), MD4(), and MD5() functions compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (whi... |
MD4(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. The MD2(), MD4(), and MD5() functions compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (whi... |
MD4_Final(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. The MD2(), MD4(), and MD5() functions compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (whi... |
MD4_Init(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. The MD2(), MD4(), and MD5() functions compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (whi... |
MD4_Update(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. The MD2(), MD4(), and MD5() functions compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (whi... |
md5(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. The MD2(), MD4(), and MD5() functions compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (whi... |
MD5(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. The MD2(), MD4(), and MD5() functions compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (whi... |
MD5_Final(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. The MD2(), MD4(), and MD5() functions compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (whi... |
MD5_Init(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. The MD2(), MD4(), and MD5() functions compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (whi... |
MD5_Update(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. The MD2(), MD4(), and MD5() functions compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (whi... |
MDC2(3) -- MDC2 hash function
|
MDC2 is a method to construct hash functions with 128 bit output from block ciphers. These functions are an implementation of MDC2 with DES. The MDC2() function computes the MDC2 message digest of the... |
MDC2_Final(3) -- MDC2 hash function
|
MDC2 is a method to construct hash functions with 128 bit output from block ciphers. These functions are an implementation of MDC2 with DES. The MDC2() function computes the MDC2 message digest of the... |
MDC2_Init(3) -- MDC2 hash function
|
MDC2 is a method to construct hash functions with 128 bit output from block ciphers. These functions are an implementation of MDC2 with DES. The MDC2() function computes the MDC2 message digest of the... |
MDC2_Update(3) -- MDC2 hash function
|
MDC2 is a method to construct hash functions with 128 bit output from block ciphers. These functions are an implementation of MDC2 with DES. The MDC2() function computes the MDC2 message digest of the... |
mdiv(3) -- Perform multiple precision integer arithmetic
|
These functions perform arithmetic on integers of arbitrary length. The integers are stored using the defined type MINT. Pointers to a MINT can be initialized using theitom() function, which sets the ... |
MDS_Initialize(3) -- Initiate service context with MDS (CDSA)
|
This function initiates a service context with MDS and returns an opaque handle corresponding to that context. The caller provides memory functions that MDS can use to manage memory in the caller's s... |
MDS_Install(3) -- Create the object directory database (CDSA)
|
This function creates the Object Directory database containing the Object relation, and the CDSA Directory database containing the set of CDSA-specific relations defined in this specification. The Mds... |
MDS_Terminate(3) -- Terminate the MDS service context (CDSA)
|
This function terminates the MDS service context identified by the opaque MdsHandle. The MDS handle is invalidated and MDS frees all internal resources associated with the context. |
MDS_Uninstall(3) -- Delete the object directory database (CDSA)
|
This function deletes the Object Directory database containing the Object relation, and the CDSA Directory database containing the set of CDSA-specific relations defined in this specification. The Mds... |
memalloc_attr(3) -- Query the memory allocation policy and attributes (libnuma library)
|
The memalloc_attr() function returns the current memory allocation policy and associated attributes in the buffer pointed to by attr for the address specified by va. If radset information about the me... |
memccpy(3) -- Perform memory operations
|
The memccpy(), memchr(), memcmp(), memcpy(), memmove(), and memset() functions operate on strings in memory areas. A memory area is a group of contiguous characters bound by a count and not terminated... |
memchr(3) -- Perform memory operations
|
The memccpy(), memchr(), memcmp(), memcpy(), memmove(), and memset() functions operate on strings in memory areas. A memory area is a group of contiguous characters bound by a count and not terminated... |
memcmp(3) -- Perform memory operations
|
The memccpy(), memchr(), memcmp(), memcpy(), memmove(), and memset() functions operate on strings in memory areas. A memory area is a group of contiguous characters bound by a count and not terminated... |
memcpy(3) -- Perform memory operations
|
The memccpy(), memchr(), memcmp(), memcpy(), memmove(), and memset() functions operate on strings in memory areas. A memory area is a group of contiguous characters bound by a count and not terminated... |
memmove(3) -- Perform memory operations
|
The memccpy(), memchr(), memcmp(), memcpy(), memmove(), and memset() functions operate on strings in memory areas. A memory area is a group of contiguous characters bound by a count and not terminated... |
memset(3) -- Perform memory operations
|
The memccpy(), memchr(), memcmp(), memcpy(), memmove(), and memset() functions operate on strings in memory areas. A memory area is a group of contiguous characters bound by a count and not terminated... |
meta(3) -- Curses
|
The cbreak and nocbreak routines put the terminal into and out of cbreak mode, respectively. In this mode, characters typed by the user are immediately available to the program, and erase/kill charact... |
min(3) -- Perform multiple precision integer arithmetic
|
These functions perform arithmetic on integers of arbitrary length. The integers are stored using the defined type MINT. Pointers to a MINT can be initialized using theitom() function, which sets the ... |
mkdtemp(3) -- Construct a unique file name or directory
|
The mktemp() function replaces, with a unique file name, the contents of the template string pointed to by the template parameter. The application should initialize the template string to be a file na... |
mkfifo(3) -- Create a FIFO
|
The mkfifo function used with libc.a is an interface to the mknod function, where the file that is to be created is a FIFO special file (named pipe). When used with libsys5.a, the mkfifo() function cr... |
mkstemp(3) -- Construct a unique file name or directory
|
The mktemp() function replaces, with a unique file name, the contents of the template string pointed to by the template parameter. The application should initialize the template string to be a file na... |
mkstemps(3) -- Construct a unique file name or directory
|
The mktemp() function replaces, with a unique file name, the contents of the template string pointed to by the template parameter. The application should initialize the template string to be a file na... |
mktemp(3) -- Construct a unique file name or directory
|
The mktemp() function replaces, with a unique file name, the contents of the template string pointed to by the template parameter. The application should initialize the template string to be a file na... |
mktime(3) -- converts time units
|
The asctime(), ctime(), gmtime(), localtime(), mktime(), and tzset() functions convert time values between tm structures, time_t type variables, and strings. [POSIX] The asctime_r(), ctime_r(), gmtime... |
mktime64(3) -- converts time units
|
The asctime(), ctime(), gmtime(), localtime(), mktime(), and tzset() functions convert time values between tm structures, time_t type variables, and strings. [POSIX] The asctime_r(), ctime_r(), gmtime... |
mktimer(3) -- Allocate a per-process timer
|
The mktimer() function is used to allocate a per-process timer using a specified system-wide clock as its timebase. The mktimer() function returns a unique timer ID of type timer_t, which is used to i... |
mlock(3) -- Locks or unlocks a specified region in memory (P1003.1b)
|
The mlock and munlock functions lock and unlock whole pages containing any part of the process address space starting at addr and continuing for len bytes. The mlock function guarantees all whole page... |
mlockall(3) -- Locks into memory, or unlocks, all of a specified process's pages (P1003.1b)
|
The mlockall function causes all of the pages mapped by the process's address space to be memory resident until unlocked by a call to the munlockall function, until the process exits, or until the pr... |
modf(3) -- Round floatingpoint
|
The floor(), floorf(), and floorl() functions return the largest floating-point integer value less than or equal to x. The ceil(), ceilf(), and ceill() functions return the smallest floating-point int... |
ModuleManagerAuthenticate(3) -- Module manager authentication (CDSA)
|
This function should perform the elective module manager's half of the bilateral authentication procedure with CSSM. The CssmGuid is used to locate the CSSM's credentials to be verified. The credent... |
moncontrol(3) -- Prepare execution profile
|
When an executable program is compiled for profiling by using either the -p or -pg option with the cc command, the default parameters cause the entire text segment to be profiled. For large programs, ... |
monitor(3) -- Prepare execution profile
|
When an executable program is compiled for profiling by using either the -p or -pg option with the cc command, the default parameters cause the entire text segment to be profiled. For large programs, ... |
monitor_signal(3) -- Prepare execution profile
|
When an executable program is compiled for profiling by using either the -p or -pg option with the cc command, the default parameters cause the entire text segment to be profiled. For large programs, ... |
monstartup(3) -- Prepare execution profile
|
When an executable program is compiled for profiling by using either the -p or -pg option with the cc command, the default parameters cause the entire text segment to be profiled. For large programs, ... |
mout(3) -- Perform multiple precision integer arithmetic
|
These functions perform arithmetic on integers of arbitrary length. The integers are stored using the defined type MINT. Pointers to a MINT can be initialized using theitom() function, which sets the ... |
move(3) -- Move the Curses window cursor
|
These routines move the cursor associated with the Curses window to line y and column x. They do not move the physical cursor of the terminal until refresh is called. The specified position is relativ... |
mp(3) -- Perform multiple precision integer arithmetic
|
These functions perform arithmetic on integers of arbitrary length. The integers are stored using the defined type MINT. Pointers to a MINT can be initialized using theitom() function, which sets the ... |
mpool(3) -- shared memory buffer pool
|
The mpool routines are the library interface that provides page-oriented buffer management of files. The buffers may be shared between processes. The function mpool_open() initializes a memory pool. T... |
MPOOL(3) -- shared memory buffer pool
|
The mpool routines are the library interface that provides page-oriented buffer management of files. The buffers may be shared between processes. The function mpool_open() initializes a memory pool. T... |
mpool_close(3) -- shared memory buffer pool
|
The mpool routines are the library interface that provides page-oriented buffer management of files. The buffers may be shared between processes. The function mpool_open() initializes a memory pool. T... |
mpool_filter(3) -- shared memory buffer pool
|
The mpool routines are the library interface that provides page-oriented buffer management of files. The buffers may be shared between processes. The function mpool_open() initializes a memory pool. T... |
mpool_get(3) -- shared memory buffer pool
|
The mpool routines are the library interface that provides page-oriented buffer management of files. The buffers may be shared between processes. The function mpool_open() initializes a memory pool. T... |
mpool_new(3) -- shared memory buffer pool
|
The mpool routines are the library interface that provides page-oriented buffer management of files. The buffers may be shared between processes. The function mpool_open() initializes a memory pool. T... |
mpool_open(3) -- shared memory buffer pool
|
The mpool routines are the library interface that provides page-oriented buffer management of files. The buffers may be shared between processes. The function mpool_open() initializes a memory pool. T... |
mpool_put(3) -- shared memory buffer pool
|
The mpool routines are the library interface that provides page-oriented buffer management of files. The buffers may be shared between processes. The function mpool_open() initializes a memory pool. T... |
mpool_sync(3) -- shared memory buffer pool
|
The mpool routines are the library interface that provides page-oriented buffer management of files. The buffers may be shared between processes. The function mpool_open() initializes a memory pool. T... |
mq_close(3) -- Closes a message queue (P1003.1b)
|
The mq_close function closes a message queue. This function removes the association between the message queue descriptor, mqdes, and its open message queue description. When all message queue descript... |
mq_getattr(3) -- Returns the status and attributes of a message queue (P1003.1b)
|
The mq_getattr function returns the status and attributes of a message queue. Use the mq_setattr function to set message queue attributes. |
mq_notify(3) -- Attaches a request for asynchronous signal notification to a message queue (P1003.1b)
|
The mq_notify function attaches a request for asynchronous signal notification to a message queue for the calling process. Following a call to this function, the specified signal is sent to the callin... |
mq_open(3) -- Establishes the connection between a message queue and a message queue descriptor (P1003.1b)
|
The mq_open function establishes the connection between a message queue and a message queue descriptor. This function creates a new open message queue description that refers to a specified message qu... |
mq_receive(3) -- Receives the oldest, highest-priority message from the message queue (P1003.1b)
|
The mq_receive function receives the oldest, highest-priority message from the message queue. The message is removed from the queue and transferred to the buffer pointed to by the msg_ptr argument. If... |
mq_send(3) -- Places a message in the message queue (P1003.1b)
|
The mq_send function places a message in the message queue. This function inserts the message in the queue at the position indicated by the msg_prio argument. A message with a relatively large numeric... |
mq_setattr(3) -- Sets the mq_options attributes associated with a message queue (P1003.1b)
|
The mq_setattr function sets the mq_options attributes associated with the message queue descriptor for the calling process. Only the blocking attribute of the queue for the calling process can be mod... |
mq_unlink(3) -- Removes a message queue (P1003.1b)
|
The mq_unlink function removes a message queue named by the pathname. After a successful call to this function, subsequent calls to the mq_open function fail if they specify the queue identified by th... |
mrand48(3) -- Generate uniformly distributed pseudorandom number sequences
|
This family of functions generates pseudorandom numbers using the linear congruential algorithm and 48-bit integer arithmetic. The drand48() and erand48() functions return nonnegative, double-precisio... |
mrand48_r(3) -- Generate uniformly distributed pseudorandom number sequences
|
This family of functions generates pseudorandom numbers using the linear congruential algorithm and 48-bit integer arithmetic. The drand48() and erand48() functions return nonnegative, double-precisio... |
MrmCloseHierarchy(3X) -- Closes a UID hierarchy
|
The MrmCloseHierarchy function closes a UID hierarchy previously opened by MrmOpenHierarchyPerDisplay. All files associated with the hierarchy are closed by the Motif Resource Manager (MRM) and all as... |
MrmFetchBitmapLiteral(3X) -- Fetches a bitmap literal from a hierarchy
|
The MrmFetchBitmapLiteral function fetches a bitmap literal from an MRM hierarchy, and converts the bitmap literal to an X pixmap of depth 1. The function returns this pixmap and its width and height.... |
MrmFetchColorLiteral(3X) -- Fetches a named color literal from a UID file
|
The MrmFetchColorLiteral function fetches a named color literal from a UID file, and converts the color literal to a pixel color value. Specifies the ID of the UID hierarchy that contains the specifie... |
MrmFetchIconLiteral(3X) -- Fetches an icon literal from a hierarchy
|
The MrmFetchIconLiteral function fetches an icon literal from an MRM hierarchy, and converts the icon literal to an X pixmap. Specifies the ID of the UID hierarchy that contains the specified icon lit... |
MrmFetchLiteral(3X) -- Fetches a literal from a UID file
|
The MrmFetchLiteral function reads and returns the value and type of a literal (named value) that is stored as a public resource in a single UID file. This function returns a pointer to the value of t... |
MrmFetchSetValues(3X) -- Fetches the values to be set from literals stored in UID files
|
The MrmFetchSetValues function is similar to XtSetValues, except that the values to be set are defined by the UIL named values that are stored in the UID hierarchy. MrmFetchSetValues fetches the value... |
MrmFetchWidget(3X) -- Fetches and creates any indexed (UIL named) application widgets and its children
|
The MrmFetchWidget function fetches and creates an indexed application widget and its children. The indexed application widget is any widget that is named in UIL. In fetch operations, the fetched widg... |
MrmFetchWidgetOverride(3X) -- Fetches any indexed (UIL named) application widget. It overrides the arguments specified for this ap...
|
The MrmFetchWidgetOverride function is the extended version of MrmFetchWidget. It is identical to MrmFetchWidget, except that it allows the caller to override the widget's name and any arguments that... |
MrmInitialize(3X) -- Prepares an application to use MRM widgetfetching facilities
|
The MrmInitialize function must be called to prepare an application to use MRM widget-fetching facilities. You must call this function prior to fetching a widget. However, it is good programming pract... |
MrmOpenHierarchy(3X) -- Allocates a hierarchy ID and opens all the UID files in the hierarchy
|
This routine is obsolete and exists for compatibility with previous releases. It is replaced by MrmOpenHierarchyPerDisplay. MrmOpenHierarchy is identical to MrmOpenHierarchyPerDisplay except that MrmO... |
MrmOpenHierarchyPerDisplay(3X) -- Allocates a hierarchy ID and opens all the UID files in the hierarchy
|
MrmOpenHierarchyPerDisplay allows you to specify the list of UID files that MRM searches in subsequent fetch operations. All subsequent fetch operations return the first occurrence of the named item e... |
MrmRegisterClass(3X) -- Saves the information needed for MRM to
|
The MrmRegisterClass function allows MRM to access userdefined widget classes. This function registers the necessary information for MRM to create widgets of this class. You must call MrmRegisterClass... |
MrmRegisterNames(3X) -- Registers the values associated with the names referenced in UIL (for example, UIL callback function...
|
The MrmRegisterNames function registers a vector of names and associated values for access in MRM. The values can be callback functions, pointers to user-defined data, or any other values. The informa... |
MrmRegisterNamesInHierarchy(3X) -- Registers the values associated with the names referenced in UIL within a single hierarchy (for exam...
|
The MrmRegisterNamesInHierarchy function registers a vector of names and associated values for access in MRM. The values can be callback functions, pointers to user-defined data, or any other values. ... |
msem_init(3) -- Initialize a semaphore in a mapped file or shared memory region
|
The msem_init() function allocates a new binary semaphore and initializes the state of the new semaphore. If the initial_value parameter is MSEM_LOCKED, the new semaphore is initialized in the locked ... |
msem_lock(3) -- Lock a semaphore
|
The msem_lock() function attempts to lock a binary semaphore. If the semaphore is not currently locked, it is locked and the msem_lock() function returns successfully. If the semaphore is currently lo... |
msem_remove(3) -- Remove a semaphore
|
The msem_remove() function removes a binary semaphore. Any subsequent use of the msemaphore structure before it is again initialized by calling the msem_init() function will have undefined results. Th... |
msem_unlock(3) -- Unlock a semaphore
|
The msem_unlock() function unlocks a binary semaphore. If the condition parameter is 0 (zero), the semaphore is unlocked, whether or not any other processes are currently attempting to lock it. If the... |
msqrt(3) -- Perform multiple precision integer arithmetic
|
These functions perform arithmetic on integers of arbitrary length. The integers are stored using the defined type MINT. Pointers to a MINT can be initialized using theitom() function, which sets the ... |
msub(3) -- Perform multiple precision integer arithmetic
|
These functions perform arithmetic on integers of arbitrary length. The integers are stored using the defined type MINT. Pointers to a MINT can be initialized using theitom() function, which sets the ... |
mult(3) -- Perform multiple precision integer arithmetic
|
These functions perform arithmetic on integers of arbitrary length. The integers are stored using the defined type MINT. Pointers to a MINT can be initialized using theitom() function, which sets the ... |
munlock(3) -- Locks or unlocks a specified region in memory (P1003.1b)
|
The mlock and munlock functions lock and unlock whole pages containing any part of the process address space starting at addr and continuing for len bytes. The mlock function guarantees all whole page... |
munlockall(3) -- Locks into memory, or unlocks, all of a specified process's pages (P1003.1b)
|
The mlockall function causes all of the pages mapped by the process's address space to be memory resident until unlocked by a call to the munlockall function, until the process exits, or until the pr... |
mvaddch(3) -- Add a character (with attributes) to a Curses window and advance the cursor
|
The addch, waddch, mvaddch, and mvwaddch routines put the character ch into the window at the current cursor position of the window and advance the position of the window cursor. Their function is sim... |
mvaddchnstr(3) -- Add string of characters (and attributes) to a Curses window
|
All of these routines copy chstr directly into the window image structure starting at the current or specified cursor position. The four routines with n as the last argument copy at most n elements, b... |
mvaddchstr(3) -- Add string of characters (and attributes) to a Curses window
|
All of these routines copy chstr directly into the window image structure starting at the current or specified cursor position. The four routines with n as the last argument copy at most n elements, b... |
mvaddnstr(3) -- Add a string of characters to a Curses window and advance cursor
|
These routines write the characters of the character string str on the given window. The four routines with n as the last argument write at most n characters. For the other routines, the string should... |
mvaddnwstr(3) -- Add a string of wchar_t characters to a Curses window and advance cursor
|
These routines write all the characters of the wchar_t character string wstr on the given window. The four routines with n as the last argument write at most n wchar_t characters. For the routines wit... |
mvaddstr(3) -- Add a string of characters to a Curses window and advance cursor
|
These routines write the characters of the character string str on the given window. The four routines with n as the last argument write at most n characters. For the other routines, the string should... |
mvaddwch(3) -- Add a wchar_t character (with attributes) to a Curses window and advance cursor
|
The addwch, waddwch, mvaddwch, and mvwaddwch routines put the character wch, holding a wchar_t character, into the window at the current cursor position of the window and advance the position of the w... |
mvaddwchnstr(3) -- Add a string of wchar_t characters (and attributes) to a Curses window
|
All of these routines copy wchstr, which points to a string of wchar_t characters, directly into the window image structure starting at the current or specified cursor position. The four routines with... |
mvaddwchstr(3) -- Add a string of wchar_t characters (and attributes) to a Curses window
|
All of these routines copy wchstr, which points to a string of wchar_t characters, directly into the window image structure starting at the current or specified cursor position. The four routines with... |
mvaddwstr(3) -- Add a string of wchar_t characters to a Curses window and advance cursor
|
These routines write all the characters of the wchar_t character string wstr on the given window. The four routines with n as the last argument write at most n wchar_t characters. For the routines wit... |
mvadd_wch(3) -- Add a complex character and rendition to a Curses window and advance the cursor
|
The add_wch, wadd_wch, mvadd_wch, and mvwadd_wch functions put the complex character wch into the window at the current or specified cursor position, of the current or specified window, and advance th... |
mvadd_wchnstr(3) -- Add an array of complex characters and rendition to a Curses window
|
All of these functions copy wchstr, which points to an array of complex characters, directly into the current or specified window image structure starting at the current cursor position or the positio... |
mvadd_wchstr(3) -- Add an array of complex characters and rendition to a Curses window
|
All of these functions copy wchstr, which points to an array of complex characters, directly into the current or specified window image structure starting at the current cursor position or the positio... |
mvchgat(3) -- Change renditions of characters in a Curses window
|
These functions change the renditions of the next n characters in the current or specified window (or of the remaining characters on the line if n is -1), starting at the current or specified cursor p... |
mvcur(3) -- Curses interfaces to the terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
mvdelch(3) -- Delete the character under the cursor in a Curses window
|
These routines do the following: Delete the character under the cursor in the current or specified window Move all characters that are to the right of the cursor and on the same line to the left one p... |
mvderwin(3) -- Routines that create Curses windows
|
The newwin routine creates and returns a pointer to a new window with the given number of lines, nlines, and columns, ncols. The upper left-hand corner of the window is at line begin_y and column begi... |
mvgetch(3) -- Get (or push back) characters from a Curses terminal keyboard
|
The getch, wgetch, mvgetch, and mvwgetch routines read a character from the terminal associated with the Curses window. In no-delay mode, if no input is waiting, these routines return the value ERR. I... |
mvgetnstr(3) -- Get character strings from a Curses terminal keyboard
|
The effect of getstr is as though a series of calls to getch were made, until a newline or carriage return is received. The resulting value is placed in the area pointed to by the character pointer st... |
mvgetnwstr(3) -- Get wchar_t character strings from a Curses terminal keyboard
|
The effect of getwstr is as though a series of calls to getwch were made, until a newline and carriage return is received. The resulting value is placed in the area pointed to by the wchar_t pointer w... |
mvgetn_wstr(3) -- Get an array of wide characters from a Curses terminal keyboard
|
The effect of get_wstr is as though a series of calls to get_wch were made, until a newline, end-of-line, or endof-file character is processed. An end-of-file character is represented by WEOF, as defi... |
mvgetstr(3) -- Get character strings from a Curses terminal keyboard
|
The effect of getstr is as though a series of calls to getch were made, until a newline or carriage return is received. The resulting value is placed in the area pointed to by the character pointer st... |
mvgetwch(3) -- Get (or push back) wchar_t characters from a Curses terminal keyboard
|
The getwch, wgetwch, mvgetwch, and mvwgetwch routines read an EUC character from the terminal associated with the Curses window, transform the character into a wchar_t character, and return the wchar_... |
mvgetwstr(3) -- Get wchar_t character strings from a Curses terminal keyboard
|
The effect of getwstr is as though a series of calls to getwch were made, until a newline and carriage return is received. The resulting value is placed in the area pointed to by the wchar_t pointer w... |
mvget_wch(3) -- Get (or push back) a wide character from Curses terminal keyboard
|
The get_wch, wget_wch, mvget_wch, and mvwget_wch functions read a character from the terminal associated with the current or specified window. In no-delay mode, if no input is waiting, these functions... |
mvget_wstr(3) -- Get an array of wide characters from a Curses terminal keyboard
|
The effect of get_wstr is as though a series of calls to get_wch were made, until a newline, end-of-line, or endof-file character is processed. An end-of-file character is represented by WEOF, as defi... |
mvhline(3) -- Create Curses borders, and horizontal and vertical lines
|
The border, wborder, and box routines draw a border around the edges of the window. Each of the following arguments contains both a character and attributes for a particular part of the border: Left s... |
mvhline_set(3) -- Draw borders or lines by using complex characters and renditions
|
The border_set and wborder_set functions draw a border around the edges of the current or specified window. These functions do not advance the cursor position, do not perform special character process... |
mvinch(3) -- Get a character and its attributes from a Curses window
|
These routines return the character, of type chtype, at the current position in the named window. If any attributes are set for that position, their values are combined (through an inclusive OR operat... |
mvinchnstr(3) -- Get a string of characters (and attributes) from a Curses window
|
These routines return a string of type chtype, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the window. The four functions ... |
mvinchstr(3) -- Get a string of characters (and attributes) from a Curses window
|
These routines return a string of type chtype, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the window. The four functions ... |
mvinnstr(3) -- Get a string of characters from a Curses window
|
These routines return the string of characters in str, starting at the current cursor position in the named window and ending at the right margin of the window. Attributes are stripped from the charac... |
mvinnwstr(3) -- Get a string of wchar_t characters from a Curses window
|
These routines return a string of wchar_t characters in str, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the window. The f... |
mvinsch(3) -- Insert a character before the character under the cursor in a Curses window
|
These routines insert the character ch before the character under the cursor. All characters to the right of the cursor are moved one space to the right, with the possibility of the rightmost characte... |
mvinsnstr(3) -- Insert a string before the character under the cursor in a Curses window
|
These routines insert a character string (as many characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are moved to the right, with the ... |
mvinsnwstr(3) -- Insert a wchar_t string before the character under the cursor in a Curses window
|
These routines insert a wchar_t character string (as many wchar_t characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are moved to the ... |
mvinsstr(3) -- Insert a string before the character under the cursor in a Curses window
|
These routines insert a character string (as many characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are moved to the right, with the ... |
mvinstr(3) -- Get a string of characters from a Curses window
|
These routines return the string of characters in str, starting at the current cursor position in the named window and ending at the right margin of the window. Attributes are stripped from the charac... |
mvinswch(3) -- Insert a wchar_t character before the character under the cursor in a Curses window
|
These routines insert the character wch, which contains a wide character, before the character under the cursor. All characters to the right of the cursor are moved one space to the right, with the po... |
mvinswstr(3) -- Insert a wchar_t string before the character under the cursor in a Curses window
|
These routines insert a wchar_t character string (as many wchar_t characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are moved to the ... |
mvins_nwstr(3) -- Insert a wide-character string into a Curses window
|
These functions insert a wchar_t character string (as many wchar_t characters as will fit on the line) in the current or specified window immediately before the current or specified position. All char... |
mvins_wch(3) -- Insert a complex character and rendition before the character under the cursor in a Curses window
|
These functions insert the complex character wch, along with its rendition, in the current or specified window at the current or specified cursor position. These functions: Do not perform wrapping In ... |
mvins_wstr(3) -- Insert a wide-character string into a Curses window
|
These functions insert a wchar_t character string (as many wchar_t characters as will fit on the line) in the current or specified window immediately before the current or specified position. All char... |
mvinwch(3) -- Get a wchar_t character and its attributes from a Curses window
|
These routines return the wide character, of type chtype, at the current or specified position in the current or specified window. If any attributes are set for that position, their values included in... |
mvinwchnstr(3) -- Get a string of wchar_t characters (and attributes) from a Curses window
|
These routines return a string of type chtype, holding wchar_t characters, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the... |
mvinwchstr(3) -- Get a string of wchar_t characters (and attributes) from a Curses window
|
These routines return a string of type chtype, holding wchar_t characters, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the... |
mvinwstr(3) -- Get a string of wchar_t characters from a Curses window
|
These routines return a string of wchar_t characters in str, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the window. The f... |
mvin_wch(3) -- Input a complex character and rendition from a Curses window
|
These functions extract the complex character and rendition from the current or specified position in the current or specified window into the object pointed to by wcval. |
mvin_wchnstr(3) -- Input an array of complex characters and renditions from a Curses window
|
These functions extract characters from the current or specified window, starting at the current or specified position and ending at the end of the line, and place them in the array pointed to by wchs... |
mvin_wchstr(3) -- Input an array of complex characters and renditions from a Curses window
|
These functions extract characters from the current or specified window, starting at the current or specified position and ending at the end of the line, and place them in the array pointed to by wchs... |
mvprintw(3) -- Print formatted output in Curses windows
|
The printw, wprintw, mvprintw, and mvwprintw routines are analogous to printf family of routines (see printf(3)). In effect, the printw routines output the string that would be output by printf as tho... |
mvscanw(3) -- Convert formatted input from a Curses window
|
The scanw, wscanw, and mvscanw routines correspond to scanf (see fscanf(3)). The effect of these routines is as though wgetstr were called on the window, and the resulting line were used as input for ... |
mvvline(3) -- Create Curses borders, and horizontal and vertical lines
|
The border, wborder, and box routines draw a border around the edges of the window. Each of the following arguments contains both a character and attributes for a particular part of the border: Left s... |
mvvline_set(3) -- Draw borders or lines by using complex characters and renditions
|
The border_set and wborder_set functions draw a border around the edges of the current or specified window. These functions do not advance the cursor position, do not perform special character process... |
mvwaddch(3) -- Add a character (with attributes) to a Curses window and advance the cursor
|
The addch, waddch, mvaddch, and mvwaddch routines put the character ch into the window at the current cursor position of the window and advance the position of the window cursor. Their function is sim... |
mvwaddchnstr(3) -- Add string of characters (and attributes) to a Curses window
|
All of these routines copy chstr directly into the window image structure starting at the current or specified cursor position. The four routines with n as the last argument copy at most n elements, b... |
mvwaddchstr(3) -- Add string of characters (and attributes) to a Curses window
|
All of these routines copy chstr directly into the window image structure starting at the current or specified cursor position. The four routines with n as the last argument copy at most n elements, b... |
mvwaddnstr(3) -- Add a string of characters to a Curses window and advance cursor
|
These routines write the characters of the character string str on the given window. The four routines with n as the last argument write at most n characters. For the other routines, the string should... |
mvwaddnwstr(3) -- Add a string of wchar_t characters to a Curses window and advance cursor
|
These routines write all the characters of the wchar_t character string wstr on the given window. The four routines with n as the last argument write at most n wchar_t characters. For the routines wit... |
mvwaddstr(3) -- Add a string of characters to a Curses window and advance cursor
|
These routines write the characters of the character string str on the given window. The four routines with n as the last argument write at most n characters. For the other routines, the string should... |
mvwaddwch(3) -- Add a wchar_t character (with attributes) to a Curses window and advance cursor
|
The addwch, waddwch, mvaddwch, and mvwaddwch routines put the character wch, holding a wchar_t character, into the window at the current cursor position of the window and advance the position of the w... |
mvwaddwchnstr(3) -- Add a string of wchar_t characters (and attributes) to a Curses window
|
All of these routines copy wchstr, which points to a string of wchar_t characters, directly into the window image structure starting at the current or specified cursor position. The four routines with... |
mvwaddwchstr(3) -- Add a string of wchar_t characters (and attributes) to a Curses window
|
All of these routines copy wchstr, which points to a string of wchar_t characters, directly into the window image structure starting at the current or specified cursor position. The four routines with... |
mvwaddwstr(3) -- Add a string of wchar_t characters to a Curses window and advance cursor
|
These routines write all the characters of the wchar_t character string wstr on the given window. The four routines with n as the last argument write at most n wchar_t characters. For the routines wit... |
mvwadd_wch(3) -- Add a complex character and rendition to a Curses window and advance the cursor
|
The add_wch, wadd_wch, mvadd_wch, and mvwadd_wch functions put the complex character wch into the window at the current or specified cursor position, of the current or specified window, and advance th... |
mvwadd_wchnstr(3) -- Add an array of complex characters and rendition to a Curses window
|
All of these functions copy wchstr, which points to an array of complex characters, directly into the current or specified window image structure starting at the current cursor position or the positio... |
mvwadd_wchstr(3) -- Add an array of complex characters and rendition to a Curses window
|
All of these functions copy wchstr, which points to an array of complex characters, directly into the current or specified window image structure starting at the current cursor position or the positio... |
mvwchgat(3) -- Change renditions of characters in a Curses window
|
These functions change the renditions of the next n characters in the current or specified window (or of the remaining characters on the line if n is -1), starting at the current or specified cursor p... |
mvwdelch(3) -- Delete the character under the cursor in a Curses window
|
These routines do the following: Delete the character under the cursor in the current or specified window Move all characters that are to the right of the cursor and on the same line to the left one p... |
mvwgetch(3) -- Get (or push back) characters from a Curses terminal keyboard
|
The getch, wgetch, mvgetch, and mvwgetch routines read a character from the terminal associated with the Curses window. In no-delay mode, if no input is waiting, these routines return the value ERR. I... |
mvwgetnstr(3) -- Get character strings from a Curses terminal keyboard
|
The effect of getstr is as though a series of calls to getch were made, until a newline or carriage return is received. The resulting value is placed in the area pointed to by the character pointer st... |
mvwgetnwstr(3) -- Get wchar_t character strings from a Curses terminal keyboard
|
The effect of getwstr is as though a series of calls to getwch were made, until a newline and carriage return is received. The resulting value is placed in the area pointed to by the wchar_t pointer w... |
mvwgetn_wstr(3) -- Get an array of wide characters from a Curses terminal keyboard
|
The effect of get_wstr is as though a series of calls to get_wch were made, until a newline, end-of-line, or endof-file character is processed. An end-of-file character is represented by WEOF, as defi... |
mvwgetstr(3) -- Get character strings from a Curses terminal keyboard
|
The effect of getstr is as though a series of calls to getch were made, until a newline or carriage return is received. The resulting value is placed in the area pointed to by the character pointer st... |
mvwgetwch(3) -- Get (or push back) wchar_t characters from a Curses terminal keyboard
|
The getwch, wgetwch, mvgetwch, and mvwgetwch routines read an EUC character from the terminal associated with the Curses window, transform the character into a wchar_t character, and return the wchar_... |
mvwgetwstr(3) -- Get wchar_t character strings from a Curses terminal keyboard
|
The effect of getwstr is as though a series of calls to getwch were made, until a newline and carriage return is received. The resulting value is placed in the area pointed to by the wchar_t pointer w... |
mvwget_wch(3) -- Get (or push back) a wide character from Curses terminal keyboard
|
The get_wch, wget_wch, mvget_wch, and mvwget_wch functions read a character from the terminal associated with the current or specified window. In no-delay mode, if no input is waiting, these functions... |
mvwget_wstr(3) -- Get an array of wide characters from a Curses terminal keyboard
|
The effect of get_wstr is as though a series of calls to get_wch were made, until a newline, end-of-line, or endof-file character is processed. An end-of-file character is represented by WEOF, as defi... |
mvwhline(3) -- Create Curses borders, and horizontal and vertical lines
|
The border, wborder, and box routines draw a border around the edges of the window. Each of the following arguments contains both a character and attributes for a particular part of the border: Left s... |
mvwhline_set(3) -- Draw borders or lines by using complex characters and renditions
|
The border_set and wborder_set functions draw a border around the edges of the current or specified window. These functions do not advance the cursor position, do not perform special character process... |
mvwin(3) -- Routines that create Curses windows
|
The newwin routine creates and returns a pointer to a new window with the given number of lines, nlines, and columns, ncols. The upper left-hand corner of the window is at line begin_y and column begi... |
mvwinch(3) -- Get a character and its attributes from a Curses window
|
These routines return the character, of type chtype, at the current position in the named window. If any attributes are set for that position, their values are combined (through an inclusive OR operat... |
mvwinchnstr(3) -- Get a string of characters (and attributes) from a Curses window
|
These routines return a string of type chtype, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the window. The four functions ... |
mvwinchstr(3) -- Get a string of characters (and attributes) from a Curses window
|
These routines return a string of type chtype, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the window. The four functions ... |
mvwinnstr(3) -- Get a string of characters from a Curses window
|
These routines return the string of characters in str, starting at the current cursor position in the named window and ending at the right margin of the window. Attributes are stripped from the charac... |
mvwinnwstr(3) -- Get a string of wchar_t characters from a Curses window
|
These routines return a string of wchar_t characters in str, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the window. The f... |
mvwinsch(3) -- Insert a character before the character under the cursor in a Curses window
|
These routines insert the character ch before the character under the cursor. All characters to the right of the cursor are moved one space to the right, with the possibility of the rightmost characte... |
mvwinsnstr(3) -- Insert a string before the character under the cursor in a Curses window
|
These routines insert a character string (as many characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are moved to the right, with the ... |
mvwinsnwstr(3) -- Insert a wchar_t string before the character under the cursor in a Curses window
|
These routines insert a wchar_t character string (as many wchar_t characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are moved to the ... |
mvwinsstr(3) -- Insert a string before the character under the cursor in a Curses window
|
These routines insert a character string (as many characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are moved to the right, with the ... |
mvwinstr(3) -- Get a string of characters from a Curses window
|
These routines return the string of characters in str, starting at the current cursor position in the named window and ending at the right margin of the window. Attributes are stripped from the charac... |
mvwinswch(3) -- Insert a wchar_t character before the character under the cursor in a Curses window
|
These routines insert the character wch, which contains a wide character, before the character under the cursor. All characters to the right of the cursor are moved one space to the right, with the po... |
mvwinswstr(3) -- Insert a wchar_t string before the character under the cursor in a Curses window
|
These routines insert a wchar_t character string (as many wchar_t characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are moved to the ... |
mvwins_nwstr(3) -- Insert a wide-character string into a Curses window
|
These functions insert a wchar_t character string (as many wchar_t characters as will fit on the line) in the current or specified window immediately before the current or specified position. All char... |
mvwins_wch(3) -- Insert a complex character and rendition before the character under the cursor in a Curses window
|
These functions insert the complex character wch, along with its rendition, in the current or specified window at the current or specified cursor position. These functions: Do not perform wrapping In ... |
mvwins_wstr(3) -- Insert a wide-character string into a Curses window
|
These functions insert a wchar_t character string (as many wchar_t characters as will fit on the line) in the current or specified window immediately before the current or specified position. All char... |
mvwinwch(3) -- Get a wchar_t character and its attributes from a Curses window
|
These routines return the wide character, of type chtype, at the current or specified position in the current or specified window. If any attributes are set for that position, their values included in... |
mvwinwchnstr(3) -- Get a string of wchar_t characters (and attributes) from a Curses window
|
These routines return a string of type chtype, holding wchar_t characters, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the... |
mvwinwchstr(3) -- Get a string of wchar_t characters (and attributes) from a Curses window
|
These routines return a string of type chtype, holding wchar_t characters, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the... |
mvwinwstr(3) -- Get a string of wchar_t characters from a Curses window
|
These routines return a string of wchar_t characters in str, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the window. The f... |
mvwin_wch(3) -- Input a complex character and rendition from a Curses window
|
These functions extract the complex character and rendition from the current or specified position in the current or specified window into the object pointed to by wcval. |
mvwin_wchnstr(3) -- Input an array of complex characters and renditions from a Curses window
|
These functions extract characters from the current or specified window, starting at the current or specified position and ending at the end of the line, and place them in the array pointed to by wchs... |
mvwin_wchstr(3) -- Input an array of complex characters and renditions from a Curses window
|
These functions extract characters from the current or specified window, starting at the current or specified position and ending at the end of the line, and place them in the array pointed to by wchs... |
mvwprintw(3) -- Print formatted output in Curses windows
|
The printw, wprintw, mvprintw, and mvwprintw routines are analogous to printf family of routines (see printf(3)). In effect, the printw routines output the string that would be output by printf as tho... |
mvwscanw(3) -- Convert formatted input from a Curses window
|
The scanw, wscanw, and mvscanw routines correspond to scanf (see fscanf(3)). The effect of these routines is as though wgetstr were called on the window, and the resulting line were used as input for ... |
mvwvline(3) -- Create Curses borders, and horizontal and vertical lines
|
The border, wborder, and box routines draw a border around the edges of the window. Each of the following arguments contains both a character and attributes for a particular part of the border: Left s... |
mvwvline_set(3) -- Draw borders or lines by using complex characters and renditions
|
The border_set and wborder_set functions draw a border around the edges of the current or specified window. These functions do not advance the cursor position, do not perform special character process... |
m_in(3) -- Perform multiple precision integer arithmetic
|
These functions perform arithmetic on integers of arbitrary length. The integers are stored using the defined type MINT. Pointers to a MINT can be initialized using theitom() function, which sets the ... |
m_out(3) -- Perform multiple precision integer arithmetic
|
These functions perform arithmetic on integers of arbitrary length. The integers are stored using the defined type MINT. Pointers to a MINT can be initialized using theitom() function, which sets the ... |
nacreate(3) -- arena memory allocator
|
The amalloc family of routines provides a main memory allocator based on the malloc(3) memory allocator. This allocator has been extended so that an arbitrary memory space ("arena") can be set up as... |
nanosleep(3) -- Suspends a process from execution for the specified timer interval (P1003.1b)
|
The nanosleep function suspends a process until one of the following conditions is met: The time interval specified in rqtp has elapsed. A signal is delivered to the calling process and the action is ... |
napms(3) -- Low-level Curses routines
|
These routines give low-level access to various Curses functionality. They are typically used inside library routines. The def_prog_mode and def_shell_mode routines save the current terminal modes as ... |
ndbm(3) -- Database subroutines
|
The dbm_open(), dbm_close(), dbm_fetch(), dbm_store(), dbm_delete(), dbm_firstkey(), dbm_nextkey(), dbm_forder(), dbm_setpblksiz(), dbm_error(), and dbm_clearerr() functions maintain key/content pairs... |
neg(3) -- Negate and returns the value of the double operand x
|
The neg() function returns a negative of the value of the double operand x. neg(3) |
netname2host(3) -- miscellaneous library routines for ONC remote procedure calls
|
The RPC routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the... |
netname2user(3) -- miscellaneous library routines for ONC remote procedure calls
|
The RPC routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the... |
newpad(3) -- Routines that create and display Curses pads
|
The newpad routine creates and returns a pointer to a new pad data structure with the given number of lines, nlines, and columns, ncols. A pad is like a window, except that a pad is not necessarily as... |
newterm(3) -- Curses routines for screen initialization and manipulation
|
The initscr routine is almost always the first routine that applications call. (The exceptions are slk_init, filter, ripoffline, use_env and, for multiple-terminal applications, newterm). The initscr ... |
newwin(3) -- Routines that create Curses windows
|
The newwin routine creates and returns a pointer to a new window with the given number of lines, nlines, and columns, ncols. The upper left-hand corner of the window is at line begin_y and column begi... |
nextafter(3) -- Related miscellaneous IEEE arithmetic functions.
|
The copysign(), copysignf(), and copysignl() functions return x with the same sign as y. IEEE 754 requires copysign(x,NaN), copysignf(x,NaN) and copysignl(x,NaN) to return +x or -x. The finite(), fini... |
nextkey(3) -- Database subroutines
|
The dbminit(), fetch(), store(), delete(), firstkey(), nextkey(), and forder() functions maintain key/content pairs in a database. They are obtained with the -ldbm loader option. The dbm library is pr... |
nfork(3) -- Creates a child process (libnuma library)
|
The nfork() function causes creation of a new process. The new process (child process) is an exact copy of the calling process (parent process). This means the child process inherits the following att... |
nftw(3) -- Walk a file tree
|
The nftw() function recursively searches the directory hierarchy that descends from the directory specified by the path parameter. The nftw() function performs the same operations as ftw(), except tha... |
nice(3) -- Change the scheduling priority of a process
|
The nice() function adds the value specified in the increment parameter to the nice value of the calling process. The nice value is a nonnegative number; a higher nice value gives the process a lower ... |
nint(3) -- Round floatingpoint
|
The floor(), floorf(), and floorl() functions return the largest floating-point integer value less than or equal to x. The ceil(), ceilf(), and ceill() functions return the smallest floating-point int... |
nl(3) -- Routines for controlling output options for a Curses terminal
|
These routines set options that deal with output within Curses. Unless stated otherwise, all options are initially FALSE. It is not necessary to turn these options off before calling endwin. The clear... |
nlist(3) -- gets entries from name list
|
NOTE The nlist() subroutine has moved from the standard C library to the libmld.a library due to the difference in the object file format. Programs that need to use nlist() must be linked with the -lm... |
nloc(3) -- Queries the NUMA Topology or Resource Affinity Domains (libnuma library)
|
The nloc() function will return in radset the set of RADs that have a distance <= the nattr_distance value from the specified resource. The returned radset value may be used as an argument to explicit... |
NLSPATH(3) -- Opening a message catalog
|
The catopen() function opens a specified message catalog and returns a catalog descriptor that is used by the catgets() function to retrieve messages from the catalog. The name parameter specifies the... |
nl_langinfo(3) -- Return language or cultural data defined in the current locale
|
The nl_langinfo() function returns a pointer to a string containing information relevant to the particular language or cultural area defined in the program's locale. The constant names and values tha... |
nmadvise(3) -- Advise the system of the expected paging behavior of a process (libnuma)
|
The nmadvise() function permits a process to advise the system about its expected behavior in referencing a particular range of pages in the process address space. This advice includes reference patte... |
nmmap(3) -- Maps an open file into a process's address space (libnuma library).
|
If the attr argument is NULL, the nmmap() function behaves identically to the mmap() function. If the attr argument is non-NULL, it points to a memory allocation policy and attributes structure that s... |
nocbreak(3) -- Curses
|
The cbreak and nocbreak routines put the terminal into and out of cbreak mode, respectively. In this mode, characters typed by the user are immediately available to the program, and erase/kill charact... |
nodelay(3) -- Curses
|
The cbreak and nocbreak routines put the terminal into and out of cbreak mode, respectively. In this mode, characters typed by the user are immediately available to the program, and erase/kill charact... |
noecho(3) -- Curses
|
The cbreak and nocbreak routines put the terminal into and out of cbreak mode, respectively. In this mode, characters typed by the user are immediately available to the program, and erase/kill charact... |
nonl(3) -- Routines for controlling output options for a Curses terminal
|
These routines set options that deal with output within Curses. Unless stated otherwise, all options are initially FALSE. It is not necessary to turn these options off before calling endwin. The clear... |
noqiflush(3) -- Curses
|
The cbreak and nocbreak routines put the terminal into and out of cbreak mode, respectively. In this mode, characters typed by the user are immediately available to the program, and erase/kill charact... |
noraw(3) -- Curses
|
The cbreak and nocbreak routines put the terminal into and out of cbreak mode, respectively. In this mode, characters typed by the user are immediately available to the program, and erase/kill charact... |
notimeut(3) -- Curses
|
The cbreak and nocbreak routines put the terminal into and out of cbreak mode, respectively. In this mode, characters typed by the user are immediately available to the program, and erase/kill charact... |
nrand48(3) -- Generate uniformly distributed pseudorandom number sequences
|
This family of functions generates pseudorandom numbers using the linear congruential algorithm and 48-bit integer arithmetic. The drand48() and erand48() functions return nonnegative, double-precisio... |
nrand48_r(3) -- Generate uniformly distributed pseudorandom number sequences
|
This family of functions generates pseudorandom numbers using the linear congruential algorithm and 48-bit integer arithmetic. The drand48() and erand48() functions return nonnegative, double-precisio... |
nsdispatch(3) -- name service switch dispatcher routine
|
The nsdispatch() function invokes the callback functions specified in dtab in the order given in /etc/nsswitch.conf for the database until a successful entry is found. retval is passed to each callbac... |
nsg_attach_pid(3) -- Attaches a process to, or detaches a process from a NUMA Scheduling Group (libnuma library)
|
The nsg_attach_pid() function attaches the process identified by the pid argument to an NSG. An NSG is a set of processes and/or threads that will be constrained to reside on the same Resource Affinit... |
nsg_destroy(3) -- Destroys a NUMA Scheduling Group (libnuma library)
|
Remove the NSG identified by nsg and deallocate associated structures. If the NSG is currently non-empty, existing members are removed before deleting the NSG. |
nsg_detach_pid(3) -- Attaches a process to, or detaches a process from a NUMA Scheduling Group (libnuma library)
|
The nsg_attach_pid() function attaches the process identified by the pid argument to an NSG. An NSG is a set of processes and/or threads that will be constrained to reside on the same Resource Affinit... |
nsg_get(3) -- Query status of a NUMA Scheduling Group (libnuma library)
|
The nsg_get() function queries the status of the NSG by copying its associated nsgid_ds structure into a buffer pointed to by result. |
nsg_get_nsgs(3) -- Returns a list NUMA Scheduling Groups (libnuma library)
|
The nsg_get_nsgs() function returns a list of NSGs that are active on the system in the buffer pointed to by nsgidlist. The argument numnsgs specifies the number of nsgid_t entries that can be accommo... |
nsg_get_pids(3) -- Return a list of a NUMA Scheduling Group's process identifiers (libnuma library)
|
The nsg_get_pids() function returns a list of process IDs of processes attached to the NSG in the buffer pointed to by pidlist. The argument numpids specifies the number of process IDs that can be acc... |
nsg_init(3) -- Look up or create a NUMA Scheduling Group (libnuma library)
|
The nsg_init() function looks up and possibly creates the NSG identified by the key parameter. The flags parameter supplies options for the lookup or create operation. After creating a new NSG, the ns... |
nsg_set(3) -- Set NUMA Scheduling Group owner and permissions (libnuma library)
|
The nsg_set() function sets the NSG owner IDs (user ID and group ID) and permissions (mode) by using the nsgid_ds structure pointed to by attrib. |
nshmget(3) -- Returns (or creates) the ID for a shared memory region (libnuma library)
|
If the attr argument is NULL, the nshmget() function behaves identically to the shmget() function. If the attr argument is non-NULL, it points to a memory allocation policy and attributes structure th... |
ntohl(3) -- Convert an unsigned 32-bit integer from Internet network byte order to host byte order
|
The ntohl() (network-to-host long) function converts an unsigned 32-bit integer from Internet network-byte order to host-byte order. The Internet network requires address and port reference data in ne... |
ntohs(3) -- Convert an unsigned short (16-bit) integer from
|
The ntohs() (network-to-host short) function converts an unsigned short (16-bit) integer from Internet network-byte order to host-byte order. The Internet network requires address and port reference d... |
numa_intro(3) -- Introduction to NUMA support
|
NUMA, or Non-Uniform Memory Access, refers to a hardware architectural feature in modern multiprocessor platforms that attempts to address the increasing disparity between requirements for processor s... |
numa_query_pid(3) -- Returns NUMA-related information for the specified process identifier (libnuma library)
|
The numa_query_pid() function returns NUMA-related information about a specified pid in the rpinfo structure, which contains the following information: typedef struct __numa_pid_info { pid_t npinfo_pi... |
Object(3X) -- The Object widget class
|
Object is never instantiated. Its sole purpose is as a supporting superclass for other widget classes. Classes    [Toc]    [Back] The class pointer is objectClass. The class name is Object. New Resour... |
ObtainPrivateKeyFromPublicKey(3) -- Convert public key to private key (CDSA)
|
Given a public key this function returns a reference to the private key. The private key and its associated passphrase can be used as an input to any function requiring a private key value. |
omin(3) -- Perform multiple precision integer arithmetic
|
These functions perform arithmetic on integers of arbitrary length. The integers are stored using the defined type MINT. Pointers to a MINT can be initialized using theitom() function, which sets the ... |
omout(3) -- Perform multiple precision integer arithmetic
|
These functions perform arithmetic on integers of arbitrary length. The integers are stored using the defined type MINT. Pointers to a MINT can be initialized using theitom() function, which sets the ... |
opendir(3) -- Perform operations on directories
|
The opendir() function opens the directory designated by the dir_name parameter and associates a directory stream with it. The directory stream is positioned at the first entry. The type DIR, which is... |
openlog(3) -- Control system log
|
The syslog() function writes messages to the system log maintained by the syslogd daemon. The syslogd daemon reads messages and writes them to the system console or to a log file, or forwards them to ... |
openlog_r(3) -- Control system log
|
The syslog() function writes messages to the system log maintained by the syslogd daemon. The syslogd daemon reads messages and writes them to the system console or to a log file, or forwards them to ... |
openpty(3) -- Open and fork pseudoterminals
|
The openpty() function opens the pty master/slave pair and sets the terminal attributes of the slave pseudoterminal according to the specifications in the termp and winp parameters. The forkpty() func... |
OpenSSL_add_all_algorithms(3) -- Add algorithms to internal table
|
OpenSSL keeps an internal table of digest algorithms and ciphers. It uses this table to lookup ciphers via functions such as EVP_get_cipher_byname(). The OpenSSL_add_all_digests() function adds all di... |
OpenSSL_add_all_ciphers(3) -- Add algorithms to internal table
|
OpenSSL keeps an internal table of digest algorithms and ciphers. It uses this table to lookup ciphers via functions such as EVP_get_cipher_byname(). The OpenSSL_add_all_digests() function adds all di... |
OpenSSL_add_all_digests(3) -- Add algorithms to internal table
|
OpenSSL keeps an internal table of digest algorithms and ciphers. It uses this table to lookup ciphers via functions such as EVP_get_cipher_byname(). The OpenSSL_add_all_digests() function adds all di... |
OpenSSL_add_ssl_algorithms(3) -- Initialize SSL library by registering algorithms
|
The SSL_library_init() function registers the available ciphers and digests. The OpenSSL_add_ssl_algorithms() and SSLeay_add_ssl_algorithms() functions are synonyms for the SSL_library_init() function... |
OPENSSL_VERSION_NUMBER(3) -- Get OpenSSL version number
|
OPENSSL_VERSION_NUMBER is a numeric release version identifier: MMNNFFPPS: major minor fix patch status The status nibble has one of the values 0 for development, 1 to e for betas 1 to 14, and f for r... |
overlay(3) -- Overlap and manipulate overlapped Curses windows
|
The overlay and overwrite routines overlay srcwin on top of dstwin. The scrwin and dstwin parameters do not have to be the same size; Curses copies only the text in the region where the two windows ov... |
OverrideShell(3X) -- The OverrideShell widget class
|
OverrideShell is used for shell windows that completely bypass the window manager, for example, PopupMenu shells. Classes    [Toc]    [Back] OverrideShell inherits behavior and resources from Core, Co... |
overwrite(3) -- Overlap and manipulate overlapped Curses windows
|
The overlay and overwrite routines overlay srcwin on top of dstwin. The scrwin and dstwin parameters do not have to be the same size; Curses copies only the text in the region where the two windows ov... |
pair_content(3) -- Curses
|
The Curses library includes routines that manipulate color-on-color alphanumeric terminals. To use these routines, applications must call start_color, usually right after initscr. Colors are always us... |
PAIR_NUMBER(3) -- Curses
|
The Curses library includes routines that manipulate color-on-color alphanumeric terminals. To use these routines, applications must call start_color, usually right after initscr. Colors are always us... |
passlen(3) -- Determines minimum password length (Enhanced Security)
|
The passlen() function takes the password lifetime duration life_dur for an account and the login_delay between login attempts, both values in seconds, and the alphabet_size of distinct characters, an... |
PassThrough(3) -- Extend crypto functionality (CDSA)
|
The CSSM_CSP_PassThrough() (CSSM API), or CSP_PassThrough() (CSP SPI), function is provided to allow CSP developers to extend the crypto functionality of the CSSM API. |
pause(3) -- Suspends a process until it receives a signal
|
The pause() function suspends the calling process until it receives a signal whose action is either to execute a signal-catching function or terminate the process. The signal must be one that is ackno... |
pclose(3) -- Closes a pipe to a process
|
The pclose() function closes a pipe between the calling program and a shell command to be executed. Use the pclose() function to close any stream you have opened with the popen() function. The pclose(... |
pechochar(3) -- Routines that create and display Curses pads
|
The newpad routine creates and returns a pointer to a new pad data structure with the given number of lines, nlines, and columns, ncols. A pad is like a window, except that a pad is not necessarily as... |
pechowchar(3) -- Routines that create and display Curses pads
|
The newpad routine creates and returns a pointer to a new pad data structure with the given number of lines, nlines, and columns, ncols. A pad is like a window, except that a pad is not necessarily as... |
pecho_wchar(3) -- Routines that create and display Curses pads
|
The newpad routine creates and returns a pointer to a new pad data structure with the given number of lines, nlines, and columns, ncols. A pad is like a window, except that a pad is not necessarily as... |
pem(3) -- PEM routines
|
The pem() functions read or write structures in PEM format. In this sense PEM format is simply base64 encoded data surrounded by header lines. Each operation has four functions associated with it. For... |
perror(3) -- Write a message explaining the current setting of errno
|
The perror() function writes a message on the standard error stream that describes the current setting of the external variable errno. The error message includes the string pointed to by the string pa... |
pfopen(3) -- Open a packet filter file
|
The packet filter (see packetfilter(7)) provides raw access to Ethernets and similar network data link layers. The pfopen() function is used to open a packet filter file descriptor. The function hides... |
pmap_getmaps(3) -- miscellaneous library routines for ONC remote procedure calls
|
The RPC routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the... |
pmap_getport(3) -- miscellaneous library routines for ONC remote procedure calls
|
The RPC routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the... |
pmap_rmtcall(3) -- miscellaneous library routines for ONC remote procedure calls
|
The RPC routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the... |
pmap_set(3) -- miscellaneous library routines for ONC remote procedure calls
|
The RPC routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the... |
pmap_unset(3) -- miscellaneous library routines for ONC remote procedure calls
|
The RPC routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the... |
pnoutrefresh(3) -- Routines that create and display Curses pads
|
The newpad routine creates and returns a pointer to a new pad data structure with the given number of lines, nlines, and columns, ncols. A pad is like a window, except that a pad is not necessarily as... |
popen(3) -- Initiates a pipe to a process
|
The popen() function creates a pipe between the calling program and a shell command to be executed. It returns a pointer to a FILE structure for the stream. If the type parameter is the value r, the c... |
pow(3) -- Exponential, logarithm, and power functions
|
The exp(), expf(), and expl() functions compute the value of the exponential function, defined as e**x, where e is the constant used as a base for natural logarithms. The expm1(), expm1f(), and expm1l... |
prefresh(3) -- Routines that create and display Curses pads
|
The newpad routine creates and returns a pointer to a new pad data structure with the given number of lines, nlines, and columns, ncols. A pad is like a window, except that a pad is not necessarily as... |
printf(3) -- Print formatted output
|
The format parameter is a character string that contains two types of objects: Literal characters, which are copied to the output stream. Conversion specifications, each of which causes zero or more i... |
printw(3) -- Print formatted output in Curses windows
|
The printw, wprintw, mvprintw, and mvwprintw routines are analogous to printf family of routines (see printf(3)). In effect, the printw routines output the string that would be output by printf as tho... |
print_pset_error(3) -- Prints an error from a processor set function
|
The print_pset_error() function prints descriptive information about an error returned by a processor set function. |
Programmers_Workbench_Library(3) -- Provide functions for compatibility with existing programs
|
The libpw functions are provided for compatibility with existing programs. Their use in new programs is not recommended. Determines whether string contains character. Determines the offset in string1 ... |
pthread(3) -- Introduction to POSIX Threads
|
DECthreads, a multithreading run-time library, provides a set of interfaces for building multithreaded programs. The POSIX threads interface provides routines that implement the IEEE Std 1003.1c-1995,... |
pthread_atfork(3) -- Declares fork handler routines to be called when the calling thread's process forks a child process
|
This routine allows a main program or library to control resources during a fork(2) operation by declaring fork handler routines, as follows: The fork handler routine specified in the prepare argument... |
pthread_attr_destroy(3) -- Destroys a thread attributes object
|
This routine destroys a thread attributes object. Call this routine when a thread attributes object will no longer be referenced. Threads that were created using this thread attributes object are not ... |
pthread_attr_getdetachstate(3) -- Obtains the detachstate attribute of the specified thread attributes object
|
This routine obtains the detachstate attribute of a thread attributes object. This attribute specifies whether threads created using the specified thread attributes object are created in a detached st... |
pthread_attr_getguardsize(3) -- Obtains the guardsize attribute of the specified thread attributes object
|
This routine obtains the value of the guardsize attribute of the thread attributes object specified in the attr argument and stores it in the location specified by the guardsize argument. The specifie... |
pthread_attr_getinheritsched(3) -- Obtains the inherit scheduling attribute of the specified thread attributes object
|
This routine obtains the value of the inherit scheduling attribute from the specified thread attributes object. The inherit scheduling attribute specifies whether threads created using the attributes ... |
pthread_attr_getname_np(3) -- Obtain the object name attribute in a thread attributes object
|
This routine copies the object name attribute from the thread attributes object specified by attr to the buffer at the location name. Before calling this routine, your program must allocate the buffer... |
pthread_attr_getschedparam(3) -- Obtains the scheduling parameters for an attribute of the specified thread attributes object
|
This routine obtains the scheduling parameters associated with the scheduling policy attribute of the specified thread attributes object. |
pthread_attr_getschedpolicy(3) -- Obtains the scheduling policy attribute of the specified thread attributes object
|
This routine obtains the value of the scheduling policy attribute of the specified thread attributes object. The scheduling policy attribute defines the scheduling policy for threads created using the... |
pthread_attr_getscope(3) -- Obtains the contention scope attribute of the specified thread attributes object
|
This routine obtains the value of the contention scope attribute of the thread attributes object specified in the attr argument and stores it in the location specified by the scope argument. The speci... |
pthread_attr_getstackaddr(3) -- Obtains the stack address attribute of the specified thread attributes object
|
This routine obtains the value of the stack address attribute of the thread attributes object specified in the attr argument and stores it in the location specified by the stackaddr argument. The spec... |
pthread_attr_getstackaddr_np(3) -- Obtains the stack address attribute of the specified thread attributes object
|
This routine obtains the value of the stack address attribute of the thread attributes object specified in the attr argument and stores it in the location specified by the stackaddr argument. The spec... |
pthread_attr_getstacksize(3) -- Obtains the value of the stacksize attribute in the specified thread attributes object
|
This routine obtains the stacksize attribute of the thread attributes object specified in the attr argument. |
pthread_attr_init(3) -- Initializes a thread attributes object
|
This routine initializes the thread attributes object specified by the attr argument with a set of default attribute values. A thread attributes object is used to specify the attributes of one or more... |
pthread_attr_setdetachstate(3) -- Changes the detachstate attribute in the specified thread attributes object
|
This routine changes the detachstate attribute in the thread attributes object specified by the attr argument. The detachstate attribute specifies whether the thread created using the specified thread... |
pthread_attr_setguardsize(3) -- Changes the guardsize attribute of the specified thread attributes object
|
This routine uses the value specified in the guardsize argument to set the guardsize attribute of the thread attributes object specified in the attr argument. When creating a thread, use a thread attr... |
pthread_attr_setinheritsched(3) -- Changes the inherit scheduling attribute of the specified thread attributes object
|
This routine changes the inherit scheduling attribute of the thread attributes object specified by the attr argument. The inherit scheduling attribute specifies whether a thread created using the spec... |
pthread_attr_setname_np(3) -- Change the object name attribute in a thread attributes object
|
This routine changes the object name attribute in the thread attributes object specified by attr to the value specified by name. A new thread created using the thread attributes object is initialized ... |
pthread_attr_setschedparam(3) -- Changes the values of the parameters associated with a scheduling policy of the specified thread att...
|
This routine sets the scheduling parameters associated with the scheduling policy attribute of the thread attributes object specified by the attr argument. Use the sched_priority field of a sched_para... |
pthread_attr_setschedpolicy(3) -- Changes the scheduling policy attribute of the specified thread attributes object
|
This routine sets the scheduling policy of a thread that is created using the attributes object specified by the attr argument. The default value of the scheduling attribute is SCHED_OTHER. By default... |
pthread_attr_setscope(3) -- Sets the contention scope attribute of the specified thread attributes object
|
This routine uses the value specified in the scope argument to set the contention scope attribute of the thread attributes object specified in the attr argument. When creating a thread, use a thread a... |
pthread_attr_setstackaddr(3) -- Changes the stack address attribute of the specified thread attributes object
|
This routine uses the value specified in the stackaddr argument to set the stack address attribute of the thread attributes object specified in the attr argument. When creating a thread, use a thread ... |
pthread_attr_setstackaddr_np(3) -- Changes the stack address and size of the specified thread attributes object
|
This routine uses the values specified in the stackaddr and size arguments to set the base stack address and size of the thread attributes object specified in the attr argument. When creating a thread... |
pthread_attr_setstacksize(3) -- Changes the stacksize attribute in the specified thread attributes object
|
This routine sets the stacksize attribute in the thread attributes object specified by the attr argument. Use this routine to adjust the size of the writable area of the stack for a new thread. The si... |
pthread_cancel(3) -- Allows a thread to request a thread to terminate execution
|
This routine sends a cancellation request to the specified target thread. A cancellation request is a mechanism by which a calling thread requests the target thread to terminate as quickly as possible... |
pthread_cleanup_pop(3) -- (Macro) Removes the cleanup handler routine from the calling thread's cleanup handler stack and opti...
|
This routine removes the cleanup handler routine established by the matching call to pthread_cleanup_push(3) from the calling thread's cleanup handler stack, then executes it if the value specified i... |
pthread_cleanup_push(3) -- (Macro) Establishes a cleanup handler routine to be executed when the thread exits or is canceled
|
This routine pushes the specified routine onto the calling thread's cleanup handler stack. The cleanup handler routine is popped from the stack and executed with the arg argument when any of the foll... |
pthread_condattr_destroy(3) -- Destroys a condition variable attributes object
|
This routine destroys the specified condition variable attributes object--that is, the object becomes uninitialized. Condition variables that were created using this attributes object are not affected... |
pthread_condattr_getpshared(3) -- Obtain the process-shared attribute of a condition variable attributes object
|
This routine obtains the value of the process-shared attribute in the condition variable attributes object referenced by attr and stores it at the location pshared. The object referenced by attr must ... |
pthread_condattr_init(3) -- Initializes a condition variable attributes object
|
This routine initializes the condition variable attributes object specified by the (attr) argument with a set of default attribute values. When an attributes object is used to create a condition varia... |
pthread_condattr_setpshared(3) -- Change the process-shared attribute of a condition variable attributes object
|
This routine uses the value specified in the pshared argument to set the process-shared attribute of the condition variable attributes object specified in the attr argument. Creating a condition varia... |
pthread_cond_broadcast(3) -- Wakes all threads that are waiting on the specified condition variable
|
This routine unblocks all threads waiting on the specified condition variable cond. Calling this routine implies that data guarded by the associated mutex has changed, so that it might be possible for... |
pthread_cond_destroy(3) -- Destroys a condition variable
|
This routine destroys the condition variable specified by cond. This effectively uninitializes the condition variable. Call this routine when a condition variable will no longer be referenced. Destroy... |
pthread_cond_getname_np(3) -- Obtain the object name from a condition variable object
|
This routine copies the object name from the condition variable object specified by cond to the buffer at the location name. Before calling this routine, your program must allocate the buffer indicate... |
pthread_cond_init(3) -- Initializes a condition variable
|
This routine initializes the condition variable (cond) with attributes referenced by attr. If attr is NULL, the default condition variable attributes are used. A condition variable is a synchronizatio... |
pthread_cond_setname_np(3) -- Changes the object name in a condition variable object
|
This routine changes the object name in the condition variable object specified by cond to the value specified by name. To set a new condition variable object's object name, call this routine immedia... |
pthread_cond_signal(3) -- Wakes at least one thread that is waiting on the specified condition variable
|
This routine unblocks at least one thread waiting on the specified condition variable cond. Calling this routine implies that data guarded by the associated mutex has changed, thus it might be possibl... |
pthread_cond_signal_int_np(3) -- Wakes one thread that is waiting on the specified condition variable (called from interrupt level on...
|
This routine wakes one thread waiting on the specified condition variable. It can only be called from a software interrupt handler routine (that is, from a Tru64 UNIX signal handler or OpenVMS AST). C... |
pthread_cond_sig_preempt_int_np(3) -- Wakes one thread that is waiting on the specified condition variable (called from interrupt level on...
|
This routine wakes one thread waiting on a condition variable. It can only be called from a software interrupt handler routine. Calling this routine implies that it might be possible for a single wait... |
pthread_cond_timedwait(3) -- Causes a thread to wait for the
|
This routine causes a thread to wait until one of the following occurs: The specified condition variable is signaled or broadcasted. The current system clock time is greater than or equal to the time ... |
pthread_cond_wait(3) -- Causes a thread to wait for the specified condition variable to be signaled or broadcasted
|
This routine causes a thread to wait for the specified condition variable to be signaled or broadcasted. Each condition corresponds to one or more Boolean relations, called a predicate, based on share... |
pthread_create(3) -- Creates a thread
|
This routine creates a thread. A thread is a single, sequential flow of control within a program. It is the active execution of a designated routine, including any nested routine invocations. Successf... |
pthread_delay_np(3) -- Delays a thread's execution
|
This routine causes a thread to delay execution for a specific interval of time. This interval ends at the current time plus the specified interval. The routine will not return before the end of the i... |
pthread_detach(3) -- Marks a thread object for deletion
|
This routine marks the specified thread object to indicate that storage for the corresponding thread can be reclaimed when the thread terminates. This includes storage for the thread argument's retur... |
pthread_equal(3) -- Compares one thread identifier to another thread identifier
|
This routine compares one thread identifier to another thread identifier. If either t1 or t2 are not valid thread identifiers, this routine's behavior is undefined. |
pthread_exc_get_status_np(3) -- (Macro) Obtains a systemdefined error status from a DECthreads status exception object
|
This routine obtains and returns the system-specific status value from the DECthreads status exception object specified in the exception argument. This value must have already been associated with the... |
pthread_exc_matches_np(3) -- (Macro) Determines whether two DECthreads exception objects are identical
|
This routine compares two DECthreads exception objects, taking into consideration whether each is an address exception or status exception. This routine returns either the C language value TRUE or the... |
pthread_exc_report_np(3) -- Produces a message that reports what a specified DECthreads status exception object represents
|
This routine produces a one-line text message on the stderr device (Tru64 UNIX) or SYS$ERROR device (OpenVMS systems) that describes the exception whose exception object is specified in the exception ... |
pthread_exc_set_status_np(3) -- (Macro) Imports a systemdefined error status into a DECthreads address exception object
|
This routine associates a system-specific status value with the specified DECthreads address exception object. This transforms the address exception object into a DECthreads status exception object. T... |
pthread_exit(3) -- Terminates the calling thread
|
This routine terminates the calling thread and makes a status value (value_ptr) available to any thread that calls pthread_join(3) and specifies the terminating thread. Any cleanup handlers that have ... |
pthread_getconcurrency(3) -- Obtains the value of the concurrency level global variable for this process
|
This routine obtains and returns the value of the "concurrency level" global setting for the calling thread's process. Because DECthreads automatically manages the concurrency of all threads in a m... |
pthread_getname_np(3) -- Obtain the object name from the thread object of an existing thread
|
This routine copies the object name from the thread object specified by thread to the buffer at the location name. Before calling this routine, your program must allocate the buffer indicated by name.... |
pthread_getschedparam(3) -- Obtains the current scheduling policy and scheduling parameters of a thread
|
This routine obtains both the current scheduling policy and associated scheduling parameters of the thread specified by the thread argument. The priority value returned in the param structure is the v... |
pthread_getsequence_np(3) -- Obtains the unique identifier for the specified thread
|
This routine obtains and returns the DECthreads thread sequence number for the thread identified by the thread object specified in the thread argument. The thread sequence number provides a unique ide... |
pthread_getspecific(3) -- Obtains the thread-specific data associated with the specified key
|
This routine obtains the thread-specific data associated with the specified key for the current thread. Obtain this key by calling the pthread_key_create(3) routine. This routine returns the value cur... |
pthread_get_expiration_np(3) -- Obtains a value representing a desired expiration time
|
This routine adds a specified interval to the current absolute system time and returns a new absolute time. This new absolute time is used as the expiration time in a call to pthread_cond_timedwait(3)... |
pthread_intro(3) -- Introduction to POSIX Threads
|
DECthreads, a multithreading run-time library, provides a set of interfaces for building multithreaded programs. The POSIX threads interface provides routines that implement the IEEE Std 1003.1c-1995,... |
pthread_join(3) -- Causes the calling thread to wait for the termination of the specified thread
|
This routine suspends execution of the calling thread until the specified target thread thread terminates. On return from a successful pthread_join(3) call with a non-NULL value_ptr argument, the valu... |
pthread_key_create(3) -- Generates a unique thread-specific data key
|
This routine generates a unique, thread-specific data key that is visible to all threads in the process. The variable key provided by this routine is an opaque object used to locate thread-specific da... |
pthread_key_delete(3) -- Deletes a thread-specific data key
|
This routine deletes the thread-specific data key specified by the key argument, which must have been previously returned by pthread_key_create(3). The thread-specific data values associated with key ... |
pthread_key_getname_np(3) -- Obtain the object name from a
|
This routine copies the object name from the thread-specific data key object specified by key to the buffer at the location name. Before calling this routine, your program must allocate the buffer ind... |
pthread_key_setname_np(3) -- Change the object name in a
|
This routine changes the object name in the thread-specific data key object specified by key to the value specified by name. To set a new thread-specific data key object's object name, call this rout... |
pthread_kill(3) -- Delivers a signal to a specified thread. (This routine is available only on a UNIX system.)
|
This routine sends a signal to the specified target thread thread. Any signal defined to stop, continue, or terminate will stop or terminate the process, even though it can be handled by the thread. F... |
pthread_lock_global_np(3) -- Locks the DECthreads global mutex
|
This routine locks the DECthreads global mutex. If the global mutex is currently held by another thread when a thread calls this routine, the calling thread waits for the global mutex to become availa... |
pthread_mutexattr_destroy(3) -- Destroys the specified mutex attributes object
|
This routine destroys a mutex attributes object--that is, the object becomes uninitialized. Call this routine when your program no longer needs the specified mutex attributes object. After this routin... |
pthread_mutexattr_getpshared(3) -- Obtains the process-shared attribute of a mutex attributes object
|
This routine obtains the value of the process-shared attribute in the mutex attributes object referenced by attr and stores it at the location pshared. The object referenced by attr must be initialize... |
pthread_mutexattr_gettype(3) -- Obtains the mutex type attribute in the specified mutex attributes object
|
This routine obtains the value of the mutex type attribute in the mutex attributes object specified by the attr argument and stores it in the location specified by the type argument. See the pthread_m... |
pthread_mutexattr_init(3) -- Initializes a mutex attributes object
|
This routine initializes the mutex attributes object specified by the attr argument with a set of default values. A mutex attributes object is used to specify the attributes of one or more mutexes whe... |
pthread_mutexattr_setpshared(3) -- Sets the process-shared attribute of a mutex attributes object
|
This routine uses the value in pshared to set the processshared attribute in the mutex attributes object referenced by attr. The object referenced by attr must be initialized before this routine is ca... |
pthread_mutexattr_settype(3) -- Specifies the mutex type attribute that is used when a mutex is created
|
This routine sets the mutex type attribute that is used to determine which type of mutex is created based on a subsequent call to pthread_mutex_init(3). |
pthread_mutex_destroy(3) -- Destroys a mutex
|
This routine destroys the specified mutex by uninitializing it, and should be called when a mutex object is no longer referenced. After this routine is called, DECthreads may reclaim internal storage ... |
pthread_mutex_getname_np(3) -- Obtain the object name from a mutex object
|
This routine copies the object name from the mutex object specified by mutex to the buffer at the location name. Before calling this routine, your program must allocate the buffer indicated by name. T... |
pthread_mutex_init(3) -- Initializes a mutex
|
This routine initializes a mutex with the attributes specified by the mutex attributes object specified in the attr argument. A mutex is a synchronization object that allows multiple threads to serial... |
pthread_mutex_lock(3) -- Locks an unlocked mutex
|
This routine locks a mutex with behavior that depends upon the type of mutex, as follows: If a normal or default mutex is specified, a deadlock can result if the current owner of the mutex calls this ... |
pthread_mutex_setname_np(3) -- Changes the object name in a mutex object
|
This routine changes the object name in the mutex object specified by mutex to the value specified by name. To set a new mutex object's object name, call this routine immediately after initializing t... |
pthread_mutex_trylock(3) -- Attempts to lock the specified mutex, without waiting if already locked
|
This routine attempts to lock the mutex specified in the mutex argument. When a thread calls this routine, an attempt is made to immediately lock the mutex. If the mutex is successfully locked, this r... |
pthread_mutex_unlock(3) -- Unlocks the specified mutex
|
This routine unlocks the mutex specified by the mutex argument. This routine behaves as follows, based on the type of the specified mutex: For a normal, default, or errorcheck mutex: if the mutex is o... |
pthread_nsg_attach(3) -- Attaches a thread to a NUMA Scheduling Group (libpthread library)
|
The pthread_nsg_attach() function attaches the thread specified by the thread argument to a NUMA Scheduling Group (NSG) specified by the nsg argument. An NSG is a set of processes and/or threads that ... |
pthread_nsg_detach(3) -- Detaches a thread from a NUMA Scheduling Group (libpthread library)
|
The pthread_nsg_detach() function detaches the thread specified by the thread argument from the NSG to which it is attached. The function does not reassign the thread to a new NSG. |
pthread_nsg_get(3) -- Gets the list of threads in a NUMA Scheduling Group (libpthread library)
|
The pthread_nsg_get() returns into the buffer pointed to by list an array of nsg_thread structures containing the process ids and thread indexes for all threads attached to the specified NSG. The list... |
pthread_once(3) -- Calls a routine to be executed by a single thread, once.
|
The first call to this routine by any thread in a process with a given once_control will call the specified routine with no arguments. Subsequent calls to pthread_once(3) with the same once_control wi... |
pthread_rad_attach(3) -- Attaches or binds a thread to a NUMA Resource Affinity Domain (libpthread library)
|
The pthread_rad_attach() function attaches the thread specified by the thread argument to the RAD set specified by the radset argument. The pthread_rad_bind() function binds the specified thread to th... |
pthread_rad_bind(3) -- Attaches or binds a thread to a NUMA Resource Affinity Domain (libpthread library)
|
The pthread_rad_attach() function attaches the thread specified by the thread argument to the RAD set specified by the radset argument. The pthread_rad_bind() function binds the specified thread to th... |
pthread_rad_detach(3) -- Detach a thread from its Resource Affinity Domain (libpthread library)
|
The pthread_rad_detach() function detaches the thread specified by the thread argument from its current Resource Affinity Domain. The thread is free to be scheduled in any RAD available to the process... |
pthread_rwlockattr_destroy(3) -- Destroys a previously initialized
|
This routine destroys the read-write lock attributes object referenced by attr--that is, the object becomes uninitialized. After successful completion of this routine, the results of using attr in a c... |
pthread_rwlockattr_getpshared(3) -- Obtains the process-shared
|
This routine obtains the value of the process-shared attribute in the read-write lock attributes object referenced by attr and stores it at the location pshared. The object referenced by attr must be ... |
pthread_rwlockattr_init(3) -- Initialize a read-write lock attributes object
|
This routine initializes the read-write lock attributes object referenced by attr and sets its attributes with default values. The results of calling this routine are undefined if attr references an a... |
pthread_rwlockattr_setpshared(3) -- Sets the process-shared
|
This routine uses the value in pshared to set the processshared attribute in the read-write lock attributes object referenced by attr. The object referenced by attr must be initialized before this rou... |
pthread_rwlock_destroy(3) -- Destroys a read-write lock object
|
This routine destroys the specified read-write lock object by uninitializing it, and should be called when the object is no longer referenced in your program. After this routine is called, DECthreads ... |
pthread_rwlock_getname_np(3) -- Obtain the object name from a
|
This routine copies the object name from the read-write lock object specified by rwlock to the buffer at the location name. Before calling this routine, your program must allocate the buffer indicated... |
pthread_rwlock_init(3) -- Initializes a read-write lock object
|
This routine initializes a read-write lock object with the attributes specified by the read-write lock attributes object specified in attr. A read-write lock is a synchronization object that serialize... |
pthread_rwlock_rdlock(3) -- Acquires a read-write lock for read access
|
This routine acquires a read-write lock for read access. If no thread already holds the lock for write access and there are no writers waiting to acquire the lock, the lock for read access is granted ... |
pthread_rwlock_setname_np(3) -- Changes the object name in a
|
This routine changes the object name in the read-write lock object specified by rwlock to the value specified by name. To set a new read-write lock object's object name, call this routine immediately... |
pthread_rwlock_tryrdlock(3) -- Attempts to acquire a readwrite lock for read access without waiting
|
This routine attempts to acquire a read-write lock for read access, but does not wait for the lock if it not immediately available. If a thread already holds the lock for read access, the lock is gran... |
pthread_rwlock_trywrlock(3) -- Attempts to acquire a readwrite lock for write access without waiting
|
This routine attempts to acquire the read-write lock referenced by rwlock for write access. If any thread already holds that lock for write access or read access, this routine fails and returns [EBUSY... |
pthread_rwlock_unlock(3) -- Unlock a read-write lock
|
This routine releases a lock acquisition held on the readwrite lock object referenced by rwlock. Results are undefined if rwlock is not held by the calling thread. If this routine is called to release... |
pthread_rwlock_wrlock(3) -- Acquires a read-write lock for write access
|
This routine attempts to acquire a read-write lock for write access. If any thread already has acquired the lock for write access or read access, the lock is not granted and the calling thread blocks ... |
pthread_self(3) -- Obtains the identifier of the calling thread
|
This routine returns the address of the calling thread's own thread identifier. For example, you can use this thread object to obtain the calling thread's own sequence number. To do so, pass the ret... |
pthread_setcancelstate(3) -- Sets the calling thread's cancelability state
|
This routine sets the current thread's cancelability state and returns the calling thread's previous cancelability state in oldstate. When cancelability state is set to PTHREAD_CANCEL_DISABLE, a can... |
pthread_setcanceltype(3) -- Sets the current thread's cancelability type
|
This routine sets the cancelability type and returns the previous type in oldtype. When the cancelability state is set to PTHREAD_CANCEL_DISABLE, (see pthread_setcancelstate), a cancel cannot be deliv... |
pthread_setconcurrency(3) -- Changes the value of the concurrency level global variable for this process
|
This routine stores the value specified in the level argument in the "concurrency level" global setting for the calling thread's process. Because DECthreads automatically manages the concurrency of... |
pthread_setname_np(3) -- Changes the object name in the thread object for an existing thread
|
This routine changes the object name in the thread object specified by thread to the value specified by name. To set an existing thread's object name, call this routine after creating the thread. How... |
pthread_setschedparam(3) -- Changes a thread's scheduling policy and scheduling parameters
|
This routine changes both the current scheduling policy and associated scheduling parameters of the thread specified by thread to the policy and associated parameters provided in policy and param, res... |
pthread_setspecific(3) -- Sets the thread-specific data value associated with the specified key for the current thread
|
This routine sets the thread-specific data value associated with the specified key for the current thread. If a value is defined for the key in this thread (the current value is not NULL), the new val... |
pthread_sigmask(3) -- Examine or change the current thread's signal mask
|
This routine is for UNIX systems only. This routine examines or changes the calling thread's signal mask. Typically, you use the SIG_BLOCK option for the how value to block signals during a critical ... |
pthread_testcancel(3) -- Requests delivery of a pending cancellation request to the calling thread
|
This routine requests delivery of a pending cancellation request to the calling thread. Thus, calling this routine creates a cancellation point within the calling thread. The cancellation request is d... |
pthread_unlock_global_np(3) -- Unlocks the DECthreads global mutex
|
This routine unlocks the DECthreads global mutex. Because the global mutex is recursive, the unlock occurs when each call to pthread_lock_global_np(3) has been matched by a call to this routine. For e... |
pthread_use_only_cpu(3) -- Restricts a thread to running only on the specified CPU. If that CPU is unavailable for any reason, ...
|
This routine restricts thread to cpu_id, preventing the thread from utilizing any other available processor resources even when cpu_id may be busy for an extended time with other work or is otherwise ... |
pthread_yield_np(3) -- Notifies the scheduler that the current thread is willing to release its processor to other threads ...
|
This routine notifies the thread scheduler that the current thread is willing to release its processor to other threads of equivalent or greater scheduling precedence. (A thread generally will release... |
ptsname(3) -- Get the name of a slave pseudoterminal device
|
The ptsname() function returns the name of the slave pseudoterminal device associated with a master pseudoterminal device. |
ptsname_r(3) -- Get the name of a slave pseudoterminal device
|
The ptsname() function returns the name of the slave pseudoterminal device associated with a master pseudoterminal device. |
putc(3) -- Write a byte or a word to a stream
|
The putc() function writes the byte c (converted to an unsigned char) to the output specified by the stream parameter. The byte is written at the position at which the file pointer is currently pointi... |
putchar(3) -- Write a byte or a word to a stream
|
The putc() function writes the byte c (converted to an unsigned char) to the output specified by the stream parameter. The byte is written at the position at which the file pointer is currently pointi... |
putchar_unlocked(3) -- Write a byte or a word to a stream
|
The putc() function writes the byte c (converted to an unsigned char) to the output specified by the stream parameter. The byte is written at the position at which the file pointer is currently pointi... |
putc_unlocked(3) -- Write a byte or a word to a stream
|
The putc() function writes the byte c (converted to an unsigned char) to the output specified by the stream parameter. The byte is written at the position at which the file pointer is currently pointi... |
putdvagnam(3) -- Manipulate device assignment database entry (Enhanced Security)
|
The getesdvent(), getesdvnam(), and copyesdvent() functions each return a pointer to an object with the following structure containing the separated-out fields of an entry in the device assignment dat... |
putenv(3) -- Sets an environment variable
|
The putenv() function sets the value of an environment variable by altering an existing variable or by creating a new one. The new environment variable remains in effect even after the program setting... |
putesdfnam(3) -- Manipulate system default database entry (Enhanced Security)
|
The getesdfent(), getesdfnam(), and copyesdfent() functions each return a pointer to an object with the following structure containing the separated-out fields of a line in the system default database... |
putesdvnam(3) -- Manipulate device assignment database entry (Enhanced Security)
|
The getesdvent(), getesdvnam(), and copyesdvent() functions each return a pointer to an object with the following structure containing the separated-out fields of an entry in the device assignment dat... |
putesfinam(3) -- Manipulate file control database entry (Enhanced Security)
|
The getesfient(), getesfinam(), and copyesfient() functions each return a pointer to an object with the following structure containing the separated-out fields of a line in the file control database. ... |
putespwnam(3) -- Manipulate protected password database entry (Enhanced Security)
|
The getespwent(), getespwuid(), getespwnam(), and copyespwent() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the protected pa... |
putestcnam(3) -- Manipulate terminal control database entry (Enhanced Security)
|
The getestcent(), getestcnam(), and copyestcent() functions return a pointer to an object with the following structure containing the separated-out fields of an entry in the terminal control database.... |
putlong(3) -- Places long byte quantities into the byte stream
|
The putlong() function places long byte quantities into the byte stream or arbitrary byte boundaries. The putlong() function is one of a set of subroutines that form the resolver, a set of functions t... |
putp(3) -- Curses interfaces to the terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
putprdfnam(3) -- Manipulate system default database entry (Enhanced Security)
|
The getesdfent(), getesdfnam(), and copyesdfent() functions each return a pointer to an object with the following structure containing the separated-out fields of a line in the system default database... |
putprfinam(3) -- Manipulate file control database entry (Enhanced Security)
|
The getesfient(), getesfinam(), and copyesfient() functions each return a pointer to an object with the following structure containing the separated-out fields of a line in the file control database. ... |
putprpwnam(3) -- Manipulate protected password database entry (Enhanced Security)
|
The getespwent(), getespwuid(), getespwnam(), and copyespwent() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the protected pa... |
putprtcnam(3) -- Manipulate terminal control database entry (Enhanced Security)
|
The getestcent(), getestcnam(), and copyestcent() functions return a pointer to an object with the following structure containing the separated-out fields of an entry in the terminal control database.... |
putpwent(3) -- Access user attribute information in the user database
|
The endpwent(), fgetpwent(), getpwent(), getpwnam(), getpwuid(), putpwent(), and setpwent() functions may be used to access the basic user attributes. The getpwent(), getpwnam(), and getpwuid() functi... |
puts(3) -- Writes a string to a stream
|
The puts() function writes the null-terminated string pointed to by the string parameter, followed by a newline character, to the standard output stream, stdout. The fputs() function writes the null-t... |
putshort(3) -- Places short byte quantities into the byte stream
|
The putshort() function puts short byte quantities into the byte stream or arbitrary byte boundaries. The putshort() function is one of a set of subroutines that form the resolver, a set of functions ... |
pututline(3) -- Access utmp file entries
|
The getutent(), getutid(), and getutline() functions return a pointer to a utmp structure. The getutent() function reads the next entry from a file similar to the utmp file. If the file is not already... |
pututline_r(3) -- Access utmp file entries
|
The getutent(), getutid(), and getutline() functions return a pointer to a utmp structure. The getutent() function reads the next entry from a file similar to the utmp file. If the file is not already... |
pututxline(3) -- Access user accounting database functions
|
These functions provide access to the user accounting database. The getutxent() function reads the next entry from the user accounting database. If the database is not already open, getutxent() opens ... |
putw(3) -- Write a byte or a word to a stream
|
The putc() function writes the byte c (converted to an unsigned char) to the output specified by the stream parameter. The byte is written at the position at which the file pointer is currently pointi... |
putwc(3) -- Write a wide character to a stream
|
The fputwc() function converts the wchar_t specified by the wc parameter to its equivalent multibyte character and then writes the multibyte character to the file or terminal associated with the strea... |
putwchar(3) -- Write a wide character to a stream
|
The fputwc() function converts the wchar_t specified by the wc parameter to its equivalent multibyte character and then writes the multibyte character to the file or terminal associated with the strea... |
putwin(3) -- Miscellaneous utility routines for Curses
|
The unctrl macro generates a character string that is a printable representation of the character c. Control characters are displayed in the ^X notation. Printing characters are displayed as is. The w... |
pw_idtoname(3) -- Map between user and group names and IDs (Enhanced Security)
|
The mapping functions provide an efficient mapping between user and group names and identifiers (IDs). These functions maintain a separate binary database, which is automatically updated each time the... |
pw_mapping(3) -- Map between user and group names and IDs (Enhanced Security)
|
The mapping functions provide an efficient mapping between user and group names and identifiers (IDs). These functions maintain a separate binary database, which is automatically updated each time the... |
pw_nametoid(3) -- Map between user and group names and IDs (Enhanced Security)
|
The mapping functions provide an efficient mapping between user and group names and identifiers (IDs). These functions maintain a separate binary database, which is automatically updated each time the... |
qiflush(3) -- Curses
|
The cbreak and nocbreak routines put the terminal into and out of cbreak mode, respectively. In this mode, characters typed by the user are immediately available to the program, and erase/kill charact... |
qsort(3) -- Sort a table in place
|
The qsort() function sorts a table having a specified number of entries. The contents of the table are sorted in ascending order according to a user-specified comparison function (the strcmp() functio... |
QueryKeySizeInBits(3) -- Get CSP logical and effective sizes (CDSA)
|
This function queries a Cryptographic Service Provider (CSP) for the logical and effective sizes of a specified key. The cryptographic service provider (handle) and the key can be specified either in ... |
QuerySize(3) -- Get size of the output data (CDSA)
|
This function queries for the size of the output data for a cryptographic operation. If the context is an encryption or decryption context type then the Encrypt parameter will determine which operatio... |
radaddset(3) -- Perform operations on a set of Resource Affinity Domains (libnuma library)
|
The radsetops primitives manipulate a specified set of Resource Affinity Domains (RADs). These functions operate on data objects (of type radset_t) that are created by calls to radsetcreate(). The rad... |
radandset(3) -- Perform operations on a set of Resource Affinity Domains (libnuma library)
|
The radsetops primitives manipulate a specified set of Resource Affinity Domains (RADs). These functions operate on data objects (of type radset_t) that are created by calls to radsetcreate(). The rad... |
radcopyset(3) -- Perform operations on a set of Resource Affinity Domains (libnuma library)
|
The radsetops primitives manipulate a specified set of Resource Affinity Domains (RADs). These functions operate on data objects (of type radset_t) that are created by calls to radsetcreate(). The rad... |
radcountset(3) -- Perform operations on a set of Resource Affinity Domains (libnuma library)
|
The radsetops primitives manipulate a specified set of Resource Affinity Domains (RADs). These functions operate on data objects (of type radset_t) that are created by calls to radsetcreate(). The rad... |
raddelset(3) -- Perform operations on a set of Resource Affinity Domains (libnuma library)
|
The radsetops primitives manipulate a specified set of Resource Affinity Domains (RADs). These functions operate on data objects (of type radset_t) that are created by calls to radsetcreate(). The rad... |
raddiffset(3) -- Perform operations on a set of Resource Affinity Domains (libnuma library)
|
The radsetops primitives manipulate a specified set of Resource Affinity Domains (RADs). These functions operate on data objects (of type radset_t) that are created by calls to radsetcreate(). The rad... |
rademptyset(3) -- Perform operations on a set of Resource Affinity Domains (libnuma library)
|
The radsetops primitives manipulate a specified set of Resource Affinity Domains (RADs). These functions operate on data objects (of type radset_t) that are created by calls to radsetcreate(). The rad... |
radfillset(3) -- Perform operations on a set of Resource Affinity Domains (libnuma library)
|
The radsetops primitives manipulate a specified set of Resource Affinity Domains (RADs). These functions operate on data objects (of type radset_t) that are created by calls to radsetcreate(). The rad... |
radisemptyset(3) -- Perform operations on a set of Resource Affinity Domains (libnuma library)
|
The radsetops primitives manipulate a specified set of Resource Affinity Domains (RADs). These functions operate on data objects (of type radset_t) that are created by calls to radsetcreate(). The rad... |
radismember(3) -- Perform operations on a set of Resource Affinity Domains (libnuma library)
|
The radsetops primitives manipulate a specified set of Resource Affinity Domains (RADs). These functions operate on data objects (of type radset_t) that are created by calls to radsetcreate(). The rad... |
radorset(3) -- Perform operations on a set of Resource Affinity Domains (libnuma library)
|
The radsetops primitives manipulate a specified set of Resource Affinity Domains (RADs). These functions operate on data objects (of type radset_t) that are created by calls to radsetcreate(). The rad... |
radsetcreate(3) -- Perform operations on a set of Resource Affinity Domains (libnuma library)
|
The radsetops primitives manipulate a specified set of Resource Affinity Domains (RADs). These functions operate on data objects (of type radset_t) that are created by calls to radsetcreate(). The rad... |
radsetdestroy(3) -- Perform operations on a set of Resource Affinity Domains (libnuma library)
|
The radsetops primitives manipulate a specified set of Resource Affinity Domains (RADs). These functions operate on data objects (of type radset_t) that are created by calls to radsetcreate(). The rad... |
radsetops(3) -- Perform operations on a set of Resource Affinity Domains (libnuma library)
|
The radsetops primitives manipulate a specified set of Resource Affinity Domains (RADs). These functions operate on data objects (of type radset_t) that are created by calls to radsetcreate(). The rad... |
radxorset(3) -- Perform operations on a set of Resource Affinity Domains (libnuma library)
|
The radsetops primitives manipulate a specified set of Resource Affinity Domains (RADs). These functions operate on data objects (of type radset_t) that are created by calls to radsetcreate(). The rad... |
rad_attach_pid(3) -- Attaches or binds a process to a Resource Affinity Domain by process ID (libnuma library)
|
The rad_attach_pid() function attaches the process specified by pid to the set of RADs specified by radset. The rad_bind_pid() function binds the process specified by pid to the set of RADs specified ... |
rad_bind_pid(3) -- Attaches or binds a process to a Resource Affinity Domain by process ID (libnuma library)
|
The rad_attach_pid() function attaches the process specified by pid to the set of RADs specified by radset. The rad_bind_pid() function binds the process specified by pid to the set of RADs specified ... |
rad_detach_pid(3) -- Detach a process from a Resource Affinity Domain by pid (libnuma library)
|
The rad_detach_pid() function frees a process that has been bound or attached to a RAD through the functions rad_bind_pid() or rad_attach_pid(), respectively. If the pid argument is NULL, the call is ... |
rad_foreach(3) -- Enumerates the members of a Resource Affinity Domain (libnuma library)
|
The rad_foreach() function scans the specified RAD set, starting at the position saved in cursor, for members of the set and returns the first member found. If the SET_CURSOR_FIRST flag is set, the cu... |
rad_fork(3) -- Creates a new process on a Resource Affinity Domain (libnuma library)
|
The rad_fork() function behaves the same as nfork() when the latter specifies a resource type of R_RAD and a resource descriptor that points to a RAD set containing a single RAD identifier. For a desc... |
rad_get_cpus(3) -- Query resource complements of a Resource Affinity Domain (libnuma)
|
A Resource Affinity Domain (RAD) is a collection of resources that are related by the platform hardware topology. The collection of processors and I/O buses connected to a local memory of a NUMA platf... |
rad_get_current_home(3) -- Returns the caller's home Resource Affinity Domain (libnuma library)
|
The rad_get_current_home() function returns the home Resource Affinity Domain (RAD) of the caller. |
rad_get_freemem(3) -- Query resource complements of a Resource Affinity Domain (libnuma)
|
A Resource Affinity Domain (RAD) is a collection of resources that are related by the platform hardware topology. The collection of processors and I/O buses connected to a local memory of a NUMA platf... |
rad_get_info(3) -- Query resource complements of a Resource Affinity Domain (libnuma)
|
A Resource Affinity Domain (RAD) is a collection of resources that are related by the platform hardware topology. The collection of processors and I/O buses connected to a local memory of a NUMA platf... |
rad_get_max(3) -- Query resource complements of a Resource Affinity Domain (libnuma)
|
A Resource Affinity Domain (RAD) is a collection of resources that are related by the platform hardware topology. The collection of processors and I/O buses connected to a local memory of a NUMA platf... |
rad_get_num(3) -- Query resource complements of a Resource Affinity Domain (libnuma)
|
A Resource Affinity Domain (RAD) is a collection of resources that are related by the platform hardware topology. The collection of processors and I/O buses connected to a local memory of a NUMA platf... |
rad_get_physmem(3) -- Query resource complements of a Resource Affinity Domain (libnuma)
|
A Resource Affinity Domain (RAD) is a collection of resources that are related by the platform hardware topology. The collection of processors and I/O buses connected to a local memory of a NUMA platf... |
rad_get_state(3) -- Query resource complements of a Resource Affinity Domain (libnuma)
|
A Resource Affinity Domain (RAD) is a collection of resources that are related by the platform hardware topology. The collection of processors and I/O buses connected to a local memory of a NUMA platf... |
raise(3) -- Send a signal to the executing process or thread
|
The raise() function sends the signal specified by the signal parameter to the invoking thread. In singlethreaded programs this is equivalent to: kill(getpid(), signal); The behavior of the raise() fu... |
rand(3) -- Generate pseudorandom numbers
|
The rand() function returns successive pseudorandom numbers in the range from 0 (zero) to RAND_MAX. The sequence of values returned depends on the seed value set with the srand() function. If rand() i... |
random(3) -- Generate pseudo-random number
|
The random() and srandom() functions are random number generators that have virtually the same calling sequence and initialization properties as the rand() and srand() functions, but produce sequences... |
randomchars(3) -- Generate random passwords (Enhanced Security)
|
These functions generate random passwords for use in password selection. All of them are generated by the system, based on seeds and set in the function. Such seeds can be created with the drand48(), ... |
randomletters(3) -- Generate random passwords (Enhanced Security)
|
These functions generate random passwords for use in password selection. All of them are generated by the system, based on seeds and set in the function. Such seeds can be created with the drand48(), ... |
randomword(3) -- Generate random passwords (Enhanced Security)
|
These functions generate random passwords for use in password selection. All of them are generated by the system, based on seeds and set in the function. Such seeds can be created with the drand48(), ... |
random_r(3) -- Generate pseudo-random number
|
The random() and srandom() functions are random number generators that have virtually the same calling sequence and initialization properties as the rand() and srand() functions, but produce sequences... |
RAND_add(3) -- Add entropy to the PRNG
|
The RAND_add() function mixes the num bytes at buf into the PRNG state. Thus, if the data at buf are unpredictable to an adversary, this increases the uncertainty about the state and makes the PRNG ou... |
RAND_bytes(3) -- Generate random data
|
The RAND_bytes() function puts num cryptographically strong pseudo-random bytes into buf. An error occurs if the PRNG has not been seeded with enough randomness to ensure an unpredictable byte sequenc... |
RAND_cleanup(3) -- Erase the PRNG state
|
The RAND_cleanup() function erases the memory used by the PRNG. |
RAND_egd(3) -- Query entropy gathering daemon
|
The RAND_egd() function queries the entropy gathering daemon EGD on socket path. It queries 255 bytes and uses RAND_add() to seed the OpenSSL built-in PRNG. The RAND_egd(path) is a wrapper for RAND_eg... |
RAND_event(3) -- Add entropy to the PRNG
|
The RAND_add() function mixes the num bytes at buf into the PRNG state. Thus, if the data at buf are unpredictable to an adversary, this increases the uncertainty about the state and makes the PRNG ou... |
RAND_file_name(3) -- PRNG seed file
|
The RAND_load_file() function reads a number of bytes from file filename and adds them to the PRNG. If max_bytes is non-negative, up to max_bytes are read; starting with OpenSSL 0.9.5, if max_bytes is... |
RAND_get_rand_method(3) -- Select RAND method
|
A RAND_METHOD specifies the functions that OpenSSL uses for random number generation. By modifying the method, alternative implementations such as hardware RNGs may be used. Initially, the default is ... |
RAND_load_file(3) -- PRNG seed file
|
The RAND_load_file() function reads a number of bytes from file filename and adds them to the PRNG. If max_bytes is non-negative, up to max_bytes are read; starting with OpenSSL 0.9.5, if max_bytes is... |
RAND_pseudo_bytes(3) -- Generate random data
|
The RAND_bytes() function puts num cryptographically strong pseudo-random bytes into buf. An error occurs if the PRNG has not been seeded with enough randomness to ensure an unpredictable byte sequenc... |
rand_r(3) -- Generate pseudorandom numbers
|
The rand() function returns successive pseudorandom numbers in the range from 0 (zero) to RAND_MAX. The sequence of values returned depends on the seed value set with the srand() function. If rand() i... |
RAND_screen(3) -- Add entropy to the PRNG
|
The RAND_add() function mixes the num bytes at buf into the PRNG state. Thus, if the data at buf are unpredictable to an adversary, this increases the uncertainty about the state and makes the PRNG ou... |
RAND_seed(3) -- Add entropy to the PRNG
|
The RAND_add() function mixes the num bytes at buf into the PRNG state. Thus, if the data at buf are unpredictable to an adversary, this increases the uncertainty about the state and makes the PRNG ou... |
RAND_set_rand_method(3) -- Select RAND method
|
A RAND_METHOD specifies the functions that OpenSSL uses for random number generation. By modifying the method, alternative implementations such as hardware RNGs may be used. Initially, the default is ... |
rand_ssl(3) -- Pseudo-random number generator
|
These functions implement a cryptographically secure pseudo-random number generator (PRNG). It is used by other library functions, for example, to generate random keys. Applications can use it when th... |
RAND_SSLeay(3) -- Select RAND method
|
A RAND_METHOD specifies the functions that OpenSSL uses for random number generation. By modifying the method, alternative implementations such as hardware RNGs may be used. Initially, the default is ... |
RAND_status(3) -- Add entropy to the PRNG
|
The RAND_add() function mixes the num bytes at buf into the PRNG state. Thus, if the data at buf are unpredictable to an adversary, this increases the uncertainty about the state and makes the PRNG ou... |
RAND_write_file(3) -- PRNG seed file
|
The RAND_load_file() function reads a number of bytes from file filename and adds them to the PRNG. If max_bytes is non-negative, up to max_bytes are read; starting with OpenSSL 0.9.5, if max_bytes is... |
ranhash(3) -- access routine for the symbol table definition file in archives
|
The ranhashinit() routine initializes static information for future use by ranhash() and ranlookup(). The ranhash() routine, given a name, returns a hash number. It uses a multiplicative hashing algor... |
ranhashinit(3) -- access routine for the symbol table definition file in archives
|
The ranhashinit() routine initializes static information for future use by ranhash() and ranlookup(). The ranhash() routine, given a name, returns a hash number. It uses a multiplicative hashing algor... |
ranlookup(3) -- access routine for the symbol table definition file in archives
|
The ranhashinit() routine initializes static information for future use by ranhash() and ranlookup(). The ranhash() routine, given a name, returns a hash number. It uses a multiplicative hashing algor... |
rapi_dispatch(3) -- Dispatch an Resource ReSerVation Protocol (RSVP) API event
|
An application calls the rapi_dispatch() routine whenever a read event is signaled on the file descriptor returned by the rapi_getfd() routine. You can call the rapi_dispatch() routine at any time, bu... |
rapi_event_rtn_t(3) -- Execute an Resource ReSerVation Protocol (RSVP) API upcall routine
|
An event upcall is invoked by a call to the rapi_dispatch() routine. The upcall executes the procedure whose address was specified by the Event_rtn parameter in the rapi_session() routine. |
rapi_fmt_adspec(3) -- Format an RSVP API (RAPI) Adspec
|
The rapi_fmt_adspec() routine reads a given RAPI Adspec and formats it into a fixed length buffer whose address is specified by buffer and whose size is specified by length. If the buffer size is too ... |
rapi_fmt_filtspec(3) -- Format an RSVP API (RAPI) filter spec
|
The rapi_fmt_filtspec() routine reads a given RAPI filter spec and formats it into a fixed length buffer whose address is specified by buffer and whose size is specified by length. If the buffer size ... |
rapi_fmt_flowspec(3) -- Format an RSVP API (RAPI) flowspec
|
The rapi_fmt_flowspec() routine reads a given RAPI flowspec and formats it into a fixed length buffer whose address is specified by buffer and whose size is specified by length. If the buffer size is ... |
rapi_fmt_tspec(3) -- Format an RSVP tspec
|
The rapi_fmt_tspec() routine reads a given RSVP API (RAPI) Tspec and formats it into a fixed length buffer whose address is specified by buffer and whose size is specified by length. If the buffer siz... |
rapi_getfd(3) -- Get the file descriptor for the Resource ReSerVation Protocol (RSVP) daemon's socket
|
The rapi_getfd() routine obtains the file descriptor associated with the UNIX socket connected to the RSVP daemon, rsvpd. An application typically calls this routine after a call to the rapi_session()... |
rapi_release(3) -- Remove a Resource ReSerVation Protocol (RSVP) API session
|
The rapi_release() routine removes any reservations and the state corresponding to a given session handle. If an application terminates without terminating its RSVP API sessions, the rapi_release() ro... |
rapi_reserve(3) -- Make, modify, or delete a Resource ReSerVation Protocol (RSVP) session reservation
|
The rapi_reserve() routine makes, modifies, or deletes a resource reservation for an RSVP session. Applications can call this routine in repeatedly, with different parameters, to modify or remove rese... |
rapi_sender(3) -- Specify Resource ReSerVation Protocol (RSVP) API sender parameters
|
The rapi_sender() routine defines, redefines, or deletes the parameters for a flow of data it intends to send and for which receivers can make reservations. An application can call this routine more t... |
rapi_session(3) -- Create an Resource ReSerVation Protocol (RSVP) API session
|
The rapi_session() routine creates an RSVP API session. If the call to rapi_session() succeeds, the application might receive upcalls of type RAPI_PATH_EVENT for the API session. |
rapi_strerror(3) -- Get a RAPI error message string
|
The rapi_strerror() routine maps an error code and value to an error message string, and returns a pointer to that error message string. |
rapi_version(3) -- Obtain the current Resource ReSerVation Protocol (RSVP) API version
|
The rapi_version() routine obtains the version number of the Resource ReSerVation Protocol API (RAPI) interface. An application can call this routine if it needs to know the specific version of the RA... |
raw(3) -- Curses
|
The cbreak and nocbreak routines put the terminal into and out of cbreak mode, respectively. In this mode, characters typed by the user are immediately available to the program, and erase/kill charact... |
rc4(3) -- RC4 encryption
|
This library implements the Alleged RC4 cipher, which is described in Applied Cryptography. It is believed to be compatible with RC4, a proprietary cipher of RSA Security Inc. R... |
RC4(3) -- RC4 encryption
|
This library implements the Alleged RC4 cipher, which is described in Applied Cryptography. It is believed to be compatible with RC4, a proprietary cipher of RSA Security Inc. R... |
RC4_set_key(3) -- RC4 encryption
|
This library implements the Alleged RC4 cipher, which is described in Applied Cryptography. It is believed to be compatible with RC4, a proprietary cipher of RSA Security Inc. R... |
rcmd(3) -- Allow execution of commands on a remote host
|
The rcmd() (remote command) function allows execution of certain commands on a remote host. For example, the rcmd() function is used by rsh and rlogin, among others. The rcmd() function looks up a hos... |
rcmd_r(3) -- Allow execution of commands on a remote host
|
The rcmd() (remote command) function allows execution of certain commands on a remote host. For example, the rcmd() function is used by rsh and rlogin, among others. The rcmd() function looks up a hos... |
readdir(3) -- Perform operations on directories
|
The opendir() function opens the directory designated by the dir_name parameter and associates a directory stream with it. The directory stream is positioned at the first entry. The type DIR, which is... |
readdir_r(3) -- Perform operations on directories
|
The opendir() function opens the directory designated by the dir_name parameter and associates a directory stream with it. The directory stream is positioned at the first entry. The type DIR, which is... |
read_rnd(3) -- sets and returns IEEE dynamic rounding
|
The write_rnd() function sets the dynamic rounding mode in the floating-point control register (fpcr) for IEEE floating-point operations and returns the previous dynamic rounding mode. Dynamic roundin... |
realloc(3) -- Provide a memory allocator
|
The malloc() and free() functions provide a simple, general-purpose memory allocation package. Note See also the subsection "Using the densemalloc Library" for information on using libdensemalloc to... |
realpath(3) -- Resolve pathname
|
The realpath() function derives, from the file pointed to by file_name, an absolute pathname that names the same file, whose resolution does not involve ".", "..", or symbolic links. The generated... |
recno(3) -- record number database access method
|
The routine dbopen() is the library interface to database files. One of the supported file formats is record number (recno) files. The general description of the database access methods is in dbopen(3... |
RectObj(3X) -- The RectObj widget class
|
RectObj is never instantiated. Its sole purpose is as a supporting superclass for other widget classes. Classes    [Toc]    [Back] RectObj inherits behavior and a resource from Object. The class point... |
redrawwin(3) -- Refresh Curses windows and lines
|
Applications must call the refresh and wrefresh routines (or the wnoutrefresh and doupdate routines) to get any output on the terminal. Other Curses routines only manipulate data structures. The wrefr... |
refresh(3) -- Refresh Curses windows and lines
|
Applications must call the refresh and wrefresh routines (or the wnoutrefresh and doupdate routines) to get any output on the terminal. Other Curses routines only manipulate data structures. The wrefr... |
RefreshFunctionTable(3) -- Gets EMM-defined API function (CDSA)
|
CSSM invokes this function to obtain the EMM-defined API function. The table is returned to CSSM in FuncNameAddrPtr and CSSM returns the table to the application. The application uses this table to in... |
regcmp(3) -- Compile and execute regular expression
|
The regcmp() function compiles a regular expression consisting of the concatenated arguments and returns a pointer to the compiled form. The end of arguments is indicated by a null pointer. The malloc... |
regcomp(3) -- Compare string to regular expression
|
The regcomp(), regerror(), regexec(), and regfree() functions perform regular expression matching. The regcomp() function compiles a regular expression and the regexec() function compares the compiled... |
regerror(3) -- Compare string to regular expression
|
The regcomp(), regerror(), regexec(), and regfree() functions perform regular expression matching. The regcomp() function compiles a regular expression and the regexec() function compares the compiled... |
regex(3) -- Compile and execute regular expression
|
The regcmp() function compiles a regular expression consisting of the concatenated arguments and returns a pointer to the compiled form. The end of arguments is indicated by a null pointer. The malloc... |
regexec(3) -- Compare string to regular expression
|
The regcomp(), regerror(), regexec(), and regfree() functions perform regular expression matching. The regcomp() function compiles a regular expression and the regexec() function compares the compiled... |
regexp(3) -- Regular expression compile and match routines
|
The compile(), advance(), and step() functions are used for general-purpose expression matching. The compile() function takes a simple regular expression as input and produces a compiled expression th... |
regfree(3) -- Compare string to regular expression
|
The regcomp(), regerror(), regexec(), and regfree() functions perform regular expression matching. The regcomp() function compiles a regular expression and the regexec() function compares the compiled... |
RegisterDispatchTable(3) -- Provide the EMM with CSSM function pointers (CDSA)
|
This EMM-defined function is invoked by CSSM once for each CSSM_ModuleAttach(), operation requesting a service provider of the type managed by the EMM. CSSM uses this function to provide the EMM with ... |
registerrpc(3) -- miscellaneous library routines for ONC remote procedure calls
|
The RPC routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the... |
reltimer(3) -- Establishe timeout intervals of a per-process timer
|
The reltimer() function establishes initial and offset timeout intervals of a per-process timer specified by the tmrid parameter. Initial and offset timeout interval information is stored in an itimer... |
remainder(3) -- Compute the floating-point remainder
|
The fmod(), fmodf(), and fmodl() functions return the remainder r = x - n*y, where n = trunc(x/y). The result has the same sign as x and magnitude less than the magnitude of y. The remainder is comput... |
remove(3) -- Remove a file
|
The remove() function causes a file named by the pathname pointed to by path to be no longer accessible by that name. A subsequent attempt to open that file using that name will fail unless it is crea... |
remque(3) -- Insert or removes an element in a queue
|
The insque() and remque() functions manipulate queues built from doubly-linked lists. The queue can be either circular or linear. An application using these functions must define a structure in which ... |
reset_prog_mode(3) -- Low-level Curses routines
|
These routines give low-level access to various Curses functionality. They are typically used inside library routines. The def_prog_mode and def_shell_mode routines save the current terminal modes as ... |
reset_shell_mode(3) -- Low-level Curses routines
|
These routines give low-level access to various Curses functionality. They are typically used inside library routines. The def_prog_mode and def_shell_mode routines save the current terminal modes as ... |
restartterm(3) -- Curses interfaces to the terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
res_init(3) -- Search for a default domain name and Internet address
|
The res_init() function reads the /etc/resolv.conf file for the default domain name and the Internet address of the initial hosts running the name server, even if the name server is not functioning. T... |
res_mkquery(3) -- Make query messages for name servers
|
The res_mkquery() function makes packets for name servers in the Internet domain. The res_mkquery() function makes a standard query message and places it in the location pointed to by the buffer param... |
res_query(3) -- Query a domain server and check the response
|
The res_search() and res_query() functions construct a query, send it to the local server, and await a response. In addition, res_search() implements the default and search rules specified by the RES_... |
res_search(3) -- Query a domain server and check the response
|
The res_search() and res_query() functions construct a query, send it to the local server, and await a response. In addition, res_search() implements the default and search rules specified by the RES_... |
res_send(3) -- Send a query to a name server and retrieve a response
|
The res_send() function sends a query to name servers and calls the res_init() function if the RES_INIT option of the _resdata structure is not set. This function sends the query to the local name ser... |
RetrieveCounter(3) -- Get the value of a tamper resistant clock (CDSA)
|
This function returns the value of a tamper resistant clock/counter of the cryptographic device. |
RetrieveUniqueId(3) -- Get identifier (CDSA)
|
This function returns an identifier that could be used to uniquely differentiate the cryptographic device from all other devices from the same vendor or different vendors. |
rewind(3) -- Reposition the file pointer of a stream
|
The fseek() function sets the position of the next input or output operation on the I/O stream specified by the stream parameter. The position of the next operation is determined by the offset paramet... |
rewinddir(3) -- Perform operations on directories
|
The opendir() function opens the directory designated by the dir_name parameter and associates a directory stream with it. The directory stream is positioned at the first entry. The type DIR, which is... |
rexec(3) -- Allow command execution on a remote host
|
The rexec() (remote execution) function allows the calling process to execute commands on a remote host. If the rexec() connection succeeds, a socket in the Internet domain of type SOCK_STREAM is retu... |
rexec_r(3) -- Allow command execution on a remote host
|
The rexec() (remote execution) function allows the calling process to execute commands on a remote host. If the rexec() connection succeeds, a socket in the Internet domain of type SOCK_STREAM is retu... |
re_comp(3) -- Handle regular expressions
|
The re_comp() function converts a string into an internal form suitable for pattern matching. The re_exec() function compares the string pointed to by the string parameter with the last string passed ... |
re_exec(3) -- Handle regular expressions
|
The re_comp() function converts a string into an internal form suitable for pattern matching. The re_exec() function compares the string pointed to by the string parameter with the last string passed ... |
rindex(3) -- Search for character in string
|
The index() function locates the first occurrence of the integer specified by the c parameter, which is converted to an unsigned char, in the string pointed to by the s parameter. The terminating null... |
rint(3) -- Round floatingpoint
|
The floor(), floorf(), and floorl() functions return the largest floating-point integer value less than or equal to x. The ceil(), ceilf(), and ceill() functions return the smallest floating-point int... |
RIPEMD160(3) -- RIPEMD-160 hash function
|
RIPEMD-160 is a cryptographic hash function with a 160 bit output. The RIPEMD160() function computes the RIPEMD-160 message digest of the n bytes at d and places it in md (which must have space for RI... |
RIPEMD160_Final(3) -- RIPEMD-160 hash function
|
RIPEMD-160 is a cryptographic hash function with a 160 bit output. The RIPEMD160() function computes the RIPEMD-160 message digest of the n bytes at d and places it in md (which must have space for RI... |
RIPEMD160_Init(3) -- RIPEMD-160 hash function
|
RIPEMD-160 is a cryptographic hash function with a 160 bit output. The RIPEMD160() function computes the RIPEMD-160 message digest of the n bytes at d and places it in md (which must have space for RI... |
RIPEMD160_Update(3) -- RIPEMD-160 hash function
|
RIPEMD-160 is a cryptographic hash function with a 160 bit output. The RIPEMD160() function computes the RIPEMD-160 message digest of the n bytes at d and places it in md (which must have space for RI... |
ripoffline(3) -- Low-level Curses routines
|
These routines give low-level access to various Curses functionality. They are typically used inside library routines. The def_prog_mode and def_shell_mode routines save the current terminal modes as ... |
rmtimer(3) -- Free a per-process timer
|
The rmtimer() function is used to free a previously allocated per-process timer (previously returned by the mktimer() function). Any pending per-process timer event generated by the timer specified by... |
rpc(3) -- library routines for ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
rpc_clnt(3) -- library routines for client ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
rpc_createrr(3) -- miscellaneous library routines for ONC remote procedure calls
|
The RPC routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the... |
rpc_functions(3) -- library routines for ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
rpc_misc(3) -- miscellaneous library routines for ONC remote procedure calls
|
The RPC routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the... |
rpc_svc(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
rpc_xdr(3) -- XDR library routines for ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
rpmatch(3) -- Determine whether a response is affirmative or negative
|
The rpmatch() function determines whether the string value of the response parameter matches the affirmative or negative response expression as specified by the LC_MESSAGES category in the program's ... |
rpow(3) -- Perform multiple precision integer arithmetic
|
These functions perform arithmetic on integers of arbitrary length. The integers are stored using the defined type MINT. Pointers to a MINT can be initialized using theitom() function, which sets the ... |
rresvport(3) -- Retrieve a socket with a privileged address
|
The rresvport() function obtains a socket with a privileged address bound to the socket. A privileged Internet port is one that falls in the range of 0 to 1023. Only processes with an effective user I... |
rresvport_af(3) -- Retrieve a socket with a privileged address
|
The rresvport_af() function obtains a socket with a privileged address bound to the socket. A privileged Internet port is one that falls in the range of 0 to 1023. Only processes with an effective use... |
rsa(3) -- RSA public key cryptosystem
|
These functions implement RSA public key encryption and signatures as defined in PKCS #1 v2.0 [RFC 2437]. The RSA structure consists of several BIGNUM components. It can contain public as well as priv... |
RSA_blinding_off(3) -- Protect the RSA operation from timing attacks
|
RSA is vulnerable to timing attacks. In a setup where attackers can measure the time of RSA decryption or signature operations, blinding must be used to protect the RSA operation from that attack. The... |
RSA_blinding_on(3) -- Protect the RSA operation from timing attacks
|
RSA is vulnerable to timing attacks. In a setup where attackers can measure the time of RSA decryption or signature operations, blinding must be used to protect the RSA operation from that attack. The... |
RSA_check_key(3) -- Validate private RSA keys
|
This function validates RSA keys. It checks that p and q are prime, and that n = p*q. It also checks that d*e = 1 mod (p-1*q-1), and that dmp1, dmq1 and iqmp are set correctly or are NULL. As such, th... |
RSA_flags(3) -- Select RSA method
|
An RSA_METHOD specifies the functions that OpenSSL uses for RSA operations. By modifying the method, alternative implementations such as hardware accelerators can be used. Initially, the default is to... |
RSA_free(3) -- Allocate and free RSA objects
|
The RSA_new() function allocates and initializes an RSA structure. The RSA_free() function frees the RSA structure and its components. The key is erased before the memory is returned to the system. |
RSA_generate_key(3) -- Generate RSA key pair
|
The RSA_generate_key() function generates a key pair and returns it in a newly allocated RSA structure. The pseudorandom number generator must be seeded prior to calling RSA_generate_key(). The modulu... |
RSA_get_default_openssl_method(3) -- Select RSA method
|
An RSA_METHOD specifies the functions that OpenSSL uses for RSA operations. By modifying the method, alternative implementations such as hardware accelerators can be used. Initially, the default is to... |
RSA_get_ex_data(3) -- Add application specific data to RSA structures
|
Several OpenSSL structures can have application specific data attached to them. This has several potential uses, it can be used to cache data associated with a structure (for example the hash of some ... |
RSA_get_ex_new_index(3) -- Add application specific data to RSA structures
|
Several OpenSSL structures can have application specific data attached to them. This has several potential uses, it can be used to cache data associated with a structure (for example the hash of some ... |
RSA_get_method(3) -- Select RSA method
|
An RSA_METHOD specifies the functions that OpenSSL uses for RSA operations. By modifying the method, alternative implementations such as hardware accelerators can be used. Initially, the default is to... |
RSA_new(3) -- Allocate and free RSA objects
|
The RSA_new() function allocates and initializes an RSA structure. The RSA_free() function frees the RSA structure and its components. The key is erased before the memory is returned to the system. |
RSA_new_method(3) -- Select RSA method
|
An RSA_METHOD specifies the functions that OpenSSL uses for RSA operations. By modifying the method, alternative implementations such as hardware accelerators can be used. Initially, the default is to... |
RSA_null_method(3) -- Select RSA method
|
An RSA_METHOD specifies the functions that OpenSSL uses for RSA operations. By modifying the method, alternative implementations such as hardware accelerators can be used. Initially, the default is to... |
RSA_padding_add_none(3) -- Asymmetric encryption padding
|
The RSA_padding_xxx_xxx() functions are called from the RSA encrypt, decrypt, sign and verify functions. Normally they should not be called from application programs. However, they can also be called ... |
RSA_padding_add_PKCS1_OAEP(3) -- Asymmetric encryption padding
|
The RSA_padding_xxx_xxx() functions are called from the RSA encrypt, decrypt, sign and verify functions. Normally they should not be called from application programs. However, they can also be called ... |
RSA_padding_add_PKCS1_type_1(3) -- Asymmetric encryption padding
|
The RSA_padding_xxx_xxx() functions are called from the RSA encrypt, decrypt, sign and verify functions. Normally they should not be called from application programs. However, they can also be called ... |
RSA_padding_add_PKCS1_type_2(3) -- Asymmetric encryption padding
|
The RSA_padding_xxx_xxx() functions are called from the RSA encrypt, decrypt, sign and verify functions. Normally they should not be called from application programs. However, they can also be called ... |
RSA_padding_add_SSLv23(3) -- Asymmetric encryption padding
|
The RSA_padding_xxx_xxx() functions are called from the RSA encrypt, decrypt, sign and verify functions. Normally they should not be called from application programs. However, they can also be called ... |
RSA_padding_check_none(3) -- Asymmetric encryption padding
|
The RSA_padding_xxx_xxx() functions are called from the RSA encrypt, decrypt, sign and verify functions. Normally they should not be called from application programs. However, they can also be called ... |
RSA_padding_check_PKCS1_OAEP(3) -- Asymmetric encryption padding
|
The RSA_padding_xxx_xxx() functions are called from the RSA encrypt, decrypt, sign and verify functions. Normally they should not be called from application programs. However, they can also be called ... |
RSA_padding_check_PKCS1_type_1(3) -- Asymmetric encryption padding
|
The RSA_padding_xxx_xxx() functions are called from the RSA encrypt, decrypt, sign and verify functions. Normally they should not be called from application programs. However, they can also be called ... |
RSA_padding_check_PKCS1_type_2(3) -- Asymmetric encryption padding
|
The RSA_padding_xxx_xxx() functions are called from the RSA encrypt, decrypt, sign and verify functions. Normally they should not be called from application programs. However, they can also be called ... |
RSA_padding_check_SSLv23(3) -- Asymmetric encryption padding
|
The RSA_padding_xxx_xxx() functions are called from the RSA encrypt, decrypt, sign and verify functions. Normally they should not be called from application programs. However, they can also be called ... |
RSA_PKCS1_RSAref(3) -- Select RSA method
|
An RSA_METHOD specifies the functions that OpenSSL uses for RSA operations. By modifying the method, alternative implementations such as hardware accelerators can be used. Initially, the default is to... |
RSA_PKCS1_SSLeay(3) -- Select RSA method
|
An RSA_METHOD specifies the functions that OpenSSL uses for RSA operations. By modifying the method, alternative implementations such as hardware accelerators can be used. Initially, the default is to... |
RSA_print(3) -- Print cryptographic parameters
|
A human-readable hexadecimal output of the components of the RSA key, DSA parameters or key or DH parameters is printed to bp or fp. The output lines are indented by offset spaces. |
RSA_print_fp(3) -- Print cryptographic parameters
|
A human-readable hexadecimal output of the components of the RSA key, DSA parameters or key or DH parameters is printed to bp or fp. The output lines are indented by offset spaces. |
RSA_private_decrypt(3) -- RSA public key cryptography
|
The RSA_public_encrypt() function encrypts the flen bytes at from (usually a session key) using the public key rsa and stores the ciphertext in to. The to must point to RSA_size(rsa) bytes of memory. ... |
RSA_private_encrypt(3) -- Low level signature operations
|
These functions handle RSA signatures at a low level. The RSA_private_encrypt() function signs the flen bytes at from (usually a message digest with an algorithm identifier) using the private key rsa ... |
RSA_public_decrypt(3) -- Low level signature operations
|
These functions handle RSA signatures at a low level. The RSA_private_encrypt() function signs the flen bytes at from (usually a message digest with an algorithm identifier) using the private key rsa ... |
RSA_public_encrypt(3) -- RSA public key cryptography
|
The RSA_public_encrypt() function encrypts the flen bytes at from (usually a session key) using the public key rsa and stores the ciphertext in to. The to must point to RSA_size(rsa) bytes of memory. ... |
RSA_set_default_openssl_method(3) -- Select RSA method
|
An RSA_METHOD specifies the functions that OpenSSL uses for RSA operations. By modifying the method, alternative implementations such as hardware accelerators can be used. Initially, the default is to... |
RSA_set_ex_data(3) -- Add application specific data to RSA structures
|
Several OpenSSL structures can have application specific data attached to them. This has several potential uses, it can be used to cache data associated with a structure (for example the hash of some ... |
RSA_set_method(3) -- Select RSA method
|
An RSA_METHOD specifies the functions that OpenSSL uses for RSA operations. By modifying the method, alternative implementations such as hardware accelerators can be used. Initially, the default is to... |
RSA_sign(3) -- RSA signatures
|
The RSA_sign() function signs the message digest m of size m_len using the private key rsa as specified in PKCS #1 v2.0. It stores the signature in sigret and the signature size in siglen. The sigret ... |
RSA_sign_ASN1_OCTET_STRING(3) -- RSA signatures
|
The RSA_sign_ASN1_OCTET_STRING() function signs the octet string m of size m_len using the private key rsa represented in DER using PKCS #1 padding. It stores the signature in sigret and the signature... |
RSA_size(3) -- Get RSA modulus size
|
This function returns the RSA modulus size in bytes. It can be used to determine how much memory must be allocated for an RSA encrypted value. The rsa->n must not be NULL. |
RSA_verify(3) -- RSA signatures
|
The RSA_sign() function signs the message digest m of size m_len using the private key rsa as specified in PKCS #1 v2.0. It stores the signature in sigret and the signature size in siglen. The sigret ... |
RSA_verify_ASN1_OCTET_STRING(3) -- RSA signatures
|
The RSA_sign_ASN1_OCTET_STRING() function signs the octet string m of size m_len using the private key rsa represented in DER using PKCS #1 padding. It stores the signature in sigret and the signature... |
rtime(3) -- Get remote time
|
The rtime() function consults the Internet Time Server at the address pointed to by addrp and returns the remote time in the timeval struct pointed to by timep. Normally, the UDP protocol is used when... |
RtlUnwindRfp(3) -- entry points that support resuming execution of user code
|
The exc_resume() and exc_continue() functions perform essentially the same operation as longjmp(3). The exc_resume() function is a libexc entry point. The exc_capture_context() function saves the curr... |
RtlVirtualUnwind(3) -- routines to unwind a context
|
All of the unwind routines perform a virtual unwind. Unlike the routines described in exc_resume(3), these routines do not actually unwind a procedure call by modifying the real registers and other ma... |
ruserok(3) -- Allow servers to authenticate clients
|
The ruserok() (remote command user OK) function allows servers to authenticate clients requesting services. The hostname must be specified. If the local domain and remote domain are the same, specifyi... |
safe_open(3) -- Open a file for I/O with comprehensive or customized security checks
|
The safe_open() function attempts to open the file system object identified by its pathname parameter and makes validity checks, as controlled by the oflags and sflags parameters. The validity checkin... |
savetty(3) -- Low-level Curses routines
|
These routines give low-level access to various Curses functionality. They are typically used inside library routines. The def_prog_mode and def_shell_mode routines save the current terminal modes as ... |
scalb(3) -- Manipulate floating-point numbers
|
Every nonzero number can be written uniquely as the normalized mantissa (fraction) z times 2 raised to the power p, where the absolute value of z is in the range [0.5, 1.0), and the exponent p, is an ... |
scandir(3) -- Scan or sorts directory contents
|
The scandir() function reads the directory pointed to by the dir_name parameter. It then uses the malloc() function to create an array of pointers to directory entries. The scandir() function returns ... |
scanf(3) -- Convert formatted input
|
The scanf(), fscanf(), and sscanf() functions read character data, interpret it according to a format, and store the converted results into specified memory locations. The format parameter contains co... |
scanw(3) -- Convert formatted input from a Curses window
|
The scanw, wscanw, and mvscanw routines correspond to scanf (see fscanf(3)). The effect of these routines is as though wgetstr were called on the window, and the resulting line were used as input for ... |
sched_getparam(3) -- Returns the scheduling parameters of the specified process (P1003.1b)
|
The sched_getparam function returns the scheduling parameters of a process. If the pid is zero, the scheduling parameters are returned for the calling process. Use the sched_setparam function to chang... |
sched_getscheduler(3) -- Returns the scheduling policy of a process (P1003.1b)
|
The sched_getscheduler function returns the current scheduling policy of a process. The values that can be returned are defined in the header file . The sched_setscheduler function changes th... |
sched_get_priority_max(3) -- Returns the maximum or minimum priority for the specified scheduling policy (P1003.1b)
|
The sched_get_priority_max and sched_get_priority_min functions return the maximum or minimum priority for the specified scheduling policy. The value of the policy argument must be one of the scheduli... |
sched_get_priority_min(3) -- Returns the maximum or minimum priority for the specified scheduling policy (P1003.1b)
|
The sched_get_priority_max and sched_get_priority_min functions return the maximum or minimum priority for the specified scheduling policy. The value of the policy argument must be one of the scheduli... |
sched_rr_get_interval(3) -- Returns the current quantum for process execution under the SCHED_RR policy (P1003.1b)
|
The sched_rr_get_interval function updates the timespec structure referenced by the interval argument to contain the current quantum for the process executing under the SCHED_RR policy. If a process r... |
sched_setparam(3) -- Sets the scheduling parameters of the specified process (P1003.1b)
|
The sched_setparam function changes the scheduling parameters of a process. Setting priorities such that the most critical process has the highest priority allows applications to determine more effect... |
sched_setscheduler(3) -- Sets the scheduling policy and scheduling parameters of the specified process (P1003.1b)
|
The sched_setscheduler function changes the scheduling policy and priority of a process. Changing the scheduling policy and priority ensures that an application can determine more effectively when a p... |
sched_yield(3) -- Signals scheduler a willingness to yield to another thread
|
This routine forces the running thread to relinquish the processor until it again becomes the head of its thread list. This routine notifies the thread scheduler that the current thread is willing to ... |
scrl(3) -- Scroll a Curses window
|
The scroll routine scrolls the window up one line. This involves moving the lines in the window data structure. As an optimization, if the scrolling region of the window is the entire screen, the phys... |
scroll(3) -- Scroll a Curses window
|
The scroll routine scrolls the window up one line. This involves moving the lines in the window data structure. As an optimization, if the scrolling region of the window is the entire screen, the phys... |
scrollok(3) -- Routines for controlling output options for a Curses terminal
|
These routines set options that deal with output within Curses. Unless stated otherwise, all options are initially FALSE. It is not necessary to turn these options off before calling endwin. The clear... |
scr_dump(3) -- Read or write a Curses screen from or to a file
|
The scr_dump routine writes the current contents of the virtual screen to filename. The scr_restore routine sets the virtual screen to the contents of filename, which must have been written using scr_... |
scr_init(3) -- Read or write a Curses screen from or to a file
|
The scr_dump routine writes the current contents of the virtual screen to filename. The scr_restore routine sets the virtual screen to the contents of filename, which must have been written using scr_... |
scr_restore(3) -- Read or write a Curses screen from or to a file
|
The scr_dump routine writes the current contents of the virtual screen to filename. The scr_restore routine sets the virtual screen to the contents of filename, which must have been written using scr_... |
scr_set(3) -- Read or write a Curses screen from or to a file
|
The scr_dump routine writes the current contents of the virtual screen to filename. The scr_restore routine sets the virtual screen to the contents of filename, which must have been written using scr_... |
sdiv(3) -- Perform multiple precision integer arithmetic
|
These functions perform arithmetic on integers of arbitrary length. The integers are stored using the defined type MINT. Pointers to a MINT can be initialized using theitom() function, which sets the ... |
seed48(3) -- Generate uniformly distributed pseudorandom number sequences
|
This family of functions generates pseudorandom numbers using the linear congruential algorithm and 48-bit integer arithmetic. The drand48() and erand48() functions return nonnegative, double-precisio... |
seed48_r(3) -- Generate uniformly distributed pseudorandom number sequences
|
This family of functions generates pseudorandom numbers using the linear congruential algorithm and 48-bit integer arithmetic. The drand48() and erand48() functions return nonnegative, double-precisio... |
seekdir(3) -- Perform operations on directories
|
The opendir() function opens the directory designated by the dir_name parameter and associates a directory stream with it. The directory stream is positioned at the first entry. The type DIR, which is... |
sem_close(3) -- Deallocates the specified named semaphore (P1003.1b)
|
The sem_close function makes a semaphore available for reuse by deallocating any system resources allocated for use by the current process for the named semaphore indicated by sem. If the semaphore ha... |
sem_destroy(3) -- Destroys an unnamed semaphore (P1003.1b)
|
The sem_destroy function destroys an unnamed semaphore indicated by sem. Only a semaphore created using sem_init may be destroyed using sem_destroy. The potential for deadlock exists if a process call... |
sem_getvalue(3) -- Gets the value of a specified semaphore (P1003.1b)
|
The sem_getvalue function updates a location referenced by the sval argument with the value of semaphore sem. The updated value represents an actual semaphore value that occurred during the call, but ... |
sem_init(3) -- Initializes an unnamed semaphore (P1003.1b)
|
The sem_init() function creates a new counting semaphore with a specific value. A semaphore is used to limit access to a critical resource. When a process requires access to the resource without inter... |
sem_open(3) -- Opens/creates a named semaphore for use by a process (P1003.1b)
|
Use the sem_open function to establish the connection between a named semaphore and a process. Subsequently, the calling process can reference the semaphore by using the address returned from the call... |
sem_post(3) -- Unlocks a semaphore (P1003.1b)
|
The sem_post function unlocks the specified semaphore by performing the semaphore unlock operation on that semaphore. The appropriate function (sem_open for named semaphores or sem_init for unnamed se... |
sem_trywait(3) -- Performs (or conditionally performs) a semaphore lock (P1003.1b)
|
The sem_wait function locks the semaphore referenced by sem by performing a semaphore lock operation on it. If the semaphore value is zero, the sem_wait function blocks until it either locks the semap... |
sem_unlink(3) -- Removes the specified named semaphore (P1003.1b)
|
The sem_unlink function removes a semaphore named by the string name. If the semaphore is referenced by other processes, sem_unlink does not change the state of the semaphore. If other processes have ... |
sem_wait(3) -- Performs (or conditionally performs) a semaphore lock (P1003.1b)
|
The sem_wait function locks the semaphore referenced by sem by performing a semaphore lock operation on it. If the semaphore value is zero, the sem_wait function blocks until it either locks the semap... |
setbuf(3) -- Assign buffering to a stream
|
The setbuf() function causes the character array pointed to by the buffer parameter to be used instead of an automatically allocated buffer. Use the setbuf() function after a stream has been opened bu... |
setbuffer(3) -- Assign buffering to a stream
|
The setbuf() function causes the character array pointed to by the buffer parameter to be used instead of an automatically allocated buffer. Use the setbuf() function after a stream has been opened bu... |
setcchar(3) -- Get a wide character string and rendition from a cchar_t or set a cchar_t from a wide-character stri...
|
The getcchar function gets a wide-character string and rendition from a cchar_t argument. When wch is not a null pointer, the getcchar function does the following: Extracts information from a cchar_t ... |
setclock(3) -- Set value of system-wide clock
|
The setclock() function sets a time value into the systemwide clock whose symbolic name is specified by the clktyp parameter, which must be TIMEOFDAY, defined in the sys/timers.h header file. The sour... |
setdvagent(3) -- Manipulate device assignment database entry (Enhanced Security)
|
The getesdvent(), getesdvnam(), and copyesdvent() functions each return a pointer to an object with the following structure containing the separated-out fields of an entry in the device assignment dat... |
setegid(3) -- Set the process's group IDs
|
The setegid() function sets the process's effective group ID to the value of the egid parameter if the egid parameter is equal to the current real, effective, or saved group ID. The setrgid() functio... |
seteuid(3) -- Set the process's user IDs
|
The setruid() and seteuid() functions reset the process's real and effective user IDs, respectively. A process with the superuser privilege can set either ID to any value. An unprivileged process can... |
setfsent(3) -- Get information about a file system
|
For the following functions, entries are read from the /etc/fstab file. The getfsent() function reads the next line of the file, opening the file if necessary. The setfsent() function opens the file o... |
setfsent_r(3) -- Get information about a file system
|
For the following functions, entries are read from the /etc/fstab file. The getfsent() function reads the next line of the file, opening the file if necessary. The setfsent() function opens the file o... |
setgrent(3) -- Access group information in the user database
|
The getgrent(), getgrgid(), getgrnam(), setgrent(), endgrent(), and fgetgrent() functions may be used to access the basic group attributes. The setgrent() function opens the user database (if not alre... |
setgrent_r(3) -- Access group information in the user database
|
The getgrent(), getgrgid(), getgrnam(), setgrent(), endgrent(), and fgetgrent() functions may be used to access the basic group attributes. The setgrent() function opens the user database (if not alre... |
sethostent(3) -- Open a network host file
|
The gethostent() (get host entry) function reads the next line of the either the local /etc/hosts file or one of the files distributed by BIND or NIS, opening it if necessary, returning a hostent stru... |
sethostent_r(3) -- Open a network host file
|
The gethostent() (get host entry) function reads the next line of the either the local /etc/hosts file or one of the files distributed by BIND or NIS, opening it if necessary, returning a hostent stru... |
setjmp(3) -- Save and restores the current execution context
|
The setjmp() and longjmp() functions are useful when handling errors and interrupts encountered in low-level functions of a program. The setjmp() function saves the current stack context and signal ma... |
setkey(3) -- DES encryption
|
The crypt() subroutine is the password encryption routine. It is based on the NBS Data Encryption Standard, with variations intended to frustrate use of hardware implementations of the DES for key sea... |
setlinebuf(3) -- Assign buffering to a stream
|
The setbuf() function causes the character array pointed to by the buffer parameter to be used instead of an automatically allocated buffer. Use the setbuf() function after a stream has been opened bu... |
setlocale(3) -- Change or queries the program's current locale
|
The setlocale() function sets or queries the appropriate portion of the program's locale as specified by the category and locale parameters. The LC_ALL value for the category parameter names the enti... |
setlogmask(3) -- Control system log
|
The syslog() function writes messages to the system log maintained by the syslogd daemon. The syslogd daemon reads messages and writes them to the system console or to a log file, or forwards them to ... |
setlogmask_r(3) -- Control system log
|
The syslog() function writes messages to the system log maintained by the syslogd daemon. The syslogd daemon reads messages and writes them to the system console or to a log file, or forwards them to ... |
setluid(3) -- Get or set the login UID (Enhanced Security)
|
The getluid() function gets the login UID associated with the process. The login UID is recorded with most audit events generated by the process, and is sometimes referred to as the audit UID (AUID). ... |
setnetent(3) -- Open, rewind, or close the networks file
|
The setnetent() (set network entry) function opens the either the local /etc/networks file or the NIS distributed networks file and sets the file marker at the beginning of the file. To determine whic... |
setnetent_r(3) -- Open, rewind, or close the networks file
|
The setnetent() (set network entry) function opens the either the local /etc/networks file or the NIS distributed networks file and sets the file marker at the beginning of the file. To determine whic... |
setnetgrent(3) -- Get network group entry
|
The innetgr() routine accesses the netgroup file and checks to see if the specified input parameters match an entry in the file. The routine returns 1 if it matches an entry, or 0 if it does not. Any ... |
setprdfent(3) -- Manipulate system default database entry (Enhanced Security)
|
The getesdfent(), getesdfnam(), and copyesdfent() functions each return a pointer to an object with the following structure containing the separated-out fields of a line in the system default database... |
setprfient(3) -- Manipulate file control database entry (Enhanced Security)
|
The getesfient(), getesfinam(), and copyesfient() functions each return a pointer to an object with the following structure containing the separated-out fields of a line in the file control database. ... |
setproplist(3) -- assigns Extended File Attributes to a file
|
The setproplist() function assigns a buffer of Extended File Attributes, pointed to by nbytes, to a file pointed to by *path. The Extended File Attribute buffer is defined in sys/proplist.h. An Extend... |
setprotoent(3) -- Open or rewind the protocols file
|
The setprotoent() (set protocol entry) function opens either the local /etc/protocols file or the NIS distributed protocols file and sets the file marker to the beginning of the file. To determine whi... |
setprotoent_r(3) -- Open or rewind the protocols file
|
The setprotoent() (set protocol entry) function opens either the local /etc/protocols file or the NIS distributed protocols file and sets the file marker to the beginning of the file. To determine whi... |
setprpwent(3) -- Manipulate protected password database entry (Enhanced Security)
|
The getespwent(), getespwuid(), getespwnam(), and copyespwent() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the protected pa... |
setprtcent(3) -- Manipulate terminal control database entry (Enhanced Security)
|
The getestcent(), getestcnam(), and copyestcent() functions return a pointer to an object with the following structure containing the separated-out fields of an entry in the terminal control database.... |
setpwent(3) -- Access user attribute information in the user database
|
The endpwent(), fgetpwent(), getpwent(), getpwnam(), getpwuid(), putpwent(), and setpwent() functions may be used to access the basic user attributes. The getpwent(), getpwnam(), and getpwuid() functi... |
setpwent_r(3) -- Access user attribute information in the user database
|
The endpwent(), fgetpwent(), getpwent(), getpwnam(), getpwuid(), putpwent(), and setpwent() functions may be used to access the basic user attributes. The getpwent(), getpwnam(), and getpwuid() functi... |
setpwfile(3) -- Access user attribute information in the user database
|
The endpwent(), fgetpwent(), getpwent(), getpwnam(), getpwuid(), putpwent(), and setpwent() functions may be used to access the basic user attributes. The getpwent(), getpwnam(), and getpwuid() functi... |
setrgid(3) -- Set the process's group IDs
|
The setegid() function sets the process's effective group ID to the value of the egid parameter if the egid parameter is equal to the current real, effective, or saved group ID. The setrgid() functio... |
setrpcent(3) -- get rpc entry
|
The getrpcent(), getrpcbynumber(), and getrpcbyname() functions return pointers to an object with the following structure containing the broken-out fields of a line in the rpc database: struct rpcent ... |
setruid(3) -- Set the process's user IDs
|
The setruid() and seteuid() functions reset the process's real and effective user IDs, respectively. A process with the superuser privilege can set either ID to any value. An unprivileged process can... |
setscrreg(3) -- Routines for controlling output options for a Curses terminal
|
These routines set options that deal with output within Curses. Unless stated otherwise, all options are initially FALSE. It is not necessary to turn these options off before calling endwin. The clear... |
setservent(3) -- Open or rewind the services file
|
The setservent() (set service entry) function opens either the local /etc/services file or the NIS distributed services file, and sets the file marker at the beginning of the file. To determine which ... |
setservent_r(3) -- Open or rewind the services file
|
The setservent() (set service entry) function opens either the local /etc/services file or the NIS distributed services file, and sets the file marker at the beginning of the file. To determine which ... |
setstate(3) -- Generate pseudo-random number
|
The random() and srandom() functions are random number generators that have virtually the same calling sequence and initialization properties as the rand() and srand() functions, but produce sequences... |
setstate_r(3) -- Generate pseudo-random number
|
The random() and srandom() functions are random number generators that have virtually the same calling sequence and initialization properties as the rand() and srand() functions, but produce sequences... |
setttyent(3) -- Get a /etc/securettys file entry
|
The getttyent() and getttynam() functions each return a pointer to an object that has the following ttyent fields. These fields describe a line from the secure tty description file. The members of the... |
setttyent_r(3) -- Get a /etc/securettys file entry
|
The getttyent() and getttynam() functions each return a pointer to an object that has the following ttyent fields. These fields describe a line from the secure tty description file. The members of the... |
setupterm(3) -- Curses interfaces to the terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
setusershell(3) -- Get the names of legal user shells
|
The getusershell() function returns a pointer to a string that contains the name of a legal user shell as defined by the system manager in the /etc/shells file. If the /etc/shells file does not exist,... |
setusershell_r(3) -- Get the names of legal user shells
|
The getusershell() function returns a pointer to a string that contains the name of a legal user shell as defined by the system manager in the /etc/shells file. If the /etc/shells file does not exist,... |
setutent(3) -- Access utmp file entries
|
The getutent(), getutid(), and getutline() functions return a pointer to a utmp structure. The getutent() function reads the next entry from a file similar to the utmp file. If the file is not already... |
setutent_r(3) -- Access utmp file entries
|
The getutent(), getutid(), and getutline() functions return a pointer to a utmp structure. The getutent() function reads the next entry from a file similar to the utmp file. If the file is not already... |
setutxent(3) -- Access user accounting database functions
|
These functions provide access to the user accounting database. The getutxent() function reads the next entry from the user accounting database. If the database is not already open, getutxent() opens ... |
setvbuf(3) -- Assign buffering to a stream
|
The setbuf() function causes the character array pointed to by the buffer parameter to be used instead of an automatically allocated buffer. Use the setbuf() function after a stream has been opened bu... |
setvbuf_unlocked(3) -- Assign buffering to a stream
|
The setbuf() function causes the character array pointed to by the buffer parameter to be used instead of an automatically allocated buffer. Use the setbuf() function after a stream has been opened bu... |
set_auth_parameters(3) -- Get or check user or group IDs (Enhanced Security)
|
The identity functions provide a way to recall the IDs of a process at the time the program started. They are useful when interrogating the invoking environment of a program after any setuid() or setg... |
set_curterm(3) -- Curses interfaces to the terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
set_term(3) -- Curses routines for screen initialization and manipulation
|
The initscr routine is almost always the first routine that applications call. (The exceptions are slk_init, filter, ripoffline, use_env and, for multiple-terminal applications, newterm). The initscr ... |
set_unhandled_exception(3) -- support routines for unhandled exceptions
|
When called as the result of an exception, exc_dispatch_exception(3) attempts to find a handler to process the exception by searching the stack frames of procedures in the call chain. It does this by ... |
set_usage(3) -- checks whether a disk partition is in use and sets the fstype of the partition in the disk label
|
The set_usage() function checks whether the special device file is in use, that is, whether it contains a valid file system, is part of LSM, or is being used by a database or for swap space. It also c... |
sha(3) -- Secure Hash Algorithm
|
SHA-1 (Secure Hash Algorithm) is a cryptographic hash function with a 160-bit output. The SHA1() function computes the SHA-1 message digest of the n bytes at d and places it in md (which must have spa... |
SHA(3) -- Secure Hash Algorithm
|
SHA-1 (Secure Hash Algorithm) is a cryptographic hash function with a 160-bit output. The SHA1() function computes the SHA-1 message digest of the n bytes at d and places it in md (which must have spa... |
SHA1(3) -- Secure Hash Algorithm
|
SHA-1 (Secure Hash Algorithm) is a cryptographic hash function with a 160-bit output. The SHA1() function computes the SHA-1 message digest of the n bytes at d and places it in md (which must have spa... |
SHA1_Final(3) -- Secure Hash Algorithm
|
SHA-1 (Secure Hash Algorithm) is a cryptographic hash function with a 160-bit output. The SHA1() function computes the SHA-1 message digest of the n bytes at d and places it in md (which must have spa... |
SHA1_Init(3) -- Secure Hash Algorithm
|
SHA-1 (Secure Hash Algorithm) is a cryptographic hash function with a 160-bit output. The SHA1() function computes the SHA-1 message digest of the n bytes at d and places it in md (which must have spa... |
SHA1_Update(3) -- Secure Hash Algorithm
|
SHA-1 (Secure Hash Algorithm) is a cryptographic hash function with a 160-bit output. The SHA1() function computes the SHA-1 message digest of the n bytes at d and places it in md (which must have spa... |
Shell(3X) -- The Shell widget class
|
Shell is a top-level widget (with only one managed child) that encapsulates the interaction with the window manager. At the time the shell's child is managed, the child's width is used for both widg... |
shm_open(3) -- Opens a shared memory object, creating the object if necessary (P1003.1b)
|
The shm_open function establishes a connection between a shared memory object and a file descriptor. It creates an open file descriptor that refers to the shared memory object and a file descriptor th... |
shm_unlink(3) -- Removes a shared memory object created by a call to the shm_open function (P1003.1b)
|
The shm_unlink function removes the name of the shared memory object pointed to by name. If this file descriptor is used by other functions, all references to the shared memory object are removed, but... |
siad_chg_finger(3) -- Dependent SIA change routines (Security Integration Architecture)
|
siad_chg_finger() This routine is called by sia_chg_finger() to accomplish processing associated with the chfn command with respect to a specific security mechanism. Only one siad_chg_finger() routine... |
siad_chg_password(3) -- Dependent SIA change routines (Security Integration Architecture)
|
siad_chg_finger() This routine is called by sia_chg_finger() to accomplish processing associated with the chfn command with respect to a specific security mechanism. Only one siad_chg_finger() routine... |
siad_chg_shell(3) -- Dependent SIA change routines (Security Integration Architecture)
|
siad_chg_finger() This routine is called by sia_chg_finger() to accomplish processing associated with the chfn command with respect to a specific security mechanism. Only one siad_chg_finger() routine... |
siad_chk_invoker(3) -- check invoker dependent routine for SIA (Security Integration Architecture)
|
siad_chk_invoker() The siad_chk_invoker() routine is called to verify that the calling program is sufficiently privileged to perform security checks or security information updates. Usually only the l... |
siad_chk_user(3) -- check user dependent routine for SIA (Security Integration Architecture)
|
siad_chk_user() This routine is called by the SIA change information interfaces to determine if a particular mechanism can change the specified users password, finger, or shell. |
siad_endgrent(3) -- group routines for SIA (Security Integration Architecture)
|
siad_getgrent() The siad_getgrent() routine is called indirectly (by the sia_switch() function) from the sia_getgroup() routine which is called from the libc and libc_r routines getgrent() and getgren... |
siad_endpwent(3) -- password routines for SIA (Security Integration Architecture)
|
This series of mechanism dependent routines is used access the corresponding getpw* series of calls. The actual result string is placed in the buffer provided and result points to the resultant struct... |
siad_getgrent(3) -- group routines for SIA (Security Integration Architecture)
|
siad_getgrent() The siad_getgrent() routine is called indirectly (by the sia_switch() function) from the sia_getgroup() routine which is called from the libc and libc_r routines getgrent() and getgren... |
siad_getgrgid(3) -- group routines for SIA (Security Integration Architecture)
|
siad_getgrent() The siad_getgrent() routine is called indirectly (by the sia_switch() function) from the sia_getgroup() routine which is called from the libc and libc_r routines getgrent() and getgren... |
siad_getgrnam(3) -- group routines for SIA (Security Integration Architecture)
|
siad_getgrent() The siad_getgrent() routine is called indirectly (by the sia_switch() function) from the sia_getgroup() routine which is called from the libc and libc_r routines getgrent() and getgren... |
siad_getpwent(3) -- password routines for SIA (Security Integration Architecture)
|
This series of mechanism dependent routines is used access the corresponding getpw* series of calls. The actual result string is placed in the buffer provided and result points to the resultant struct... |
siad_getpwnam(3) -- password routines for SIA (Security Integration Architecture)
|
This series of mechanism dependent routines is used access the corresponding getpw* series of calls. The actual result string is placed in the buffer provided and result points to the resultant struct... |
siad_getpwuid(3) -- password routines for SIA (Security Integration Architecture)
|
This series of mechanism dependent routines is used access the corresponding getpw* series of calls. The actual result string is placed in the buffer provided and result points to the resultant struct... |
siad_get_groups(3) -- mechanism-specific routine called from sia_get_groups to fill in a user's supplementary groups for S...
|
This routine is responsible for ensuring that any group it adds to the list of GIDs found is not a duplicate. __sia_isagroup(3) is provided specifically to make that determination simpler for the mech... |
siad_init(3) -- initialization routine for SIA (Security Integration Architecture)
|
The siad_init() routine is called from siainit() to do mechanism-specific processing once per reboot. |
siad_ses_authent(3) -- SIA session routines (Security Integration Architecture)
|
siad_ses_init() This routine is called by sia_ses_init() to initialize a session with respect to a mechanism. This call is used to check resources and subsystems associated with a security mechanism. ... |
siad_ses_estab(3) -- SIA session routines (Security Integration Architecture)
|
siad_ses_init() This routine is called by sia_ses_init() to initialize a session with respect to a mechanism. This call is used to check resources and subsystems associated with a security mechanism. ... |
siad_ses_init(3) -- SIA session routines (Security Integration Architecture)
|
siad_ses_init() This routine is called by sia_ses_init() to initialize a session with respect to a mechanism. This call is used to check resources and subsystems associated with a security mechanism. ... |
siad_ses_launch(3) -- SIA session routines (Security Integration Architecture)
|
siad_ses_init() This routine is called by sia_ses_init() to initialize a session with respect to a mechanism. This call is used to check resources and subsystems associated with a security mechanism. ... |
siad_ses_reauthent(3) -- SIA session routines (Security Integration Architecture)
|
siad_ses_init() This routine is called by sia_ses_init() to initialize a session with respect to a mechanism. This call is used to check resources and subsystems associated with a security mechanism. ... |
siad_ses_release(3) -- SIA session routines (Security Integration Architecture)
|
siad_ses_init() This routine is called by sia_ses_init() to initialize a session with respect to a mechanism. This call is used to check resources and subsystems associated with a security mechanism. ... |
siad_ses_suauthent(3) -- SIA session routines (Security Integration Architecture)
|
siad_ses_init() This routine is called by sia_ses_init() to initialize a session with respect to a mechanism. This call is used to check resources and subsystems associated with a security mechanism. ... |
siad_setgrent(3) -- group routines for SIA (Security Integration Architecture)
|
siad_getgrent() The siad_getgrent() routine is called indirectly (by the sia_switch() function) from the sia_getgroup() routine which is called from the libc and libc_r routines getgrent() and getgren... |
siad_setpwent(3) -- password routines for SIA (Security Integration Architecture)
|
This series of mechanism dependent routines is used access the corresponding getpw* series of calls. The actual result string is placed in the buffer provided and result points to the resultant struct... |
siad_test_newpass(3) -- test passphrase against rules and policy routine for SIA (Security Integration Architecture)
|
The siad_test_newpass() routine tests and compares the string at *newpass against the passphrase rules and policy for the mechanism. This routine is called from the sia_chg_password() routine when it ... |
siad_update_pass(3) -- store new passphrase routine for SIA (Security Integration Architecture)
|
The siad_update_pass() routine stores the new password in the mechanism's user database. An entity must have been set up and the siad_chk_user() routine must have been able to handle the CHGENTITY fl... |
sia_audit(3) -- Variable format interface for audgen - SIA (Security Integration Architecture)
|
The sia_audit() routine is an interface for the audgen system call. It accepts a variable number of arguments describing the event and audit data, then calls with the appropriate parameters to generat... |
sia_become_user(3) -- su routine for SIA (Security Integration Architecture)
|
This routine allows a privileged process to establish the full set of credentials for a specified user, for whichever system security mechanisms are in use. This is specifically intended for daemons l... |
sia_chdir(3) -- Interface to the chdir system call - SIA (Security Integration Architecture)
|
The sia_chdir() routine implements a "NFS-safe" way to change the current working directory. This routine calls the chdir() system call which is protected by alarm() and signal-handling for SIGALRM,... |
sia_chg_finger(3) -- SIA change routines (Security Integration Architecture)
|
sia_chg_finger() The sia_chg_finger() routine is used to change information about users in the /etc/passwd file. This information is used by the finger program, among others. The user is offered a men... |
sia_chg_password(3) -- SIA change routines (Security Integration Architecture)
|
sia_chg_finger() The sia_chg_finger() routine is used to change information about users in the /etc/passwd file. This information is used by the finger program, among others. The user is offered a men... |
sia_chg_shell(3) -- SIA change routines (Security Integration Architecture)
|
sia_chg_finger() The sia_chg_finger() routine is used to change information about users in the /etc/passwd file. This information is used by the finger program, among others. The user is offered a men... |
sia_chk_invoker(3) -- Check invoker routine for SIA (Security Integration Architecture)
|
The sia_chk_invoker() routine checks the calling application for appropriate privileges, typically root, for accessing and changing security sensitive information. |
sia_collect_trm(3) -- Parameter collection routine for SIA (Security Integration Architecture)
|
The sia_collect_trm() routine provides parameter collection capability. The SIA session interfaces and change secure information interfaces use a pre-defined parameter collection capability. The calli... |
sia_getgroup(3) -- interface to the getpw* and getgr* routines for SIA (Security Integration Architecture)
|
The sia_getpasswd() routine provides thread locking for the libc_r routines (-D_THREAD_SAFE), provides static storage for non reentrant getpw* routines, and calls the appropriate siad_getpw* routine. ... |
sia_getpasswd(3) -- interface to the getpw* and getgr* routines for SIA (Security Integration Architecture)
|
The sia_getpasswd() routine provides thread locking for the libc_r routines (-D_THREAD_SAFE), provides static storage for non reentrant getpw* routines, and calls the appropriate siad_getpw* routine. ... |
sia_get_groups(3) -- retrieve user's group information for SIA (Security Integration Architecture)
|
The sia_get_groups() routine is called to obtain a user's group array. |
sia_init(3) -- initialization routine for SIA (Security Integration Architecture)
|
The sia_init() routine is called by every sia_* routine to initialize the SIA configuration. This routine indirectly sets up the matrix of switches used to drive the SIA interfaces. |
sia_log(3) -- Log events and errors - SIA (Security Integration Architecture)
|
The sia_log() routine logs events and error messages into the sialog file. Each entry is time and PID stamped to track when and who was making the log entry. The sia_log() routine appends to an existi... |
sia_make_entity_pwd(3) -- Make entity password - SIA (Security Integration Architecture)
|
The sia_make_entity_pwd() routine fills in the pwd field of the entity structure, using malloc() to ensure that the copied data is not overwritten by subsequent calls to getpwent(). |
sia_ses_authent(3) -- SIA session routines (Security Integration Architecture)
|
sia_ses_init() The sia_ses_init() routine initializes SIA sessions. The routine allocates an entity handle structure and initializes various values in that structure. It must be called before any of t... |
sia_ses_estab(3) -- SIA session routines (Security Integration Architecture)
|
sia_ses_init() The sia_ses_init() routine initializes SIA sessions. The routine allocates an entity handle structure and initializes various values in that structure. It must be called before any of t... |
sia_ses_init(3) -- SIA session routines (Security Integration Architecture)
|
sia_ses_init() The sia_ses_init() routine initializes SIA sessions. The routine allocates an entity handle structure and initializes various values in that structure. It must be called before any of t... |
sia_ses_launch(3) -- SIA session routines (Security Integration Architecture)
|
sia_ses_init() The sia_ses_init() routine initializes SIA sessions. The routine allocates an entity handle structure and initializes various values in that structure. It must be called before any of t... |
sia_ses_reauthent(3) -- SIA session routines (Security Integration Architecture)
|
sia_ses_init() The sia_ses_init() routine initializes SIA sessions. The routine allocates an entity handle structure and initializes various values in that structure. It must be called before any of t... |
sia_ses_release(3) -- SIA session routines (Security Integration Architecture)
|
sia_ses_init() The sia_ses_init() routine initializes SIA sessions. The routine allocates an entity handle structure and initializes various values in that structure. It must be called before any of t... |
sia_ses_suauthent(3) -- SIA session routines (Security Integration Architecture)
|
sia_ses_init() The sia_ses_init() routine initializes SIA sessions. The routine allocates an entity handle structure and initializes various values in that structure. It must be called before any of t... |
sia_timed_action(3) -- Time limit routine - SIA (Security Integration Architecture)
|
The sia_timed_action() routine provides a way to call a function with a time limit and signal protection. If SIGHUP, SIGINT, SIGQUIT, SIGTERM, or SIGALRM is received, sia_timed_action() fails. |
sia_validate_user(3) -- perform password validation for SIA (Security Integration Architecture)
|
The sia_validate_user() routine performs password validation by calling sia_ses_init(), sia_ses_reauthent(), and sia_ses_release(). |
sigaddset(3) -- Create and manipulates signal masks
|
The sigemptyset(),sigfillset(),sigaddset()sigdelset() and sigismember() functions manipulate sets of signals. These functions operate on data objects that can be addressed by the application, not on a... |
sigdelset(3) -- Create and manipulates signal masks
|
The sigemptyset(),sigfillset(),sigaddset()sigdelset() and sigismember() functions manipulate sets of signals. These functions operate on data objects that can be addressed by the application, not on a... |
sigemptyset(3) -- Create and manipulates signal masks
|
The sigemptyset(),sigfillset(),sigaddset()sigdelset() and sigismember() functions manipulate sets of signals. These functions operate on data objects that can be addressed by the application, not on a... |
sigfillset(3) -- Create and manipulates signal masks
|
The sigemptyset(),sigfillset(),sigaddset()sigdelset() and sigismember() functions manipulate sets of signals. These functions operate on data objects that can be addressed by the application, not on a... |
sighold(3) -- Compatibility interfaces for signal management
|
The sigset(), sighold(), sigrelse(), and sigignore() functions provide simplified signal management. The sigset() function is used to modify signal dispositions. The value of the function parameter de... |
sigignore(3) -- Compatibility interfaces for signal management
|
The sigset(), sighold(), sigrelse(), and sigignore() functions provide simplified signal management. The sigset() function is used to modify signal dispositions. The value of the function parameter de... |
siginterrupt(3) -- Allow signals to interrupt functions
|
The siginterrupt() function is used to change the restart behavior of a system call when it is interrupted by the signal specified by the sig parameter. When the flag parameter is FALSE (0), system ca... |
sigismember(3) -- Create and manipulates signal masks
|
The sigemptyset(),sigfillset(),sigaddset()sigdelset() and sigismember() functions manipulate sets of signals. These functions operate on data objects that can be addressed by the application, not on a... |
siglongjmp(3) -- Save and restores the current execution context
|
The sigsetjmp() and siglongjmp() functions are useful when handling errors and interrupts encountered in low-level functions of a program. The sigsetjmp() function saves the current stack context in t... |
SignData(3) -- Sign all buffer data (CDSA)
|
This function signs all data contained in the set of input buffers using the private key specified in the context. The CSP can require that the cryptographic context include access credentials for aut... |
SignDataFinal(3) -- Complete the final stage of the sign data (CDSA)
|
This function completes the final stage of the sign data function. |
SignDataInit(3) -- Initialize the staged sign data (CDSA)
|
This function initializes the staged sign data function. For staged operations, a combination operation selecting both a digesting algorithm and a signing algorithm must be specified. The CSP can requ... |
SignDataUpdate(3) -- Continue the staged signing process input buffer data (CDSA)
|
This function continues the staged signing process over all data contained in the set of input buffers. Signing is performed using the private key specified in the context. |
sigpause(3) -- Provide a compatibility interface to the sigsuspend function
|
The sigpause() function call blocks the signals specified by the signal_mask parameter and then suspends execution of the process until delivery of a signal whose action is either to execute a signal-... |
sigqueue(3) -- Queues a signal and data to a running process
|
The sigqueue function causes the signal specified by signo to be sent with the value specified by value to the process specified by pid. The conditions required for a process to have permission to que... |
sigrelse(3) -- Compatibility interfaces for signal management
|
The sigset(), sighold(), sigrelse(), and sigignore() functions provide simplified signal management. The sigset() function is used to modify signal dispositions. The value of the function parameter de... |
sigset(3) -- Compatibility interfaces for signal management
|
The sigset(), sighold(), sigrelse(), and sigignore() functions provide simplified signal management. The sigset() function is used to modify signal dispositions. The value of the function parameter de... |
sigsetjmp(3) -- Save and restores the current execution context
|
The sigsetjmp() and siglongjmp() functions are useful when handling errors and interrupts encountered in low-level functions of a program. The sigsetjmp() function saves the current stack context in t... |
sigtimedwait(3) -- Suspend a calling thread until a signal arrives
|
The sigwait functions suspend the calling thread until at least one of the signals in the set parameter is in the caller's set of pending signals. When this happens, one of those signals is automatic... |
sigwait(3) -- Suspend a calling thread until a signal arrives
|
The sigwait functions suspend the calling thread until at least one of the signals in the set parameter is in the caller's set of pending signals. When this happens, one of those signals is automatic... |
sigwaitinfo(3) -- Suspend a calling thread until a signal arrives
|
The sigwait functions suspend the calling thread until at least one of the signals in the set parameter is in the caller's set of pending signals. When this happens, one of those signals is automatic... |
sin(3) -- Trigonometric and inverse trigonometric functions in radian and degree calculations.
|
The sin(), sinf(), and sinl() functions compute the sine of x, measured in radians. The sind(), sindf(), and sindl() functions compute the sine of x, measured in degrees. The cos(), cosf(), and cosl()... |
sind(3) -- Trigonometric and inverse trigonometric functions in radian and degree calculations.
|
The sin(), sinf(), and sinl() functions compute the sine of x, measured in radians. The sind(), sindf(), and sindl() functions compute the sine of x, measured in degrees. The cos(), cosf(), and cosl()... |
sinh(3) -- Hyperbolic functions
|
The sinh(), sinhf(), and sinhl() functions compute the hyperbolic sine of x. Both sinh(x), sinhf(x), and sinhl(x) are defined as (exp(x) - exp(-x))/2. The cosh(), coshf(), and coshl() functions comput... |
sizeof_proplist_entry(3) -- determines space necessary to store an Extended File Attribute
|
The sizeof_proplist_entry() function determines the minimum size of the Extended File Attribute buffer required to store an Extended File Attribute, specified by the *name and value_size parameters. A... |
sleep(3) -- Suspend execution for an interval of time
|
The sleep() function suspends execution of a process for the interval specified by the seconds parameter. The suspension time may be longer than requested due to the scheduling of other activity by th... |
slk_attroff(3) -- Curses soft-label routines
|
Curses manipulates the set of soft function-key labels that exist on many terminals. For those terminals that do not support soft labels, Curses takes over the bottom line of stdscr, reducing the size... |
slk_attron(3) -- Curses soft-label routines
|
Curses manipulates the set of soft function-key labels that exist on many terminals. For those terminals that do not support soft labels, Curses takes over the bottom line of stdscr, reducing the size... |
slk_attrset(3) -- Curses soft-label routines
|
Curses manipulates the set of soft function-key labels that exist on many terminals. For those terminals that do not support soft labels, Curses takes over the bottom line of stdscr, reducing the size... |
slk_attr_off(3) -- Curses soft-label routines
|
Curses manipulates the set of soft function-key labels that exist on many terminals. For those terminals that do not support soft labels, Curses takes over the bottom line of stdscr, reducing the size... |
slk_attr_on(3) -- Curses soft-label routines
|
Curses manipulates the set of soft function-key labels that exist on many terminals. For those terminals that do not support soft labels, Curses takes over the bottom line of stdscr, reducing the size... |
slk_attr_set(3) -- Curses soft-label routines
|
Curses manipulates the set of soft function-key labels that exist on many terminals. For those terminals that do not support soft labels, Curses takes over the bottom line of stdscr, reducing the size... |
slk_clear(3) -- Curses soft-label routines
|
Curses manipulates the set of soft function-key labels that exist on many terminals. For those terminals that do not support soft labels, Curses takes over the bottom line of stdscr, reducing the size... |
slk_color(3) -- Curses soft-label routines
|
Curses manipulates the set of soft function-key labels that exist on many terminals. For those terminals that do not support soft labels, Curses takes over the bottom line of stdscr, reducing the size... |
slk_init(3) -- Curses soft-label routines
|
Curses manipulates the set of soft function-key labels that exist on many terminals. For those terminals that do not support soft labels, Curses takes over the bottom line of stdscr, reducing the size... |
slk_label(3) -- Curses soft-label routines
|
Curses manipulates the set of soft function-key labels that exist on many terminals. For those terminals that do not support soft labels, Curses takes over the bottom line of stdscr, reducing the size... |
slk_noutrefresh(3) -- Curses soft-label routines
|
Curses manipulates the set of soft function-key labels that exist on many terminals. For those terminals that do not support soft labels, Curses takes over the bottom line of stdscr, reducing the size... |
slk_refresh(3) -- Curses soft-label routines
|
Curses manipulates the set of soft function-key labels that exist on many terminals. For those terminals that do not support soft labels, Curses takes over the bottom line of stdscr, reducing the size... |
slk_restore(3) -- Curses soft-label routines
|
Curses manipulates the set of soft function-key labels that exist on many terminals. For those terminals that do not support soft labels, Curses takes over the bottom line of stdscr, reducing the size... |
slk_set(3) -- Curses soft-label routines
|
Curses manipulates the set of soft function-key labels that exist on many terminals. For those terminals that do not support soft labels, Curses takes over the bottom line of stdscr, reducing the size... |
slk_touch(3) -- Curses soft-label routines
|
Curses manipulates the set of soft function-key labels that exist on many terminals. For those terminals that do not support soft labels, Curses takes over the bottom line of stdscr, reducing the size... |
slk_wset(3) -- Curses soft-label routines
|
Curses manipulates the set of soft function-key labels that exist on many terminals. For those terminals that do not support soft labels, Curses takes over the bottom line of stdscr, reducing the size... |
snprintf(3) -- Print formatted output
|
The format parameter is a character string that contains two types of objects: Literal characters, which are copied to the output stream. Conversion specifications, each of which causes zero or more i... |
sockatmark(3) -- Test whether a socket is at the out-of-band mark
|
The sockatmark() function enables applications to determine which received data precede the out-of-band data and which data follow the out-of-band data. The function uses the file descriptor for the s... |
sprintf(3) -- Print formatted output
|
The format parameter is a character string that contains two types of objects: Literal characters, which are copied to the output stream. Conversion specifications, each of which causes zero or more i... |
sqrt(3) -- Square and cube root functions
|
sqrt(), sqrtf(), and sqrtl() compute the rounded square root of x. For platforms supporting a signed zero, sqrt (-0) = 0. cbrt(), cbrtf(), and cbrtl() return the rounded cube root of y. --------------... |
srand(3) -- Generate pseudorandom numbers
|
The rand() function returns successive pseudorandom numbers in the range from 0 (zero) to RAND_MAX. The sequence of values returned depends on the seed value set with the srand() function. If rand() i... |
srand48(3) -- Generate uniformly distributed pseudorandom number sequences
|
This family of functions generates pseudorandom numbers using the linear congruential algorithm and 48-bit integer arithmetic. The drand48() and erand48() functions return nonnegative, double-precisio... |
srand48_r(3) -- Generate uniformly distributed pseudorandom number sequences
|
This family of functions generates pseudorandom numbers using the linear congruential algorithm and 48-bit integer arithmetic. The drand48() and erand48() functions return nonnegative, double-precisio... |
srandom(3) -- Generate pseudo-random number
|
The random() and srandom() functions are random number generators that have virtually the same calling sequence and initialization properties as the rand() and srand() functions, but produce sequences... |
srandom_r(3) -- Generate pseudo-random number
|
The random() and srandom() functions are random number generators that have virtually the same calling sequence and initialization properties as the rand() and srand() functions, but produce sequences... |
sscanf(3) -- Convert formatted input
|
The scanf(), fscanf(), and sscanf() functions read character data, interpret it according to a format, and store the converted results into specified memory locations. The format parameter contains co... |
ssignal(3) -- Set and raise a software signal
|
These functions are obsolete and are retained for compatibility with earlier versions of the operating system. The ssignal() and gsignal() functions implement a facility similar to that of the signal(... |
ssignal_r(3) -- Set and raise a software signal
|
These functions are obsolete and are retained for compatibility with earlier versions of the operating system. The ssignal() and gsignal() functions implement a facility similar to that of the signal(... |
ssl(3) -- OpenSSL SSL/TLS library
|
The OpenSSL ssl library implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols. It provides a rich API which is documented here. At first, the library must be ... |
SSL(3) -- OpenSSL SSL/TLS library
|
The OpenSSL ssl library implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols. It provides a rich API which is documented here. At first, the library must be ... |
SSLeay(3) -- Get OpenSSL version number
|
OPENSSL_VERSION_NUMBER is a numeric release version identifier: MMNNFFPPS: major minor fix patch status The status nibble has one of the values 0 for development, 1 to e for betas 1 to 14, and f for r... |
SSLeay_add_ssl_algorithms(3) -- Initialize SSL library by registering algorithms
|
The SSL_library_init() function registers the available ciphers and digests. The OpenSSL_add_ssl_algorithms() and SSLeay_add_ssl_algorithms() functions are synonyms for the SSL_library_init() function... |
SSLeay_version(3) -- Get OpenSSL version number
|
OPENSSL_VERSION_NUMBER is a numeric release version identifier: MMNNFFPPS: major minor fix patch status The status nibble has one of the values 0 for development, 1 to e for betas 1 to 14, and f for r... |
SSL_accept(3) -- Wait for a TLS/SSL client to initiate a TLS/SSL handshake
|
The SSL_accept() function waits for a TLS/SSL client to initiate the TLS/SSL handshake. The communication channel must already have been set and assigned to the ssl by setting an underlying BIO. |
SSL_add_client_CA(3) -- Set list of CAs sent to the client when requesting a client certificate
|
The SSL_CTX_set_client_CA_list() function sets the list of CAs sent to the client when requesting a client certificate for ctx. The SSL_set_client_CA_list() function sets the list of CAs sent to the c... |
SSL_add_session(3) -- Manipulate session cache
|
The SSL_CTX_add_session() function adds the session c to the context ctx. The reference count for session c is incremented by 1. If a session with the same session id already exists, the old session i... |
SSL_alert_desc_string(3) -- Get description of an SSL alert
|
The SSL_alert_desc_string() returns two-letter strings indicating SSL alerts. The SSL_alert_desc_string_long() returns message strings about SSL alerts. |
SSL_alert_desc_string_long(3) -- Get description of an SSL alert
|
The SSL_alert_desc_string() returns two-letter strings indicating SSL alerts. The SSL_alert_desc_string_long() returns message strings about SSL alerts. |
SSL_alert_type_string(3) -- Get textual description of alert information
|
The SSL_alert_type_string() function returns a one letter string indicating the type of the alert specified by value. The SSL_alert_type_string_long() function returns a string indicating the type of ... |
SSL_alert_type_string_long(3) -- Get textual description of alert information
|
The SSL_alert_type_string() function returns a one letter string indicating the type of the alert specified by value. The SSL_alert_type_string_long() function returns a string indicating the type of ... |
SSL_callback_ctrl(3) -- Perform an operation (get or set information in SSL) for the SSL structure
|
The SSL_ctrl() function performs an operation (get or set information in SSL) for the SSL structure. The second argument cmd accepts the macros in the following table: Table 1: Macros for cmd"" ----... |
SSL_check_private_key(3) -- Checks the private key against the public key of the certificate in the SSL structure
|
The SSL_check_private_key() function checks if the private key matches against the public key of the certificate loaded in the SSL structure. |
SSL_CIPHER_description(3) -- Get SSL_CIPHER properties
|
The SSL_CIPHER_get_name() function returns a pointer to the name of cipher. If the argument is the NULL pointer, a pointer to the constant value NONE is returned. The SSL_CIPHER_get_bits() function re... |
SSL_CIPHER_get_bits(3) -- Get SSL_CIPHER properties
|
The SSL_CIPHER_get_name() function returns a pointer to the name of cipher. If the argument is the NULL pointer, a pointer to the constant value NONE is returned. The SSL_CIPHER_get_bits() function re... |
SSL_CIPHER_get_name(3) -- Get SSL_CIPHER properties
|
The SSL_CIPHER_get_name() function returns a pointer to the name of cipher. If the argument is the NULL pointer, a pointer to the constant value NONE is returned. The SSL_CIPHER_get_bits() function re... |
SSL_CIPHER_get_version(3) -- Get SSL_CIPHER properties
|
The SSL_CIPHER_get_name() function returns a pointer to the name of cipher. If the argument is the NULL pointer, a pointer to the constant value NONE is returned. The SSL_CIPHER_get_bits() function re... |
SSL_clear(3) -- Reset SSL object to allow another connection
|
Reset ssl to allow another connection. All settings (method, ciphers, BIOs) are kept. |
SSL_COMP_add_compression_method(3) -- Handle SSL/TLS integrated compression methods
|
The SSL_COMP_add_compression_method() function adds the compression method cm with the identifier id to the list of available compression methods. This list is globally maintained for all SSL operatio... |
SSL_connect(3) -- Initiate the TLS/SSL handshake with an TLS/SSL server
|
The SSL_connect() function initiates the TLS/SSL handshake with a server. The communication channel must already have been set and assigned to the ssl by setting an underlying BIO. |
SSL_copy_session_id(3) -- Copies the session-id from one SSL structure to another
|
The SSL_copy_session_id() function copies an SSL sessionid from SSL structure f and to SSL structure t. |
SSL_ctrl(3) -- Performs an operation (get or set information in SSL) for the SSL structure
|
The SSL_ctrl() function performs an operation (get or set information in SSL) for the SSL structure. The second argument cmd accepts the macros in the following table: Table 1: Macros for cmd"" ----... |
SSL_CTX_add_client_CA(3) -- Set list of CAs sent to the client when requesting a client certificate
|
The SSL_CTX_set_client_CA_list() function sets the list of CAs sent to the client when requesting a client certificate for ctx. The SSL_set_client_CA_list() function sets the list of CAs sent to the c... |
SSL_CTX_add_extra_chain_cert(3) -- Add certificate to chain
|
The SSL_CTX_add_extra_chain_cert() function adds the certificate x509 to the certificate chain presented together with the certificate. Several certificates can be added one after the other. |
SSL_CTX_add_session(3) -- Manipulate session cache
|
The SSL_CTX_add_session() function adds the session c to the context ctx. The reference count for session c is incremented by 1. If a session with the same session id already exists, the old session i... |
SSL_CTX_callback_ctrl(3) -- Internal handling functions for SSL_CTX and SSL objects
|
The SSL_*_ctrl() family of functions is used to manipulate settings of the SSL_CTX and SSL objects. Depending on the cmd parameter, the arguments larg, parg, or fp are evaluated. These functions shoul... |
SSL_CTX_check_private_key(3) -- Load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_CTX_ctrl(3) -- Internal handling functions for SSL_CTX and SSL objects
|
The SSL_*_ctrl() family of functions is used to manipulate settings of the SSL_CTX and SSL objects. Depending on the cmd parameter, the arguments larg, parg, or fp are evaluated. These functions shoul... |
SSL_CTX_flush_sessions(3) -- Remove expired sessions
|
The SSL_CTX_flush_sessions() function causes a run through the session cache of ctx to remove sessions expired at time (tm). The SSL_flush_sessions() function is a synonym for the SSL_CTX_flush_sessio... |
SSL_CTX_free(3) -- Free an allocated SSL_CTX object
|
The SSL_CTX_free() function decrements the reference count of ctx, and removes the SSL_CTX object pointed to by ctx and frees up the allocated memory if the the reference count has reached 0. If appli... |
SSL_CTX_get_cert_store(3) -- Get the X509_STORE structure in the SSL_CTX structure
|
The SSL_CTX_get_cert_store() function gets the X509_STORE structure in the SSL_CTX structure. An X509_STORE structure holds information for certificate verification including cache of trusted certific... |
SSL_CTX_get_client_CA_list(3) -- Get list of client CAs
|
The SSL_CTX_get_client_CA_list() function returns the list of client CAs explicitly set for ctx using the SSL_CTX_set_client_CA_list() function. The SSL_get_client_CA_list() function returns the list ... |
SSL_CTX_get_client_cert_cb(3) -- Handle client certificate callback function
|
The SSL_CTX_set_client_cert_cb() function sets the client_cert_cb() callback that is called when a client certificate is requested by a server and no certificate was set for the SSL object. When clien... |
SSL_CTX_get_ex_data(3) -- Internal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
SSL_CTX_get_ex_new_index(3) -- Internal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
SSL_CTX_get_info_callback(3) -- Handle information callback for SSL connections
|
The SSL_CTX_set_info_callback() function sets the callback function that can be used to obtain state information for SSL objects created from ctx during connection setup and use. The setting for ctx i... |
SSL_CTX_get_mode(3) -- Manipulate SSL engine mode
|
The SSL_CTX_set_mode() function adds the mode set via bitmask in mode to ctx. Options already set before are not cleared. The SSL_set_mode() function adds the mode set via bitmask in mode to ssl. Opti... |
SSL_CTX_get_options(3) -- Manipulate SSL engine options
|
The SSL_CTX_set_options() function adds the options set via bitmask in options to ctx. Options already set before are not cleared. The SSL_set_options() function adds the options set via bitmask in op... |
SSL_CTX_get_quiet_shutdown(3) -- Get the value of the quietshutdown flag in the SSL_CTX data structure
|
The SSL_CTX_get_quiet_shutdown() function returns a mode of the quiet shutdown flag in the SSL_CTX structure. |
SSL_CTX_get_session_cache_mode(3) -- Enable or disable session caching
|
The SSL_CTX_set_session_cache_mode() function enables or disables session caching by setting the operational mode for ctx to . The SSL_CTX_get_session_cache_mode() function returns the currently... |
SSL_CTX_get_timeout(3) -- Manipulate timeout values for session caching
|
The SSL_CTX_set_timeout() function sets the timeout for newly created sessions for ctx to t. The timeout value t must be given in seconds. The SSL_CTX_get_timeout() function returns the currently set ... |
SSL_CTX_get_verify_callback(3) -- Get currently set verification parameters
|
The SSL_CTX_get_verify_mode() function returns the verification mode currently set in ctx. The SSL_get_verify_mode() function returns the verification mode currently set in ssl. The SSL_CTX_get_verify... |
SSL_CTX_get_verify_depth(3) -- Get currently set verification parameters
|
The SSL_CTX_get_verify_mode() function returns the verification mode currently set in ctx. The SSL_get_verify_mode() function returns the verification mode currently set in ssl. The SSL_CTX_get_verify... |
SSL_CTX_get_verify_mode(3) -- Get currently set verification parameters
|
The SSL_CTX_get_verify_mode() function returns the verification mode currently set in ctx. The SSL_get_verify_mode() function returns the verification mode currently set in ssl. The SSL_CTX_get_verify... |
SSL_CTX_load_verify_locations(3) -- Set default locations for trusted CA certificates
|
The SSL_CTX_load_verify_locations() function specifies the locations for ctx, at which CA certificates for verification purposes are located. The certificates available via CAfile and CApath are trust... |
SSL_CTX_need_tmp_rsa(3) -- Handle RSA keys for ephemeral key exchange
|
The SSL_CTX_set_tmp_rsa_callback() and function sets the callback function for ctx to be used when a temporary/ephemeral RSA key is required to tmp_rsa_callback(). The callback is inherited by all SSL... |
SSL_CTX_new(3) -- Create a new SSL_CTX object as framework for TLS/SSL enabled functions
|
The SSL_CTX_new() function creates a new SSL_CTX object as framework to establish TLS/SSL enabled connections. |
SSL_CTX_remove_session(3) -- Manipulate session cache
|
The SSL_CTX_add_session() function adds the session c to the context ctx. The reference count for session c is incremented by 1. If a session with the same session id already exists, the old session i... |
SSL_CTX_sessions(3) -- Access internal session cache
|
The SSL_CTX_sessions() function returns a pointer to the lhash databases containing the internal session cache for ctx. |
SSL_CTX_sess_accept(3) -- Obtain session cache statistics
|
The SSL_CTX_sess_number() function returns the current number of sessions in the internal session cache. The SSL_CTX_sess_connect() function returns the number of started SSL/TLS handshakes in client ... |
SSL_CTX_sess_accept_good(3) -- Obtain session cache statistics
|
The SSL_CTX_sess_number() function returns the current number of sessions in the internal session cache. The SSL_CTX_sess_connect() function returns the number of started SSL/TLS handshakes in client ... |
SSL_CTX_sess_accept_renegotiate(3) -- Obtain session cache statistics
|
The SSL_CTX_sess_number() function returns the current number of sessions in the internal session cache. The SSL_CTX_sess_connect() function returns the number of started SSL/TLS handshakes in client ... |
SSL_CTX_sess_cache_full(3) -- Obtain session cache statistics
|
The SSL_CTX_sess_number() function returns the current number of sessions in the internal session cache. The SSL_CTX_sess_connect() function returns the number of started SSL/TLS handshakes in client ... |
SSL_CTX_sess_cb_hits(3) -- Obtain session cache statistics
|
The SSL_CTX_sess_number() function returns the current number of sessions in the internal session cache. The SSL_CTX_sess_connect() function returns the number of started SSL/TLS handshakes in client ... |
SSL_CTX_sess_connect(3) -- Obtain session cache statistics
|
The SSL_CTX_sess_number() function returns the current number of sessions in the internal session cache. The SSL_CTX_sess_connect() function returns the number of started SSL/TLS handshakes in client ... |
SSL_CTX_sess_connect_good(3) -- Obtain session cache statistics
|
The SSL_CTX_sess_number() function returns the current number of sessions in the internal session cache. The SSL_CTX_sess_connect() function returns the number of started SSL/TLS handshakes in client ... |
SSL_CTX_sess_connect_renegotiate(3) -- Obtain session cache statistics
|
The SSL_CTX_sess_number() function returns the current number of sessions in the internal session cache. The SSL_CTX_sess_connect() function returns the number of started SSL/TLS handshakes in client ... |
SSL_CTX_sess_get_cache_size(3) -- Manipulate session cache size
|
The SSL_CTX_sess_set_cache_size() function sets the size of the internal session cache of context ctx to t. The SSL_CTX_sess_get_cache_size() function returns the currently valid session cache size. |
SSL_CTX_sess_get_get_cb(3) -- Provide callback functions for server side external session caching
|
The SSL_CTX_sess_set_get_cb() function sets the callback function which is called whenever an SSL/TLS client proposes to resume a session but the session could not be found in the internal session cac... |
SSL_CTX_sess_get_new_cb(3) -- Provide callback functions for server side external session caching
|
The SSL_CTX_sess_set_get_cb() function sets the callback function which is called whenever an SSL/TLS client proposes to resume a session but the session could not be found in the internal session cac... |
SSL_CTX_sess_get_remove_cb(3) -- Provide callback functions for server side external session caching
|
The SSL_CTX_sess_set_get_cb() function sets the callback function which is called whenever an SSL/TLS client proposes to resume a session but the session could not be found in the internal session cac... |
SSL_CTX_sess_hits(3) -- Obtain session cache statistics
|
The SSL_CTX_sess_number() function returns the current number of sessions in the internal session cache. The SSL_CTX_sess_connect() function returns the number of started SSL/TLS handshakes in client ... |
SSL_CTX_sess_misses(3) -- Obtain session cache statistics
|
The SSL_CTX_sess_number() function returns the current number of sessions in the internal session cache. The SSL_CTX_sess_connect() function returns the number of started SSL/TLS handshakes in client ... |
SSL_CTX_sess_number(3) -- Obtain session cache statistics
|
The SSL_CTX_sess_number() function returns the current number of sessions in the internal session cache. The SSL_CTX_sess_connect() function returns the number of started SSL/TLS handshakes in client ... |
SSL_CTX_sess_set_cache_size(3) -- Manipulate session cache size
|
The SSL_CTX_sess_set_cache_size() function sets the size of the internal session cache of context ctx to t. The SSL_CTX_sess_get_cache_size() function returns the currently valid session cache size. |
SSL_CTX_sess_set_get_cb(3) -- Provide callback functions for server side external session caching
|
The SSL_CTX_sess_set_get_cb() function sets the callback function which is called whenever an SSL/TLS client proposes to resume a session but the session could not be found in the internal session cac... |
SSL_CTX_sess_set_new_cb(3) -- Provide callback functions for server side external session caching
|
The SSL_CTX_sess_set_get_cb() function sets the callback function which is called whenever an SSL/TLS client proposes to resume a session but the session could not be found in the internal session cac... |
SSL_CTX_sess_set_remove_cb(3) -- Provide callback functions for server side external session caching
|
The SSL_CTX_sess_set_get_cb() function sets the callback function which is called whenever an SSL/TLS client proposes to resume a session but the session could not be found in the internal session cac... |
SSL_CTX_sess_timeouts(3) -- Obtain session cache statistics
|
The SSL_CTX_sess_number() function returns the current number of sessions in the internal session cache. The SSL_CTX_sess_connect() function returns the number of started SSL/TLS handshakes in client ... |
SSL_CTX_set_cert_store(3) -- Manipulate X509 certificate verification storage.
|
The SSL_CTX_set_cert_store() function sets/replaces the certificate verification storage of ctx to/with store. If another X509_STORE object is currently set in ctx, it will be X509_STORE_free()ed. The... |
SSL_CTX_set_cert_verify_cb(3) -- Set peer certificate verification procedure
|
The SSL_CTX_set_cert_verify_cb() sets the verification callback function for ctx. SSL objects that are created from ctx inherit the setting valid at the time SSL_new() is called. The arg is currently ... |
SSL_CTX_set_cipher_list(3) -- Choose list of available SSL_CIPHERs
|
The SSL_CTX_set_cipher_list() function sets the list of available ciphers for ctx using the control string str. The format of the string is described in ciphers(1). The list of ciphers is inherited by... |
SSL_CTX_set_client_CA_list(3) -- Set list of CAs sent to the client when requesting a client certificate
|
The SSL_CTX_set_client_CA_list() function sets the list of CAs sent to the client when requesting a client certificate for ctx. The SSL_set_client_CA_list() function sets the list of CAs sent to the c... |
SSL_CTX_set_client_cert_cb(3) -- Handle client certificate callback function
|
The SSL_CTX_set_client_cert_cb() function sets the client_cert_cb() callback that is called when a client certificate is requested by a server and no certificate was set for the SSL object. When clien... |
SSL_CTX_set_default_passwd_cb(3) -- Set password callback for encrypted PEM file handling
|
The SSL_CTX_set_default_passwd_cb() function sets the default password callback called when loading or storing a PEM certificate with encryption. The SSL_CTX_set_default_passwd_cb_userdata() function ... |
SSL_CTX_set_default_passwd_cb_userdata(3) -- Set password callback for encrypted PEM file handling
|
The SSL_CTX_set_default_passwd_cb() function sets the default password callback called when loading or storing a PEM certificate with encryption. The SSL_CTX_set_default_passwd_cb_userdata() function ... |
SSL_CTX_set_def_verify_paths(3) -- Sets default file path and file name of trusted CA certificate
|
The SSL_CTX_set_def_verify_paths() function sets pre-compiled default CA path and file name for certificate verification. The default CA file path and name are defined as follows: #define X509_CERT_DI... |
SSL_CTX_set_ex_data(3) -- Internal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
SSL_CTX_set_info_callback(3) -- Handle information callback for SSL connections
|
The SSL_CTX_set_info_callback() function sets the callback function that can be used to obtain state information for SSL objects created from ctx during connection setup and use. The setting for ctx i... |
SSL_CTX_set_mode(3) -- Manipulate SSL engine mode
|
The SSL_CTX_set_mode() function adds the mode set via bitmask in mode to ctx. Options already set before are not cleared. The SSL_set_mode() function adds the mode set via bitmask in mode to ssl. Opti... |
SSL_CTX_set_options(3) -- Manipulate SSL engine options
|
The SSL_CTX_set_options() function adds the options set via bitmask in options to ctx. Options already set before are not cleared. The SSL_set_options() function adds the options set via bitmask in op... |
SSL_CTX_set_purpose(3) -- Set a purpose value to the SSL_CTX structure
|
The SSL_CTX_set_purpose() function sets a purpose value in the SSL_CTX structure. The purpose values and their macros are defined in x509v3.h as follows: #define X509_PURPOSE_SSL_CLIENT 1 #define X509... |
SSL_CTX_set_quiet_shutdown(3) -- Manipulate shutdown behavior
|
The SSL_CTX_set_quiet_shutdown() function sets the quiet shutdown flag for ctx to be mode. SSL objects created from ctx inherit the mode valid at the time SSL_new(3) is called. mode may be 0 or 1. SSL... |
SSL_CTX_set_session_cache_mode(3) -- Enable or disable session caching
|
The SSL_CTX_set_session_cache_mode() function enables or disables session caching by setting the operational mode for ctx to . The SSL_CTX_get_session_cache_mode() function returns the currently... |
SSL_CTX_set_session_id_context(3) -- Set context within which session can be reused (server side only)
|
The SSL_CTX_set_session_id_context() function sets the context sid_ctx of length sid_ctx_len within which a session can be reused for the ctx object. The SSL_set_session_id_context() function sets the... |
SSL_CTX_set_ssl_version(3) -- Choose a new TLS/SSL method
|
The SSL_CTX_set_ssl_version() function sets a new default TLS/SSL method for SSL objects newly created from this ctx. SSL objects already created with the SSL_new() function are not affected, except w... |
SSL_CTX_set_timeout(3) -- Manipulate timeout values for session caching
|
The SSL_CTX_set_timeout() function sets the timeout for newly created sessions for ctx to t. The timeout value t must be given in seconds. The SSL_CTX_get_timeout() function returns the currently set ... |
SSL_CTX_set_tmp_dh(3) -- Handle DH keys for ephemeral key exchange
|
The SSL_CTX_set_tmp_dh_callback() function sets the callback function for ctx to be used when DH parameters are required to tmp_dh_callback. The callback is inherited by all ssl objects created from c... |
SSL_CTX_set_tmp_dh_callback(3) -- Handle DH keys for ephemeral key exchange
|
The SSL_CTX_set_tmp_dh_callback() function sets the callback function for ctx to be used when DH parameters are required to tmp_dh_callback. The callback is inherited by all ssl objects created from c... |
SSL_CTX_set_tmp_rsa(3) -- Handle RSA keys for ephemeral key exchange
|
The SSL_CTX_set_tmp_rsa_callback() and function sets the callback function for ctx to be used when a temporary/ephemeral RSA key is required to tmp_rsa_callback(). The callback is inherited by all SSL... |
SSL_CTX_set_tmp_rsa_callback(3) -- Handle RSA keys for ephemeral key exchange
|
The SSL_CTX_set_tmp_rsa_callback() and function sets the callback function for ctx to be used when a temporary/ephemeral RSA key is required to tmp_rsa_callback(). The callback is inherited by all SSL... |
SSL_CTX_set_trust(3) -- Set a trust value to the SSL_CTX structure
|
The SSL_CTX_set_trust() function sets a trust value in the SSL_CTX structure. The trust values and their macros are defined in x509v3.h as follows: #define X509_TRUST_COMPAT #define X509_TRUST_SSL_CLI... |
SSL_CTX_set_verify(3) -- Set peer certificate verification parameters
|
The SSL_CTX_set_verify() function sets the verification flags for ctx to be mode and specifies the verify_callback() function to be used. If no callback function is specified, the NULL pointer can be ... |
SSL_CTX_set_verify_depth(3) -- Set peer certificate verification parameters
|
The SSL_CTX_set_verify() function sets the verification flags for ctx to be mode and specifies the verify_callback() function to be used. If no callback function is specified, the NULL pointer can be ... |
SSL_CTX_use_certificate(3) -- Load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_CTX_use_certificate_ASN1(3) -- Load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_CTX_use_certificate_chain_file(3) -- Load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_CTX_use_certificate_file(3) -- Load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_CTX_use_PrivateKey(3) -- Load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_CTX_use_PrivateKey_ASN1(3) -- Load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_CTX_use_PrivateKey_file(3) -- Load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_CTX_use_RSAPrivateKey(3) -- Load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_CTX_use_RSAPrivateKey_ASN1(3) -- Load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_CTX_use_RSAPrivateKey_file(3) -- Load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_do_handshake(3) -- Perform a TLS/SSL handshake
|
The SSL_do_handshake() function will wait for an SSL/TLS handshake to take place. If the connection is in client mode, the handshake will start. The handshake routines may have to be explicitly set in... |
SSL_dup(3) -- duplicates the specified SSL structure
|
The SSL_dup() function duplicates the specified SSL structure and returns an address of the newly created SSL structure. |
SSL_dup_CA_list(3) -- Duplicate the list of CAs
|
The SSL_dup_CA_list() function duplicates the specified list of CAs and return an address of the newly created list of CAs. |
SSL_flush_sessions(3) -- Remove expired sessions
|
The SSL_CTX_flush_sessions() function causes a run through the session cache of ctx to remove sessions expired at time (tm). The SSL_flush_sessions() function is a synonym for the SSL_CTX_flush_sessio... |
SSL_free(3) -- Free an allocated SSL structure
|
The SSL_free() function decrements the reference count of ssl, and removes the SSL structure pointed to by ssl and frees up the allocated memory if the the reference count has reached 0. |
SSL_get_accept_state(3) -- Prepare SSL object to work in client or server mode
|
The SSL_set_connect_state() function sets ssl to work in client mode. The SSL_set_accept_state() function sets ssl to work in server mode. |
SSL_get_certificate(3) -- Return an X.509 certificate loaded in the SSL structure
|
The SSL_get_certificate() function returns an X.509 certificate loaded in the SSL structure. Before calling this function, an X509 certificate must be loaded into the SSL structure with another API (f... |
SSL_get_cipher(3) -- Get SSL_CIPHER of a connection
|
The SSL_get_current_cipher() function returns a pointer to an SSL_CIPHER object containing the description of the actually used cipher of a connection established with the ssl object. The SSL_get_ciph... |
SSL_get_ciphers(3) -- Get list of available SSL_CIPHERs
|
|
SSL_get_cipher_bits(3) -- Get SSL_CIPHER of a connection
|
The SSL_get_current_cipher() function returns a pointer to an SSL_CIPHER object containing the description of the actually used cipher of a connection established with the ssl object. The SSL_get_ciph... |
SSL_get_cipher_list(3) -- Get list of available SSL_CIPHERs
|
|
SSL_get_cipher_name(3) -- Get SSL_CIPHER of a connection
|
The SSL_get_current_cipher() function returns a pointer to an SSL_CIPHER object containing the description of the actually used cipher of a connection established with the ssl object. The SSL_get_ciph... |
SSL_get_cipher_version(3) -- Get SSL_CIPHER of a connection
|
The SSL_get_current_cipher() function returns a pointer to an SSL_CIPHER object containing the description of the actually used cipher of a connection established with the ssl object. The SSL_get_ciph... |
SSL_get_client_CA_list(3) -- Get list of client CAs
|
The SSL_CTX_get_client_CA_list() function returns the list of client CAs explicitly set for ctx using the SSL_CTX_set_client_CA_list() function. The SSL_get_client_CA_list() function returns the list ... |
SSL_get_current_cipher(3) -- Get SSL_CIPHER of a connection
|
The SSL_get_current_cipher() function returns a pointer to an SSL_CIPHER object containing the description of the actually used cipher of a connection established with the ssl object. The SSL_get_ciph... |
SSL_get_default_timeout(3) -- Get default session timeout value
|
The SSL_get_default_timeout() function returns the default timeout value assigned to SSL_SESSION objects negotiated for the protocol valid for ssl. |
SSL_get_error(3) -- Obtain result code for TLS/SSL I/O operation
|
The SSL_get_error() function returns a result code (suitable for the C switch statement) for a preceding call to the SSL_connect(), SSL_accept(), SSL_do_handshake(), SSL_read(), SSL_peek(), or SSL_wri... |
SSL_get_ex_data(3) -- Internal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
SSL_get_ex_data_X509_STORE_CTX_idx(3) -- Get ex_data index to access SSL structure from X509_STORE_CTX
|
The SSL_get_ex_data_X509_STORE_CTX_idx() function returns the index number under which the pointer to the SSL object is stored into the X509_STORE_CTX object. |
SSL_get_ex_new_index(3) -- Internal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
SSL_get_fd(3) -- Get file descriptor linked to an SSL object
|
The SSL_get_fd() function returns the file descriptor which is linked to ssl. The SSL_get_rfd() and SSL_get_wfd() functions return the file descriptors for the read or the write channel, which can be ... |
SSL_get_finished(3) -- Get the latest "Finished" message sent out and return the length of the message.
|
The SSL_get_finished function copies the latest "Finished" message (sent out from this side) to buf and returns the length of the "Finished" message of the SSL handshake. |
SSL_get_info_callback(3) -- Get the callback function set by SSL_set_info_callback
|
The SSL_get_info_callback() function returns a pointer to the informational callback function set (in info_callback of the SSL structure) by theSSL_set_info_callback() function. |
SSL_get_mode(3) -- Manipulate SSL engine mode
|
The SSL_CTX_set_mode() function adds the mode set via bitmask in mode to ctx. Options already set before are not cleared. The SSL_set_mode() function adds the mode set via bitmask in mode to ssl. Opti... |
SSL_get_options(3) -- Manipulate SSL engine options
|
The SSL_CTX_set_options() function adds the options set via bitmask in options to ctx. Options already set before are not cleared. The SSL_set_options() function adds the options set via bitmask in op... |
SSL_get_peer_certificate(3) -- Get the X509 certificate of the peer
|
The SSL_get_peer_certificate() function returns a pointer to the X509 certificate the peer presented. If the peer did not present a certificate, NULL is returned. |
SSL_get_peer_cert_chain(3) -- Get the X509 certificate chain of the peer
|
The SSL_get_peer_cert_chain() function returns a pointer to STACKOF(X509) certificates forming the certificate chain of the peer. If called on the client side, the stack also contains the peer's cert... |
SSL_get_peer_finished(3) -- Gets the latest "Finished" message received and return the length of the message.
|
The SSL_get_finished() function copies the latest "Finished" message (received on this side) to buf and returns the length of the "Finished" message of the SSL handshake. |
SSL_get_privatekey(3) -- Get a private-key of the X.509 certificate loaded in the SSL structure
|
The SSL_get_privatekey() function returns a pointer to a private-key of the X.509 certificate loaded in the SSL structure. Before calling this function, a private-key must be loaded into the SSL struc... |
SSL_get_quiet_shutdown(3) -- Get a value of the quiet-shutdown flag in the ssl data structure
|
The SSL_get_quiet_shutdown() function returns a mode of the quiet shutdown flag in the ssl structure. |
SSL_get_rbio(3) -- Get BIO linked to an SSL object
|
The SSL_get_rbio() and SSL_get_wbio() functions return pointers to the BIOs for the read or the write channel, which can be different. The reference count of the BIO is not incremented. |
SSL_get_read_ahead(3) -- Get the read-ahead flag in the SSL structure.
|
The SSL_get_read_ahead() function receives an SSL structure as an argument and returns the read-ahead flag in the SSL structure. |
SSL_get_session(3) -- Retrieve TLS/SSL session data
|
The SSL_get_session() function returns a pointer to the SSL_SESSION actually used in ssl. The reference count of the SSL_SESSION is not incremented, so that the pointer can become invalid by other ope... |
SSL_get_shared_ciphers(3) -- Get the shared ciphers from the SSL connection.
|
The SSL_get_shared_ciphers() function returns a pointer to a buffer (*buf) containing a list of shared ciphers. The function can be used only for SSLv2 connection. It does not work for SSLv3 and TLSv1... |
SSL_get_shutdown(3) -- Manipulate shutdown state of an SSL connection
|
The SSL_set_shutdown() function sets the shutdown state of ssl to mode. The SSL_get_shutdown() function returns the shutdown mode of ssl. |
SSL_get_SSL_CTX(3) -- Get the SSL_CTX from which an SSL is created
|
The SSL_get_SSL_CTX() function returns a pointer to the SSL_CTX object from which ssl was created with SSL_new(). |
SSL_get_ssl_method(3) -- Choose a new TLS/SSL method
|
The SSL_CTX_set_ssl_version() function sets a new default TLS/SSL method for SSL objects newly created from this ctx. SSL objects already created with the SSL_new() function are not affected, except w... |
SSL_get_verify_callback(3) -- Get currently set verification parameters
|
The SSL_CTX_get_verify_mode() function returns the verification mode currently set in ctx. The SSL_get_verify_mode() function returns the verification mode currently set in ssl. The SSL_CTX_get_verify... |
SSL_get_verify_depth(3) -- Get currently set verification parameters
|
The SSL_CTX_get_verify_mode() function returns the verification mode currently set in ctx. The SSL_get_verify_mode() function returns the verification mode currently set in ssl. The SSL_CTX_get_verify... |
SSL_get_verify_mode(3) -- Get currently set verification parameters
|
The SSL_CTX_get_verify_mode() function returns the verification mode currently set in ctx. The SSL_get_verify_mode() function returns the verification mode currently set in ssl. The SSL_CTX_get_verify... |
SSL_get_verify_result(3) -- Get result of peer certificate verification
|
The SSL_get_verify_result() function returns the result of the verification of the X509 certificate presented by the peer, if any. |
SSL_get_version(3) -- Get the protocol version of a connection.
|
The SSL_get_cipher_version() function returns the name of the protocol used for the connection ssl. |
SSL_library_init(3) -- Initialize SSL library by registering algorithms
|
The SSL_library_init() function registers the available ciphers and digests. The OpenSSL_add_ssl_algorithms() and SSLeay_add_ssl_algorithms() functions are synonyms for the SSL_library_init() function... |
SSL_load_client_CA_file(3) -- Load certificate names from file
|
The SSL_load_client_CA_file() function reads certificates from file and returns a STACK_OF(X509_NAME) with the subject names found. |
SSL_load_error_strings(3) -- Load error strings
|
The ERR_load_crypto_strings() function registers the error strings for all libcrypto functions. The ERR_load_SSL_strings() function registers the error strings for all libssl functions. The SSL_load_e... |
SSL_need_tmp_rsa(3) -- Handle RSA keys for ephemeral key exchange
|
The SSL_CTX_set_tmp_rsa_callback() and function sets the callback function for ctx to be used when a temporary/ephemeral RSA key is required to tmp_rsa_callback(). The callback is inherited by all SSL... |
SSL_new(3) -- Create a new SSL structure for a connection
|
The SSL_new() function creates a new SSL structure which is needed to hold the data for a TLS/SSL connection. The new structure inherits the settings of the underlying context ctx: connection method (... |
SSL_peek(3) -- Copy the data in the SSL buffer into the buffer passed to this API
|
The SSL_peek() function copies num bytes from the specified ssl into the buffer buf. In constrast to the SSL_read() function, the data in the SSL buffer is unmodified after the SSL_peek() operation. |
SSL_pending(3) -- Obtain number of readable bytes buffered in an SSL object
|
The SSL_pending() function returns the number of bytes which are available inside ssl for immediate read. |
SSL_read(3) -- Read bytes from a TLS/SSL connection.
|
The SSL_read() function tries to read num bytes from the specified ssl into the buffer buf. |
SSL_remove_session(3) -- Manipulate session cache
|
The SSL_CTX_add_session() function adds the session c to the context ctx. The reference count for session c is incremented by 1. If a session with the same session id already exists, the old session i... |
SSL_renogiate(3) -- Turn on flags for renegotiation so that renegotiation will happen
|
The SSL_renegotiate() function sets flags to initiate renegotiation. The renegotiation may happen at the next I/O operation provided that client/server are ready for renegotiation. |
SSL_rstate_string(3) -- Get textual description of state of an SSL object during read operation
|
The SSL_rstate_string() function returns a 2 letter string indicating the current read state of the SSL object ssl. The SSL_rstate_string_long() function returns a string indicating the current read s... |
SSL_rstate_string_long(3) -- Get textual description of state of an SSL object during read operation
|
The SSL_rstate_string() function returns a 2 letter string indicating the current read state of the SSL object ssl. The SSL_rstate_string_long() function returns a string indicating the current read s... |
SSL_SESSION_cmp(3) -- Compare two SSL_SESSION structures
|
SSL_SESSION_cmp() compares two SSL_SESSION structures. If the two structures are the same, this API return 0, otherwise non-zero value is returned. |
SSL_SESSION_free(3) -- Free an allocated SSL_SESSION structure
|
The SSL_SESSION_free() function decrements the reference count of session and removes the SSL_SESSION structure pointed to by session and frees up the allocated memory, if the the reference count has ... |
SSL_SESSION_get_ex_data(3) -- Unternal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
SSL_SESSION_get_ex_new_index(3) -- Unternal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
SSL_SESSION_get_time(3) -- Retrieve and manipulate session time and timeout settings
|
The SSL_SESSION_get_time() function returns the time at which the session s was established. The time is given in seconds since the Epoch and therefore compatible to the time delivered by the time() c... |
SSL_SESSION_get_timeout(3) -- Retrieve and manipulate session time and timeout settings
|
The SSL_SESSION_get_time() function returns the time at which the session s was established. The time is given in seconds since the Epoch and therefore compatible to the time delivered by the time() c... |
SSL_SESSION_hash(3) -- Return a session ID formatted as an
|
The SSL_SESSION_hash() function formats session_id[0...3] of the received SSL_SESSION into a unsigned long data and returns it. |
SSL_SESSION_new(3) -- Create a new SSL_SESSION structure
|
The SSL_SESSION_new() function creates an SSL_SESSION structure and returns an address of the structure. 60*5+4 is set to timeout value of a newly created SSL_SESSION structure. |
SSL_SESSION_print(3) -- Write data in the SSL_SESSION structure to the BIO or to an I/O stream specified by the file pointer
|
The SSL_SESSION_print() writes SSL_SESSION information (including protocol type, cipher types, session id, and master key) into the BIO. If this function succeeds, it returns 1. The SSL_SESSION_print_... |
SSL_SESSION_print_fp(3) -- Write data in the SSL_SESSION structure to the BIO or to an I/O stream specified by the file pointer
|
The SSL_SESSION_print() writes SSL_SESSION information (including protocol type, cipher types, session id, and master key) into the BIO. If this function succeeds, it returns 1. The SSL_SESSION_print_... |
SSL_session_reused(3) -- Query whether a reused session was negotiated during handshake
|
The SSL_session_reused() function queries whether a reused session was negotiated during the handshake. |
SSL_SESSION_set_ex_data(3) -- Unternal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
SSL_SESSION_set_time(3) -- Retrieve and manipulate session time and timeout settings
|
The SSL_SESSION_get_time() function returns the time at which the session s was established. The time is given in seconds since the Epoch and therefore compatible to the time delivered by the time() c... |
SSL_SESSION_set_timeout(3) -- Retrieve and manipulate session time and timeout settings
|
The SSL_SESSION_get_time() function returns the time at which the session s was established. The time is given in seconds since the Epoch and therefore compatible to the time delivered by the time() c... |
SSL_set_bio(3) -- Connect the SSL object with a BIO
|
The SSL_set_bio() function connects the BIOs rbio and wbio for the read and write operations of the TLS/SSL (encrypted) side of ssl. The SSL engine inherits the behavior of rbio and wbio, respectively... |
SSL_set_cipher_list(3) -- Choose list of available SSL_CIPHERs
|
The SSL_CTX_set_cipher_list() function sets the list of available ciphers for ctx using the control string str. The format of the string is described in ciphers(1). The list of ciphers is inherited by... |
SSL_set_client_CA_list(3) -- Set list of CAs sent to the client when requesting a client certificate
|
The SSL_CTX_set_client_CA_list() function sets the list of CAs sent to the client when requesting a client certificate for ctx. The SSL_set_client_CA_list() function sets the list of CAs sent to the c... |
SSL_set_connect_state(3) -- Prepare SSL object to work in client or server mode
|
The SSL_set_connect_state() function sets ssl to work in client mode. The SSL_set_accept_state() function sets ssl to work in server mode. |
SSL_set_ex_data(3) -- Internal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
SSL_set_fd(3) -- Connect the SSL object with a file descriptor
|
The SSL_set_fd() function sets the file descriptor fd as the input/output facility for the TLS/SSL (encrypted) side of ssl. The fd will typically be the socket file descriptor of a network connection.... |
SSL_set_info_callback(3) -- Set a callback which will be called during the specified SSL connection
|
The SSL_set_info_callback() function sets a callback which will be called during the specified SSL connection. This function is useful to trace an SSL connection. |
SSL_set_mode(3) -- Manipulate SSL engine mode
|
The SSL_CTX_set_mode() function adds the mode set via bitmask in mode to ctx. Options already set before are not cleared. The SSL_set_mode() function adds the mode set via bitmask in mode to ssl. Opti... |
SSL_set_options(3) -- Manipulate SSL engine options
|
The SSL_CTX_set_options() function adds the options set via bitmask in options to ctx. Options already set before are not cleared. The SSL_set_options() function adds the options set via bitmask in op... |
SSL_set_purpose(3) -- Set a purpose value to the SSL structure
|
The SSL_set_purpose() function sets a purpose value in the SSL structure. The purpose values and their macros are defined in x509v3.h as follows: #define X509_PURPOSE_SSL_CLIENT 1 #define X509_PURPOSE... |
SSL_set_quiet_shutdown(3) -- Set a value to the quiet-shutdown flag in the ssl data structure
|
The SSL_set_quiet_shutdown() function sets a mode of quiet shutdown to the ssl structure. To turn on the quiet shutdown, mode == 1 needs to be passed. The mode == 0 turns off the quiet shutdown flag o... |
SSL_set_read_ahead(3) -- sets the read-ahead flag in the SSL structure.
|
SSL_get_read_ahead() sets a value (int yes) to the readahead flag in the SSL structure. In order to turn on the flag, a non-zero value must be set. |
SSL_set_session(3) -- Set a TLS/SSL session to be used during TLS/SSL connect
|
The SSL_set_session() function sets session to be used when the TLS/SSL connection is to be established. The SSL_set_session() function is only useful for TLS/SSL clients. When the session is set, the... |
SSL_set_session_id_context(3) -- Set context within which session can be reused (server side only)
|
The SSL_CTX_set_session_id_context() function sets the context sid_ctx of length sid_ctx_len within which a session can be reused for the ctx object. The SSL_set_session_id_context() function sets the... |
SSL_set_shutdown(3) -- Manipulate shutdown state of an SSL connection
|
The SSL_set_shutdown() function sets the shutdown state of ssl to mode. The SSL_get_shutdown() function returns the shutdown mode of ssl. |
SSL_set_ssl_method(3) -- Choose a new TLS/SSL method
|
The SSL_CTX_set_ssl_version() function sets a new default TLS/SSL method for SSL objects newly created from this ctx. SSL objects already created with the SSL_new() function are not affected, except w... |
SSL_set_tmp_dh(3) -- Handle DH keys for ephemeral key exchange
|
The SSL_CTX_set_tmp_dh_callback() function sets the callback function for ctx to be used when DH parameters are required to tmp_dh_callback. The callback is inherited by all ssl objects created from c... |
SSL_set_tmp_dh_callback(3) -- Handle DH keys for ephemeral key exchange
|
The SSL_CTX_set_tmp_dh_callback() function sets the callback function for ctx to be used when DH parameters are required to tmp_dh_callback. The callback is inherited by all ssl objects created from c... |
SSL_set_tmp_rsa(3) -- Handle RSA keys for ephemeral key exchange
|
The SSL_CTX_set_tmp_rsa_callback() and function sets the callback function for ctx to be used when a temporary/ephemeral RSA key is required to tmp_rsa_callback(). The callback is inherited by all SSL... |
SSL_set_tmp_rsa_callback(3) -- Handle RSA keys for ephemeral key exchange
|
The SSL_CTX_set_tmp_rsa_callback() and function sets the callback function for ctx to be used when a temporary/ephemeral RSA key is required to tmp_rsa_callback(). The callback is inherited by all SSL... |
SSL_set_trust(3) -- sets a trust value to the SSL structure
|
The SSL_set_trust() function sets a trust value in the SSL structure. The trust values and their macros are defined in x509v3.h as follows: #define X509_TRUST_COMPAT 1 #define X509_TRUST_SSL_CLIENT 2 ... |
SSL_set_verify(3) -- Set peer certificate verification parameters
|
The SSL_CTX_set_verify() function sets the verification flags for ctx to be mode and specifies the verify_callback() function to be used. If no callback function is specified, the NULL pointer can be ... |
SSL_set_verify_depth(3) -- Set peer certificate verification parameters
|
The SSL_CTX_set_verify() function sets the verification flags for ctx to be mode and specifies the verify_callback() function to be used. If no callback function is specified, the NULL pointer can be ... |
SSL_set_verify_result(3) -- Override result of peer certificate verification
|
The SSL_set_verify_result() function sets verify_result of the object ssl to be the result of the verification of the X509 certificate presented by the peer, if any. |
SSL_shutdown(3) -- Shut down a TLS/SSL connection
|
The SSL_shutdown() function shuts down an active TLS/SSL connection. It sends the "lose notify" shutdown alert to the peer. |
SSL_state(3) -- Get a description of an SSL state
|
These APIs are used to get the information about the current SSL state. The SSL_state() function takes the address of the current SSL structure and return its state code (integer). The SSL_state_strin... |
SSL_state_string(3) -- Get textual description of state of an SSL object
|
The SSL_state_string() function returns a six-- letter string indicating the current state of the SSL object ssl. The SSL_state_string_long() function returns a string indicating the current state of ... |
SSL_state_string_long(3) -- Get textual description of state of an SSL object
|
The SSL_state_string() function returns a six-- letter string indicating the current state of the SSL object ssl. The SSL_state_string_long() function returns a string indicating the current state of ... |
SSL_use_certificate(3) -- Load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_use_certificate_ASN1(3) -- Load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_use_certificate_file(3) -- Load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_use_PrivateKey(3) -- Load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_use_PrivateKey_ASN1(3) -- Load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_use_PrivateKey_file(3) -- Load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_use_RSAPrivateKey(3) -- Load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_use_RSAPrivateKey_ASN1(3) -- Load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_use_RSAPrivateKey_file(3) -- Load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_version(3) -- Get a version of the SSL structure
|
The SSL_version() function returns an SSL version (one of SSL2_VERSION, SSL3_VERSION, TLS1_VERSION). |
SSL_want(3) -- Obtain state information TLS/SSL I/O operation
|
The SSL_want() function returns state information for the SSL object ssl. The other SSL_want_*() functions are shortcuts for the possible states returned by SSL_want(). |
SSL_want_nothing(3) -- Obtain state information TLS/SSL I/O operation
|
The SSL_want() function returns state information for the SSL object ssl. The other SSL_want_*() functions are shortcuts for the possible states returned by SSL_want(). |
SSL_want_read(3) -- Obtain state information TLS/SSL I/O operation
|
The SSL_want() function returns state information for the SSL object ssl. The other SSL_want_*() functions are shortcuts for the possible states returned by SSL_want(). |
SSL_want_write(3) -- Obtain state information TLS/SSL I/O operation
|
The SSL_want() function returns state information for the SSL object ssl. The other SSL_want_*() functions are shortcuts for the possible states returned by SSL_want(). |
SSL_want_x509_lookup(3) -- Obtain state information TLS/SSL I/O operation
|
The SSL_want() function returns state information for the SSL object ssl. The other SSL_want_*() functions are shortcuts for the possible states returned by SSL_want(). |
SSL_write(3) -- Write bytes to a TLS/SSL connection.
|
The SSL_write() function writes num bytes from the buffer buf into the specified ssl connection. |
standend(3) -- Curses character and window attribute control routines
|
These routines manipulate the current attributes of the current or specified window. The current attributes of a window are applied to all characters that are written into the window with waddch, wadd... |
standout(3) -- Curses character and window attribute control routines
|
These routines manipulate the current attributes of the current or specified window. The current attributes of a window are applied to all characters that are written into the window with waddch, wadd... |
starting_egid(3) -- Get or check user or group IDs (Enhanced Security)
|
The identity functions provide a way to recall the IDs of a process at the time the program started. They are useful when interrogating the invoking environment of a program after any setuid() or setg... |
starting_euid(3) -- Get or check user or group IDs (Enhanced Security)
|
The identity functions provide a way to recall the IDs of a process at the time the program started. They are useful when interrogating the invoking environment of a program after any setuid() or setg... |
starting_luid(3) -- Get or check user or group IDs (Enhanced Security)
|
The identity functions provide a way to recall the IDs of a process at the time the program started. They are useful when interrogating the invoking environment of a program after any setuid() or setg... |
starting_rgid(3) -- Get or check user or group IDs (Enhanced Security)
|
The identity functions provide a way to recall the IDs of a process at the time the program started. They are useful when interrogating the invoking environment of a program after any setuid() or setg... |
starting_ruid(3) -- Get or check user or group IDs (Enhanced Security)
|
The identity functions provide a way to recall the IDs of a process at the time the program started. They are useful when interrogating the invoking environment of a program after any setuid() or setg... |
start_color(3) -- Curses
|
The Curses library includes routines that manipulate color-on-color alphanumeric terminals. To use these routines, applications must call start_color, usually right after initscr. Colors are always us... |
staux(3) -- routines that provide scalar interfaces to auxiliaries
|
Auxiliary entries are unions with a fixed length of four bytes per entry. Much information is packed within the auxiliaries. Rather than have the compiler front-ends handle each type of auxiliary entr... |
stcu(3) -- routines that provide a compilation unit symbol table interface
|
The stcu() routines provide an interface to objects that occur once per object rather than once per file descriptor (for example, external symbols, strings, and dense numbers). The routines provide ac... |
stdarg(3) -- Handle a variable-length parameter list
|
The stdarg set of macros allows you to write portable functions that accept a variable number of parameters. Subroutines that have variable-length parameter lists (such as the printf() function), but ... |
stdio(3) -- locking functions
|
The flockfile(), ftrylockfile, and funlockfile functions provide for explicit application-level locking of stdio (FILE*) objects. These functions can be used by a thread to delineate a sequence of I/O... |
step(3) -- Regular expression compile and match routines
|
The compile(), advance(), and step() functions are used for general-purpose expression matching. The compile() function takes a simple regular expression as input and produces a compiled expression th... |
step_r(3) -- Regular expression compile and match routines
|
The compile(), advance(), and step() functions are used for general-purpose expression matching. The compile() function takes a simple regular expression as input and produces a compiled expression th... |
stfd(3) -- routines that provide access to per file descriptor section of the symbol table
|
The stfd routines provide an interface to objects handled on a per file descriptor (fd) level (for example, local symbols, auxiliaries, local strings, line numbers, optimization entries, procedure des... |
stfe(3) -- routines that provide a high-level interface to basic functions needed to access and add to the symb...
|
The stfe routines provide a high-level interface to the symbol table based on common needs of the compiler frontends. Should be called upon encountering each cpp directive in the front end. It calls s... |
stime(3) -- Set the system-wide time-of-day clock
|
The stime() function sets the time and date of the system. |
stio(3) -- routines that provide a binary read/write interface to the symbol table
|
The CHDRR structure (see stcu(3)) represents a symbol table in memory. A new CHDRR can be created by reading a symbol table from disk. The st_readbinary() and st_readst() routines read a symbol table ... |
store(3) -- Database subroutines
|
The dbminit(), fetch(), store(), delete(), firstkey(), nextkey(), and forder() functions maintain key/content pairs in a database. They are obtained with the -ldbm loader option. The dbm library is pr... |
strcasecmp(3) -- Perform case-insensitive string comparisons
|
The strcasecmp() function compares the string pointed to by the s1 parameter to the string pointed to by the s2 parameter, while ignoring differences in case. The strncasecmp() function is similar to ... |
strcat(3) -- Perform operations on strings
|
The strcat() function appends a copy of the string pointed to by the s2 parameter (including the terminating null byte) to the end of the string pointed to by the s1 parameter. The initial byte of s2 ... |
strchr(3) -- Search for character in string
|
The index() function locates the first occurrence of the integer specified by the c parameter, which is converted to an unsigned char, in the string pointed to by the s parameter. The terminating null... |
strcmp(3) -- Perform operations on strings
|
The strcat() function appends a copy of the string pointed to by the s2 parameter (including the terminating null byte) to the end of the string pointed to by the s1 parameter. The initial byte of s2 ... |
strcoll(3) -- Compares strings using locale collation
|
The strcoll() function compares the string pointed to by the s1 parameter with the string pointed to by the s2 parameter, both interpreted as appropriate to the LC_COLLATE category of the current loca... |
strcpy(3) -- Perform operations on strings
|
The strcat() function appends a copy of the string pointed to by the s2 parameter (including the terminating null byte) to the end of the string pointed to by the s1 parameter. The initial byte of s2 ... |
strcspn(3) -- Return length of initial segment of string
|
The strspn() function computes the length of the maximum initial segment of the string pointed to by the s1 parameter, which consists entirely of bytes from the string pointed to by the s2 parameter. ... |
strdup(3) -- Perform operations on strings
|
The strcat() function appends a copy of the string pointed to by the s2 parameter (including the terminating null byte) to the end of the string pointed to by the s1 parameter. The initial byte of s2 ... |
strerror(3) -- Access message explaining function error
|
The strerror() function maps the error number specified by the errnum parameter to a error message string and returns a pointer to the string. The string pointed to by the return value is not modified... |
strerror_r(3) -- Access message explaining function error
|
The strerror() function maps the error number specified by the errnum parameter to a error message string and returns a pointer to the string. The string pointed to by the return value is not modified... |
strfmon(3) -- Formats monetary strings
|
The strfmon() function converts numeric values to monetary strings according to the specifications in the format parameter. The function converts the double-precision floating-point value parameters u... |
strftime(3) -- Convert a date and time to a string
|
The strftime() function places characters into the array pointed to by the s parameter as controlled by the string pointed to by the format parameter. Local time zone information is used as though the... |
string(3) -- Perform operations on strings
|
The strcat() function appends a copy of the string pointed to by the s2 parameter (including the terminating null byte) to the end of the string pointed to by the s1 parameter. The initial byte of s2 ... |
strlen(3) -- Find the length of a string
|
The strlen() function returns the number of bytes in the string pointed to by the s parameter. The string length value does not include the terminating null character. Note If you pass a NULL pointer ... |
strncasecmp(3) -- Perform case-insensitive string comparisons
|
The strcasecmp() function compares the string pointed to by the s1 parameter to the string pointed to by the s2 parameter, while ignoring differences in case. The strncasecmp() function is similar to ... |
strncat(3) -- Perform operations on string
|
The strncat() function appends no more than n bytes from the array pointed to by the s2 parameter to the end of the array pointed to by the s1 parameter. The initial byte of the array pointed to by s2... |
strncmp(3) -- Perform operations on string
|
The strncat() function appends no more than n bytes from the array pointed to by the s2 parameter to the end of the array pointed to by the s1 parameter. The initial byte of the array pointed to by s2... |
strncpy(3) -- Perform operations on string
|
The strncat() function appends no more than n bytes from the array pointed to by the s2 parameter to the end of the array pointed to by the s1 parameter. The initial byte of the array pointed to by s2... |
strpbrk(3) -- Find one of a set of bytes in a string
|
The strpbrk() function scans the string pointed to by the s1 parameter for the first occurrence of any byte in the string pointed to by the s2 parameter. The strpbrk() function treats the s2 parameter... |
strptime(3) -- Convert a character string to a time value
|
The strptime() function converts the characters pointed to by the buf parameter to values that are stored in the tm structure, using the format specified by the format parameter. The strptime() functi... |
strrchr(3) -- Search for character in string
|
The index() function locates the first occurrence of the integer specified by the c parameter, which is converted to an unsigned char, in the string pointed to by the s parameter. The terminating null... |
strspn(3) -- Return length of initial segment of string
|
The strspn() function computes the length of the maximum initial segment of the string pointed to by the s1 parameter, which consists entirely of bytes from the string pointed to by the s2 parameter. ... |
strstr(3) -- Find a substring
|
The strstr() function locates the first occurrence in the string pointed to by the s1 parameter of the sequence of bytes in the string pointed to by the s2 parameter, excluding the terminating null ch... |
strtod(3) -- Converts a character
|
The atof() function converts, to a double floating-point value, the string pointed to by the nptr parameter - up to the first character that is inconsistent with the format of a floating-point number.... |
strtof(3) -- Converts a character
|
The atof() function converts, to a double floating-point value, the string pointed to by the nptr parameter - up to the first character that is inconsistent with the format of a floating-point number.... |
strtok(3) -- Split string into tokens
|
The strtok() function splits the string pointed to by the s1 parameter into a sequence of tokens, each of which is delimited by a byte equal to one of the bytes in the s2 parameter. Usually, the strto... |
strtok_r(3) -- Split string into tokens
|
The strtok() function splits the string pointed to by the s1 parameter into a sequence of tokens, each of which is delimited by a byte equal to one of the bytes in the s2 parameter. Usually, the strto... |
strtol(3) -- Convert a character string to the specified integer data type
|
The atoi(), atol(), strtol(), and strtoul() functions are used to convert a character string pointed to by the nptr parameter to an integer having a specified data type. The atoi() and atol() function... |
strtold(3) -- Converts a character
|
The atof() function converts, to a double floating-point value, the string pointed to by the nptr parameter - up to the first character that is inconsistent with the format of a floating-point number.... |
strtoul(3) -- Convert a character string to the specified integer data type
|
The atoi(), atol(), strtol(), and strtoul() functions are used to convert a character string pointed to by the nptr parameter to an integer having a specified data type. The atoi() and atol() function... |
strxfrm(3) -- Transforms string for collation in current locale
|
The strxfrm() function transforms the string pointed to by the s2 parameter into an internal form suitable for collation and places the result in the address specified by s1. This transformation is pe... |
stty(3) -- set and get terminal state
|
The stty() subroutine sets the state of the terminal associated with fd. The gtty() subroutine retrieves the state of the terminal associated with fd. To set the state of a terminal, the stty() call m... |
st_addr_to_file(3) -- convert an address in an object to a file handle, procedure handle, line number, or symbol handle an...
|
These functions convert an address in an object to a file handle, procedure handle, line number, or symbol handle and offset: Returns the file handle corresponding to the specified text address. Retur... |
st_addr_to_line(3) -- convert an address in an object to a file handle, procedure handle, line number, or symbol handle an...
|
These functions convert an address in an object to a file handle, procedure handle, line number, or symbol handle and offset: Returns the file handle corresponding to the specified text address. Retur... |
st_addr_to_obj(3) -- create, close, or perform operations on object lists
|
These functions create, close, or perform operations on object lists: Either creates a list of objects or appends an object to an existing object list. It either creates a new object list (when you sp... |
st_addr_to_proc(3) -- convert an address in an object to a file handle, procedure handle, line number, or symbol handle an...
|
These functions convert an address in an object to a file handle, procedure handle, line number, or symbol handle and offset: Returns the file handle corresponding to the specified text address. Retur... |
st_addr_to_sym(3) -- convert an address in an object to a file handle, procedure handle, line number, or symbol handle an...
|
These functions convert an address in an object to a file handle, procedure handle, line number, or symbol handle and offset: Returns the file handle corresponding to the specified text address. Retur... |
st_ar_member_next(3) -- routines to check whether an object is an archive and to process object files within an archive
|
The st_obj_open() function opens the named object file for read access. It maps the file in memory using mmap(), if possible. If mmap() fails, it dynamically allocates memory in which to read the file... |
st_check_proc_line_range(3) -- access information about the procedures in an object
|
These functions return information about a procedure or perform operations on the procedures in an object or file: Determines whether the specified procedure is an alternate entry or nested routine. R... |
st_class_str(3) -- translate symbol table codes to printable strings
|
These functions are used to get a printable string corresponding to an encoded value in an object file's symbol table. The st_lang_str() function determines the source language for a file. The st_typ... |
st_cm_add(3) -- access and modify comment section information in an object file
|
These functions are used to read, create or modify comment section data. Return an opaque handle for the comment section to the cmscn parameter. You can use this handle as an input argument in subsequ... |
st_cm_append(3) -- access and modify comment section information in an object file
|
These functions are used to read, create or modify comment section data. Return an opaque handle for the comment section to the cmscn parameter. You can use this handle as an input argument in subsequ... |
st_cm_cleanup(3) -- access and modify comment section information in an object file
|
These functions are used to read, create or modify comment section data. Return an opaque handle for the comment section to the cmscn parameter. You can use this handle as an input argument in subsequ... |
st_cm_data(3) -- access and modify comment section information in an object file
|
These functions are used to read, create or modify comment section data. Return an opaque handle for the comment section to the cmscn parameter. You can use this handle as an input argument in subsequ... |
st_cm_delete(3) -- access and modify comment section information in an object file
|
These functions are used to read, create or modify comment section data. Return an opaque handle for the comment section to the cmscn parameter. You can use this handle as an input argument in subsequ... |
st_cm_del_entry(3) -- access and modify comment section information in an object file
|
These functions are used to read, create or modify comment section data. Return an opaque handle for the comment section to the cmscn parameter. You can use this handle as an input argument in subsequ... |
st_cm_find_sscn(3) -- access and modify comment section information in an object file
|
These functions are used to read, create or modify comment section data. Return an opaque handle for the comment section to the cmscn parameter. You can use this handle as an input argument in subsequ... |
st_cm_flags(3) -- access and modify comment section information in an object file
|
These functions are used to read, create or modify comment section data. Return an opaque handle for the comment section to the cmscn parameter. You can use this handle as an input argument in subsequ... |
st_cm_get_flags(3) -- access and modify comment section information in an object file
|
These functions are used to read, create or modify comment section data. Return an opaque handle for the comment section to the cmscn parameter. You can use this handle as an input argument in subsequ... |
st_cm_layout(3) -- access and modify comment section information in an object file
|
These functions are used to read, create or modify comment section data. Return an opaque handle for the comment section to the cmscn parameter. You can use this handle as an input argument in subsequ... |
st_cm_next(3) -- access and modify comment section information in an object file
|
These functions are used to read, create or modify comment section data. Return an opaque handle for the comment section to the cmscn parameter. You can use this handle as an input argument in subsequ... |
st_cm_print(3) -- access and modify comment section information in an object file
|
These functions are used to read, create or modify comment section data. Return an opaque handle for the comment section to the cmscn parameter. You can use this handle as an input argument in subsequ... |
st_cm_print_one(3) -- access and modify comment section information in an object file
|
These functions are used to read, create or modify comment section data. Return an opaque handle for the comment section to the cmscn parameter. You can use this handle as an input argument in subsequ... |
st_cm_setup(3) -- access and modify comment section information in an object file
|
These functions are used to read, create or modify comment section data. Return an opaque handle for the comment section to the cmscn parameter. You can use this handle as an input argument in subsequ... |
st_cm_set_flags(3) -- access and modify comment section information in an object file
|
These functions are used to read, create or modify comment section data. Return an opaque handle for the comment section to the cmscn parameter. You can use this handle as an input argument in subsequ... |
st_cm_start(3) -- access and modify comment section information in an object file
|
These functions are used to read, create or modify comment section data. Return an opaque handle for the comment section to the cmscn parameter. You can use this handle as an input argument in subsequ... |
st_cm_tag(3) -- access and modify comment section information in an object file
|
These functions are used to read, create or modify comment section data. Return an opaque handle for the comment section to the cmscn parameter. You can use this handle as an input argument in subsequ... |
st_data_addr_to_sym(3) -- convert an address in an object to a file handle, procedure handle, line number, or symbol handle an...
|
These functions convert an address in an object to a file handle, procedure handle, line number, or symbol handle and offset: Returns the file handle corresponding to the specified text address. Retur... |
st_dyn_addr(3) -- Access routines for dynamic header information in shared objects
|
These functions are used to read dynamic section entries in an object file. The dynamic section is an array of tag and value pairs providing information that is used to navigate and interpret addition... |
st_dyn_count(3) -- Access routines for dynamic header information in shared objects
|
These functions are used to read dynamic section entries in an object file. The dynamic section is an array of tag and value pairs providing information that is used to navigate and interpret addition... |
st_dyn_find_tag(3) -- Access routines for dynamic header information in shared objects
|
These functions are used to read dynamic section entries in an object file. The dynamic section is an array of tag and value pairs providing information that is used to navigate and interpret addition... |
st_dyn_next(3) -- Access routines for dynamic header information in shared objects
|
These functions are used to read dynamic section entries in an object file. The dynamic section is an array of tag and value pairs providing information that is used to navigate and interpret addition... |
st_dyn_start(3) -- Access routines for dynamic header information in shared objects
|
These functions are used to read dynamic section entries in an object file. The dynamic section is an array of tag and value pairs providing information that is used to navigate and interpret addition... |
st_dyn_tag(3) -- Access routines for dynamic header information in shared objects
|
These functions are used to read dynamic section entries in an object file. The dynamic section is an array of tag and value pairs providing information that is used to navigate and interpret addition... |
st_dyn_value(3) -- Access routines for dynamic header information in shared objects
|
These functions are used to read dynamic section entries in an object file. The dynamic section is an array of tag and value pairs providing information that is used to navigate and interpret addition... |
st_end_sym(3) -- access information about the symbols in an object, and access or set symbol name demangling controls
|
These functions return information about the symbols in an object. Symbols may represent files, procedures, or local or global symbols. Return the value, type, and class of a given symbol. Returns the... |
st_external_name_sym(3) -- access information about the symbols in an object, and access or set symbol name demangling controls
|
These functions return information about the symbols in an object. Symbols may represent files, procedures, or local or global symbols. Return the value, type, and class of a given symbol. Returns the... |
st_fd_get_version_byname(3) -- access version information in an object file
|
These functions access version information in an object file. The st_get_known_versions() routine returns the version stamp values (from the file /usr/include/stamp.h) that libst.a was built with. The... |
st_file_is_archive(3) -- routines to check whether an object is an archive and to process object files within an archive
|
The st_obj_open() function opens the named object file for read access. It maps the file in memory using mmap(), if possible. If mmap() fails, it dynamically allocates memory in which to read the file... |
st_file_lang(3) -- access information about the files in an object
|
All of the functions described in this reference page return information about the files in an object: Identifies the source language (for example, C++) of the specified file. Returns a pointer to a n... |
st_file_name(3) -- access information about the files in an object
|
All of the functions described in this reference page return information about the files in an object: Identifies the source language (for example, C++) of the specified file. Returns a pointer to a n... |
st_file_proc_count(3) -- access information about the files in an object
|
All of the functions described in this reference page return information about the files in an object: Identifies the source language (for example, C++) of the specified file. Returns a pointer to a n... |
st_file_proc_next(3) -- access information about the files in an object
|
All of the functions described in this reference page return information about the files in an object: Identifies the source language (for example, C++) of the specified file. Returns a pointer to a n... |
st_file_proc_start(3) -- access information about the files in an object
|
All of the functions described in this reference page return information about the files in an object: Identifies the source language (for example, C++) of the specified file. Returns a pointer to a n... |
st_file_sym_start(3) -- access information about the files in an object
|
All of the functions described in this reference page return information about the files in an object: Identifies the source language (for example, C++) of the specified file. Returns a pointer to a n... |
st_file_to_obj(3) -- create, close, or perform operations on object lists
|
These functions create, close, or perform operations on object lists: Either creates a list of objects or appends an object to an existing object list. It either creates a new object list (when you sp... |
st_foreach_obj(3) -- create, close, or perform operations on object lists
|
These functions create, close, or perform operations on object lists: Either creates a list of objects or appends an object to an existing object list. It either creates a new object list (when you sp... |
st_foreach_obj_proc(3) -- access information about the procedures in an object
|
These functions return information about a procedure or perform operations on the procedures in an object or file: Determines whether the specified procedure is an alternate entry or nested routine. R... |
st_foreach_proc(3) -- access information about the procedures in an object
|
These functions return information about a procedure or perform operations on the procedures in an object or file: Determines whether the specified procedure is an alternate entry or nested routine. R... |
st_foreach_proc_sorted(3) -- access information about the procedures in an object
|
These functions return information about a procedure or perform operations on the procedures in an object or file: Determines whether the specified procedure is an alternate entry or nested routine. R... |
st_frame_offset_to_sym(3) -- access information about the symbols in an object, and access or set symbol name demangling controls
|
These functions return information about the symbols in an object. Symbols may represent files, procedures, or local or global symbols. Return the value, type, and class of a given symbol. Returns the... |
st_free_name(3) -- access information about the symbols in an object, and access or set symbol name demangling controls
|
These functions return information about the symbols in an object. Symbols may represent files, procedures, or local or global symbols. Return the value, type, and class of a given symbol. Returns the... |
st_get_format_versions(3) -- access version information in an object file
|
These functions access version information in an object file. The st_get_known_versions() routine returns the version stamp values (from the file /usr/include/stamp.h) that libst.a was built with. The... |
st_get_known_versions(3) -- access version information in an object file
|
These functions access version information in an object file. The st_get_known_versions() routine returns the version stamp values (from the file /usr/include/stamp.h) that libst.a was built with. The... |
st_get_mangled_name_flag(3) -- access information about the symbols in an object, and access or set symbol name demangling controls
|
These functions return information about the symbols in an object. Symbols may represent files, procedures, or local or global symbols. Return the value, type, and class of a given symbol. Returns the... |
st_get_version_byname(3) -- access version information in an object file
|
These functions access version information in an object file. The st_get_known_versions() routine returns the version stamp values (from the file /usr/include/stamp.h) that libst.a was built with. The... |
st_is_alternate_entry(3) -- access information about the procedures in an object
|
These functions return information about a procedure or perform operations on the procedures in an object or file: Determines whether the specified procedure is an alternate entry or nested routine. R... |
st_is_file_locally_stripped(3) -- access information about the files in an object
|
All of the functions described in this reference page return information about the files in an object: Identifies the source language (for example, C++) of the specified file. Returns a pointer to a n... |
st_is_obj_archive(3) -- routines to check whether an object is an archive and to process object files within an archive
|
The st_obj_open() function opens the named object file for read access. It maps the file in memory using mmap(), if possible. If mmap() fails, it dynamically allocates memory in which to read the file... |
st_is_obj_call_shared(3) -- general calls for accessing information about an object file
|
These routines return information about an object: Determine whether the specified object is a call-shared object, a nonshared object, or a shared library. Determines whether the symbol table has been... |
st_is_obj_shared(3) -- general calls for accessing information about an object file
|
These routines return information about an object: Determine whether the specified object is a call-shared object, a nonshared object, or a shared library. Determines whether the symbol table has been... |
st_is_obj_stripped(3) -- general calls for accessing information about an object file
|
These routines return information about an object: Determine whether the specified object is a call-shared object, a nonshared object, or a shared library. Determines whether the symbol table has been... |
st_is_sym_global(3) -- access information about the symbols in an object, and access or set symbol name demangling controls
|
These functions return information about the symbols in an object. Symbols may represent files, procedures, or local or global symbols. Return the value, type, and class of a given symbol. Returns the... |
st_is_sym_local(3) -- access information about the symbols in an object, and access or set symbol name demangling controls
|
These functions return information about the symbols in an object. Symbols may represent files, procedures, or local or global symbols. Return the value, type, and class of a given symbol. Returns the... |
st_is_sym_weak(3) -- access information about the symbols in an object, and access or set symbol name demangling controls
|
These functions return information about the symbols in an object. Symbols may represent files, procedures, or local or global symbols. Return the value, type, and class of a given symbol. Returns the... |
st_lang_str(3) -- translate symbol table codes to printable strings
|
These functions are used to get a printable string corresponding to an encoded value in an object file's symbol table. The st_lang_str() function determines the source language for a file. The st_typ... |
st_mem_get_format_versions(3) -- access version information in an object file
|
These functions access version information in an object file. The st_get_known_versions() routine returns the version stamp values (from the file /usr/include/stamp.h) that libst.a was built with. The... |
st_mem_get_version_byname(3) -- access version information in an object file
|
These functions access version information in an object file. The st_get_known_versions() routine returns the version stamp values (from the file /usr/include/stamp.h) that libst.a was built with. The... |
st_object_type(3) -- routines to check whether an object is an archive and to process object files within an archive
|
The st_obj_open() function opens the named object file for read access. It maps the file in memory using mmap(), if possible. If mmap() fails, it dynamically allocates memory in which to read the file... |
st_objlist_append(3) -- create, close, or perform operations on object lists
|
These functions create, close, or perform operations on object lists: Either creates a list of objects or appends an object to an existing object list. It either creates a new object list (when you sp... |
st_objlist_close(3) -- create, close, or perform operations on object lists
|
These functions create, close, or perform operations on object lists: Either creates a list of objects or appends an object to an existing object list. It either creates a new object list (when you sp... |
st_objlist_delete(3) -- create, close, or perform operations on object lists
|
These functions create, close, or perform operations on object lists: Either creates a list of objects or appends an object to an existing object list. It either creates a new object list (when you sp... |
st_objlist_external_name_sym(3) -- create, close, or perform operations on object lists
|
These functions create, close, or perform operations on object lists: Either creates a list of objects or appends an object to an existing object list. It either creates a new object list (when you sp... |
st_objlist_first(3) -- create, close, or perform operations on object lists
|
These functions create, close, or perform operations on object lists: Either creates a list of objects or appends an object to an existing object list. It either creates a new object list (when you sp... |
st_objlist_last(3) -- create, close, or perform operations on object lists
|
These functions create, close, or perform operations on object lists: Either creates a list of objects or appends an object to an existing object list. It either creates a new object list (when you sp... |
st_obj_bss_size(3) -- general calls for accessing information about an object file
|
These routines return information about an object: Determine whether the specified object is a call-shared object, a nonshared object, or a shared library. Determines whether the symbol table has been... |
st_obj_bss_start(3) -- general calls for accessing information about an object file
|
These routines return information about an object: Determine whether the specified object is a call-shared object, a nonshared object, or a shared library. Determines whether the symbol table has been... |
st_obj_calls(3) -- general calls for accessing information about an object file
|
These routines return information about an object: Determine whether the specified object is a call-shared object, a nonshared object, or a shared library. Determines whether the symbol table has been... |
st_obj_close(3) -- routines to check whether an object is an archive and to process object files within an archive
|
The st_obj_open() function opens the named object file for read access. It maps the file in memory using mmap(), if possible. If mmap() fails, it dynamically allocates memory in which to read the file... |
st_obj_cm_setup(3) -- access and modify comment section information in an object file
|
These functions are used to read, create or modify comment section data. Return an opaque handle for the comment section to the cmscn parameter. You can use this handle as an input argument in subsequ... |
st_obj_data_size(3) -- general calls for accessing information about an object file
|
These routines return information about an object: Determine whether the specified object is a call-shared object, a nonshared object, or a shared library. Determines whether the symbol table has been... |
st_obj_data_start(3) -- general calls for accessing information about an object file
|
These routines return information about an object: Determine whether the specified object is a call-shared object, a nonshared object, or a shared library. Determines whether the symbol table has been... |
st_obj_esym_count(3) -- access information about an object's files, procedures, and symbols
|
An object or executable can contain multiple files, procedures, and symbols. These routines provide the interface for accessing each of these entities sequentially. Separate interfaces are provided to... |
st_obj_esym_next(3) -- access information about an object's files, procedures, and symbols
|
An object or executable can contain multiple files, procedures, and symbols. These routines provide the interface for accessing each of these entities sequentially. Separate interfaces are provided to... |
st_obj_esym_start(3) -- access information about an object's files, procedures, and symbols
|
An object or executable can contain multiple files, procedures, and symbols. These routines provide the interface for accessing each of these entities sequentially. Separate interfaces are provided to... |
st_obj_file_count(3) -- access information about an object's files, procedures, and symbols
|
An object or executable can contain multiple files, procedures, and symbols. These routines provide the interface for accessing each of these entities sequentially. Separate interfaces are provided to... |
st_obj_file_next(3) -- access information about an object's files, procedures, and symbols
|
An object or executable can contain multiple files, procedures, and symbols. These routines provide the interface for accessing each of these entities sequentially. Separate interfaces are provided to... |
st_obj_file_start(3) -- access information about an object's files, procedures, and symbols
|
An object or executable can contain multiple files, procedures, and symbols. These routines provide the interface for accessing each of these entities sequentially. Separate interfaces are provided to... |
st_obj_libnames(3) -- general calls for accessing information about an object file
|
These routines return information about an object: Determine whether the specified object is a call-shared object, a nonshared object, or a shared library. Determines whether the symbol table has been... |
st_obj_lsym_count(3) -- access information about an object's files, procedures, and symbols
|
An object or executable can contain multiple files, procedures, and symbols. These routines provide the interface for accessing each of these entities sequentially. Separate interfaces are provided to... |
st_obj_lsym_next(3) -- access information about an object's files, procedures, and symbols
|
An object or executable can contain multiple files, procedures, and symbols. These routines provide the interface for accessing each of these entities sequentially. Separate interfaces are provided to... |
st_obj_lsym_start(3) -- access information about an object's files, procedures, and symbols
|
An object or executable can contain multiple files, procedures, and symbols. These routines provide the interface for accessing each of these entities sequentially. Separate interfaces are provided to... |
st_obj_mem_addr(3) -- general calls for accessing information about an object file
|
These routines return information about an object: Determine whether the specified object is a call-shared object, a nonshared object, or a shared library. Determines whether the symbol table has been... |
st_obj_name(3) -- general calls for accessing information about an object file
|
These routines return information about an object: Determine whether the specified object is a call-shared object, a nonshared object, or a shared library. Determines whether the symbol table has been... |
st_obj_open(3) -- routines to check whether an object is an archive and to process object files within an archive
|
The st_obj_open() function opens the named object file for read access. It maps the file in memory using mmap(), if possible. If mmap() fails, it dynamically allocates memory in which to read the file... |
st_obj_path(3) -- general calls for accessing information about an object file
|
These routines return information about an object: Determine whether the specified object is a call-shared object, a nonshared object, or a shared library. Determines whether the symbol table has been... |
st_obj_proc_count(3) -- access information about an object's files, procedures, and symbols
|
An object or executable can contain multiple files, procedures, and symbols. These routines provide the interface for accessing each of these entities sequentially. Separate interfaces are provided to... |
st_obj_proc_has_ppod(3) -- access and modify optimization symbol table information in an object file
|
These functions are used to read, create, or modify optimization symbol table data. The optimization symbol table is a part of an object file that contains the ppod table. The term, ppod, refers to Pe... |
st_obj_proc_next(3) -- access information about an object's files, procedures, and symbols
|
An object or executable can contain multiple files, procedures, and symbols. These routines provide the interface for accessing each of these entities sequentially. Separate interfaces are provided to... |
st_obj_proc_pp(3) -- access and modify optimization symbol table information in an object file
|
These functions are used to read, create, or modify optimization symbol table data. The optimization symbol table is a part of an object file that contains the ppod table. The term, ppod, refers to Pe... |
st_obj_proc_start(3) -- access information about an object's files, procedures, and symbols
|
An object or executable can contain multiple files, procedures, and symbols. These routines provide the interface for accessing each of these entities sequentially. Separate interfaces are provided to... |
st_obj_pt_setup(3) -- access and modify optimization symbol table information in an object file
|
These functions are used to read, create, or modify optimization symbol table data. The optimization symbol table is a part of an object file that contains the ppod table. The term, ppod, refers to Pe... |
st_obj_rpath(3) -- general calls for accessing information about an object file
|
These routines return information about an object: Determine whether the specified object is a call-shared object, a nonshared object, or a shared library. Determines whether the symbol table has been... |
st_obj_soname(3) -- general calls for accessing information about an object file
|
These routines return information about an object: Determine whether the specified object is a call-shared object, a nonshared object, or a shared library. Determines whether the symbol table has been... |
st_obj_sym_count(3) -- access information about an object's files, procedures, and symbols
|
An object or executable can contain multiple files, procedures, and symbols. These routines provide the interface for accessing each of these entities sequentially. Separate interfaces are provided to... |
st_obj_sym_next(3) -- access information about an object's files, procedures, and symbols
|
An object or executable can contain multiple files, procedures, and symbols. These routines provide the interface for accessing each of these entities sequentially. Separate interfaces are provided to... |
st_obj_sym_start(3) -- access information about an object's files, procedures, and symbols
|
An object or executable can contain multiple files, procedures, and symbols. These routines provide the interface for accessing each of these entities sequentially. Separate interfaces are provided to... |
st_obj_text_size(3) -- general calls for accessing information about an object file
|
These routines return information about an object: Determine whether the specified object is a call-shared object, a nonshared object, or a shared library. Determines whether the symbol table has been... |
st_obj_text_start(3) -- general calls for accessing information about an object file
|
These routines return information about an object: Determine whether the specified object is a call-shared object, a nonshared object, or a shared library. Determines whether the symbol table has been... |
st_outer_proc_end_line(3) -- access information about the procedures in an object
|
These functions return information about a procedure or perform operations on the procedures in an object or file: Determines whether the specified procedure is an alternate entry or nested routine. R... |
st_ppod_data(3) -- access and modify optimization symbol table information in an object file
|
These functions are used to read, create, or modify optimization symbol table data. The optimization symbol table is a part of an object file that contains the ppod table. The term, ppod, refers to Pe... |
st_ppod_print(3) -- access and modify optimization symbol table information in an object file
|
These functions are used to read, create, or modify optimization symbol table data. The optimization symbol table is a part of an object file that contains the ppod table. The term, ppod, refers to Pe... |
st_ppod_tag(3) -- access and modify optimization symbol table information in an object file
|
These functions are used to read, create, or modify optimization symbol table data. The optimization symbol table is a part of an object file that contains the ppod table. The term, ppod, refers to Pe... |
st_pp_add(3) -- access and modify optimization symbol table information in an object file
|
These functions are used to read, create, or modify optimization symbol table data. The optimization symbol table is a part of an object file that contains the ppod table. The term, ppod, refers to Pe... |
st_pp_append(3) -- access and modify optimization symbol table information in an object file
|
These functions are used to read, create, or modify optimization symbol table data. The optimization symbol table is a part of an object file that contains the ppod table. The term, ppod, refers to Pe... |
st_pp_delete(3) -- access and modify optimization symbol table information in an object file
|
These functions are used to read, create, or modify optimization symbol table data. The optimization symbol table is a part of an object file that contains the ppod table. The term, ppod, refers to Pe... |
st_pp_find_tag(3) -- access and modify optimization symbol table information in an object file
|
These functions are used to read, create, or modify optimization symbol table data. The optimization symbol table is a part of an object file that contains the ppod table. The term, ppod, refers to Pe... |
st_pp_next(3) -- access and modify optimization symbol table information in an object file
|
These functions are used to read, create, or modify optimization symbol table data. The optimization symbol table is a part of an object file that contains the ppod table. The term, ppod, refers to Pe... |
st_pp_print(3) -- access and modify optimization symbol table information in an object file
|
These functions are used to read, create, or modify optimization symbol table data. The optimization symbol table is a part of an object file that contains the ppod table. The term, ppod, refers to Pe... |
st_pp_start(3) -- access and modify optimization symbol table information in an object file
|
These functions are used to read, create, or modify optimization symbol table data. The optimization symbol table is a part of an object file that contains the ppod table. The term, ppod, refers to Pe... |
st_proc_addr(3) -- access information about the procedures in an object
|
These functions return information about a procedure or perform operations on the procedures in an object or file: Determines whether the specified procedure is an alternate entry or nested routine. R... |
st_proc_end_line(3) -- access information about the procedures in an object
|
These functions return information about a procedure or perform operations on the procedures in an object or file: Determines whether the specified procedure is an alternate entry or nested routine. R... |
st_proc_end_sym(3) -- access information about the symbols in an object, and access or set symbol name demangling controls
|
These functions return information about the symbols in an object. Symbols may represent files, procedures, or local or global symbols. Return the value, type, and class of a given symbol. Returns the... |
st_proc_has_ppod(3) -- access and modify optimization symbol table information in an object file
|
These functions are used to read, create, or modify optimization symbol table data. The optimization symbol table is a part of an object file that contains the ppod table. The term, ppod, refers to Pe... |
st_proc_name(3) -- access information about the procedures in an object
|
These functions return information about a procedure or perform operations on the procedures in an object or file: Determines whether the specified procedure is an alternate entry or nested routine. R... |
st_proc_pp(3) -- access and modify optimization symbol table information in an object file
|
These functions are used to read, create, or modify optimization symbol table data. The optimization symbol table is a part of an object file that contains the ppod table. The term, ppod, refers to Pe... |
st_proc_sort(3) -- access information about the procedures in an object
|
These functions return information about a procedure or perform operations on the procedures in an object or file: Determines whether the specified procedure is an alternate entry or nested routine. R... |
st_proc_sorted_next(3) -- access information about the procedures in an object
|
These functions return information about a procedure or perform operations on the procedures in an object or file: Determines whether the specified procedure is an alternate entry or nested routine. R... |
st_proc_sorted_start(3) -- access information about the procedures in an object
|
These functions return information about a procedure or perform operations on the procedures in an object or file: Determines whether the specified procedure is an alternate entry or nested routine. R... |
st_proc_start_line(3) -- access information about the procedures in an object
|
These functions return information about a procedure or perform operations on the procedures in an object or file: Determines whether the specified procedure is an alternate entry or nested routine. R... |
st_proc_sym(3) -- access information about the procedures in an object
|
These functions return information about a procedure or perform operations on the procedures in an object or file: Determines whether the specified procedure is an alternate entry or nested routine. R... |
st_proc_to_file(3) -- access information about the procedures in an object
|
These functions return information about a procedure or perform operations on the procedures in an object or file: Determines whether the specified procedure is an alternate entry or nested routine. R... |
st_proc_to_obj(3) -- create, close, or perform operations on object lists
|
These functions create, close, or perform operations on object lists: Either creates a list of objects or appends an object to an existing object list. It either creates a new object list (when you sp... |
st_pt_cleanup(3) -- access and modify optimization symbol table information in an object file
|
These functions are used to read, create, or modify optimization symbol table data. The optimization symbol table is a part of an object file that contains the ppod table. The term, ppod, refers to Pe... |
st_pt_layout(3) -- access and modify optimization symbol table information in an object file
|
These functions are used to read, create, or modify optimization symbol table data. The optimization symbol table is a part of an object file that contains the ppod table. The term, ppod, refers to Pe... |
st_pt_next(3) -- access and modify optimization symbol table information in an object file
|
These functions are used to read, create, or modify optimization symbol table data. The optimization symbol table is a part of an object file that contains the ppod table. The term, ppod, refers to Pe... |
st_pt_setup(3) -- access and modify optimization symbol table information in an object file
|
These functions are used to read, create, or modify optimization symbol table data. The optimization symbol table is a part of an object file that contains the ppod table. The term, ppod, refers to Pe... |
st_pt_start(3) -- access and modify optimization symbol table information in an object file
|
These functions are used to read, create, or modify optimization symbol table data. The optimization symbol table is a part of an object file that contains the ppod table. The term, ppod, refers to Pe... |
st_set_mangled_name_flag(3) -- access information about the symbols in an object, and access or set symbol name demangling controls
|
These functions return information about the symbols in an object. Symbols may represent files, procedures, or local or global symbols. Return the value, type, and class of a given symbol. Returns the... |
st_strerror(3) -- translate a libst return code to a printable error message
|
The st_strerror() function translates a libst error code to a printable error message and copies that error message to the memory region addressed by the buf parameter. If the error message exceeds th... |
st_sym_class(3) -- access information about the symbols in an object, and access or set symbol name demangling controls
|
These functions return information about the symbols in an object. Symbols may represent files, procedures, or local or global symbols. Return the value, type, and class of a given symbol. Returns the... |
st_sym_name(3) -- access information about the symbols in an object, and access or set symbol name demangling controls
|
These functions return information about the symbols in an object. Symbols may represent files, procedures, or local or global symbols. Return the value, type, and class of a given symbol. Returns the... |
st_sym_name_copy(3) -- access information about the symbols in an object, and access or set symbol name demangling controls
|
These functions return information about the symbols in an object. Symbols may represent files, procedures, or local or global symbols. Return the value, type, and class of a given symbol. Returns the... |
st_sym_size(3) -- access information about the symbols in an object, and access or set symbol name demangling controls
|
These functions return information about the symbols in an object. Symbols may represent files, procedures, or local or global symbols. Return the value, type, and class of a given symbol. Returns the... |
st_sym_to_file(3) -- access information about the symbols in an object, and access or set symbol name demangling controls
|
These functions return information about the symbols in an object. Symbols may represent files, procedures, or local or global symbols. Return the value, type, and class of a given symbol. Returns the... |
st_sym_to_obj(3) -- create, close, or perform operations on object lists
|
These functions create, close, or perform operations on object lists: Either creates a list of objects or appends an object to an existing object list. It either creates a new object list (when you sp... |
st_sym_to_outer_scope_sym(3) -- access information about the symbols in an object, and access or set symbol name demangling controls
|
These functions return information about the symbols in an object. Symbols may represent files, procedures, or local or global symbols. Return the value, type, and class of a given symbol. Returns the... |
st_sym_type(3) -- access information about the symbols in an object, and access or set symbol name demangling controls
|
These functions return information about the symbols in an object. Symbols may represent files, procedures, or local or global symbols. Return the value, type, and class of a given symbol. Returns the... |
st_sym_value(3) -- access information about the symbols in an object, and access or set symbol name demangling controls
|
These functions return information about the symbols in an object. Symbols may represent files, procedures, or local or global symbols. Return the value, type, and class of a given symbol. Returns the... |
st_text_addr_to_sym(3) -- convert an address in an object to a file handle, procedure handle, line number, or symbol handle an...
|
These functions convert an address in an object to a file handle, procedure handle, line number, or symbol handle and offset: Returns the file handle corresponding to the specified text address. Retur... |
st_type_str(3) -- translate symbol table codes to printable strings
|
These functions are used to get a printable string corresponding to an encoded value in an object file's symbol table. The st_lang_str() function determines the source language for a file. The st_typ... |
subpad(3) -- Routines that create and display Curses pads
|
The newpad routine creates and returns a pointer to a new pad data structure with the given number of lines, nlines, and columns, ncols. A pad is like a window, except that a pad is not necessarily as... |
subwin(3) -- Routines that create Curses windows
|
The newwin routine creates and returns a pointer to a new window with the given number of lines, nlines, and columns, ncols. The upper left-hand corner of the window is at line begin_y and column begi... |
svcerr_auth(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svcerr_decode(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svcerr_noproc(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svcerr_noprog(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svcerr_progvers(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svcerr_systemerr(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svcerr_weakauth(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svcfd_create(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svcraw_create(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svctcp_create(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svcudp_create(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_destroy(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_fdset(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_freeargs(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_getargs(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_getcaller(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_getreq(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_getreqset(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_register(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_run(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_sendreply(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_unregister(3) -- library routines for ONC server remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
swab(3) -- Swap bytes
|
The swab() function copies the number of bytes specified by the nbytes parameter from the location pointed to by the src parameter to the array pointed to by the dest parameter, exchanging adjacent by... |
swprintf(3) -- Print formatted output for wide characters
|
The wprintf() function converts, formats, and writes its value parameters, under control of the format parameter, to the standard output stream stdout. The fwprintf() function converts, formats, and w... |
swscanf(3) -- Convert formatted wide-character input
|
The wscanf(), fwscanf(), and swscanf() functions read wide-character data, interpret it according to a format, and store the converted results into specified memory locations. The format parameter con... |
syncok(3) -- Routines that create Curses windows
|
The newwin routine creates and returns a pointer to a new window with the given number of lines, nlines, and columns, ncols. The upper left-hand corner of the window is at line begin_y and column begi... |
sysconf(3) -- Get configurable system variables
|
The sysconf() function provides a method for the application to determine the current value of a configurable system limit or whether optional features are supported. The following is a list of system... |
syslog(3) -- Control system log
|
The syslog() function writes messages to the system log maintained by the syslogd daemon. The syslogd daemon reads messages and writes them to the system console or to a log file, or forwards them to ... |
syslog_r(3) -- Control system log
|
The syslog() function writes messages to the system log maintained by the syslogd daemon. The syslogd daemon reads messages and writes them to the system console or to a log file, or forwards them to ... |
system(3) -- Execute a shell command
|
The system() function passes the string parameter to the sh command, which interprets string as a command and executes it. See sh(1) to determine which command interpreter is defined by sh on your sys... |
tan(3) -- Trigonometric and inverse trigonometric functions in radian and degree calculations.
|
The sin(), sinf(), and sinl() functions compute the sine of x, measured in radians. The sind(), sindf(), and sindl() functions compute the sine of x, measured in degrees. The cos(), cosf(), and cosl()... |
tand(3) -- Trigonometric and inverse trigonometric functions in radian and degree calculations.
|
The sin(), sinf(), and sinl() functions compute the sine of x, measured in radians. The sind(), sindf(), and sindl() functions compute the sine of x, measured in degrees. The cos(), cosf(), and cosl()... |
tanh(3) -- Hyperbolic functions
|
The sinh(), sinhf(), and sinhl() functions compute the hyperbolic sine of x. Both sinh(x), sinhf(x), and sinhl(x) are defined as (exp(x) - exp(-x))/2. The cosh(), coshf(), and coshl() functions comput... |
tcdrain(3) -- Wait for output to complete
|
The tcdrain() function waits until all output written to the object referred to by the filedes parameter has been transmitted. A process group is sent a SIGTTOU signal if the tcdrain() function is cal... |
tcflow(3) -- Perform flow control functions
|
The tcflow() function suspends transmission or reception of data on the object referred to by the filedes parameter, depending on the value of the action parameter. A process group is sent a SIGTTOU s... |
tcflush(3) -- Flush nontransmitted output data or nonread input data
|
The tcflush() function discards any data written to the object referred to by the filedes parameter, or data received but not read by the object referred to by filedes, depending on the value of the q... |
tcgetattr(3) -- Get the parameters associated with the terminal
|
The tcgetattr() function gets the parameters associated with the object referenced by the filedes parameter and stores them in the termios structure referenced by the termios_p parameter. If the devic... |
tcgetpgrp(3) -- Get foreground process group ID
|
The tcgetpgrp() function returns the value of the process group ID of the foreground process group associated with the terminal. The function can be called from a background process; however, the info... |
tcgetsid(3) -- returns the session ID of the terminal
|
The tcgetsid() routine is a part of the general terminal interface. This routine obtains the session ID of the terminal as specified by the fildes parameter. |
tcsendbreak(3) -- Send a break on an asynchronous serial data line
|
If the terminal is using asynchronous serial data transmission, the tcsendbreak() function causes transmission of a continuous stream of zero-valued bits for a specific duration. If the terminal is no... |
tcsetattr(3) -- Set the parameters associated with the terminal
|
The tcsetattr() function sets the parameters associated with the terminal referred to by the open file descriptor filedes from the termios structure referenced by termios_p as follows: If optional_act... |
tcsetpgrp(3) -- Set foreground process group ID
|
If the process has a controlling terminal, the tcsetpgrp() function sets the foreground process group ID associated with the terminal to the value of the pgrp_id parameter. The file associated with th... |
tdelete(3) -- Manage binary search trees
|
The tsearch(), tfind(), tdelete() and twalk() functions are used to operate on binary search trees. Comparisons are done with a user-supplied function whose address is passed as the compar parameter i... |
telldir(3) -- Perform operations on directories
|
The opendir() function opens the directory designated by the dir_name parameter and associates a directory stream with it. The directory stream is positioned at the first entry. The type DIR, which is... |
tempnam(3) -- Construct the name for a temporary file
|
The tmpnam() and tempnam() functions generate filenames for temporary files. The tmpnam() function generates a filename using the pathname defined as P_tmpdir in the stdio.h header file. Files created... |
termattrs(3) -- Routines for querying the Curses environment
|
The baudrate routine returns the output speed of the terminal. The number returned is an integer that represents bits per second (for example, 9600). The erasechar routine returns the current erase ch... |
termcap(3x) -- Terminal independent operation routines
|
These functions extract and use capabilities from the terminal capability database termcap(4). These are low level routines; see curses(3) for a higher level package. The tgetent function extracts the... |
Terminate(3) -- Clean up module-manager-specific activities (CDSA)
|
This function performs any module-manager-specific cleanup activities in preparation for unloading of the elective module manager. |
termname(3) -- Routines for querying the Curses environment
|
The baudrate routine returns the output speed of the terminal. The number returned is an integer that represents bits per second (for example, 9600). The erasechar routine returns the current erase ch... |
term_attrs(3) -- Routines for querying the Curses environment
|
The baudrate routine returns the output speed of the terminal. The number returned is an integer that represents bits per second (for example, 9600). The erasechar routine returns the current erase ch... |
tfind(3) -- Manage binary search trees
|
The tsearch(), tfind(), tdelete() and twalk() functions are used to operate on binary search trees. Comparisons are done with a user-supplied function whose address is passed as the compar parameter i... |
tgetent(3) -- Curses interfaces that support termcap capabilities
|
These routines are obsolete and should not be used in new applications. The routines are included in the Curses library as a conversion aid for applications originally designed to use the termcap file... |
tgetent(3x) -- Terminal independent operation routines
|
These functions extract and use capabilities from the terminal capability database termcap(4). These are low level routines; see curses(3) for a higher level package. The tgetent function extracts the... |
tgetflag(3) -- Curses interfaces that support termcap capabilities
|
These routines are obsolete and should not be used in new applications. The routines are included in the Curses library as a conversion aid for applications originally designed to use the termcap file... |
tgetnum(3) -- Curses interfaces that support termcap capabilities
|
These routines are obsolete and should not be used in new applications. The routines are included in the Curses library as a conversion aid for applications originally designed to use the termcap file... |
tgetnum(3x) -- Terminal independent operation routines
|
These functions extract and use capabilities from the terminal capability database termcap(4). These are low level routines; see curses(3) for a higher level package. The tgetent function extracts the... |
tgetoption(3x) -- Terminal independent operation routines
|
These functions extract and use capabilities from the terminal capability database termcap(4). These are low level routines; see curses(3) for a higher level package. The tgetent function extracts the... |
tgetstr(3) -- Curses interfaces that support termcap capabilities
|
These routines are obsolete and should not be used in new applications. The routines are included in the Curses library as a conversion aid for applications originally designed to use the termcap file... |
tgetstr(3x) -- Terminal independent operation routines
|
These functions extract and use capabilities from the terminal capability database termcap(4). These are low level routines; see curses(3) for a higher level package. The tgetent function extracts the... |
tgoto(3) -- Curses interfaces that support termcap capabilities
|
These routines are obsolete and should not be used in new applications. The routines are included in the Curses library as a conversion aid for applications originally designed to use the termcap file... |
tgoto(3x) -- Terminal independent operation routines
|
These functions extract and use capabilities from the terminal capability database termcap(4). These are low level routines; see curses(3) for a higher level package. The tgetent function extracts the... |
threads(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. The locking_function(int mode, int n, const char *file, int line) is needed to perform ... |
tigetflag(3) -- Curses interfaces to the terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
tigetnum(3) -- Curses interfaces to the terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
tigetstr(3) -- Curses interfaces to the terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
time(3) -- Get time, converts time between time_t and time64_t
|
The time() function returns the time in seconds since the Epoch. The Epoch is referenced to 00:00:00 UTC (Coordinated Universal Time) 1 Jan 1970. The time64_t data type is a 64-bit signed value which,... |
time64(3) -- Get time, converts time between time_t and time64_t
|
The time() function returns the time in seconds since the Epoch. The Epoch is referenced to 00:00:00 UTC (Coordinated Universal Time) 1 Jan 1970. The time64_t data type is a 64-bit signed value which,... |
timeout(3) -- Curses
|
The cbreak and nocbreak routines put the terminal into and out of cbreak mode, respectively. In this mode, characters typed by the user are immediately available to the program, and erase/kill charact... |
timer_create(3) -- Allocates a per-process timer
|
The timer_create function allocates a per-process timer using the specified clock as the timing base. The timer_create function returns timer_id, which identifies the timer in timer requests. The time... |
timer_delete(3) -- Deallocates a previously allocated per-process timer (P1003.1b)
|
The timer_delete function frees a per-process timer previously allocated by a call to the timer_create function. If the timer is armed when the timer_delete function is called, the timer is disarmed a... |
timer_getoverrun(3) -- Obtains the overrun count for a specified timer
|
The timer_getoverrun function returns the overrun count for a specified timer. The count contains the number of extra timer expirations that occurred between the time the signal was queued and when it... |
timer_gettime(3) -- Obtains or sets the expiration
|
The timer_gettime function returns the amount of time remaining in the current time interval before the expiration of the specified timer. The timer_settime function sets the expiration time of the sp... |
timer_settime(3) -- Obtains or sets the expiration
|
The timer_gettime function returns the amount of time remaining in the current time interval before the expiration of the specified timer. The timer_settime function sets the expiration time of the sp... |
times(3) -- Get process and child process times
|
The times() function fills the type tms structure space pointed to by the buffer parameter with time-accounting information. All time values reported by this function are in hardware-dependent clock t... |
TIMET32TO64(3) -- Get time, converts time between time_t and time64_t
|
The time() function returns the time in seconds since the Epoch. The Epoch is referenced to 00:00:00 UTC (Coordinated Universal Time) 1 Jan 1970. The time64_t data type is a 64-bit signed value which,... |
TIMET64TO32(3) -- Get time, converts time between time_t and time64_t
|
The time() function returns the time in seconds since the Epoch. The Epoch is referenced to 00:00:00 UTC (Coordinated Universal Time) 1 Jan 1970. The time64_t data type is a 64-bit signed value which,... |
timezone(3) -- sets and accesses time zone conversion information
|
The tzset() function uses the value of the environment variable TZ to set time conversion information used by several other functions, including ctime(), ctime_r(), getdate(), getdate_r(), localtime()... |
time_lock_es(3) -- Check time-of-day locking (Enhanced Security)
|
The time_lock_es() function performs time-of-day lock checking for the current date and time against the timeof-day specification in the fd_tod string of the prpwd parameter. The function returns 1 if... |
tis(3) -- Introduction to Thread-Independent Services (tis)
|
Thread-independent services (tis) routines compose an HPproprietary interface to the DECthreads multitasking library. The tis interface provides services that assist with the development of thread-saf... |
tis_cond_broadcast(3) -- Wakes all threads that are waiting on the specified condition variable
|
When threads are not present, this routine performs no actions. When threads are present, this routine unblocks all threads waiting on the specified condition variable cond. For more information about... |
tis_cond_destroy(3) -- Destroys the specified condition variable
|
This routine destroys the condition variable specified by cond. After this routine is called, DECthreads may reclaim internal storage used by the condition variable object. Call this routine when a co... |
tis_cond_init(3) -- Initializes a condition variable
|
This routine initializes a condition variable (cond) with the DECthreads default condition variable attributes. A condition variable is a synchronization object used in conjunction with a mutex. A mut... |
tis_cond_signal(3) -- Wakes at least one thread that is waiting on the specified condition variable
|
When threads are present, this routine unblocks at least one thread that is waiting on the specified condition variable cond. When threads are not present, this routine has no effect. For more informa... |
tis_cond_timedwait(3) -- Causes a thread to wait for the specified condition variable to be signaled or broadcast, such that ...
|
If threads are not present, this function is equivalent to sleep(3). This routine causes a thread to wait until one of the following occurs: The specified condition variable is signaled or broadcast. ... |
tis_cond_wait(3) -- Causes a thread to wait for the specified condition variable to be signaled or broadcast
|
When threads are present, this routine causes a thread to wait for the specified condition variable cond to be signaled or broadcast. Calling this routine in a single-threaded environment is a coding ... |
tis_getspecific(3) -- Obtains the data associated with the
|
This routine returns the value currently bound to the specified thread-specific data key. This routine can be called from a data destructor function. When threads are present, the data and keys are th... |
tis_get_expiration(3) -- Obtains a value representing a desired expiration time
|
If threads are not present, this routine has no effect. This routine adds a specified time interval to the current absolute system time and returns a new absolute time. This new absolute time is used ... |
tis_intro(3) -- Introduction to Thread-Independent Services (tis)
|
Thread-independent services (tis) routines compose an HPproprietary interface to the DECthreads multitasking library. The tis interface provides services that assist with the development of thread-saf... |
tis_key_create(3) -- Generates a unique thread-specific data key
|
This routine generates a unique thread-specific data key. The key argument points to an opaque object used to locate data. This routine generates and returns a new key value. The key reserves a cell. ... |
tis_key_delete(3) -- Deletes the specified thread-specific data key
|
This routine deletes a thread-specific data key key previously returned by a call to the tis_key_create(3) routine. The data values associated with key need not be NULL at the time this routine is cal... |
tis_lock_global(3) -- Locks the DECthreads global mutex
|
This routine locks the DECthreads global mutex. The global mutex is recursive. For example, if you called tis_lock_global(3) three times, tis_unlock_global(3) unlocks the global mutex when you call it... |
tis_mutex_destroy(3) -- Destroys the specified mutex object
|
This routine destroys a mutex object by uninitializing it, and should be called when a mutex object is no longer referenced. After this routine is called, DECthreads can reclaim internal storage used ... |
tis_mutex_init(3) -- Initializes a mutex object
|
This routine initializes a mutex object with the DECthreads default mutex attributes. A mutex is a synchronization object that allows multiple threads to serialize their access to shared data. The mut... |
tis_mutex_lock(3) -- Locks an unlocked mutex
|
This routine locks the specified mutex mutex. A deadlock can result if the current owner of a mutex calls this routine in an attempt to lock the same mutex a second time. (DECthreads does not detect o... |
tis_mutex_trylock(3) -- Attempts to lock the specified mutex
|
This routine attempts to lock the specified mutex mutex. When this routine is called, an attempt is made immediately to lock the mutex. If the mutex is successfully locked, zero (0) is returned. If th... |
tis_mutex_unlock(3) -- Unlocks the specified mutex
|
This routine unlocks the specified mutex mutex. For more information about actions taken when threads are present, refer to the pthread_mutex_unlock description. |
tis_once(3) -- Calls an initialization routine that can be executed by only one thread, once
|
The first call to this routine by a process with a given once_control calls the init_routine with no arguments. Thereafter, subsequent calls to tis_once(3) with the same once_control do not call the i... |
tis_read_lock(3) -- Acquires a read-write lock for read access
|
This routine acquires a read-write lock for read access. This routine waits for any existing lock holder for write access to relinquish its lock before granting the lock for read access. This routine ... |
tis_read_trylock(3) -- Attempts to acquire a read-write lock for read access and does not wait if the lock cannot be immedi...
|
This routine attempts to acquire a read-write lock for read access. If the lock cannot be granted, the routine returns without waiting. When a thread calls this routine, an attempt is made to immediat... |
tis_read_unlock(3) -- Unlocks a read-write lock that was acquired for read access
|
This routine unlocks a read-write lock that was acquired for read access. If there are no other holders of the lock for read access and another thread is waiting to acquire the lock for write access, ... |
tis_rwlock_destroy(3) -- Destroys the specified read-write lock object
|
This routine destroys the specified read-write lock object. Prior to calling this routine, ensure that there are no locks granted to the specified read-write lock and that there are no threads waiting... |
tis_rwlock_init(3) -- Initializes a read-write lock object
|
This routine initializes a read-write lock object. The routine initializes the tis_rwlock_t structure that holds the object's lock states. To destroy a read-write lock object, call the tis_rwlock_des... |
tis_self(3) -- Obtains the identifier of the calling thread
|
This routine allows a thread to obtain its own thread identifier. This value becomes meaningless when the thread is destroyed. The initial thread in a process can "change identity" when thread syste... |
tis_setcancelstate(3) -- Changes the calling thread's cancelability state
|
This routine sets the calling thread's cancelability state to the value specified in the state argument and returns the calling thread's previous cancelability state in the location referenced by th... |
tis_setspecific(3) -- Changes the value associated with the
|
This routine sets the value associated with the specified thread-specific data key. If a value is defined for the key (that is, the current value is not NULL), the new value is substituted for it. The... |
tis_testcancel(3) -- Creates a cancellation point in the calling thread
|
This routine requests delivery of a pending cancellation request to the calling thread. Thus, this routine creates a cancellation point in the calling thread. The cancellation request is delivered onl... |
tis_unlock_global(3) -- Unlocks the DECthreads global mutex
|
This routine unlocks the DECthreads global mutex. Because the global mutex is recursive, the unlock occurs when each call to tis_lock_global(3) has been matched by a call to this routine. For example,... |
tis_write_lock(3) -- Acquires the specified read-write lock for write access
|
This routine acquires a read-write lock for write access. This routine waits for any other active locks (for either read or write access) to be unlocked before this acquisition request is granted. Thi... |
tis_write_trylock(3) -- Attempts to acquire the specified
|
This routine attempts to acquire a read-write lock for write access. The routine attempts to immediately acquire the lock. If the lock is acquired, zero (0) is returned. If the lock is held by another... |
tis_write_unlock(3) -- Unlocks the specified read-write lock that was acquired for write access
|
This routine unlocks a read-write lock that was acquired for write access. Upon completion of this routine, any thread waiting to acquire the lock for read access will have those acquisitions granted.... |
tmpfile(3) -- Create a temporary file
|
The tmpfile() function creates a temporary file and returns its FILE pointer. The file is opened for update. The temporary file is automatically deleted when the process using it terminates. |
tmpnam(3) -- Construct the name for a temporary file
|
The tmpnam() and tempnam() functions generate filenames for temporary files. The tmpnam() function generates a filename using the pathname defined as P_tmpdir in the stdio.h header file. Files created... |
toascii(3) -- Translate characters
|
The toascii(), tolower(), _tolower(), toupper(), and _toupper() functions translate all characters, including multibyte characters, to their specified character values. The toascii() function converts... |
tolower(3) -- Translate characters
|
The toascii(), tolower(), _tolower(), toupper(), and _toupper() functions translate all characters, including multibyte characters, to their specified character values. The toascii() function converts... |
TopLevelShell(3X) -- The TopLevelShell widget class
|
TopLevelShell is used for normal top-level windows such as any additional top-level widgets an application needs. Classes    [Toc]    [Back] TopLevelShell inherits behavior and resources from Core, Co... |
touchline(3) -- Curses routines that control refresh
|
The touchwin and touchline routines throw away all optimization information about which parts of the window have been touched, by pretending that the entire window has been drawn on. It is sometimes n... |
touchwin(3) -- Curses routines that control refresh
|
The touchwin and touchline routines throw away all optimization information about which parts of the window have been touched, by pretending that the entire window has been drawn on. It is sometimes n... |
toupper(3) -- Translate characters
|
The toascii(), tolower(), _tolower(), toupper(), and _toupper() functions translate all characters, including multibyte characters, to their specified character values. The toascii() function converts... |
towctrans(3) -- Convert a wide character according to a property defined in the current locale
|
The towctrans() function maps a wide character to its counterpart value according to a specified property, for example, tolower or toupper. Before calling towctrans(), you must call wctrans() to deter... |
towlower(3) -- Convert uppercase and lowercase wide characters
|
The towlower() function converts the uppercase wide character specified by the wc parameter into the corresponding lowercase wide character. The towupper() function converts the lowercase wide charact... |
towupper(3) -- Convert uppercase and lowercase wide characters
|
The towlower() function converts the uppercase wide character specified by the wc parameter into the corresponding lowercase wide character. The towupper() function converts the lowercase wide charact... |
tparm(3) -- Curses interfaces to the terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
tputs(3) -- Curses interfaces to the terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
tputs(3x) -- Terminal independent operation routines
|
These functions extract and use capabilities from the terminal capability database termcap(4). These are low level routines; see curses(3) for a higher level package. The tgetent function extracts the... |
TP_ApplyCrlToDb(3) -- Update persistent storage (CDSA)
|
This function updates persistent storage to reflect entries in the certificate revocation list. The TP module determines whether the memory-resident CRL is trusted, and if it should be applied to one ... |
TP_CertCreateTemplate(3) -- Allocate and initialize template memory (CDSA)
|
This function allocates and initializes memory for an encoded certificate template output in CertTemplate->Data. The template values are specified by the input OID/value pairs contained in CertFields.... |
TP_CertGetAllTemplateFields(3) -- Get CertTemplate field values (CDSA)
|
This function extracts and returns all field values from CertTemplate. The CertTemplate parameter is an unsigned certificate template in the format supported by the TP. Fields are returned as a set of... |
TP_CertGroupConstruct(3) -- Construct credential (CDSA)
|
This function builds a collection of certificates that together make up a meaningful credential for a given trust domain. For example, in a hierarchical trust domain, a certificate group is a chain of... |
TP_CertGroupPrune(3) -- Remove locally issued anchor certificates (CDSA)
|
This function removes any locally issued anchor certificates from a constructed certificate group. The prune operation can remove those certificates that have been signed by any local certificate auth... |
TP_CertGroupToTupleGroup(3) -- Create a set of authorization tuples (CDSA)
|
This function creates a set of authorization tuples based on a set of input certificates. The certificates must be of the type managed by the Trust Policy module. The trust policy module may require t... |
TP_CertGroupVerify(3) -- Determine if a certificate is trusted (CDSA)
|
This function determines whether the certificate is trusted. The actions performed by this function differ based on the trust policy domain. The factors include practices, procedures and policies defi... |
TP_CertReclaimAbort(3) -- Terminate the process of reclaiming certificates (CDSA)
|
This function terminates the iterative process of reclaiming certificates and recovering their associated private keys from a protected key cache. This function must be called even if all private keys... |
TP_CertReclaimKey(3) -- Get private key associated with a certificate (CDSA)
|
This function recovers the private key associated with a certificate and securely stores that key in the specified cryptographic service provider. The key and its associated certificate are among a se... |
TP_CertRemoveFromCrlTemplate(3) -- Determine if the revoking certificate group can remove the subject certificate group from the CRL te...
|
The TP module determines whether the revoking certificate group can remove the subject certificate group from the CRL template. The revoker certificate group is first authenticated and its applicabili... |
TP_CertRevoke(3) -- Determine if the revoking certificate group can revoke the subject certificate group (CDSA)
|
The TP module determines whether the revoking certificate group can revoke the subject certificate group. The revoker certificate group is first authenticated and its applicability to perform this ope... |
TP_CertSign(3) -- Determine if signer certificate is trusted (CDSA)
|
The TP module decides whether the signer certificate is trusted to sign the CertTemplateToBeSigned. The signer certificate group is first authenticated and its applicability to perform this operation ... |
TP_ConfirmCredResult(3) -- Confirm credentials (CDSA)
|
This function submits a vector of acknowledgements to a Certificate Authority for a set of requests and corresponding results identified by ReferenceIdentifier. The caller must execute the call sequen... |
TP_CrlCreateTemplate(3) -- Create
|
This function creates an unsigned, memory-resident CRL template. Fields in the CRL are initialized based on the descriptive data specified by the OID/value input pairs in CrlFields and the local domai... |
TP_CrlSign(3) -- Determine if signer certificate is trusted (CDSA)
|
The TP module decides whether the signer certificate is trusted to sign the entire certificate revocation list. The signer certificate group is first authenticated and its applicability to perform thi... |
TP_CrlVerify(3) -- Verify integrity of the certificate revocation list (CDSA)
|
This function verifies the integrity of the certificate revocation list and determines whether it is trusted. The conditions for trust are part of the trust policy module. It can include conditions su... |
TP_FormRequest(3) -- Get form from authority (CDSA)
|
This function returns a blank form of type FormType from an Authority. If the PreferredAuthority list is NULL, the CA module can use a default authority name and location based on FormType. The CA mod... |
TP_FormSubmit(3) -- Submit form to ClearanceAuthority (CDSA)
|
The completed Form is submitted to a ClearanceAuthority, who is acting on behalf of a RepresentedAuthority. Typically the submitted form is requesting an authorization credential required as input to ... |
TP_PassThrough(3) -- Extend trust policy functionality
|
This function allows applications to call trust policy module-specific operations that have been exported. Such operations may include queries or services specific to the domain represented by the TP ... |
TP_ReceiveConfirmation(3) -- Poll for confirmation (CDSA)
|
A certificate authority uses this function to poll for confirmation from a requester who has been served by the authority. A requester sends a confirmation to the authority by successfully invoking th... |
TP_SubmitCredRequest(3) -- Submit credential request (CDSA)
|
If the caller is successfully authenticated, then this function submits a request to the Authority identified by PreferredAuthority. The authority service can be local or remote. If the Authority is n... |
TP_TupleGroupToCertGroup(3) -- Create a set of certificate templates (CDSA)
|
This function creates a set of certificate templates based on a set of input tuples. The tuples describe a set of authorizations for one or more subjects. The trust policy service provider maps these ... |
TransientShell(3X) -- The TransientShell widget class
|
TransientShell is used for shell windows that can be manipulated by the window manager but are not allowed to be iconified separately. For example, Dialog boxes make no sense without their associated ... |
trunc(3) -- Round floatingpoint
|
The floor(), floorf(), and floorl() functions return the largest floating-point integer value less than or equal to x. The ceil(), ceilf(), and ceill() functions return the smallest floating-point int... |
tsearch(3) -- Manage binary search trees
|
The tsearch(), tfind(), tdelete() and twalk() functions are used to operate on binary search trees. Comparisons are done with a user-supplied function whose address is passed as the compar parameter i... |
ttyname(3) -- Get the name of a terminal
|
The ttyname() function gets the name of a terminal. It returns a pointer to a string containing the null-terminated pathname of the terminal device associated with the file-descriptor parameter. The i... |
ttyname_r(3) -- Get the name of a terminal
|
The ttyname() function gets the name of a terminal. It returns a pointer to a string containing the null-terminated pathname of the terminal device associated with the file-descriptor parameter. The i... |
ttyslot(3) -- Find the slot for the current user in the user accounting database
|
The ttyslot() function returns the index of the current user's entry in the user accounting database. The current user's entry is an entry for which the utline member matches the name of a terminal ... |
twalk(3) -- Manage binary search trees
|
The tsearch(), tfind(), tdelete() and twalk() functions are used to operate on binary search trees. Comparisons are done with a user-supplied function whose address is passed as the compar parameter i... |
typeahead(3) -- Curses
|
The cbreak and nocbreak routines put the terminal into and out of cbreak mode, respectively. In this mode, characters typed by the user are immediately available to the program, and erase/kill charact... |
tzname(3) -- sets and accesses time zone conversion information
|
The tzset() function uses the value of the environment variable TZ to set time conversion information used by several other functions, including ctime(), ctime_r(), getdate(), getdate_r(), localtime()... |
tzset(3) -- sets and accesses time zone conversion information
|
The tzset() function uses the value of the environment variable TZ to set time conversion information used by several other functions, including ctime(), ctime_r(), getdate(), getdate_r(), localtime()... |
t_accept(3) -- Accept a connect request
|
The t_accept() function is an XTI connection-oriented service function that is issued by a transport user to accept a connect request after a connect indication has arrived. Structures of types t_call... |
t_alloc(3) -- Allocate a library structure
|
The t_alloc() XTI memory utility function is used to dynamically allocate memory for structures required by various XTI transport interface functions. The structure to allocate is specified by a struc... |
t_bind(3) -- Bind an address to a transport endpoint
|
The t_bind() XTI function is used in connectionless and connection-oriented transport service to associate a protocol address with the transport endpoint returned by the t_open() function and to activ... |
t_close(3) -- Close a transport endpoint.
|
The t_close() XTI function is used in connection-oriented and connectionless transport service to inform a transport provider that the transport user has finished with the transport endpoint. The tran... |
t_connect(3) -- Establish a connection with another transport user
|
The t_connect() XTI function is a connection-oriented service function issued by a transport user to request connection to the specified destination transport user. By default, this function executes ... |
t_error(3) -- Produce an error message
|
The t_error() function is a general utility function used to produce an error message on the standard error output device. The error message describes the last error encountered during execution of an... |
t_free(3) -- Free a library structure
|
The t_free() function is an XTI general utility function used to deallocate memory buffers previously allocated with the t_alloc() function. When executed, t_free() deallocates memory for the named st... |
t_getinfo(3) -- Get protocol-specific information
|
The t_getinfo() function is an XTI general utility function that provides information about the underlying transport protocol associated with a file descriptor previously returned by the t_open() func... |
t_getprotaddr(3) -- Get the protocol address
|
The t_getprotaddr() function returns local and remote protocol addresses currently associated with the transport endpoint specified by fd. |
t_getstate(3) -- Get the current state of the transport provider
|
The t_getstate() function is a general utility function used to get the current state of the transport provider. The transport endpoint, which is specified by a file descriptor, is regarded as a finit... |
t_listen(3) -- Listen for a connect request
|
The t_listen() function is an XTI connection-oriented service function that listens for a connect request from a calling transport user. The transport endpoint where the connect indications arrive is ... |
t_look(3) -- Look at the current event on a transport endpoint.
|
The t_look() XTI function is used in connectionless and connection-oriented transport service to monitor the current event at the transport endpoint specified by a file descriptor previously returned ... |
t_open(3) -- Establishes a transport endpoint
|
The t_open() XTI function must be the first one called when initializing a transport endpoint. Two modes of operation may be specified, synchronous and asynchronous. In synchronous mode, a transport u... |
t_optmgmt(3) -- Manage protocol options for a transport endpoint
|
The t_optmgmt() XTI function is used in connectionless and connection-oriented transport service. The t_optmgmt() function associates specific optional parameters with a bound transport endpoint previ... |
t_rcv(3) -- Receive normal data or expedited data on a connection
|
The t_rcv() function is an XTI connection-oriented service function that is used to receive normal or expedited data. The transport endpoint through which data arrives is specified by a file descripto... |
t_rcvconnect(3) -- Receive the confirmation from a connect request
|
The t_rcvconnect() XTI function enables a calling transport user to determine the status of a previously sent connect request at a transport endpoint specified by a file descriptor returned by the t_o... |
t_rcvdis(3) -- Retrieve disconnect information
|
The t_rcvdis() XTI connection-oriented function is used to identify the cause of a disconnect at a transport endpoint specified by a file descriptor returned by the t_open() function, and to retrieve ... |
t_rcvrel(3) -- Acknowledge receipt of an orderly release indication
|
The t_rcvrel() XTI function is used in connection-oriented mode to acknowledge receipt of an orderly release indication at a transport endpoint. The released endpoint is specified by a file descriptor... |
t_rcvreldata(3) -- Receive an orderly release indication or confirmation containing user data
|
The t_rcvreldata() function is an XTI connection mode service function that is used to receive an orderly release indication for the incoming direction of data transfer and to retrieve any user data s... |
t_rcvudata(3) -- Receive a data unit
|
The t_rcvudata() function is an XTI connectionless service function that is used to receive a data unit from a remote transport provider user. By default, t_rcvudata() executes in the synchronous oper... |
t_rcvuderr(3) -- Receive a unit data error indication
|
The t_rcvuderr() function is an XTI connectionless service function that is used to retrieve information about an error indication returned when a data unit was previously sent with a t_sndudata() cal... |
t_rcvv(3) -- Receive data or expedited data sent over a connection
|
The t_rcvv() function receives data into the buffers specified by iov[0].iov_base, iov[1].iov_base, through iov[iovcount-1].iov_base, always filling one buffer before proceding to the next. Note The l... |
t_rcvvudata(3) -- Receive data or expedited data sent over a
|
The t_rcvvudata() function is an XTI connectionless service function that is used to receive a data unit from another transport user. If the limit on iovcount is exceeded, the function fails with [TBA... |
t_snd(3) -- Send normal data or expedited data over a connection
|
The t_snd() function is an XTI connection-oriented service function that is used to send normal or expedited data. The transport endpoint through which normal Transport Service Data Unit (TSDU) data o... |
t_snddis(3) -- Send a user-initiated disconnect request
|
The t_snddis() XTI connection-oriented function is used to initiate an abortive disconnect at an established transport endpoint. The transport endpoint is specified by a file descriptor returned by th... |
t_sndrel(3) -- Initiate an endpoint connect orderly release
|
The t_sndrel() XTI function is used in connection-oriented mode to initiate an orderly release at a transport endpoint specified by a file descriptor previously returned by the t_open() function. Afte... |
t_sndreldata(3) -- Initiate or respond to an orderly release with user data
|
The t_sndreldata() function is an XTI connection mode service function that is used to initiate an orderly release of the outgoing direction of data transfer and to send user data with the release. Af... |
t_sndudata(3) -- Send a data unit
|
The t_sndudata() function is an XTI connectionless service function that is used to send a data unit to a remote transport user. By default, t_sndudata() executes in the synchronous operating mode. Th... |
t_sndv(3) -- Receive data or expedited data sent over a connection
|
The t_sndv() function sends data either normal or expedited data. The data is contained in buffers iov[0], iov[1], through iov[iovcount-1]. Note The limit on the total number of bytes available in all... |
t_sndvudata(3) -- Send a data unit from one or more non-contiguous buffers
|
The t_sndvudata() function is an XTI connectionless service The data to be sent is identified by iov[0] through iov[iovcount-1]. Note The limit on the total number of bytes available in all buffers pa... |
t_strerror(3) -- Produce an error message string
|
The t_strerror() function maps the error number in errnum that corresponds to an XTI error to a language-dependent error message string and returns a pointer to the string. The string pointed to will ... |
t_sync(3) -- Synchronize transport library
|
The t_sync() XTI utility service function is used to synchronize data structures managed by the transport library with information from the underlying transport provider. The t_sync() function can be ... |
t_sysconf(3) -- Initiate or respond to an orderly release with user data
|
The t_sysconf() routine provides a method for the application to determine the current value of configurable and implementation-dependent XTI limits or options. The the minimal set of XTI system varia... |
t_unbind(3) -- Disable a transport endpoint.
|
The t_unbind() XTI service function is used in connectionoriented and connectionless modes to disable the transport endpoint, specified by the file descriptor that was previously bound by a t_bind() c... |
ualarm(3) -- Sets or changes the timeout of interval timers.
|
The alarm() function is used to obtain notification of a timeout after the number of real-time seconds specified by the seconds parameter has elapsed. At some time after seconds seconds have elapsed, ... |
Uil(3X) -- Invokes the UIL compiler from within an application
|
The Uil function provides a callable entry point for the UIL compiler. The Uil callable interface can be used to process a UIL source file and to generate UID files, as well as return a detailed descr... |
UilDumpSymbolTable(3X) -- Dumps the contents of a named UIL symbol table to standard output
|
The UilDumpSymbolTable function dumps the contents of a UIL symbol table pointer to standard output. Specifies a pointer to the symbol table root entry. This value can be taken from the parse_tree_roo... |
uitrunc(3) -- truncate a floating-point number
|
The itrunc() function returns the signed integer nearest to the double-precision floating value x in the direction of 0.0. This effectively truncates x by discarding its fraction component. The uitrun... |
ulimit(3) -- Set and gets process limits
|
The ulimit() function controls process limits. During access to remote files, the process limits of the local node are used. |
umount(3) -- Unmount a file system
|
The umount() function unmounts a previously-mounted file system contained on the block special file pointed to by the spec parameter. When the file system is unmounted, the directory mount point where... |
unctrl(3) -- Miscellaneous utility routines for Curses
|
The unctrl macro generates a character string that is a printable representation of the character c. Control characters are displayed in the ^X notation. Printing characters are displayed as is. The w... |
ungetc(3) -- Push a byte or wide-character code back into the input stream
|
The ungetc() function converts the byte specified by the c parameter into an unsigned char and inserts it into the buffer associated with the input stream specified by the stream parameter. This cause... |
ungetch(3) -- Get (or push back) characters from a Curses terminal keyboard
|
The getch, wgetch, mvgetch, and mvwgetch routines read a character from the terminal associated with the Curses window. In no-delay mode, if no input is waiting, these routines return the value ERR. I... |
ungetwc(3) -- Push a byte or wide-character code back into the input stream
|
The ungetc() function converts the byte specified by the c parameter into an unsigned char and inserts it into the buffer associated with the input stream specified by the stream parameter. This cause... |
ungetwch(3) -- Get (or push back) wchar_t characters from a Curses terminal keyboard
|
The getwch, wgetwch, mvgetwch, and mvwgetwch routines read an EUC character from the terminal associated with the Curses window, transform the character into a wchar_t character, and return the wchar_... |
unget_wch(3) -- Get (or push back) a wide character from Curses terminal keyboard
|
The get_wch, wget_wch, mvget_wch, and mvwget_wch functions read a character from the terminal associated with the current or specified window. In no-delay mode, if no input is waiting, these functions... |
unlockpt(3) -- Unlock a pseudoterminal master and slave pair
|
The unlockpt() function unlocks a slave pseudoterminal from its associated master counterpart. It does this by clearing a lock option so that the slave device can be opened. |
unordered(3) -- Related miscellaneous IEEE arithmetic functions.
|
The copysign(), copysignf(), and copysignl() functions return x with the same sign as y. IEEE 754 requires copysign(x,NaN), copysignf(x,NaN) and copysignl(x,NaN) to return +x or -x. The finite(), fini... |
untouchwin(3) -- Curses routines that control refresh
|
The touchwin and touchline routines throw away all optimization information about which parts of the window have been touched, by pretending that the entire window has been drawn on. It is sometimes n... |
unwind(3) -- routines to unwind a context
|
All of the unwind routines perform a virtual unwind. Unlike the routines described in exc_resume(3), these routines do not actually unwind a procedure call by modifying the real registers and other ma... |
UnwrapKey(3) -- Unwrap the wrapped key (CDSA)
|
This function unwraps the wrapped key using the context. The wrapped key can be a symmetric key or a private key. If the unwrapping algorithm is a symmetric algorithm, then a symmetric context must be... |
UnwrapKeyP(3) -- Unwrap the wrapped keys with privilege (CDSA)
|
This function is similar to CSSM_UnwrapKey(). It also accepts a USEE tag as a privilege request parameter. CSSM checks that either its own privilege set or the Application's privilege set (if the App... |
use_env(3) -- Miscellaneous utility routines for Curses
|
The unctrl macro generates a character string that is a printable representation of the character c. Control characters are displayed in the ^X notation. Printing characters are displayed as is. The w... |
usleep(3) -- Suspend execution for an interval of time
|
The usleep() function suspends the current process from execution for the number of microseconds specified by the useconds parameter. Because of other activity in the system, or because of the time sp... |
usr2netname(3) -- miscellaneous library routines for ONC remote procedure calls
|
The RPC routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the... |
utmpname(3) -- Access utmp file entries
|
The getutent(), getutid(), and getutline() functions return a pointer to a utmp structure. The getutent() function reads the next entry from a file similar to the utmp file. If the file is not already... |
valloc(3) -- Provide a memory allocator
|
The malloc() and free() functions provide a simple, general-purpose memory allocation package. Note See also the subsection "Using the densemalloc Library" for information on using libdensemalloc to... |
varargs(3) -- Handle a variablelength parameter list
|
NOTE: When writing new code, it is recommended that you use stdarg instead of varargs. They both perform the same function, but stdarg is standards-compliant and varargs complies only with BSD convent... |
va_arg(3) -- Handle a variablelength parameter list
|
NOTE: When writing new code, it is recommended that you use stdarg instead of varargs. They both perform the same function, but stdarg is standards-compliant and varargs complies only with BSD convent... |
va_end(3) -- Handle a variablelength parameter list
|
NOTE: When writing new code, it is recommended that you use stdarg instead of varargs. They both perform the same function, but stdarg is standards-compliant and varargs complies only with BSD convent... |
va_start(3) -- Handle a variablelength parameter list
|
NOTE: When writing new code, it is recommended that you use stdarg instead of varargs. They both perform the same function, but stdarg is standards-compliant and varargs complies only with BSD convent... |
VendorShell(3X) -- The VendorShell widget class
|
VendorShell is a Motif widget class used as a supporting superclass for all shell classes that are visible to the window manager and that are not override redirect. It contains resources that describe... |
VerifyData(3) -- Verify input buffer data (CDSA)
|
This function verifies all data contained in the set of input buffers based on the input signature. Verifying can include digesting the data and decrypting the digest (from the signature) or verifying... |
VerifyDataFinal(3) -- Finalize the staged verify data (CDSA)
|
This function finalizes the staged verify data function. |
VerifyDataInit(3) -- Initialize the staged verify data (CDSA)
|
This function initializes the staged verify data function. For staged operations, a combination operation selecting both a digesting algorithm and a verification algorithm must be specified. |
VerifyDataUpdate(3) -- Continue the staged verification (CDSA)
|
This function continues the staged verification process over all data contained in the set of input. Verification will be based on the signature presented as input when finalizing the staged verificat... |
VerifyDevice(3) -- Cause the cryptographic module to perform a self verification and integrity check (CDSA)
|
This function triggers the cryptographic module to perform self verification and integrity checking. |
VerifyMac(3) -- Verify the message authentication code (CDSA)
|
This function verifies the message authentication code over all data contained in the set of input buffers based on the input signature. |
VerifyMacFinal(3) -- Finalize the staged message authentication code (CDSA)
|
This function finalizes the staged message authentication code verification function. |
VerifyMacInit(3) -- Initialize the staged message authentication code (CDSA)
|
This function initializes the staged message authentication code verification function. |
VerifyMacUpdate(3) -- Continue the staged process of verifying the message authentication code (CDSA)
|
This function continues the staged process of verifying the message authentication code over all data in the set of input buffers. Verification will be based on the authentication code presented as in... |
versw(3) -- Check the status of an operating system version switch on a single cluster member to determine wheth...
|
The VERSW() macro and versw() function check the status of a version switch on a single cluster member to determine whether the calling application can enable new features that are incompatible with t... |
VERSW(3) -- Check the status of an operating system version switch on a single cluster member to determine wheth...
|
The VERSW() macro and versw() function check the status of a version switch on a single cluster member to determine whether the calling application can enable new features that are incompatible with t... |
vfprintf(3) -- Format a variable number of parameters for output
|
The vprintf(), vfprintf(), vsnprintf(), and vsprintf() functions format and write stdarg parameter lists. These functions are the same as the printf(), fprintf(), snprintf(), and sprintf() functions, ... |
vfwprintf(3) -- Print formatted output for wide characters from stdarg parameter list
|
The vwprintf(), vfwprintf(), and vswprintf() functions convert, format, and write stdarg parameter lists. These functions are the same as the wprintf(), fwprintf(), and swprintf() functions, respectiv... |
vidattr(3) -- Curses interfaces to the terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
vidputs(3) -- Curses interfaces to the terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
vid_attr(3) -- Curses interfaces to the terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
vid_puts(3) -- Curses interfaces to the terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
VirtualBindings(3X) -- Bindings for virtual mouse and key events
|
The 1/Motif manual pages describe translations in terms of virtual bindings, based on those described in the OSF/Motif Style Guide. Mouse events are described in terms of virtual buttons, and key even... |
vline(3) -- Create Curses borders, and horizontal and vertical lines
|
The border, wborder, and box routines draw a border around the edges of the window. Each of the following arguments contains both a character and attributes for a particular part of the border: Left s... |
vline_set(3) -- Draw borders or lines by using complex characters and renditions
|
The border_set and wborder_set functions draw a border around the edges of the current or specified window. These functions do not advance the cursor position, do not perform special character process... |
vprintf(3) -- Format a variable number of parameters for output
|
The vprintf(), vfprintf(), vsnprintf(), and vsprintf() functions format and write stdarg parameter lists. These functions are the same as the printf(), fprintf(), snprintf(), and sprintf() functions, ... |
vsnprintf(3) -- Format a variable number of parameters for output
|
The vprintf(), vfprintf(), vsnprintf(), and vsprintf() functions format and write stdarg parameter lists. These functions are the same as the printf(), fprintf(), snprintf(), and sprintf() functions, ... |
vsprintf(3) -- Format a variable number of parameters for output
|
The vprintf(), vfprintf(), vsnprintf(), and vsprintf() functions format and write stdarg parameter lists. These functions are the same as the printf(), fprintf(), snprintf(), and sprintf() functions, ... |
vswprintf(3) -- Print formatted output for wide characters from stdarg parameter list
|
The vwprintf(), vfwprintf(), and vswprintf() functions convert, format, and write stdarg parameter lists. These functions are the same as the wprintf(), fwprintf(), and swprintf() functions, respectiv... |
vwprintf(3) -- Print formatted output for wide characters from stdarg parameter list
|
The vwprintf(), vfwprintf(), and vswprintf() functions convert, format, and write stdarg parameter lists. These functions are the same as the wprintf(), fwprintf(), and swprintf() functions, respectiv... |
vwprintw(3) -- Print formatted output in Curses windows
|
The printw, wprintw, mvprintw, and mvwprintw routines are analogous to printf family of routines (see printf(3)). In effect, the printw routines output the string that would be output by printf as tho... |
vwscanw(3) -- Convert formatted input from a Curses window
|
The scanw, wscanw, and mvscanw routines correspond to scanf (see fscanf(3)). The effect of these routines is as though wgetstr were called on the window, and the resulting line were used as input for ... |
vw_printw(3) -- Print formatted output in Curses windows
|
The printw, wprintw, mvprintw, and mvwprintw routines are analogous to printf family of routines (see printf(3)). In effect, the printw routines output the string that would be output by printf as tho... |
vw_scanw(3) -- Convert formatted input from a Curses window
|
The scanw, wscanw, and mvscanw routines correspond to scanf (see fscanf(3)). The effect of these routines is as though wgetstr were called on the window, and the resulting line were used as input for ... |
waddch(3) -- Add a character (with attributes) to a Curses window and advance the cursor
|
The addch, waddch, mvaddch, and mvwaddch routines put the character ch into the window at the current cursor position of the window and advance the position of the window cursor. Their function is sim... |
waddchnstr(3) -- Add string of characters (and attributes) to a Curses window
|
All of these routines copy chstr directly into the window image structure starting at the current or specified cursor position. The four routines with n as the last argument copy at most n elements, b... |
waddchstr(3) -- Add string of characters (and attributes) to a Curses window
|
All of these routines copy chstr directly into the window image structure starting at the current or specified cursor position. The four routines with n as the last argument copy at most n elements, b... |
waddnstr(3) -- Add a string of characters to a Curses window and advance cursor
|
These routines write the characters of the character string str on the given window. The four routines with n as the last argument write at most n characters. For the other routines, the string should... |
waddnwstr(3) -- Add a string of wchar_t characters to a Curses window and advance cursor
|
These routines write all the characters of the wchar_t character string wstr on the given window. The four routines with n as the last argument write at most n wchar_t characters. For the routines wit... |
waddstr(3) -- Add a string of characters to a Curses window and advance cursor
|
These routines write the characters of the character string str on the given window. The four routines with n as the last argument write at most n characters. For the other routines, the string should... |
waddwch(3) -- Add a wchar_t character (with attributes) to a Curses window and advance cursor
|
The addwch, waddwch, mvaddwch, and mvwaddwch routines put the character wch, holding a wchar_t character, into the window at the current cursor position of the window and advance the position of the w... |
waddwchnstr(3) -- Add a string of wchar_t characters (and attributes) to a Curses window
|
All of these routines copy wchstr, which points to a string of wchar_t characters, directly into the window image structure starting at the current or specified cursor position. The four routines with... |
waddwchstr(3) -- Add a string of wchar_t characters (and attributes) to a Curses window
|
All of these routines copy wchstr, which points to a string of wchar_t characters, directly into the window image structure starting at the current or specified cursor position. The four routines with... |
waddwstr(3) -- Add a string of wchar_t characters to a Curses window and advance cursor
|
These routines write all the characters of the wchar_t character string wstr on the given window. The four routines with n as the last argument write at most n wchar_t characters. For the routines wit... |
wadd_wch(3) -- Add a complex character and rendition to a Curses window and advance the cursor
|
The add_wch, wadd_wch, mvadd_wch, and mvwadd_wch functions put the complex character wch into the window at the current or specified cursor position, of the current or specified window, and advance th... |
wadd_wchnstr(3) -- Add an array of complex characters and rendition to a Curses window
|
All of these functions copy wchstr, which points to an array of complex characters, directly into the current or specified window image structure starting at the current cursor position or the positio... |
wadd_wchstr(3) -- Add an array of complex characters and rendition to a Curses window
|
All of these functions copy wchstr, which points to an array of complex characters, directly into the current or specified window image structure starting at the current cursor position or the positio... |
wattroff(3) -- Curses character and window attribute control routines
|
These routines manipulate the current attributes of the current or specified window. The current attributes of a window are applied to all characters that are written into the window with waddch, wadd... |
wattron(3) -- Curses character and window attribute control routines
|
These routines manipulate the current attributes of the current or specified window. The current attributes of a window are applied to all characters that are written into the window with waddch, wadd... |
wattrset(3) -- Curses character and window attribute control routines
|
These routines manipulate the current attributes of the current or specified window. The current attributes of a window are applied to all characters that are written into the window with waddch, wadd... |
wattr_get(3) -- Functions that control Curses window attributes
|
These functions manipulate the attributes and color of the window rendition of the current or specified window. The current attributes of a window are applied to all characters that are written into t... |
wattr_off(3) -- Functions that control Curses window attributes
|
These functions manipulate the attributes and color of the window rendition of the current or specified window. The current attributes of a window are applied to all characters that are written into t... |
wattr_on(3) -- Functions that control Curses window attributes
|
These functions manipulate the attributes and color of the window rendition of the current or specified window. The current attributes of a window are applied to all characters that are written into t... |
wattr_set(3) -- Functions that control Curses window attributes
|
These functions manipulate the attributes and color of the window rendition of the current or specified window. The current attributes of a window are applied to all characters that are written into t... |
wbkgd(3) -- Routines for manipulating the background in a Curses window
|
The bkgdset and wbkgdset routines manipulate the background of the named window. Background is defined as chtype and consists of any combination of attributes and a character. The attribute part of th... |
wbkgdset(3) -- Routines for manipulating the background in a Curses window
|
The bkgdset and wbkgdset routines manipulate the background of the named window. Background is defined as chtype and consists of any combination of attributes and a character. The attribute part of th... |
wbkgrnd(3) -- Set or get background character and rendition by using a complex character
|
By using the information in wch, the bkgrndset and wbkgrndset functions set the background rendition and manipulate the window rendition of the current or specified window. These functions turn off th... |
wbkgrndset(3) -- Set or get background character and rendition by using a complex character
|
By using the information in wch, the bkgrndset and wbkgrndset functions set the background rendition and manipulate the window rendition of the current or specified window. These functions turn off th... |
wborder(3) -- Create Curses borders, and horizontal and vertical lines
|
The border, wborder, and box routines draw a border around the edges of the window. Each of the following arguments contains both a character and attributes for a particular part of the border: Left s... |
wborder_set(3) -- Draw borders or lines by using complex characters and renditions
|
The border_set and wborder_set functions draw a border around the edges of the current or specified window. These functions do not advance the cursor position, do not perform special character process... |
wchgat(3) -- Change renditions of characters in a Curses window
|
These functions change the renditions of the next n characters in the current or specified window (or of the remaining characters on the line if n is -1), starting at the current or specified cursor p... |
wclear(3) -- Clear all or part of a Curses window
|
The erase and werase routines copy blanks to every position in the window. The clear and wclear routines are similar to erase and werase but also call clearok. The result is that the screen is cleared... |
wclrtobot(3) -- Clear all or part of a Curses window
|
The erase and werase routines copy blanks to every position in the window. The clear and wclear routines are similar to erase and werase but also call clearok. The result is that the screen is cleared... |
wclrtoeol(3) -- Clear all or part of a Curses window
|
The erase and werase routines copy blanks to every position in the window. The clear and wclear routines are similar to erase and werase but also call clearok. The result is that the screen is cleared... |
wcolor_set(3) -- Functions that control Curses window attributes
|
These functions manipulate the attributes and color of the window rendition of the current or specified window. The current attributes of a window are applied to all characters that are written into t... |
wcrtomb(3) -- Convert a wide character into a multibyte character
|
The wctomb() function converts a wide character into a multibyte character and stores the result in s. The wctomb() function stores no more than MB_CUR_MAX bytes in s and returns the number of bytes s... |
wcscat(3) -- Perform operations on wide-character strings
|
The wcscat(), wcscmp(), and wcscpy() functions operate on null-terminated, wide-character strings. The string arguments to these functions are expected to contain a null wide character marking the end... |
wcschr(3) -- Search for the first or last occurrence
|
The wcschr() function locates the first occurrence of the widecharacter parameter in the string pointed to by the wcstring parameter. The wcsrchr() function locates the last occurrence of the widechar... |
wcscmp(3) -- Perform operations on wide-character strings
|
The wcscat(), wcscmp(), and wcscpy() functions operate on null-terminated, wide-character strings. The string arguments to these functions are expected to contain a null wide character marking the end... |
wcscoll(3) -- Compare wide-character strings by using collation information
|
The wcscoll() function compares the two wide-character strings pointed to by the wcs1 and wcs2 parameters based on the collation values specified by the LC_COLLATE category of the program's current l... |
wcscpy(3) -- Perform operations on wide-character strings
|
The wcscat(), wcscmp(), and wcscpy() functions operate on null-terminated, wide-character strings. The string arguments to these functions are expected to contain a null wide character marking the end... |
wcscspn(3) -- Return the length of the initial segment
|
The wcsspn() and wcscspn() functions compute the number of wide characters in the initial segment of a wide-character string. The wcsspn() function considers the initial segment to consist of all wide... |
wcsftime(3) -- Convert a date and time to a string
|
The strftime() function places characters into the array pointed to by the s parameter as controlled by the string pointed to by the format parameter. Local time zone information is used as though the... |
wcslen(3) -- Find length of wide-character string
|
The wcslen() function returns the number of wide characters, excluding the terminating null wide character, in the string pointed to by the wstr parameter. |
wcsncat(3) -- Perform operations on widecharacter strings with a character count
|
The wcsncat(), wcsncmp(), and wcsncpy() functions operate on null-terminated, wide-character strings. The wcsncat() function appends wide characters from the wcstring2 parameter to the end of the wcst... |
wcsncmp(3) -- Perform operations on widecharacter strings with a character count
|
The wcsncat(), wcsncmp(), and wcsncpy() functions operate on null-terminated, wide-character strings. The wcsncat() function appends wide characters from the wcstring2 parameter to the end of the wcst... |
wcsncpy(3) -- Perform operations on widecharacter strings with a character count
|
The wcsncat(), wcsncmp(), and wcsncpy() functions operate on null-terminated, wide-character strings. The wcsncat() function appends wide characters from the wcstring2 parameter to the end of the wcst... |
wcspbrk(3) -- Locate the first occurrence of a wide character
|
The wcspbrk() function locates the first occurrence in the string pointed to by the wcs1 parameter of any wide character from the string pointed to by the wcs2 parameter. |
wcsrchr(3) -- Search for the first or last occurrence
|
The wcschr() function locates the first occurrence of the widecharacter parameter in the string pointed to by the wcstring parameter. The wcsrchr() function locates the last occurrence of the widechar... |
wcsrtombs(3) -- Convert a wide-character string into
|
The wcstombs() function converts a wide-character string into a multibyte-character string and stores the result in a location pointed to by the s parameter. The wcstombs() function stores only the nu... |
wcsspn(3) -- Return the length of the initial segment
|
The wcsspn() and wcscspn() functions compute the number of wide characters in the initial segment of a wide-character string. The wcsspn() function considers the initial segment to consist of all wide... |
wcsstr(3) -- Find a wide-character substring
|
The wcsstr() function locates the first occurrence in the wide-character string pointed to by the s1 parameter of the sequence of wide characters in the wide-character string pointed to by the s2 para... |
wcstod(3) -- Convert a wide-character string to a double-precision value
|
The wcstod() function converts the initial portion of the wide-character string pointed to by the ws parameter to a double-precision floating-point value. The input widecharacter string is first broke... |
wcstok(3) -- Split wide-character strings into tokens
|
The wcstok() function splits the wide-character string pointed to by the ws1 parameter into a sequence of tokens, each of which is delimited by a wide character from the wide-character string pointed ... |
wcstok_r(3) -- Split wide-character strings into tokens
|
The wcstok() function splits the wide-character string pointed to by the ws1 parameter into a sequence of tokens, each of which is delimited by a wide character from the wide-character string pointed ... |
wcstol(3) -- Convert a wide-character string to long integer
|
The wcstol() function converts the initial portion of the wide-character string pointed to by the nptr parameter to a long integer representation. The input wide-character string is first broken down ... |
wcstold(3) -- Convert a wide-character string to a long double-precision value
|
The wcstold() function converts the initial portion of the wide-character string pointed to by the ws parameter to a long double-precision floating-point value. The input wide-character string is firs... |
wcstombs(3) -- Convert a wide-character string into
|
The wcstombs() function converts a wide-character string into a multibyte-character string and stores the result in a location pointed to by the s parameter. The wcstombs() function stores only the nu... |
wcstoul(3) -- Convert wide-character strings to unsigned long integer
|
The wcstoul() function converts the initial portion of the wide-character string pointed to by the nptr parameter to an unsigned long integer representation. The input widecharacter string is first br... |
wcswcs(3) -- Searche for a substring in a wide-character string.
|
The wcswcs() function locates the first occurrence of a wide-character string in another wide-character string. The function locates the first occurrence in the string pointed to by the wcstring1 para... |
wcswidth(3) -- Determine the display width of wide-character strings
|
The wcswidth() function determines the number of display columns to be occupied by the number of wide characters specified by the n parameter in the string pointed to by the pwcs parameter. The behavi... |
wcsxfrm(3) -- Transform wide-character strings for collation in the current locale
|
The wcsxfrm() function is used to transform the wide-character string specified by the ws2 parameter into a string of wide-character codes based on the collation values of the wide characters in the c... |
wctob(3) -- Convert a wide character to a single byte in
|
The wctob() function determines if a wide-character value constitutes a valid single-byte character in the initial shift state from a multibyte codeset. If so, the function returns the corresponding m... |
wctomb(3) -- Convert a wide character into a multibyte character
|
The wctomb() function converts a wide character into a multibyte character and stores the result in s. The wctomb() function stores no more than MB_CUR_MAX bytes in s and returns the number of bytes s... |
wctrans(3) -- Map wide characters to a property
|
The wctrans() function constructs a wctrans_t value that maps wide characters in the current locale according to the specified property. Because all locales include ASCII letter characters through the... |
wctype(3) -- Get a handle to classify wide characters
|
The wctype() function obtains a handle for valid property names for wide characters, as defined in the current locale. The handle can then be used as the wc_prop parameter in a subsequent call to the ... |
wcursyncup(3) -- Routines that create Curses windows
|
The newwin routine creates and returns a pointer to a new window with the given number of lines, nlines, and columns, ncols. The upper left-hand corner of the window is at line begin_y and column begi... |
wcwidth(3) -- Determine the display width of wide characters
|
The wcwidth() function determines the number of display columns to be occupied by the wide character specified by the wc parameter. The behavior of the wcwidth() function is determined by the LC_CTYPE... |
wdelch(3) -- Delete the character under the cursor in a Curses window
|
These routines do the following: Delete the character under the cursor in the current or specified window Move all characters that are to the right of the cursor and on the same line to the left one p... |
wdeleteln(3) -- Delete or insert lines in a Curses window
|
The deleteln and wdeleteln routines do the following: Delete the line under the cursor in the current or specified window Move all lines below the current line up one line Clear the bottom line of the... |
wechochar(3) -- Add a character (with attributes) to a Curses window and advance the cursor
|
The addch, waddch, mvaddch, and mvwaddch routines put the character ch into the window at the current cursor position of the window and advance the position of the window cursor. Their function is sim... |
wechowchar(3) -- Add a wchar_t character (with attributes) to a Curses window and advance cursor
|
The addwch, waddwch, mvaddwch, and mvwaddwch routines put the character wch, holding a wchar_t character, into the window at the current cursor position of the window and advance the position of the w... |
wecho_wchar(3) -- Add a complex character and rendition to a Curses window and advance the cursor
|
The add_wch, wadd_wch, mvadd_wch, and mvwadd_wch functions put the complex character wch into the window at the current or specified cursor position, of the current or specified window, and advance th... |
werase(3) -- Clear all or part of a Curses window
|
The erase and werase routines copy blanks to every position in the window. The clear and wclear routines are similar to erase and werase but also call clearok. The result is that the screen is cleared... |
wgetbkgrnd(3) -- Set or get background character and rendition by using a complex character
|
By using the information in wch, the bkgrndset and wbkgrndset functions set the background rendition and manipulate the window rendition of the current or specified window. These functions turn off th... |
wgetch(3) -- Get (or push back) characters from a Curses terminal keyboard
|
The getch, wgetch, mvgetch, and mvwgetch routines read a character from the terminal associated with the Curses window. In no-delay mode, if no input is waiting, these routines return the value ERR. I... |
wgetnstr(3) -- Get character strings from a Curses terminal keyboard
|
The effect of getstr is as though a series of calls to getch were made, until a newline or carriage return is received. The resulting value is placed in the area pointed to by the character pointer st... |
wgetnwstr(3) -- Get wchar_t character strings from a Curses terminal keyboard
|
The effect of getwstr is as though a series of calls to getwch were made, until a newline and carriage return is received. The resulting value is placed in the area pointed to by the wchar_t pointer w... |
wgetn_wstr(3) -- Get an array of wide characters from a Curses terminal keyboard
|
The effect of get_wstr is as though a series of calls to get_wch were made, until a newline, end-of-line, or endof-file character is processed. An end-of-file character is represented by WEOF, as defi... |
wgetstr(3) -- Get character strings from a Curses terminal keyboard
|
The effect of getstr is as though a series of calls to getch were made, until a newline or carriage return is received. The resulting value is placed in the area pointed to by the character pointer st... |
wgetwch(3) -- Get (or push back) wchar_t characters from a Curses terminal keyboard
|
The getwch, wgetwch, mvgetwch, and mvwgetwch routines read an EUC character from the terminal associated with the Curses window, transform the character into a wchar_t character, and return the wchar_... |
wgetwstr(3) -- Get wchar_t character strings from a Curses terminal keyboard
|
The effect of getwstr is as though a series of calls to getwch were made, until a newline and carriage return is received. The resulting value is placed in the area pointed to by the wchar_t pointer w... |
wget_wch(3) -- Get (or push back) a wide character from Curses terminal keyboard
|
The get_wch, wget_wch, mvget_wch, and mvwget_wch functions read a character from the terminal associated with the current or specified window. In no-delay mode, if no input is waiting, these functions... |
wget_wstr(3) -- Get an array of wide characters from a Curses terminal keyboard
|
The effect of get_wstr is as though a series of calls to get_wch were made, until a newline, end-of-line, or endof-file character is processed. An end-of-file character is represented by WEOF, as defi... |
whline(3) -- Create Curses borders, and horizontal and vertical lines
|
The border, wborder, and box routines draw a border around the edges of the window. Each of the following arguments contains both a character and attributes for a particular part of the border: Left s... |
whline_set(3) -- Draw borders or lines by using complex characters and renditions
|
The border_set and wborder_set functions draw a border around the edges of the current or specified window. These functions do not advance the cursor position, do not perform special character process... |
winch(3) -- Get a character and its attributes from a Curses window
|
These routines return the character, of type chtype, at the current position in the named window. If any attributes are set for that position, their values are combined (through an inclusive OR operat... |
winchnstr(3) -- Get a string of characters (and attributes) from a Curses window
|
These routines return a string of type chtype, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the window. The four functions ... |
winchstr(3) -- Get a string of characters (and attributes) from a Curses window
|
These routines return a string of type chtype, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the window. The four functions ... |
winnstr(3) -- Get a string of characters from a Curses window
|
These routines return the string of characters in str, starting at the current cursor position in the named window and ending at the right margin of the window. Attributes are stripped from the charac... |
winnwstr(3) -- Get a string of wchar_t characters from a Curses window
|
These routines return a string of wchar_t characters in str, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the window. The f... |
winsch(3) -- Insert a character before the character under the cursor in a Curses window
|
These routines insert the character ch before the character under the cursor. All characters to the right of the cursor are moved one space to the right, with the possibility of the rightmost characte... |
winsdelln(3) -- Delete or insert lines in a Curses window
|
The deleteln and wdeleteln routines do the following: Delete the line under the cursor in the current or specified window Move all lines below the current line up one line Clear the bottom line of the... |
winsertln(3) -- Delete or insert lines in a Curses window
|
The deleteln and wdeleteln routines do the following: Delete the line under the cursor in the current or specified window Move all lines below the current line up one line Clear the bottom line of the... |
winsnstr(3) -- Insert a string before the character under the cursor in a Curses window
|
These routines insert a character string (as many characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are moved to the right, with the ... |
winsnwstr(3) -- Insert a wchar_t string before the character under the cursor in a Curses window
|
These routines insert a wchar_t character string (as many wchar_t characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are moved to the ... |
winsstr(3) -- Insert a string before the character under the cursor in a Curses window
|
These routines insert a character string (as many characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are moved to the right, with the ... |
winstr(3) -- Get a string of characters from a Curses window
|
These routines return the string of characters in str, starting at the current cursor position in the named window and ending at the right margin of the window. Attributes are stripped from the charac... |
winswch(3) -- Insert a wchar_t character before the character under the cursor in a Curses window
|
These routines insert the character wch, which contains a wide character, before the character under the cursor. All characters to the right of the cursor are moved one space to the right, with the po... |
winswstr(3) -- Insert a wchar_t string before the character under the cursor in a Curses window
|
These routines insert a wchar_t character string (as many wchar_t characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are moved to the ... |
wins_nwstr(3) -- Insert a wide-character string into a Curses window
|
These functions insert a wchar_t character string (as many wchar_t characters as will fit on the line) in the current or specified window immediately before the current or specified position. All char... |
wins_wch(3) -- Insert a complex character and rendition before the character under the cursor in a Curses window
|
These functions insert the complex character wch, along with its rendition, in the current or specified window at the current or specified cursor position. These functions: Do not perform wrapping In ... |
wins_wstr(3) -- Insert a wide-character string into a Curses window
|
These functions insert a wchar_t character string (as many wchar_t characters as will fit on the line) in the current or specified window immediately before the current or specified position. All char... |
winwch(3) -- Get a wchar_t character and its attributes from a Curses window
|
These routines return the wide character, of type chtype, at the current or specified position in the current or specified window. If any attributes are set for that position, their values included in... |
winwchnstr(3) -- Get a string of wchar_t characters (and attributes) from a Curses window
|
These routines return a string of type chtype, holding wchar_t characters, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the... |
winwchstr(3) -- Get a string of wchar_t characters (and attributes) from a Curses window
|
These routines return a string of type chtype, holding wchar_t characters, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the... |
winwstr(3) -- Get a string of wchar_t characters from a Curses window
|
These routines return a string of wchar_t characters in str, starting at the current or specified cursor position in the current or specified window and ending at the right margin of the window. The f... |
win_wch(3) -- Input a complex character and rendition from a Curses window
|
These functions extract the complex character and rendition from the current or specified position in the current or specified window into the object pointed to by wcval. |
win_wchnstr(3) -- Input an array of complex characters and renditions from a Curses window
|
These functions extract characters from the current or specified window, starting at the current or specified position and ending at the end of the line, and place them in the array pointed to by wchs... |
win_wchstr(3) -- Input an array of complex characters and renditions from a Curses window
|
These functions extract characters from the current or specified window, starting at the current or specified position and ending at the end of the line, and place them in the array pointed to by wchs... |
wmemchr(3) -- Perform
|
The wmemcpy(), wmemchr(), wmemcmp(), wmemset(), and wmemmove() functions operate on wide-character strings in memory areas. A memory area is a group of contiguous wide characters bound by a count and ... |
wmemcmp(3) -- Perform
|
The wmemcpy(), wmemchr(), wmemcmp(), wmemset(), and wmemmove() functions operate on wide-character strings in memory areas. A memory area is a group of contiguous wide characters bound by a count and ... |
wmemcpy(3) -- Perform
|
The wmemcpy(), wmemchr(), wmemcmp(), wmemset(), and wmemmove() functions operate on wide-character strings in memory areas. A memory area is a group of contiguous wide characters bound by a count and ... |
wmemmove(3) -- Perform
|
The wmemcpy(), wmemchr(), wmemcmp(), wmemset(), and wmemmove() functions operate on wide-character strings in memory areas. A memory area is a group of contiguous wide characters bound by a count and ... |
wmemset(3) -- Perform
|
The wmemcpy(), wmemchr(), wmemcmp(), wmemset(), and wmemmove() functions operate on wide-character strings in memory areas. A memory area is a group of contiguous wide characters bound by a count and ... |
wmove(3) -- Move the Curses window cursor
|
These routines move the cursor associated with the Curses window to line y and column x. They do not move the physical cursor of the terminal until refresh is called. The specified position is relativ... |
WMShell(3X) -- The WMShell widget class
|
WMShell is a top-level widget that encapsulates the interaction with the window manager. Classes    [Toc]    [Back] WMShell inherits behavior and resources from Core, Composite, and Shell classes. The... |
wnoutrefresh(3) -- Refresh Curses windows and lines
|
Applications must call the refresh and wrefresh routines (or the wnoutrefresh and doupdate routines) to get any output on the terminal. Other Curses routines only manipulate data structures. The wrefr... |
wordexp(3) -- Perform word expansions
|
The wordexp() function performs word expansions equivalent to the word expansion that would be performed by the shell if the contents of the words parameter were arguments on the command line. The lis... |
wordfree(3) -- Perform word expansions
|
The wordexp() function performs word expansions equivalent to the word expansion that would be performed by the shell if the contents of the words parameter were arguments on the command line. The lis... |
wprintf(3) -- Print formatted output for wide characters
|
The wprintf() function converts, formats, and writes its value parameters, under control of the format parameter, to the standard output stream stdout. The fwprintf() function converts, formats, and w... |
wprintw(3) -- Print formatted output in Curses windows
|
The printw, wprintw, mvprintw, and mvwprintw routines are analogous to printf family of routines (see printf(3)). In effect, the printw routines output the string that would be output by printf as tho... |
WrapKey(3) -- Wrap a key using the context (CDSA)
|
This function wraps the supplied key using the context. It allows a key to be exported from a CSP. Four types of wrapping exist: Wrap a symmetric key with a symmetric key. Wrap a symmetric key with an... |
WrapKeyP(3) -- Wrap a key with privilege (CDSA)
|
This function is similar to CSSM_WrapKey(). It also accepts a USEE tag as a privilege request parameter. CSSM checks that either its own privilege set or the application's privilege set (if the appli... |
wredrawln(3) -- Refresh Curses windows and lines
|
Applications must call the refresh and wrefresh routines (or the wnoutrefresh and doupdate routines) to get any output on the terminal. Other Curses routines only manipulate data structures. The wrefr... |
wrefresh(3) -- Refresh Curses windows and lines
|
Applications must call the refresh and wrefresh routines (or the wnoutrefresh and doupdate routines) to get any output on the terminal. Other Curses routines only manipulate data structures. The wrefr... |
write_rnd(3) -- sets and returns IEEE dynamic rounding
|
The write_rnd() function sets the dynamic rounding mode in the floating-point control register (fpcr) for IEEE floating-point operations and returns the previous dynamic rounding mode. Dynamic roundin... |
wscanf(3) -- Convert formatted wide-character input
|
The wscanf(), fwscanf(), and swscanf() functions read wide-character data, interpret it according to a format, and store the converted results into specified memory locations. The format parameter con... |
wscanw(3) -- Convert formatted input from a Curses window
|
The scanw, wscanw, and mvscanw routines correspond to scanf (see fscanf(3)). The effect of these routines is as though wgetstr were called on the window, and the resulting line were used as input for ... |
wscrl(3) -- Scroll a Curses window
|
The scroll routine scrolls the window up one line. This involves moving the lines in the window data structure. As an optimization, if the scrolling region of the window is the entire screen, the phys... |
wsetscrreg(3) -- Routines for controlling output options for a Curses terminal
|
These routines set options that deal with output within Curses. Unless stated otherwise, all options are initially FALSE. It is not necessary to turn these options off before calling endwin. The clear... |
wstandend(3) -- Curses character and window attribute control routines
|
These routines manipulate the current attributes of the current or specified window. The current attributes of a window are applied to all characters that are written into the window with waddch, wadd... |
wstandout(3) -- Curses character and window attribute control routines
|
These routines manipulate the current attributes of the current or specified window. The current attributes of a window are applied to all characters that are written into the window with waddch, wadd... |
wsyncdown(3) -- Routines that create Curses windows
|
The newwin routine creates and returns a pointer to a new window with the given number of lines, nlines, and columns, ncols. The upper left-hand corner of the window is at line begin_y and column begi... |
wsyncup(3) -- Routines that create Curses windows
|
The newwin routine creates and returns a pointer to a new window with the given number of lines, nlines, and columns, ncols. The upper left-hand corner of the window is at line begin_y and column begi... |
wtimeout(3) -- Curses
|
The cbreak and nocbreak routines put the terminal into and out of cbreak mode, respectively. In this mode, characters typed by the user are immediately available to the program, and erase/kill charact... |
wtouchln(3) -- Curses routines that control refresh
|
The touchwin and touchline routines throw away all optimization information about which parts of the window have been touched, by pretending that the entire window has been drawn on. It is sometimes n... |
wunctrl(3) -- Miscellaneous utility routines for Curses
|
The unctrl macro generates a character string that is a printable representation of the character c. Control characters are displayed in the ^X notation. Printing characters are displayed as is. The w... |
wvline(3) -- Create Curses borders, and horizontal and vertical lines
|
The border, wborder, and box routines draw a border around the edges of the window. Each of the following arguments contains both a character and attributes for a particular part of the border: Left s... |
wvline_set(3) -- Draw borders or lines by using complex characters and renditions
|
The border_set and wborder_set functions draw a border around the edges of the current or specified window. These functions do not advance the cursor position, do not perform special character process... |
Xau(3X) -- X authority database routines
|
XauFileName generates the default authorization file name by first checking the XAUTHORITY environment variable if set, else it returns $HOME/.Xauthority. This name is statically allocated and should ... |
XauFileName(3X) -- X authority database routines
|
XauFileName generates the default authorization file name by first checking the XAUTHORITY environment variable if set, else it returns $HOME/.Xauthority. This name is statically allocated and should ... |
XauGetAuthByAddr(3X) -- X authority database routines
|
XauFileName generates the default authorization file name by first checking the XAUTHORITY environment variable if set, else it returns $HOME/.Xauthority. This name is statically allocated and should ... |
XauGetBestAuthByAddr(3X) -- X authority database routines
|
XauFileName generates the default authorization file name by first checking the XAUTHORITY environment variable if set, else it returns $HOME/.Xauthority. This name is statically allocated and should ... |
XauLockAuth(3X) -- X authority database routines
|
XauFileName generates the default authorization file name by first checking the XAUTHORITY environment variable if set, else it returns $HOME/.Xauthority. This name is statically allocated and should ... |
XauReadAuth(3X) -- X authority database routines
|
XauFileName generates the default authorization file name by first checking the XAUTHORITY environment variable if set, else it returns $HOME/.Xauthority. This name is statically allocated and should ... |
XauUnlockAuth(3X) -- X authority database routines
|
XauFileName generates the default authorization file name by first checking the XAUTHORITY environment variable if set, else it returns $HOME/.Xauthority. This name is statically allocated and should ... |
XauWriteAuth(3X) -- X authority database routines
|
XauFileName generates the default authorization file name by first checking the XAUTHORITY environment variable if set, else it returns $HOME/.Xauthority. This name is statically allocated and should ... |
xdr(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdrmem_create(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdrrec_create(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdrrec_endofrecord(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdrrec_eof(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdrrec_skiprecord(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdrstdio_create(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_accepted_reply(3) -- XDR library routines for ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
xdr_array(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_authunix_parms(3) -- XDR library routines for ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
xdr_bool(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_bytes(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_callhdr(3) -- XDR library routines for ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
xdr_callmsg(3) -- XDR library routines for ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
xdr_char(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_destroy(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_double(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_enum(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_float(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_free(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_functions(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_getpos(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_hyper(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_inline(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_int(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_long(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_longlong_t(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_opaque(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_opaque_auth(3) -- XDR library routines for ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
xdr_pmap(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_pmaplist(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_pointer(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_reference(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_rejected_reply(3) -- XDR library routines for ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
xdr_replymsg(3) -- XDR library routines for ONC remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
xdr_setpos(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_short(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_string(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_union(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_u_char(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_u_hyper(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_u_int(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_u_long(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_u_longlong_t(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_u_short(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_vector(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_void(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
xdr_wrapstring(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for ONC remote procedure calls are transmitted using the following routines: A filter pr... |
XmActivateProtocol(3X) -- A VendorShell function that activates a protocol
|
XmActivateProtocol activates a protocol. It updates the handlers and the property if the shell is realized. It is sometimes useful to allow a protocol's state information (callback lists, and so on) ... |
XmActivateWMProtocol(3X) -- A VendorShell convenience interface that activates a protocol
|
XmActivateWMProtocol is a convenience interface. It calls XmActivateProtocol with the property value set to the atom returned by interning WM_PROTOCOLS. Specifies the widget with which the protocol pr... |
XmAddProtocolCallback(3X) -- A VendorShell function that adds client callbacks for a protocol
|
XmAddProtocolCallback adds client callbacks for a protocol. It checks if the protocol is registered, and if it is not, calls XmAddProtocols. It then adds the callback to the internal list. These callb... |
XmAddProtocols(3X) -- A VendorShell function that adds the protocols to the protocol manager and allocates the internal ta...
|
XmAddProtocols adds the protocols to the protocol manager and allocates the internal tables. XmAddWMProtocols is a convenience interface. It calls XmAddProtocols with the property value set to the ato... |
XmAddTabGroup(3X) -- A function that adds a manager or a primitive widget to the list of tab groups
|
This function is obsolete and its behavior is replaced by setting XmNnavigationType to XmEXCLUSIVE_TAB_GROUP. When using the keyboard to traverse through a widget hierarchy, primitive or manager widge... |
XmAddWMProtocolCallback(3X) -- A VendorShell convenience interface that adds client callbacks for a protocol
|
XmAddWMProtocolCallback is a convenience interface. It calls XmAddProtocolCallback with the property value set to the atom returned by interning WM_PROTOCOLS. Specifies the widget with which the proto... |
XmAddWMProtocols(3X) -- A VendorShell convenience interface that adds the protocols to the protocol manager and allocates th...
|
XmAddWMProtocols is a convenience interface. It calls XmAddProtocols with the property value set to the atom returned by interning WM_PROTOCOLS. Specifies the widget with which the protocol property i... |
XmArrowButton(3X) -- The ArrowButton widget class
|
ArrowButton consists of a directional arrow surrounded by a border shadow. When it is selected, the shadow changes to give the appearance that the ArrowButton has been pressed in. When the ArrowButton... |
XmArrowButtonGadget(3X) -- The ArrowButtonGadget widget class
|
ArrowButtonGadget consists of a directional arrow surrounded by a border shadow. When it is selected, the shadow changes to give the appearance that the ArrowButtonGadget has been pressed in. When it ... |
XmBulletinBoard(3X) -- The BulletinBoard widget class
|
BulletinBoard is a composite widget that provides simple geometry management for children widgets. It does not force positioning on its children, but can be set to reject geometry requests that result... |
XmCascadeButton(3X) -- The CascadeButton widget class
|
CascadeButton links two MenuPanes or a MenuBar to a MenuPane. It is used in menu systems and must have a RowColumn parent with its XmNrowColumnType resource set to XmMENU_BAR, XmMENU_POPUP or XmMENU_P... |
XmCascadeButtonGadget(3X) -- The CascadeButtonGadget widget class
|
CascadeButtonGadget links two MenuPanes, a MenuBar to a MenuPane, or an OptionMenu to a MenuPane. It is used in menu systems and must have a RowColumn parent with its XmNrowColumnType resource set to ... |
XmCascadeButtonGadgetHighlight(3X) -- A CascadeButtonGadget function that sets the highlight state
|
XmCascadeButtonGadgetHighlight either draws or erases the shadow highlight around the CascadeButtonGadget. Specifies the CascadeButtonGadget to be highlighted or unhighlighted. Specifies whether to hi... |
XmCascadeButtonHighlight(3X) -- A CascadeButton and CascadeButtonGadget function that sets the highlight state
|
XmCascadeButtonHighlight either draws or erases the shadow highlight around the CascadeButton or the CascadeButtonGadget. Specifies the CascadeButton or CascadeButtonGadget to be highlighted or unhigh... |
XmChangeColor(3X) -- Recalculates all associated colors of a widget
|
XmChangeColor handles all color modifications for the specified widget when a new background pixel value is specified. The function recalculates the foreground, select, and shadow colors based on the ... |
XmClipboardCancelCopy(3X) -- A clipboard function that cancels a copy to the clipboard
|
XmClipboardCancelCopy cancels the copy to clipboard that is in progress and frees up temporary storage. When a copy is to be performed, XmClipboardStartCopy allocates temporary storage for the clipboa... |
XmClipboardCopy(3X) -- A clipboard function that copies a data item to temporary storage for later copying to clipboard
|
XmClipboardCopy copies a data item to temporary storage. The data item is moved from temporary storage to the clipboard data structure when a call to XmClipboardEndCopy is made. Additional calls to Xm... |
XmClipboardCopyByName(3X) -- A clipboard function that copies a data item passed by name
|
XmClipboardCopyByName copies the actual data for a data item that was previously passed by name to the clipboard. Data is considered to be passed by name when a call to XmClipboardCopy is made with a ... |
XmClipboardEndCopy(3X) -- A clipboard function that ends a copy to the clipboard
|
XmClipboardEndCopy locks the clipboard from access by other applications, places data in the clipboard data structure, and unlocks the clipboard. Data items copied to the clipboard by XmClipboardCopy ... |
XmClipboardEndRetrieve(3X) -- A clipboard function that ends a copy from the clipboard
|
XmClipboardEndRetrieve suspends copying data incrementally from the clipboard. It tells the clipboard routines that the application is through copying an item from the clipboard. Until this function i... |
XmClipboardInquireCount(3X) -- A clipboard function that returns the number of data item formats
|
XmClipboardInquireCount returns the number of data item formats available for the data item in the clipboard. This function also returns the maximum name-length for all formats in which the data item ... |
XmClipboardInquireFormat(3X) -- A clipboard function that returns a specified format name
|
XmClipboardInquireFormat returns a specified format name for the data item in the clipboard. If the name must be truncated, the function returns a warning status. Specifies a pointer to the Display st... |
XmClipboardInquireLength(3X) -- A clipboard function that returns the length of the stored data
|
XmClipboardInquireLength returns the length of the data stored under a specified format name for the clipboard data item. If no data is found for the specified format, or if there is no item on the cl... |
XmClipboardInquirePendingItems(3X) -- A clipboard function that returns a list of data_id/private_id pairs
|
XmClipboardInquirePendingItems returns a list of data_id/private_id pairs for the specified format name. A data item is considered pending if the application originally passed it by name, the applicat... |
XmClipboardLock(3X) -- A clipboard function that locks the clipboard
|
XmClipboardLock locks the clipboard from access by another application until XmClipboardUnlock is called. All clipboard functions lock and unlock the clipboard to prevent simultaneous access. This fun... |
XmClipboardRegisterFormat(3X) -- A clipboard function that registers a new format
|
XmClipboardRegisterFormat registers a new format. Each format stored on the clipboard should have a length associated with it; this length must be known to the clipboard routines. Formats are known as... |
XmClipboardRetrieve(3X) -- A clipboard function that retrieves a data item from the clipboard
|
XmClipboardRetrieve retrieves the current data item from clipboard storage. It returns a warning if the clipboard is locked; if there is no data on the clipboard; or if the data needs to be truncated ... |
XmClipboardStartCopy(3X) -- A clipboard function that sets up a storage and data structure
|
XmClipboardStartCopy sets up storage and data structures to receive clipboard data. An application calls this function during a cut or copy operation. The data item that these structures receive then ... |
XmClipboardStartRetrieve(3X) -- A clipboard function that starts a copy from the clipboard
|
XmClipboardStartRetrieve tells the clipboard routines that the application is ready to start copying an item from the clipboard. The clipboard is locked by this routine and stays locked until XmClipbo... |
XmClipboardUndoCopy(3X) -- A clipboard function that deletes the last item placed on the clipboard
|
XmClipboardUndoCopy deletes the last item placed on the clipboard if the item was placed there by an application with the passed display and window arguments. Any data item deleted from the clipboard ... |
XmClipboardUnlock(3X) -- A clipboard function that unlocks the clipboard
|
XmClipboardUnlock unlocks the clipboard, enabling it to be accessed by other applications. If multiple calls to XmClipboardLock have occurred, the same number of calls to XmClipboardUnlock is necessar... |
XmClipboardWithdrawFormat(3X) -- A clipboard function that indicates that the application no longer wants to supply a data item
|
XmClipboardWithdrawFormat indicates that the application no longer supplies a data item to the clipboard that the application had previously passed by name. Specifies a pointer to the Display structur... |
XmCommand(3X) -- The Command widget class
|
Command is a special-purpose composite widget for command entry that provides a built-in command-history mechanism. Command includes a command-line text-input field, a command-line prompt, and a comma... |
XmCommandAppendValue(3X) -- A Command function that appends the passed XmString to the end of the string displayed in the comman...
|
XmCommandAppendValue appends the passed XmString to the end of the string displayed in the command area of the Command widget. Specifies the Command widget ID Specifies the passed XmString For a compl... |
XmCommandError(3X) -- A Command function that displays an error message
|
XmCommandError displays an error message in the history area of the Command widget. The XmString error is displayed until the next command entered occurs. Specifies the Command widget ID Specifies the... |
XmCommandGetChild(3X) -- A Command function that is used to access a component
|
XmCommandGetChild is used to access a component within a Command. The parameters given to the function are the Command widget and a value indicating which component to access. Specifies the Command wi... |
XmCommandSetValue(3X) -- A Command function that replaces a displayed string
|
XmCommandSetValue replaces the string displayed in the command area of the Command widget with the passed XmString. Specifies the Command widget ID Specifies the passed XmString For a complete definit... |
XmConvertUnits(3X) -- A function that converts a value in one unit type to another unit type
|
XmConvertUnits converts the value and returns it as the return value from the function. Specifies the widget for which the data is to be converted Specifies whether the converter uses the horizontal o... |
XmCreateArrowButton(3X) -- The ArrowButton widget creation function
|
XmCreateArrowButton creates an instance of an ArrowButton widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argument li... |
XmCreateArrowButtonGadget(3X) -- The ArrowButtonGadget creation function
|
XmCreateArrowButtonGadget creates an instance of an ArrowButtonGadget widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the... |
XmCreateBulletinBoard(3X) -- The BulletinBoard widget creation function
|
XmCreateBulletinBoard creates an instance of a BulletinBoard widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argument... |
XmCreateBulletinBoardDialog(3X) -- The BulletinBoard BulletinBoardDialog convenience creation function
|
XmCreateBulletinBoardDialog is a convenience creation function that creates a DialogShell and an unmanaged BulletinBoard child of the DialogShell. A BulletinBoardDialog is used for interactions not su... |
XmCreateCascadeButton(3X) -- The CascadeButton widget creation function
|
XmCreateCascadeButton creates an instance of a CascadeButton widget and returns the associated widget ID. Specifies the parent widget ID. The parent must be a RowColumn widget. Specifies the name of t... |
XmCreateCascadeButtonGadget(3X) -- The CascadeButtonGadget creation function
|
XmCreateCascadeButtonGadget creates an instance of a CascadeButtonGadget and returns the associated widget ID. Specifies the parent widget ID. The parent must be a RowColumn widget. Specifies the name... |
XmCreateCommand(3X) -- The Command widget creation function
|
XmCreateCommand creates an instance of a Command widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argument list Specif... |
XmCreateDialogShell(3X) -- The DialogShell widget creation function
|
XmCreateDialogShell creates an instance of a DialogShell widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argument lis... |
XmCreateDragIcon(3X) -- A Drag and Drop function that creates a DragIcon widget
|
XmCreateDragIcon creates a DragIcon and returns the associated widget ID. Specifies the ID of the widget that the function uses to access default values for visual attributes of the DragIcon. This wid... |
XmCreateDrawingArea(3X) -- The DrawingArea widget creation function
|
XmCreateDrawingArea creates an instance of a DrawingArea widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argument lis... |
XmCreateDrawnButton(3X) -- The DrawnButton widget creation function
|
XmCreateDrawnButton creates an instance of a DrawnButton widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argument lis... |
XmCreateErrorDialog(3X) -- The MessageBox ErrorDialog convenience creation function
|
XmCreateErrorDialog is a convenience creation function that creates a DialogShell and an unmanaged MessageBox child of the DialogShell. An ErrorDialog warns the user of an invalid or potentially dange... |
XmCreateFileSelectionBox(3X) -- The FileSelectionBox widget creation function
|
XmCreateFileSelectionBox creates an unmanaged FileSelectionBox. A FileSelectionBox is used to select a file and includes the following: An editable text field for the directory mask A scrolling list o... |
XmCreateFileSelectionDialog(3X) -- The FileSelectionBox FileSelectionDialog convenience creation function
|
XmCreateFileSelectionDialog is a convenience creation function that creates a DialogShell and an unmanaged FileSelectionBox child of the DialogShell. A FileSelectionDialog selects a file. It includes ... |
XmCreateForm(3X) -- The Form widget creation function
|
XmCreateForm creates an instance of a Form widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argument list Specifies th... |
XmCreateFormDialog(3X) -- A Form FormDialog convenience creation function
|
XmCreateFormDialog is a convenience creation function that creates a DialogShell and an unmanaged Form child of the DialogShell. A FormDialog is used for interactions not supported by the standard dia... |
XmCreateFrame(3X) -- The Frame widget creation function
|
XmCreateFrame creates an instance of a Frame widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argument list Specifies ... |
XmCreateInformationDialog(3X) -- The MessageBox InformationDialog convenience creation function
|
XmCreateInformationDialog is a convenience creation function that creates a DialogShell and an unmanaged MessageBox child of the DialogShell. An InformationDialog gives the user information, such as t... |
XmCreateLabel(3X) -- The Label widget creation function
|
XmCreateLabel creates an instance of a Label widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argument list Specifies ... |
XmCreateLabelGadget(3X) -- The LabelGadget creation function
|
XmCreateLabelGadget creates an instance of a LabelGadget widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argument lis... |
XmCreateList(3X) -- The List widget creation function
|
XmCreateList creates an instance of a List widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argument list Specifies th... |
XmCreateMainWindow(3X) -- The MainWindow widget creation function
|
XmCreateMainWindow creates an instance of a MainWindow widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argument list ... |
XmCreateMenuBar(3X) -- A RowColumn widget convenience creation function
|
XmCreateMenuBar creates an instance of a RowColumn widget of type XmMENU_BAR and returns the associated widget ID. It is provided as a convenience function for creating RowColumn widgets configured to... |
XmCreateMenuShell(3X) -- The MenuShell widget creation function
|
XmCreateMenuShell creates an instance of a MenuShell widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argument list Sp... |
XmCreateMessageBox(3X) -- The MessageBox widget creation function
|
XmCreateMessageBox creates an unmanaged MessageBox. A MessageBox is used for common interaction tasks, which include giving information, asking questions, and reporting errors. It includes an optional... |
XmCreateMessageDialog(3X) -- The MessageBox MessageDialog convenience creation function
|
XmCreateMessageDialog is a convenience creation function that creates a DialogShell and an unmanaged MessageBox child of the DialogShell. A MessageDialog is used for common interaction tasks, which in... |
XmCreateOptionMenu(3X) -- A RowColumn widget convenience creation function
|
XmCreateOptionMenu creates an instance of a RowColumn widget of type XmMENU_OPTION and returns the associated widget ID. It is provided as a convenience function for creating a RowColumn widget config... |
XmCreatePanedWindow(3X) -- The PanedWindow widget creation function
|
XmCreatePanedWindow creates an instance of a PanedWindow widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argument lis... |
XmCreatePopupMenu(3X) -- A RowColumn widget convenience creation function
|
XmCreatePopupMenu creates an instance of a RowColumn widget of type XmMENU_POPUP and returns the associated widget ID. When using this function to create the Popup MenuPane, a MenuShell widget is auto... |
XmCreatePromptDialog(3X) -- The SelectionBox PromptDialog convenience creation function
|
XmCreatePromptDialog is a convenience creation function that creates a DialogShell and an unmanaged SelectionBox child of the DialogShell. A PromptDialog prompts the user for text input. It includes a... |
XmCreatePulldownMenu(3X) -- A RowColumn widget convenience creation function
|
XmCreatePulldownMenu creates an instance of a RowColumn widget of type XmMENU_PULLDOWN and returns the associated widget ID. When using this function to create the Pulldown MenuPane, a MenuShell widge... |
XmCreatePushButton(3X) -- The PushButton widget creation function
|
XmCreatePushButton creates an instance of a PushButton widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argument list ... |
XmCreatePushButtonGadget(3X) -- The PushButtonGadget creation function
|
XmCreatePushButtonGadget creates an instance of a PushButtonGadget widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the ar... |
XmCreateQuestionDialog(3X) -- The MessageBox QuestionDialog convenience creation function
|
XmCreateQuestionDialog is a convenience creation function that creates a DialogShell and an unmanaged MessageBox child of the DialogShell. A QuestionDialog is used to get the answer to a question from... |
XmCreateRadioBox(3X) -- A RowColumn widget convenience creation function
|
XmCreateRadioBox creates an instance of a RowColumn widget of type XmWORK_AREA and returns the associated widget ID. Typically, this is a composite widget that contains multiple ToggleButtonGadgets. T... |
XmCreateRowColumn(3X) -- The RowColumn widget creation function
|
XmCreateRowColumn creates an instance of a RowColumn widget and returns the associated widget ID. If XmNrowColumnType is not specified, then it is created with XmWORK_AREA, which is the default. If th... |
XmCreateScale(3X) -- The Scale widget creation function
|
XmCreateScale creates an instance of a Scale widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argument list Specifies ... |
XmCreateScrollBar(3X) -- The ScrollBar widget creation function
|
XmCreateScrollBar creates an instance of a ScrollBar widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argument list Sp... |
XmCreateScrolledList(3X) -- The List ScrolledList convenience creation function
|
XmCreateScrolledList creates an instance of a List widget that is contained within a ScrolledWindow. All ScrolledWindow subarea widgets are automatically created by this function. The ID returned by t... |
XmCreateScrolledText(3X) -- The TextScrolledText convenience creation function
|
XmCreateScrolledText creates an instance of a Text widget that is contained within a ScrolledWindow. All ScrolledWindow subarea widgets are automatically created by this function. The ID returned by t... |
XmCreateScrolledWindow(3X) -- The ScrolledWindow widget creation function
|
XmCreateScrolledWindow creates an instance of a ScrolledWindow widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argume... |
XmCreateSelectionBox(3X) -- The SelectionBox widget creation function
|
XmCreateSelectionBox creates an unmanaged SelectionBox. A SelectionBox is used to get a selection from a list of alternatives from the user and includes the following: A scrolling list of alternatives... |
XmCreateSelectionDialog(3X) -- The SelectionBox SelectionDialog convenience creation function
|
XmCreateSelectionDialog is a convenience creation function that creates a DialogShell and an unmanaged SelectionBox child of the DialogShell. A SelectionDialog offers the user a choice from a list of ... |
XmCreateSeparator(3X) -- The Separator widget creation function
|
XmCreateSeparator creates an instance of a Separator widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argument list Sp... |
XmCreateSeparatorGadget(3X) -- The SeparatorGadget creation function
|
XmCreateSeparatorGadget creates an instance of a SeparatorGadget widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argu... |
XmCreateSimpleCheckBox(3X) -- A RowColumn widget convenience creation function
|
XmCreateSimpleCheckBox creates an instance of a RowColumn widget of type XmWORK_AREA and returns the associated widget ID. This routine creates a CheckBox and its ToggleButtonGadget children. A CheckB... |
XmCreateSimpleMenuBar(3X) -- A RowColumn widget convenience creation function
|
XmCreateSimpleMenuBar creates an instance of a RowColumn widget of type XmMENU_BAR and returns the associated widget ID. This routine creates a MenuBar and its CascadeButtonGadget children. The name o... |
XmCreateSimpleOptionMenu(3X) -- A RowColumn widget convenience creation function
|
XmCreateSimpleOptionMenu creates an instance of a RowColumn widget of type XmMENU_OPTION and returns the associated widget ID. This routine creates an Option Menu and its submenu containing PushButton... |
XmCreateSimplePopupMenu(3X) -- A RowColumn widget convenience creation function
|
XmCreateSimplePopupMenu creates an instance of a RowColumn widget of type XmMENU_POPUP and returns the associated widget ID. This routine creates a Popup MenuPane and its button children. The name of ... |
XmCreateSimplePulldownMenu(3X) -- A RowColumn widget convenience creation function
|
XmCreateSimplePulldownMenu creates an instance of a RowColumn widget of type XmMENU_PULLDOWN and returns the associated widget ID. This routine creates a Pulldown MenuPane and its button children. The... |
XmCreateSimpleRadioBox(3X) -- A RowColumn widget convenience creation function
|
XmCreateSimpleRadioBox creates an instance of a RowColumn widget of type XmWORK_AREA and returns the associated widget ID. This routine creates a Radio Box and its ToggleButtonGadget children. The nam... |
XmCreateTemplateDialog(3X) -- A MessageBox TemplateDialog convenience creation function
|
XmCreateTemplateDialog is a convenience creation function that creates a DialogShell and an unmanaged MessageBox child of the DialogShell. The MessageBox widget's XmNdialogType resource is set to XmD... |
XmCreateText(3X) -- The Text widget creation function
|
XmCreateText creates an instance of a Text widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argument list Specifies th... |
XmCreateTextField(3X) -- The TextField widget creation function
|
XmCreateTextField creates an instance of a TextField widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argument list Sp... |
XmCreateToggleButton(3X) -- The ToggleButton widget creation function
|
XmCreateToggleButton creates an instance of a ToggleButton widget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argument l... |
XmCreateToggleButtonGadget(3X) -- The ToggleButtonGadget creation function
|
XmCreateToggleButtonGadget creates an instance of a ToggleButtonGadget and returns the associated widget ID. Specifies the parent widget ID Specifies the name of the created widget Specifies the argum... |
XmCreateWarningDialog(3X) -- The MessageBox WarningDialog convenience creation function
|
XmCreateWarningDialog is a convenience creation function that creates a DialogShell and an unmanaged MessageBox child of the DialogShell. A WarningDialog warns users of action consequences and gives t... |
XmCreateWorkArea(3X) -- A function that creates a RowColumn work area
|
XmCreateWorkArea creates an instance of a RowColumn widget and returns the associated widget ID. The widget is created with XmNrowColumnType set to XmWORK_AREA. Specifies the parent widget ID Specifie... |
XmCreateWorkingDialog(3X) -- The MessageBox WorkingDialog convenience creation function
|
XmCreateWorkingDialog is a convenience creation function that creates a DialogShell and an unmanaged MessageBox child of the DialogShell. A WorkingDialog informs users that there is a time-consuming o... |
XmCvtCTToXmString(3X) -- A compound string function that converts compound text to a compound string
|
XmCvtCTToXmString converts a (char *) string in compound text format to a compound string. The application must call XtAppInitialize before calling this function. Conversion of compound text to compou... |
XmCvtStringToUnitType(3X) -- A function that converts a string
|
XmCvtStringToUnitType converts a string to a unit type. Refer to the man pages for XmGadget(3X), XmManager(3X), or XmPrimitive(3X) for a description of the valid unit types. Use of this function as a ... |
XmCvtXmStringToCT(3X) -- A compound string function that converts a compound string to compound text
|
XmCvtXmStringToCT converts a compound string to a (char *) string in compound text format. The application must call XtAppInitialize before calling this function. The converter uses the font list tag ... |
XmDeactivateProtocol(3X) -- A VendorShell function that deactivates a protocol without removing it
|
XmDeactivateProtocol deactivates a protocol without removing it. It updates the handlers and the property, if the shell is realized. It is sometimes useful to allow a protocol's state information (ca... |
XmDeactivateWMProtocol(3X) -- A VendorShell convenience interface that deactivates a protocol without removing it
|
XmDeactivateWMProtocol is a convenience interface. It calls XmDeactivateProtocol with the property value set to the atom returned by interning WM_PROTOCOLS. Specifies the widget with which the protoco... |
XmDestroyPixmap(3X) -- A pixmap caching function that removes a pixmap from the pixmap cache
|
XmDestroyPixmap removes pixmaps that are no longer used. Pixmaps are completely freed only when there is no further reference to them. Specifies the display screen for which the pixmap was requested S... |
XmDialogShell(3X) -- The DialogShell widget class
|
Modal and modeless dialogs use DialogShell as the Shell parent. DialogShell widgets cannot be iconified. Instead, all secondary DialogShell widgets associated with an ApplicationShell widget are iconi... |
XmDisplay(3X) -- The Display widget class
|
The XmDisplay object is used by the Motif widgets to store information that is specific to a display. It also allows the toolkit to access certain information on widget hierarchies that would otherwis... |
XmDragCancel(3X) -- A Drag and Drop function that terminates a drag transaction
|
XmDragCancel terminates a drag operation and cancels any pending actions of the specified DragContext. This routine can only be called by the initiator client. Specifies the ID of the DragContext widg... |
XmDragContext(3X) -- The DragContext widget class
|
DragContexts are special widgets used in drag and drop transactions. A DragContext is implemented as a widget, but a client does not explicitly create a DragContext widget. Instead, a client initiates... |
XmDragIcon(3X) -- The DragIcon widget class
|
A DragIcon is a component of the visual used to represent the source data in a drag and drop transaction. During a drag operation, a real or simulated X cursor provides drag-over visuals consisting of... |
XmDragStart(3X) -- A Drag and Drop function that initiates a drag and drop transaction
|
XmDragStart initiates a drag operation. This routine returns the DragContext widget that it initializes for the associated drag transaction. The toolkit is responsible for freeing the DragContext when... |
XmDrawingArea(3X) -- The DrawingArea widget class
|
DrawingArea is an empty widget that is easily adaptable to a variety of purposes. It does no drawing and defines no behavior except for invoking callbacks. Callbacks notify the application when graphi... |
XmDrawnButton(3X) -- The DrawnButton widget class
|
The DrawnButton widget consists of an empty widget window surrounded by a shadow border. It provides the application developer with a graphics area that can have PushButton input semantics. Callback t... |
XmDropSite(3X) -- The DropSite Registry
|
A client registers a widget or gadget as a drop site using the XmDropSiteRegister function. In addition, this routine defines the behavior and capabilities of a drop site by specifying appropriate res... |
XmDropSiteConfigureStackingOrder(3X) -- A Drag and Drop function that reorders a stack of widgets that are registered drop sites
|
XmDropSiteConfigureStackingOrder changes the stacking order of the drop site specified by widget. The stacking order controls the manner in which drag-under effects are clipped by overlapping siblings... |
XmDropSiteEndUpdate(3X) -- A Drag and Drop function that facilitates processing updates to multiple drop sites
|
XmDropSiteEndUpdate is used in conjunction with XmDropSiteStartUpdate to process updates to multiple drop sites within the same hierarchy. XmDropSiteStartUpdate and XmDropSiteEndUpdate signal the begi... |
XmDropSiteQueryStackingOrder(3X) -- A Drag and Drop function that returns the parent, a list of children, and the number of children for...
|
XmDropSiteQueryStackingOrder obtains the parent, a list of children registered as drop sites, and the number of children registered as drop sites for a given widget. The children are listed in current... |
XmDropSiteRegister(3X) -- A Drag and Drop function that identifies a drop site and assigns resources that specify its behavior
|
XmDropSiteRegister identifies the specified widget or gadget as a drop site and sets resource values that define the drop site's behavior. The routine assigns default values to any resources that are... |
XmDropSiteRetrieve(3X) -- A Drag and Drop function that retrieves resource values set on a drop site
|
XmDropSiteRetrieve extracts values for the given resources from the drop site specified by widget. An initiator can also obtain information about the current drop site by passing the associated DragCo... |
XmDropSiteStartUpdate(3X) -- A Drag and Drop function that facilitates processing updates to multiple drop sites
|
XmDropSiteStartUpdate is used in conjunction with XmDropSiteEndUpdate to process updates to multiple drop sites within the same shell widget. XmDropSiteStartUpdate and XmDropSiteEndUpdate signal the b... |
XmDropSiteUnregister(3X) -- A Drag and Drop function that frees drop site information
|
XmDropSiteUnregister informs the toolkit that the specified widget is no longer a registered drop site. The function frees all associated drop site information. Specifies the ID of the widget, registe... |
XmDropSiteUpdate(3X) -- A Drag and Drop function that sets resource values for a drop site
|
XmDropSiteUpdate modifies drop site resources associated with the specified widget. This routine updates the drop site resources specified in the arglist. Specifies the ID of the widget registered as ... |
XmDropTransfer(3X) -- The DropTransfer widget class
|
DropTransfer provides a set of resources that identifies the procedures and associated information required by the toolkit in order to process and complete a drop transaction. Clients should not expli... |
XmDropTransferAdd(3X) -- A Drag and Drop function that enables additional drop transfer entries to be processed after initiat...
|
XmDropTransferAdd identifies a list of additional drop transfer entries to be processed after a drop transfer is started. Specifies the ID of the DropTransfer widget returned by XmDropTransferStart Sp... |
XmDropTransferStart(3X) -- A Drag and Drop function that initiates a drop transfer
|
XmDropTransferStart initiates a drop transfer and uses the specified argument list to initialize an XmDropTransfer object. The DropTransfer object can be manipulated with XtSetValues and XtGetValues u... |
XmFileSelectionBox(3X) -- The FileSelectionBox widget class
|
FileSelectionBox traverses through directories, views the files and subdirectories in them, and then selects files. A FileSelectionBox has five main areas: A text input field for displaying and editin... |
XmFileSelectionBoxGetChild(3X) -- A FileSelectionBox function used to access a component
|
XmFileSelectionBoxGetChild is used to access a component within a FileSelectionBox. The parameters given to the function are the FileSelectionBox widget and a value indicating which component to acces... |
XmFileSelectionDoSearch(3X) -- A FileSelectionBox function that initiates a directory search
|
XmFileSelectionDoSearch initiates a directory and file search in a FileSelectionBox widget. For a description of the actions that the FileSelectionBox takes when doing a search, see XmFileSelectionBox... |
XmFontList(3X) -- Data type for a font list
|
XmFontList is the data type for a font list. A font list consists of font list entries, each of which contains a font or a font set (a group of fonts) and is identified with a tag. The font list entry... |
XmFontListAdd(3X) -- A font list function that creates a new font list
|
XmFontListAdd creates a new font list consisting of the contents of the oldlist and the new font-list element being added. This function deallocates the oldlist after extracting the required informati... |
XmFontListAppendEntry(3X) -- A font list function that appends an entry to a font list
|
XmFontListAppendEntry creates a new font list that contains the contents of oldlist. This function copies the contents of the font list entry being added into this new font list. If oldlist is NULL, X... |
XmFontListCopy(3X) -- A font list function that copies a font list
|
XmFontListCopy creates a new font list consisting of the contents of the fontlist argument. Specifies a font list to be copied |
XmFontListCreate(3X) -- A font list function that creates a font list
|
XmFontListCreate creates a new font list with a single element specified by the provided font and character set. It also allocates the space for the font list. Note This function is obsolete and exist... |
XmFontListEntryCreate(3X) -- A font list function that creates a font list entry
|
XmFontListEntryCreate creates a font list entry that contains either a font or font set and is identified by a tag. Specifies a NULL terminated string for the tag of the font list entry. The tag may b... |
XmFontListEntryFree(3X) -- A font list function that recovers memory used by a font list entry
|
XmFontListEntryFree recovers memory used by a font list entry. This routine does not free the XFontSet or XFontStruct associated with the font list entry. Specifies the font list entry to be freed |
XmFontListEntryGetFont(3X) -- A font list function that retrieves font information from a font list entry
|
XmFontListEntryGetFont retrieves font information for a specified font list entry. If the font list entry contains a font, type_return returns XmFONT_IS_FONT and the function returns a pointer to an X... |
XmFontListEntryGetTag(3X) -- A font list function that retrieves the tag of a font list entry
|
XmFontListEntryGetTag retrieves a copy of the tag of the specified font list entry. This routine allocates memory for the tag string that must be freed by the application. Specifies the font list entr... |
XmFontListEntryLoad(3X) -- A font list function that loads a font or creates a font set and creates an accompanying font list e...
|
XmFontListEntryLoad loads a font or creates a font set based on the value of the type argument. It creates and returns a font list entry that contains the font or font set and the specified tag. If th... |
XmFontListFree(3X) -- A font list function that recovers memory used by a font list
|
XmFontListFree recovers memory used by a font list. This routine does not free the XFontSet or XFontStruct associated with the specified font list. Specifies the font list to be freed |
XmFontListFreeFontContext(3X) -- A font list function that instructs the toolkit that the font list context is no longer needed
|
XmFontListFreeFontContext instructs the toolkit that the context is no longer needed and will not be used without reinitialization. Specifies the font list context structure that was allocated by the ... |
XmFontListGetNextFont(3X) -- A font list function that allows applications to access the fonts and character sets in a font list
|
XmFontListGetNextFont accesses the character set and font for the next entry of the font list. The application first uses the XmFontListInitFontContext routine to create a font list context. The appli... |
XmFontListInitFontContext(3X) -- A font list function that allows applications to access the entries in a font list
|
XmFontListInitFontContext establishes a context to allow applications to access the contents of a font list. This context is used when reading the font list entry tag, font, or font set associated wit... |
XmFontListNextEntry(3X) -- A font list function that returns the next entry in a font list
|
XmFontListNextEntry returns the next entry in the font list. The application uses the XmFontListInitFontContext routine to create a font list context. The first call to XmFontListNextEntry sets the co... |
XmFontListRemoveEntry(3X) -- A font list function that removes a font list entry from a font list
|
XmFontListRemoveEntry creates a new font list that contains the contents of oldlist minus those entries specified in entry. The routine removes any entries from oldlist that match the components (tag,... |
XmForm(3X) -- The Form widget class
|
Form is a container widget with no input semantics of its own. Constraints are placed on children of the Form to define attachments for each of the child's four sides. These attachments can be to the... |
XmFrame(3X) -- The Frame widget class
|
Frame is a very simple manager used to enclose a single work area child in a border drawn by Frame. It uses the Manager class resources for border drawing and performs geometry management so that its ... |
XmGadget(3X) -- The Gadget widget class
|
Gadget is a widget class used as a supporting superclass for other gadget classes. It handles shadow-border drawing and highlighting, traversal activation and deactivation, and various callback lists ... |
XmGetAtomName(3X) -- A function that returns the string representation for an atom
|
XmGetAtomName returns the string representation for an atom. It mirrors the Xlib interfaces for atom management but provides client-side caching. When and where caching is provided in Xlib, the routin... |
XmGetColorCalculation(3X) -- A function to get the procedure used for default color calculation
|
XmGetColorCalculation returns the procedure being used to calculate default colors. For a description of XmColorProc, see XmSetColorCalculation(3X). |
XmGetColors(3X) -- A function that generates foreground, select, and shadow colors
|
XmGetColors takes a screen, a colormap, and a background pixel, and it returns pixel values for foreground, select, and shadow colors. Specifies the screen for which these colors should be allocated. ... |
XmGetDestination(3X) -- A function that returns the widget ID of the widget to be used as the current destination for quick ...
|
XmGetDestination returns the widget that is the current destination on the specified display. The destination is generally the last editable widget on which a select, edit, insert, or paste operation ... |
XmGetDragContext(3X) -- A Drag and Drop function that retrieves the DragContext widget ID associated with a timestamp
|
XmGetDragContext returns the widget ID of the active DragContext associated with a given display and timestamp. A timestamp uniquely identifies which DragContext is active when more than one drag and ... |
XmGetFocusWidget(3X) -- Returns the ID of the widget that has keyboard focus
|
XmGetFocusWidget examines the hierarchy that contains the specified widget and returns the ID of the widget that has keyboard focus. The function extracts the widget ID from the associated Shell widge... |
XmGetMenuCursor(3X) -- A function that returns the cursor ID for the current menu cursor
|
XmGetMenuCursor queries the menu cursor currently being used by this client on the specified display and returns the cursor ID. This function returns the menu cursor for the default screen of the disp... |
XmGetPixmap(3X) -- A pixmap caching function that generates a pixmap, stores it in a pixmap cache, and returns the pixm...
|
XmGetPixmap uses the parameter data to perform a lookup in the pixmap cache to see if a pixmap has already been generated that matches the data. If one is found, a reference count is incremented and t... |
XmGetPixmapByDepth(3X) -- A pixmap caching function that generates a pixmap, stores it in a pixmap cache, and returns the pixm...
|
XmGetPixmapByDepth uses the parameter data to perform a lookup in the pixmap cache to see if a pixmap has already been generated that matches the data. If one is found, a reference count is incremente... |
XmGetPostedFromWidget(3X) -- A RowColumn function that returns the widget from which a menu was posted
|
XmGetPostedFromWidget returns the widget from which a menu was posted. For torn-off menus, this function returns the widget from which the menu was originally torn. An application can use this routine... |
XmGetSecondaryResourceData(3X) -- A function that provides access to secondary widget resource data
|
Some Motif widget classes (such as Gadget, Text, and VendorShell) have resources that are not accessible via the functions XtGetResourceList and XtGetConstraintResourceList. To retrieve the descriptio... |
XmGetTabGroup(3X) -- Returns the widget ID of a tab group
|
XmGetTabGroup returns the widget ID of the tab group that contains the specified widget. Specifies a widget ID within a tab group |
XmGetTearOffControl(3X) -- A RowColumn function that obtains
|
XmGetTearOffControl provides the application with the means for obtaining the widget ID of the internally created tear-off control in a tear-off menu. RowColumn creates a tear-off control for a Pulldo... |
XmGetVisibility(3X) -- A function that determines if a widget is visible
|
XmGetVisibility returns the visibility state of the specified widget. Specifies the ID of the widget |
XmGetXmDisplay(3X) -- A Display function that returns the XmDisplay object ID for a specified display
|
Display resources by using XtGetValues. Specifies the display for which the XmDisplay object ID is to be returned For a complete definition of Display and its associated resources, see XmDisplay(3X). |
XmGetXmScreen(3X) -- A Screen function that returns the XmScreen object ID for a specified screen
|
XmGetXmScreen returns the XmScreen object ID associated with a screen. The application can access and manipulate Screen resources by using XtGetValues and XtSetValues. Specifies the screen for which t... |
XmInstallImage(3X) -- A pixmap caching function that adds an image to the pixmap cache
|
XmInstallImage stores an image in an image cache that can later be used to generate a pixmap. Part of the installation process is to extend the resource converter used to reference these images. The r... |
XmInternAtom(3X) -- A function that returns an atom for a given name
|
XmInternAtom returns an atom for a given name. It mirrors the Xlib interfaces for atom management, but provides client-side caching. When and where caching is provided in Xlib, the routines will becom... |
XmIsMotifWMRunning(3X) -- A function that determines whether the window manager is running
|
XmIsMotifWMRunning lets a user know whether the Motif Window Manager is running on a screen that contains a specific widget hierarchy. This function first sees whether the _MOTIF_WM_INFO property is p... |
XmIsTraversable(3X) -- A function that identifies whether a widget can be traversed
|
XmIsTraversable determines whether the specified widget is eligible to receive focus through keyboard traversal. In general, a widget is eligible to receive focus when all of the following conditions ... |
XmLabel(3X) -- The Label widget class
|
Label is an instantiable widget and is also used as a superclass for other button widgets, such as PushButton and ToggleButton. The Label widget does not accept any button or key input, and the help c... |
XmLabelGadget(3X) -- The LabelGadget widget class
|
LabelGadget is an instantiable widget and is also used as a superclass for other button gadgets, such as PushButtonGadget and ToggleButtonGadget. LabelGadget can contain either text or a pixmap. Label... |
XmList(3X) -- The List widget class
|
List allows a user to select one or more items from a group of choices. Items are selected from the list in a variety of ways, using both the pointer and the keyboard. List operates on an array of com... |
XmListAddItem(3X) -- A List function that adds an item to the list
|
XmListAddItem adds an item to the list at the given position. When the item is inserted into the list, it is compared with the current XmNselectedItems list. If the new item matches an item on the sel... |
XmListAddItems(3X) -- A List function that adds items to the list
|
XmListAddItems adds the specified items to the list at the given position. The first item_count items of the items array are added to the list. When the items are inserted into the list, they are comp... |
XmListAddItemsUnselected(3X) -- A List function that adds items to a list
|
XmListAddItemsUnselected adds the specified items to the list at the given position. The inserted items remain unselected, even if they currently appear in the XmNselectedItems list. Specifies the ID ... |
XmListAddItemUnselected(3X) -- A List function that adds an item to the list
|
XmListAddItemUnselected adds an item to the list at the given position. The item does not appear selected, even if it matches an item in the current XmNselectedItems list. Specifies the ID of the List... |
XmListDeleteAllItems(3X) -- A List function that deletes all items from the list
|
XmListDeleteAllItems deletes all items from the list. Specifies the ID of the List from whose list the items are deleted For a complete definition of List and its associated resources, see XmList(3X). |
XmListDeleteItem(3X) -- A List function that deletes an item from the list
|
XmListDeleteItem deletes the first item in the list that matches item. A warning message appears if the item does not exist. Specifies the ID of the List from whose list an item is deleted Specifies t... |
XmListDeleteItems(3X) -- A List function that deletes items from the list
|
XmListDeleteItems deletes the specified items from the list. For each element of items, the first item in the list that matches that element is deleted. A warning message appears if any of the items d... |
XmListDeleteItemsPos(3X) -- A List function that deletes items from the list starting at the given position
|
XmListDeleteItemsPos deletes the specified number of items from the list starting at the specified position. Specifies the ID of the List from whose list an item is deleted. Specifies the number of it... |
XmListDeletePos(3X) -- A List function that deletes an item from a list at a specified position
|
XmListDeletePos deletes an item at a specified position. A warning message appears if the position does not exist. Specifies the ID of the List from which an item is to be deleted. Specifies the posit... |
XmListDeletePositions(3X) -- A List function that deletes items from a list based on an array of positions
|
XmListDeletePositions deletes noncontiguous items from a list. The function deletes all items whose corresponding positions appear in the position_list array. A warning message is displayed if a speci... |
XmListDeselectAllItems(3X) -- A List function that unhighlights and removes all items from the selected list
|
XmListDeselectAllItems unhighlights and removes all items from the selected list. Specifies the ID of the List widget from whose list all selected items are deselected For a complete definition of Lis... |
XmListDeselectItem(3X) -- A List function that deselects the specified item from the selected list
|
XmListDeselectItem unhighlights and removes from the selected list the first item in the list that matches item. Specifies the ID of the List from whose list an item is deselected Specifies the item t... |
XmListDeselectPos(3X) -- A List function that deselects an item at a specified position in the list
|
XmListDeselectPos unhighlights the item at the specified position and deletes it from the list of selected items. Specifies the ID of the List widget Specifies the position of the item to be deselecte... |
XmListGetKbdItemPos(3X) -- A List function that returns the position of the item at the location cursor
|
XmListGetKbdItemPos returns the position of the list item at the location cursor. Specifies the ID of the List widget For a complete definition of List and its associated resources, see XmList(3X). |
XmListGetMatchPos(3X) -- A List function that returns all instances of an item in the list
|
XmListGetMatchPos is a Boolean function that returns an array of positions where a specified item is found in a List. Specifies the ID of the List widget. Specifies the item to search for. Returns an ... |
XmListGetSelectedPos(3X) -- A List function that returns the position of every selected item in the list
|
XmListGetSelectedPos is a Boolean function that returns an array of the positions of the selected items in a List. Specifies the ID of the List widget. Returns an array of the positions of the selecte... |
XmListItemExists(3X) -- A List function that checks if a specified item is in the list
|
XmListItemExists is a Boolean function that checks if a specified item is present in the list. Specifies the ID of the List widget Specifies the item whose presence is checked For a complete definitio... |
XmListItemPos(3X) -- A List function that returns the position of an item in the list
|
XmListItemPos returns the position of the first instance of the specified item in a List. Specifies the ID of the List widget Specifies the item whose position is returned For a complete definition of... |
XmListPosSelected(3X) -- A List function that determines if the list item at a specified position is selected
|
XmPosSelected determines if the list item at the specified position is selected or not. Specifies the ID of the List widget Specifies the position of the list item. A value of 1 indicates the first it... |
XmListPosToBounds(3X) -- A List function that returns the bounding box of an item at a specified position in a list
|
XmListPosToBounds returns the coordinates of an item within a list and the dimensions of its bounding box. The function returns the associated x and y coordinates of the upper left corner of the bound... |
XmListReplaceItems(3X) -- A List function that replaces the specified elements in the list
|
XmListReplaceItems replaces each specified item of the list with a corresponding new item. When the items are inserted into the list, they are compared with the current XmNselectedItems list. If any o... |
XmListReplaceItemsPos(3X) -- A List function that replaces the specified elements in the list
|
XmListReplaceItemsPos replaces the specified number of items of the List with new items, starting at the specified position in the List. When the items are inserted into the list, they are compared wi... |
XmListReplaceItemsPosUnselected(3X) -- A List function that replaces items in a list without selecting the replacement items
|
XmListReplaceItemsPosUnselected replaces the specified number of items in the list with new items, starting at the given position. The replacement items remain unselected, even if they currently appea... |
XmListReplaceItemsUnselected(3X) -- A List function that replaces items in a list
|
XmListReplaceItemsUnselected replaces each specified item in the list with a corresponding new item. The replacement items remain unselected, even if they currently appear in the XmNselectedItems list... |
XmListReplacePositions(3X) -- A List function that replaces items in a list based on position
|
XmListReplacePositions replaces noncontiguous items in a list. The item at each position specified in position_list is replaced with the corresponding entry in item_list. When the items are inserted i... |
XmListSelectItem(3X) -- A List function that selects an item in the list
|
XmListSelectItem highlights and adds to the selected list the first item in the list that matches item. Specifies the ID of the List widget from whose list an item is selected Specifies the item to be... |
XmListSelectPos(3X) -- A List function that selects an item at a specified position in the list
|
XmListSelectPos highlights a List item at the specified position and adds it to the list of selected items. Specifies the ID of the List widget. Specifies the position of the item to be selected. A va... |
XmListSetAddMode(3X) -- A List function that sets add mode in the list
|
XmListSetAddMode allows applications control over Add Mode in the extended selection model. Specifies the ID of the List widget Specifies whether to activate or deactivate Add Mode. If state is True, ... |
XmListSetBottomItem(3X) -- A List function that makes an existing item the last visible item in the list
|
XmListSetBottomItem makes the first item in the list that matches item the last visible item in the list. Specifies the ID of the List widget from whose list an item is made the last visible Specifies... |
XmListSetBottomPos(3X) -- A List function that makes a specified item the last visible item in the list
|
XmListSetBottomPos makes the item at the specified position the last visible item in the List. Specifies the ID of the List widget. Specifies the position of the item to be made the last visible item ... |
XmListSetHorizPos(3X) -- A List function that scrolls to the specified position in the list
|
XmListSetHorizPos sets the XmNvalue resource of the horizontal ScrollBar to the specified position and updates the visible portion of the list with the new value if the List widget's XmNlistSizePolic... |
XmListSetItem(3X) -- A List function that makes an existing item the first visible item in the list
|
XmListSetItem makes the first item in the list that matches item the first visible item in the list. Specifies the ID of the List widget from whose list an item is made the first visible Specifies the... |
XmListSetKbdItemPos(3X) -- A List function that sets the location cursor at a specified position
|
XmListSetKbdItemPos sets the location cursor at the item specified by position. This function does not determine if the item at the specified position is selected or not. Specifies the ID of the List ... |
XmListSetPos(3X) -- A List function that makes the item at the given position the first visible position in the list
|
XmListSetPos makes the item at the given position the first visible position in the List. Specifies the ID of the List widget. Specifies the position of the item to be made the first visible item in t... |
XmListUpdateSelectedList(3X) -- A List function that updates the XmNselectedItems resource
|
XmListUpdateSelectedList frees the contents of the current XmNselectedItems list. The routine traverses the XmNitems list and adds each currently selected item to the XmNselectedItems list. For each s... |
XmListYToPos(3X) -- A List function that returns the position of the item at a specified y coordinate
|
XmListYToPos returns the position of the item at the given y coordinate within the list. Specifies the ID of the List widget Specifies the y coordinate in the list's coordinate system For a complete ... |
XmMainWindow(3X) -- The MainWindow widget class
|
MainWindow provides a standard layout for the primary window of an application. This layout includes a MenuBar, a CommandWindow, a work region, a MessageWindow, and ScrollBars. Any or all of these are... |
XmMainWindowSep1(3X) -- A MainWindow function that returns the widget ID of the first Separator widget
|
XmMainWindowSep1 returns the widget ID of the first Separator widget in the MainWindow. The first Separator widget is located between the MenuBar and the Command widget. This Separator is visible only... |
XmMainWindowSep2(3X) -- A MainWindow function that returns the widget ID of the second Separator widget
|
XmMainWindowSep2 returns the widget ID of the second Separator widget in the MainWindow. The second Separator widget is located between the Command widget and the ScrolledWindow. This Separator is vis... |
XmMainWindowSep3(3X) -- A MainWindow function that returns the widget ID of the third Separator widget
|
XmMainWindowSep3 returns the widget ID of the third Separator widget in the MainWindow. The third Separator widget is located between the message window and the widget above it. This Separator is visi... |
XmMainWindowSetAreas(3X) -- A MainWindow function that identifies manageable children for each area
|
XmMainWindowSetAreas identifies which of the valid children for each area (such as the MenuBar and work region) are to be actively managed by MainWindow. This function also sets up or adds the MenuBar... |
XmManager(3X) -- The Manager widget class
|
Manager is a widget class used as a supporting superclass for other widget classes. It supports the visual resources, graphics contexts, and traversal resources necessary for the graphics and traversa... |
XmMapSegmentEncoding(3X) -- A compound string function that returns the compound text encoding format associated with the specif...
|
XmMapSegmentEncoding searches the segment encoding registry for an entry that matches the specified font list tag and returns a copy of the associated compound text encoding format. The application is... |
XmMenuPosition(3X) -- A RowColumn function that positions a Popup MenuPane
|
XmMenuPosition positions a Popup MenuPane using the information in the specified event. Unless an application is positioning the MenuPane itself, it must first invoke this function before managing the... |
XmMenuShell(3X) -- The MenuShell widget class
|
The MenuShell widget is a custom OverrideShell widget. An OverrideShell widget bypasses mwm when displaying itself. It is designed specifically to contain Popup or Pulldown MenuPanes. Most application... |
XmMessageBox(3X) -- The MessageBox widget class
|
MessageBox is a dialog class used for creating simple message dialogs. Convenience dialogs based on MessageBox are provided for several common interaction tasks, which include giving information, aski... |
XmMessageBoxGetChild(3X) -- A MessageBox function that is used to access a component
|
XmMessageBoxGetChild is used to access a component within a MessageBox. The parameters given to the function are the MessageBox widget and a value indicating which component to access. Specifies the M... |
XmOptionButtonGadget(3X) -- A RowColumn function that obtains the widget ID for the CascadeButtonGadget in an OptionMenu
|
XmOptionButtonGadget provides the application with the means for obtaining the widget ID for the internally created CascadeButtonGadget. Once the application has obtained the widget ID, it can adjust ... |
XmOptionLabelGadget(3X) -- A RowColumn function that obtains the widget ID for the LabelGadget in an OptionMenu
|
XmOptionLabelGadget provides the application with the means for obtaining the widget ID for the internally created LabelGadget. Once the application has obtained the widget ID, it can adjust the visua... |
XmPanedWindow(3X) -- The PanedWindow widget class
|
PanedWindow is a composite widget that lays out children in a vertically tiled format. Children appear in top-tobottom fashion, with the first child inserted appearing at the top of the PanedWindow an... |
XmPrimitive(3X) -- The Primitive widget class
|
Primitive is a widget class used as a supporting superclass for other widget classes. It handles border drawing and highlighting, traversal activation and deactivation, and various callback lists need... |
XmProcessTraversal(3X) -- A function that determines which component receives keyboard events when a widget has the focus
|
XmProcessTraversal determines which component of a hierarchy receives keyboard events when the hierarchy that contains the given widget has keyboard focus. Using XmProcessTraversal to traverse to Menu... |
XmPushButton(3X) -- The PushButton widget class
|
PushButton issues commands within an application. It consists of a text label or pixmap surrounded by a border shadow. When a PushButton is selected, the shadow changes to give the appearance that it ... |
XmPushButtonGadget(3X) -- The PushButtonGadget widget class
|
PushButtonGadget issues commands within an application. It consists of a text label or pixmap surrounded by a border shadow. When PushButtonGadget is selected, the shadow changes to give the appearanc... |
XmRegisterSegmentEncoding(3X) -- A compound string function that registers a compound text encoding format for a specified font list ...
|
XmRegisterSegmentEncoding registers a compound text encoding format with the specified font list element tag. The XmCvtXmStringToCT function uses this registry to map the font list tags of compound st... |
XmRemoveProtocolCallback(3X) -- A VendorShell function that removes a callback from the internal list
|
XmRemoveProtocolCallback removes a callback from the internal list. XmRemoveWMProtocolCallback is a convenience interface. It calls XmRemoveProtocolCallback with the property value set to the atom ret... |
XmRemoveProtocols(3X) -- A VendorShell function that removes the protocols from the protocol manager and deallocates the inte...
|
XmRemoveProtocols removes the protocols from the protocol manager and deallocates the internal tables. If any of the protocols are active, it will update the handlers and update the property if shell ... |
XmRemoveTabGroup(3X) -- A function that removes a tab group
|
This function is obsolete and its behavior is replaced by setting XmNnavigationType to XmNONE. XmRemoveTabGroup removes a widget from the list of tab groups associated with a particular widget hierarc... |
XmRemoveWMProtocolCallback(3X) -- A VendorShell convenience interface that removes a callback from the internal list
|
XmRemoveWMProtocolCallback is a convenience interface. It calls XmRemoveProtocolCallback with the property value set to the atom returned by interning WM_PROTOCOLS. Specifies the widget with which the... |
XmRemoveWMProtocols(3X) -- A VendorShell convenience interface that removes the protocols from the protocol manager and dealloc...
|
XmRemoveWMProtocols is a convenience interface. It calls XmRemoveProtocols with the property value set to the atom returned by interning WM_PROTOCOLS. Specifies the widget with which the protocol prop... |
XmRepTypeAddReverse(3X) -- A representation type manager function that installs the reverse converter for a previously register...
|
XmRepTypeAddReverse installs the reverse converter for a previously registered representation type. The reverse converter takes a numerical representation type value and returns its corresponding stri... |
XmRepTypeGetId(3X) -- A representation type manager function that retrieves the identification number of a representation ...
|
XmRepTypeGetId searches the registration list for the specified representation type and returns the associated identification number. Specifies the representation type for which an identification numb... |
XmRepTypeGetNameList(3X) -- A representation type manager function that generates a list of values for a representation type
|
XmRepTypeGetNameList generates a null-terminated list of the value names associated with the specified representation type. Each value name is a null-terminated string. This routine allocates memory f... |
XmRepTypeGetRecord(3X) -- A representation type manager function that returns information about a representation type
|
XmRepTypeGetRecord retrieves information about a particular representation type that is registered with the representation type manager. This routine allocates memory for the returned data. The applic... |
XmRepTypeGetRegistered(3X) -- A representation type manager function that returns a copy of the registration list
|
XmRepTypeGetRegistered retrieves information about all representation types that are registered with the representation type manager. The registration list is an array of structures, each of which con... |
XmRepTypeInstallTearOffModelConverter(3X) -- A representation type manager function that installs the resource converter for XmNtearOffModel.
|
XmRepTypeInstallTearOffModelConverter installs the resource converter that allows values for the XmNtearOffModel resource to be specified in resource default files. |
XmRepTypeRegister(3X) -- A representation type manager function that registers a representation type resource
|
XmRepTypeRegister registers a representation type resource with the representation type manager. All features of the representation type management facility become available for the specified represen... |
XmRepTypeValidValue(3X) -- A representation type manager function that tests the validity of a numerical value of a representat...
|
XmRepTypeValidValue tests the validity of a numerical value for a given representation type resource. The function generates a default warning message if the value is invalid and the enable_default_wa... |
XmResolveAllPartOffsets(3X) -- A function that allows writing
|
The use of offset records requires two extra global variables per widget class. The variables consist of pointers to arrays of offsets into the widget record and constraint record for each part of the... |
XmResolvePartOffsets(3X) -- A function that allows writing of
|
The use of offset records requires one extra global variable per widget class. The variable consists of a pointer to an array of offsets into the widget record for each part of the widget structure. T... |
XmRowColumn(3X) -- The RowColumn widget class
|
The RowColumn widget is a general purpose RowColumn manager capable of containing any widget type as a child. In general, it requires no special knowledge about how its children function and provides ... |
XmScale(3X) -- The Scale widget class
|
Scale is used by an application to indicate a value from within a range of values, and it allows the user to input or modify a value from the same range. A Scale has an elongated rectangular region si... |
XmScaleGetValue(3X) -- A Scale function that returns the current slider position
|
XmScaleGetValue returns the current slider position value displayed in the scale. Specifies the Scale widget ID Returns the current slider position value For a complete definition of Scale and its ass... |
XmScaleSetValue(3X) -- A Scale function that sets a slider value
|
XmScaleSetValue sets the slider value within the Scale widget. Specifies the Scale widget ID. Specifies the slider position along the scale. This sets the XmNvalue resource. For a complete definition ... |
XmScreen(3X) -- The Screen widget class
|
The XmScreen object is used by Motif widgets to store information that is specific to a screen. It also allows the toolkit to store certain information on widget hierarchies that would otherwise be un... |
XmScrollBar(3X) -- The ScrollBar widget class
|
The ScrollBar widget allows the user to view data that is too large to be displayed all at once. ScrollBars are usually located inside a ScrolledWindow and adjacent to the widget that contains the dat... |
XmScrollBarGetValues(3X) -- A ScrollBar function that returns the ScrollBar's increment values
|
XmScrollBarGetValues returns the ScrollBar's increment values. The scroll region is overlaid with a slider bar that is adjusted in size and position using the main ScrollBar or set slider function at... |
XmScrollBarSetValues(3X) -- A ScrollBar function that changes ScrollBar's increment values and the slider's size and position
|
XmSetScrollBarValues changes the ScrollBar's increment values and the slider's size and position. The scroll region is overlaid with a slider bar that is adjusted in size and position using the main... |
XmScrolledWindow(3X) -- The ScrolledWindow widget class
|
The ScrolledWindow widget combines one or two ScrollBar widgets and a viewing area to implement a visible window onto some other (usually larger) data display. The visible part of the window can be sc... |
XmScrolledWindowSetAreas(3X) -- A ScrolledWindow function that adds or changes a window work region and a horizontal or vertical Scr...
|
XmScrolledWindowSetAreas adds or changes a window work region and a horizontal or vertical ScrollBar widget to the ScrolledWindow widget for the application. Each widget is optional and may be passed ... |
XmScrollVisible(3X) -- A ScrolledWindow function that makes an invisible descendant of a ScrolledWindow work area visible
|
XmScrollVisible makes an obscured or partially obscured widget or gadget descendant of a ScrolledWindow work area visible. The function repositions the work area and sets the specified margins between... |
XmSelectionBox(3X) -- The SelectionBox widget class
|
SelectionBox is a general dialog widget that allows the user to select one item from a list. By default a SelectionBox includes the following: A scrolling list of alternatives An editable text field f... |
XmSelectionBoxGetChild(3X) -- A SelectionBox function that is used to access a component
|
XmSelectionBoxGetChild is used to access a component within a SelectionBox. The parameters given to the function are the SelectionBox widget and a value indicating which component to access. Specifies... |
XmSeparator(3X) -- The Separator widget class
|
Separator is a primitive widget that separates items in a display. Several different line drawing styles are provided, as well as horizontal or vertical orientation. The Separator line drawing is auto... |
XmSeparatorGadget(3X) -- The SeparatorGadget widget class
|
SeparatorGadget separates items in a display. Several line drawing styles are provided, as well as horizontal or vertical orientation. Lines drawn within the SeparatorGadget are automatically centered... |
XmSetColorCalculation(3X) -- A function to set the procedure used for default color calculation
|
XmSetColorCalculation sets the procedure to calculate default colors. This procedure is used to calculate the foreground, top shadow, bottom shadow, and select colors on the basis of a given backgroun... |
XmSetFontUnit(3X) -- A function that sets the font unit value for a display
|
XmSetFontUnit provides an external function to initialize font unit values. Applications may want to specify resolution-independent data based on a global font size. See the XmNunitType resource descr... |
XmSetFontUnits(3X) -- A function that sets the font unit value for a display
|
XmSetFontUnits provides an external function to initialize font unit values. Applications may want to specify resolution-independent data based on a global font size. This function must be called befo... |
XmSetMenuCursor(3X) -- A function that modifies the menu cursor for a client
|
XmSetMenuCursor programmatically modifies the menu cursor for a client; after the cursor has been created by the client, this function registers the cursor with the menu system. After calling this fun... |
XmSetProtocolHooks(3X) -- A VendorShell function that allows pre and post actions to be executed when a protocol message is re...
|
XmSetProtocolHooks is used by shells that want to have pre and post actions executed when a protocol message is received from MWM. Since there is no guaranteed ordering in execution of event handlers ... |
XmSetWMProtocolHooks(3X) -- A VendorShell convenience interface that allows pre and post actions to be executed when a protocol ...
|
XmSetWMProtocolHooks is a convenience interface. It calls XmSetProtocolHooks with the property value set to the atom returned by interning WM_PROTOCOLS. Specifies the widget with which the protocol pr... |
XmString(3X) -- Data type for a compound string
|
XmString is the data type for a compound string. Compound strings include one or more segments, each of which may contain a font list element tag, string direction, and text component. When a compound... |
XmStringBaseline(3X) -- A compound string function that returns the number of pixels between the top of the character box an...
|
XmStringBaseline returns the number of pixels between the top of the character box and the baseline of the first line of text in the provided compound string. Specifies the font list Specifies the str... |
XmStringByteCompare(3X) -- A compound string function that
|
XmStringByteCompare returns a Boolean indicating the results of a byte-by-byte comparison of two compound strings. In general, if two compound strings are created with the same (char *) string using X... |
XmStringCompare(3X) -- A compound string function that compares two strings
|
XmStringCompare returns a Boolean value indicating the results of a semantically equivalent comparison of two compound strings. Semantically equivalent means that the strings have the same text compon... |
XmStringConcat(3X) -- A compound string function that appends one string to another
|
XmStringConcat copies s2 to the end of s1 and returns a copy of the resulting compound string. The original strings are preserved. The space for the resulting compound string is allocated within the f... |
XmStringCopy(3X) -- A compound string function that makes a copy of a string
|
XmStringCopy makes a copy of a compound string. The space for the resulting compound string is allocated within the function. The application is responsible for managing the allocated space. The memor... |
XmStringCreate(3X) -- A compound string function that creates a compound string
|
XmStringCreate creates a compound string with two components: text and a font list element tag. Specifies a null-terminated string to be used as the text component of the compound string. Specifies th... |
XmStringCreateLocalized(3X) -- A compound string function that creates a compound string in the current locale
|
XmStringCreateLocalized creates a compound string containing the specified text and assigns XmFONTLIST_DEFAULT_TAG as the font list entry tag. An identical compound string would result from the functi... |
XmStringCreateLtoR(3X) -- A compound string function that creates a compound string
|
XmStringCreateLtoR creates a compound string with two components: text and a font list element tag. This function imposes the semantic of scanning for \n characters in the text. When one is found, th... |
XmStringCreateSimple(3X) -- A compound string function that creates a compound string in the language environment of a widget
|
XmStringCreateSimple creates a compound string with two components: text and a character set. It derives the character set from the current language environment. The routine attempts to derive a chara... |
XmStringDirection(3X) -- Data type for the direction of display in a string
|
XmStringDirection is the data type for specifying the direction in which the system displays characters of a string, or characters of a segment of a compound string. This is an enumeration with two po... |
XmStringDirectionCreate(3X) -- A compound string function that creates a compound string
|
XmStringDirectionCreate creates a compound string with a single component, a direction with the given value. Specifies the value of the directional component |
XmStringDraw(3X) -- A compound string function that draws a compound string in an X window
|
XmStringDraw draws a compound string in an X Window. If a compound string segment uses a font list entry that defines a font set, the graphic context passed to this routine will have the GC font membe... |
XmStringDrawImage(3X) -- A compound string function that draws a compound string in an X Window and creates an image
|
XmStringDrawImage draws a compound string in an X Window and paints both the foreground and background bits of each character. If a compound string segment uses a font list entry that defines a font s... |
XmStringDrawUnderline(3X) -- A compound string function that underlines a string drawn in an X Window
|
XmStringDrawUnderline draws a compound string in an X Window. If the substring identified by underline can be matched in string, the substring will be underlined. Once a match has occurred, no further... |
XmStringEmpty(3X) -- A compound string function that provides
|
XmStringEmpty returns a Boolean value indicating whether any non-zero length text components exist in the provided compound string. It returns True if there are no text segments in the string. If this... |
XmStringExtent(3X) -- A compound string function that determines the size of the smallest rectangle that will enclose the ...
|
XmStringExtent determines the width and height, in pixels, of the smallest rectangle that will enclose the provided compound string. Specifies the font list Specifies the string Specifies a pointer to... |
XmStringFree(3X) -- A compound string function that recovers memory
|
XmStringFree recovers memory used by a compound string. Specifies the compound string to be freed |
XmStringFreeContext(3X) -- A compound string function that instructs the toolkit that the context is no longer needed
|
XmStringFreeContext instructs the toolkit that the context is no longer needed and will not be used without reinitialization. Specifies the string context structure that was allocated by the XmStringI... |
XmStringGetLtoR(3X) -- A compound string function that searches for a text segment in the input compound string
|
XmStringGetLtoR searches for a text segment in the input compound string that matches the given font list element tag. Specifies the compound string. Specifies the font list element tag associated wit... |
XmStringGetNextComponent(3X) -- A compound string function that returns the type and value of the next component in a compound strin...
|
XmStringGetNextComponent returns the type and value of the next component in the compound string identified by context. It is a low-level component function. Components are returned one at a time. On ... |
XmStringGetNextSegment(3X) -- A compound string function that fetches the octets in the next segment of a compound string
|
XmStringGetNextSegment fetches the octets in the next segment; repeated calls fetch sequential segments. The text, tag, and direction of the fetched segment are returned each time. A Boolean status is... |
XmStringHasSubstring(3X) -- A compound string function that indicates whether one compound string is contained within another
|
XmStringHasSubstring indicates whether or not one compound string is contained within another. Specifies the compound string to be searched Specifies the compound string to be searched for |
XmStringHeight(3X) -- A compound string function that returns the line height of the given compound string
|
XmStringHeight returns the height, in pixels, of the sum of all the line heights of the given compound string. Separator components delimit lines. Specifies the font list Specifies the string |
XmStringInitContext(3X) -- A compound string function that allows applications to read out the content segment by segment
|
XmStringInitContext maintains a context to allow applications to read out the contents of a compound string segment by segment. This function establishes the context for this read out. This context is... |
XmStringLength(3X) -- A compound string function that obtains the length of a compound string
|
XmStringLength obtains the length of a compound string. It returns the number of bytes in s1 including all tags, direction indicators, and separators. If the compound string has an invalid structure, ... |
XmStringLineCount(3X) -- A compound string function that returns the number of separators plus one in the provided compound s...
|
XmStringLineCount returns the number of separators plus one in the provided compound string. In effect, it counts the lines of text. Specifies the string. |
XmStringNConcat(3X) -- A compound string function that appends a specified number of bytes to a compound string
|
XmStringNConcat appends a specified number of bytes from s2 to the end of s1, including tags, directional indicators, and separators. It then returns the resulting compound string. The original string... |
XmStringNCopy(3X) -- A compound string function that creates a copy of a compound string
|
XmStringNCopy creates a copy of s1 that contains a specified number of bytes, including tags, directional indicators, and separators. It then returns the resulting compound string. The original string... |
XmStringPeekNextComponent(3X) -- A compound string function that returns the component type of the next component fetched
|
XmStringPeekNextComponent examines the next component that would be fetched by XmStringGetNextComponent and returns the component type. Specifies the string context structure that was allocated by the... |
XmStringSegmentCreate(3X) -- A compound string function that creates a compound string
|
XmStringSegmentCreate is a high-level function that assembles a compound string consisting of a font list element tag, a direction component, a text component, and an optional separator component. Spe... |
XmStringSeparatorCreate(3X) -- A compound string function that creates a compound string
|
XmStringSeparatorCreate creates a compound string with a single component, a separator. |
XmStringTable(3X) -- Data type for an array of compound strings
|
XmStringTable is the data type for an array of compound strings (objects of type XmString). |
XmStringWidth(3X) -- A compound string function that returns the width of the longest sequence of text components in a co...
|
XmStringWidth returns the width, in pixels, of the longest sequence of text components in the provided compound string. Separator components are used to delimit sequences of text components. Specifies... |
XmTargetsAreCompatible(3X) -- A function that tests whether the target types match between a drop site and source object
|
XmTargetsAreCompatible determines whether the import targets of the destination match any of the export targets of a source. If there is at least one target in common, the function returns True. Speci... |
XmText(3X) -- The Text widget class
|
Text provides a single-line and multiline text editor for customizing both user and programmatic interfaces. It can be used for single-line string entry, forms entry with verification procedures, and ... |
XmTextClearSelection(3X) -- A Text function that clears the primary selection
|
XmTextClearSelection clears the primary selection in the Text widget. Specifies the Text widget ID. Specifies the server time at which the selection value is desired. This should be the time of the ev... |
XmTextCopy(3X) -- A Text function that copies the primary selection to the clipboard
|
XmTextCopy copies the primary selected text to the clipboard. Specifies the Text widget ID. Specifies the server time at which the selection value is to be modified. This should be the time of the eve... |
XmTextCut(3X) -- A Text function that copies the primary selection to the clipboard and deletes the selected text
|
XmTextCut copies the primary selected text to the clipboard and then deletes the primary selected text. This routine calls the widget's XmNvalueChangedCallback and verification callbacks, either XmNm... |
XmTextDisableRedisplay(3X) -- A Text function that temporarily prevents visual update of the Text widget
|
XmTextDisableRedisplay prevents redisplay of the specified Text widget even though its visual attributes have been modified. The visual appearance of the widget remains unchanged until XmTextEnableRed... |
XmTextEnableRedisplay(3X) -- A Text function that forces the visual update of a Text widget
|
XmTextEnableRedisplay is used in conjunction with XmTextDisableRedisplay, which suppresses visual update of the Text widget. When XmTextEnableRedisplay is called, it determines if any visual attribute... |
XmTextField(3X) -- The TextField class
|
TextField widget provides a single line text editor for customizing both user and programmatic interfaces. It is used for single-line string entry, and forms entry with verification procedures. It pro... |
XmTextFieldClearSelection(3X) -- A TextField function that clears the primary selection
|
XmTextFieldClearSelection clears the primary selection in the TextField widget. Specifies the TextField widget ID. Specifies the time at which the selection value is desired. This should be the time o... |
XmTextFieldCopy(3X) -- A TextField function that copies the primary selection to the clipboard
|
XmTextFieldCopy copies the primary selected text to the clipboard. Specifies the TextField widget ID. Specifies the time at which the selection value is to be modified. This should be the time of the ... |
XmTextFieldCut(3X) -- A TextField function that copies the primary selection to the clipboard and deletes the selected tex...
|
XmTextFieldCut copies the primary selected text to the clipboard and then deletes the primary selected text. This routine calls the widget's XmNvalueChangedCallback and verification callbacks, either... |
XmTextFieldGetBaseline(3X) -- A TextField function that accesses the x position of the first baseline
|
XmTextFieldGetBaseline accesses the x position of the first baseline in the TextField widget, relative to the x position of the top of the widget. Specifies the TextField widget ID For a complete defi... |
XmTextFieldGetEditable(3X) -- A TextField function that accesses the edit permission state
|
XmTextFieldGetEditable accesses the edit permission state of the TextField widget. Specifies the TextField widget ID For a complete definition of TextField and its associated resources, see XmTextFiel... |
XmTextFieldGetInsertionPosition(3X) -- A TextField function that accesses the position of the insertion cursor
|
XmTextFieldGetInsertionPosition accesses the insertion cursor position of the TextField widget. Specifies the TextField widget ID For a complete definition of TextField and its associated resources, s... |
XmTextFieldGetLastPosition(3X) -- A TextField function that accesses the position of the last text character
|
XmTextFieldGetLastPosition accesses the position of the last character in the text buffer of the TextField widget. Specifies the TextField widget ID For a complete definition of TextField and its asso... |
XmTextFieldGetMaxLength(3X) -- A TextField function that accesses the value of the current maximum allowable length of a text strin...
|
XmTextFieldGetMaxLength accesses the value of the current maximum allowable length of the text string in the TextField widget entered from the keyboard. The maximum allowable length prevents the user ... |
XmTextFieldGetSelection(3X) -- A TextField function that retrieves the value of the primary selection
|
XmTextFieldGetSelection retrieves the value of the primary selection. It returns a NULL pointer if no text is selected in the widget. The application is responsible for freeing the storage associated ... |
XmTextFieldGetSelectionPosition(3X) -- A TextField function that accesses the position of the primary selection
|
XmTextFieldGetSelectionPosition accesses the left and right position of the primary selection in the text buffer of the TextField widget. Specifies the TextField widget ID Specifies the pointer in whi... |
XmTextFieldGetSelectionWcs(3X) -- A TextField function that retrieves the value of a wide character encoded primary selection
|
XmTextFieldGetSelectionWcs retrieves the value of the primary selection, encoded in a wide character format. It returns a NULL pointer if no text is selected in the widget. The application is responsi... |
XmTextFieldGetString(3X) -- A TextField function that accesses the string value
|
XmTextFieldGetString accesses the string value of the TextField widget. The application is responsible for freeing the storage associated with the string by calling XtFree. Specifies the TextField wid... |
XmTextFieldGetStringWcs(3X) -- A TextField function that retrieves a copy of the wide character string value of a TextField widget
|
XmTextFieldGetStringWcs retrieves a copy of the wide character string value of the TextField widget. The application is responsible for freeing the storage associated with the string by calling XtFree... |
XmTextFieldGetSubstring(3X) -- A TextField function that retrieves a copy of a portion of the internal text buffer
|
XmTextFieldGetSubstring retrieves a copy of a portion of the internal text buffer of a TextField widget. The function copies a specified number of characters from a given start position in the interna... |
XmTextFieldGetSubstringWcs(3X) -- A TextField function that retrieves a portion of a wide character internal text buffer
|
XmTextFieldGetSubstringWcs retrieves a copy of a portion of the internal text buffer of a TextField widget that is stored in a wide character format. The function copies a specified number of characte... |
XmTextFieldInsert(3X) -- A TextField function that inserts a character string into a text string
|
XmTextFieldInsert inserts a character string into the text string in the TextField widget. The character positions begin at zero and are numbered sequentially from the beginning of the text. For examp... |
XmTextFieldInsertWcs(3X) -- A TextField function that inserts a wide character string into a TextField widget
|
XmTextFieldInsertWcs inserts a wide character string into the TextField widget at a specified location. The character positions begin at zero and are numbered sequentially from the beginning of the te... |
XmTextFieldPaste(3X) -- A TextField function that inserts the clipboard selection
|
XmTextFieldPaste inserts the clipboard selection at the insertion cursor of the destination widget. If XmNpendingDelete is True and the insertion cursor is inside the current selection, the clipboard ... |
XmTextFieldPosToXY(3X) -- A TextField function that accesses the x and y position of a character position
|
XmTextFieldPosToXY accesses the x and y position, relative to the upper left corner of the TextField widget, of a given character position in the text buffer. Specifies the TextField widget ID Specifi... |
XmTextFieldRemove(3X) -- A TextField function that deletes the primary selection
|
XmTextFieldRemove deletes the primary selected text. If there is a selection, this routine also calls the widget's XmNvalueChangedCallback and verification callbacks, either XmNmodifyVerifyCallback o... |
XmTextFieldReplace(3X) -- A TextField function that replaces part of a text string
|
XmTextFieldReplace replaces part of the text string in the TextField widget. The character positions begin at zero and are numbered sequentially from the beginning of the text. An example text replace... |
XmTextFieldReplaceWcs(3X) -- A TextField function that replaces part of a wide character string in a TextField widget
|
XmTextFieldReplaceWcs replaces part of the wide character string in the TextField widget. The character positions begin at zero and are numbered sequentially from the beginning of the text. An example... |
XmTextFieldSetAddMode(3X) -- A TextField function that sets the state of Add Mode
|
XmTextFieldSetAddMode controls whether or not the TextField widget is in Add Mode. When the widget is in Add Mode, the insert cursor can be moved without disturbing the primary selection. Specifies th... |
XmTextFieldSetEditable(3X) -- A TextField function that sets the edit permission
|
XmTextFieldSetEditable sets the edit permission state of the TextField widget. When set to True, the text string can be edited. Specifies the TextField widget ID Specifies a Boolean value that when Tr... |
XmTextFieldSetHighlight(3X) -- A TextField function that highlights text
|
XmTextFieldSetHighlight highlights text between the two specified character positions. The mode parameter determines the type of highlighting. Highlighting text merely changes the visual appearance of... |
XmTextFieldSetInsertionPosition(3X) -- A TextField function that sets the position of the insertion cursor
|
XmTextFieldSetInsertionPosition sets the insertion cursor position of the TextField widget. This routine also calls the widget's XmNmotionVerifyCallback callbacks if the insertion cursor position cha... |
XmTextFieldSetMaxLength(3X) -- A TextField function that sets the value of the current maximum allowable length of a text string en...
|
XmTextFieldSetMaxLength sets the value of the current maximum allowable length of the text string in the TextField widget. The maximum allowable length prevents the user from entering a text string fr... |
XmTextFieldSetSelection(3X) -- A TextField function that sets the primary selection of the text
|
XmTextFieldSetSelection sets the primary selection of the text in the widget. It also sets the insertion cursor position to the last position of the selection and calls the widget's XmNmotionVerifyCa... |
XmTextFieldSetString(3X) -- A TextField function that sets the string value
|
XmTextFieldSetString sets the string value of the TextField widget. This routine calls the widget's XmNvalueChangedCallback and verification callbacks, either XmNmodifyVerifyCallback or XmNmodifyVeri... |
XmTextFieldSetStringWcs(3X) -- A TextField function that sets a wide character string value
|
XmTextFieldSetStringWcs sets the wide character string value of the TextField widget. This routine calls the widget's XmNvalueChangedCallback and verification callbacks, either XmNmodifyVerifyCallbac... |
XmTextFieldShowPosition(3X) -- A TextField function that forces text at a given position to be displayed
|
XmTextFieldShowPosition forces text at the specified position to be displayed. If the XmNautoShowCursorPosition resource is True, the application should also set the insert cursor to this position. Sp... |
XmTextFieldXYToPos(3X) -- A TextField function that accesses the character position nearest an x and y position
|
XmTextFieldXYToPos accesses the character position nearest to the specified x and y position, relative to the upper left corner of the TextField widget. Specifies the TextField widget ID Specifies the... |
XmTextFindString(3X) -- A Text function that finds the beginning position of a text string
|
XmTextFindString locates the beginning position of a specified text string. This routine searches forward or backward for the first occurrence of the string starting from the given start position. If ... |
XmTextFindStringWcs(3X) -- A Text function that finds the beginning position of a wide character text string
|
XmTextFindStringWcs locates the beginning position of a specified wide character text string. This routine searches forward or backward for the first occurrence of the string, starting from the given ... |
XmTextGetBaseline(3X) -- A Text function that accesses the x position of the first baseline
|
XmTextGetBaseline accesses the x position of the first baseline in the Text widget, relative to the x position of the top of the widget. Specifies the Text widget ID For a complete definition of Text ... |
XmTextGetEditable(3X) -- A Text function that accesses the edit permission state
|
XmTextGetEditable accesses the edit permission state of the Text widget. Specifies the Text widget ID For a complete definition of Text and its associated resources, see XmText(3X). |
XmTextGetInsertionPosition(3X) -- A Text function that accesses the position of the insert cursor
|
XmTextGetInsertionPosition accesses the insertion cursor position of the Text widget. Specifies the Text widget ID For a complete definition of Text and its associated resources, see XmText(3X). |
XmTextGetLastPosition(3X) -- A Text function that accesses the last position in the text
|
XmTextGetLastPosition accesses the last position in the text buffer of the Text widget. This is an integer number of characters from the beginning of the buffer, and represents the position following ... |
XmTextGetMaxLength(3X) -- A Text function that accesses the value of the current maximum allowable length of a text string ent...
|
XmTextGetMaxLength accesses the value of the current maximum allowable length of the text string in the Text widget entered from the keyboard. The maximum allowable length prevents the user from enter... |
XmTextGetSelection(3X) -- A Text function that retrieves the value of the primary selection
|
XmTextGetSelection retrieves the value of the primary selection. It returns a NULL pointer if no text is selected in the widget. The application is responsible for freeing the storage associated with ... |
XmTextGetSelectionPosition(3X) -- A Text function that accesses the position of the primary selection
|
XmTextGetSelectionPosition accesses the left and right position of the primary selection in the text buffer of the Text widget. Specifies the Text widget ID Specifies the pointer in which the position... |
XmTextGetSelectionWcs(3X) -- A Text function that retrieves the value of a wide character encoded primary selection
|
XmTextGetSelectionWcs retrieves the value of the primary selection that is encoded in a wide character format. It returns a NULL pointer if no text is selected in the widget. The application is respon... |
XmTextGetSource(3X) -- A Text function that accesses the source of the widget
|
XmTextGetSource accesses the source of the Text widget. Text widgets can share sources of text so that editing in one widget is reflected in another. This function accesses the source of one widget so... |
XmTextGetString(3X) -- A Text function that accesses the string value
|
XmTextGetString accesses the string value of the Text widget. The application is responsible for freeing the storage associated with the string by calling XtFree. Specifies the Text widget ID For a co... |
XmTextGetStringWcs(3X) -- A Text function that retrieves a copy of the wide character string value of a Text widget
|
XmTextGetStringWcs retrieves a copy of the wide character string value of the Text widget. The application is responsible for freeing the storage associated with the string by calling XtFree. Specifie... |
XmTextGetSubstring(3X) -- A Text function that retrieves a copy of a portion of the internal text buffer
|
XmTextGetSubstring retrieves a copy of a portion of the internal text buffer of a Text widget. The function copies a specified number of characters from a given start position in the internal text buf... |
XmTextGetSubstringWcs(3X) -- A Text function that retrieves a portion of a wide character internal text buffer
|
XmTextGetSubstringWcs retrieves a copy of a portion of the internal text buffer of a Text widget that is stored in a wide character format. The function copies a specified number of characters from a ... |
XmTextGetTopCharacter(3X) -- A Text function that accesses the position of the first character displayed
|
XmTextGetTopCharacter accesses the position of the text at the top of the Text widget. Specifies the Text widget ID For a complete definition of Text and its associated resources, see XmText(3X). |
XmTextInsert(3X) -- A Text function that inserts a character string into a text string
|
XmTextInsert inserts a character string into the text string in the Text widget. The character positions begin at zero and are numbered sequentially from the beginning of the text. For example, to ins... |
XmTextInsertWcs(3X) -- A Text function that inserts a wide character string into a Text widget
|
XmTextInsertWcs inserts a wide character string into the Text widget at a specified location. The character positions begin at zero and are numbered sequentially from the beginning of the text. For ex... |
XmTextPaste(3X) -- A Text function that inserts the clipboard selection
|
XmTextPaste inserts the clipboard selection at the insertion cursor of the destination widget. If XmNpendingDelete is True and the insertion cursor is inside the current selection, the clipboard selec... |
XmTextPosition(3X) -- Data type for a character position within a text string
|
XmTextPosition is the data type for a character position within a text string. The text position is an integer representing the number of characters from the beginning of the string. The first charact... |
XmTextPosToXY(3X) -- A Text function that accesses the x and y position of a character position
|
XmTextPosToXY accesses the x and y position, relative to the upper left corner of the Text widget, of a given character position in the text buffer. Specifies the Text widget ID Specifies the characte... |
XmTextRemove(3X) -- A Text function that deletes the primary selection
|
XmTextRemove deletes the primary selected text. If there is a selection, this routine also calls the widget's XmNvalueChangedCallback and verification callbacks, either XmNmodifyVerifyCallback or XmN... |
XmTextReplace(3X) -- A Text function that replaces part of a text string
|
XmTextReplace replaces part of the text string in the Text widget. The character positions begin at zero and are numbered sequentially from the beginning of the text. An example text replacement would... |
XmTextReplaceWcs(3X) -- A Text function that replaces part of a wide character string in a Text widget
|
XmTextReplaceWcs replaces part of the wide character string in the Text widget. The character positions begin at zero and are numbered sequentially from the beginning of the text. An example text repl... |
XmTextScroll(3X) -- A Text function that scrolls text
|
XmTextScroll scrolls text in a Text widget. Specifies the Text widget ID Specifies the number of lines of text to scroll. A positive value causes text to scroll upward; a negative value causes text to... |
XmTextSetAddMode(3X) -- A Text function that sets the state of Add Mode
|
XmTextSetAddMode controls whether or not the Text widget is in Add Mode. When the widget is in Add Mode, the insert cursor can be moved without disturbing the primary selection. Specifies the Text wid... |
XmTextSetEditable(3X) -- A Text function that sets the edit permission
|
XmTextSetEditable sets the edit permission state of the Text widget. When set to True, the text string can be edited. Specifies the Text widget ID Specifies a Boolean value that when True allows text ... |
XmTextSetHighlight(3X) -- A Text function that highlights text
|
XmTextSetHighlight highlights text between the two specified character positions. The mode parameter determines the type of highlighting. Highlighting text merely changes the visual appearance of the ... |
XmTextSetInsertionPosition(3X) -- A Text function that sets the position of the insert cursor
|
XmTextSetInsertionPosition sets the insertion cursor position of the Text widget. This routine also calls the widget's XmNmotionVerifyCallback callbacks if the insertion cursor position changes. Spec... |
XmTextSetMaxLength(3X) -- A Text function that sets the value of the current maximum allowable length of a text string entered...
|
XmTextSetMaxLength sets the value of the current maximum allowable length of the text string in the Text widget. The maximum allowable length prevents the user from entering a text string from the key... |
XmTextSetSelection(3X) -- A Text function that sets the primary selection of the text
|
XmTextSetSelection sets the primary selection of the text in the widget. It also sets the insertion cursor position to the last position of the selection and calls the widget's XmNmotionVerifyCallbac... |
XmTextSetSource(3X) -- A Text function that sets the source of the widget
|
XmTextSetSource sets the source of the Text widget. Text widgets can share sources of text so that editing in one widget is reflected in another. This function sets the source of one widget so that it... |
XmTextSetString(3X) -- A Text function that sets the string value
|
XmTextSetString sets the string value of the Text widget. This routine calls the widget's XmNvalueChangedCallback and verification callbacks, either XmNmodifyVerifyCallback or XmNmodifyVerifyCallback... |
XmTextSetStringWcs(3X) -- A Text function that sets a wide character string value
|
XmTextSetStringWcs sets the wide character string value of the Text widget. This routine calls the widget's XmNvalueChangedCallback and verification callbacks, either XmNmodifyVerifyCallback or XmNmo... |
XmTextSetTopCharacter(3X) -- A Text function that sets the position of the first character displayed
|
XmTextSetTopCharacter sets the position of the text at the top of the Text widget. If the XmNeditMode is XmMULTI_LINE_EDIT, the line of text that contains top_character is displayed at the top of the ... |
XmTextShowPosition(3X) -- A Text function that forces text at a given position to be displayed
|
XmTextShowPosition forces text at the specified position to be displayed. If the XmNautoShowCursorPosition resource is True, the application should also set the insert cursor to this position. Specifi... |
XmTextXYToPos(3X) -- A Text function that accesses the character position nearest an x and y position
|
XmTextXYToPos accesses the character position nearest to the specified x and y position, relative to the upper left corner of the Text widget. Specifies the Text widget ID Specifies the x position, re... |
XmToggleButton(3X) -- The ToggleButton widget class
|
ToggleButton sets nontransitory state data within an application. Usually this widget consists of an indicator (square or diamond) with either text or a pixmap on one side of it. However, it can also ... |
XmToggleButtonGadget(3X) -- The ToggleButtonGadget widget class
|
ToggleButtonGadget sets nontransitory state data within an application. Usually this gadget consists of an indicator (square or diamond-shaped) with either text or a pixmap on one side of it. However,... |
XmToggleButtonGadgetGetState(3X) -- A ToggleButtonGadget function that obtains the state of a ToggleButtonGadget
|
XmToggleButtonGadgetGetState obtains the state of a ToggleButtonGadget. Specifies the ToggleButtonGadget ID For a complete definition of ToggleButtonGadget and its associated resources, see XmToggleBu... |
XmToggleButtonGadgetSetState(3X) -- A ToggleButtonGadget function that sets or changes the current state
|
XmToggleButtonGadgetSetState sets or changes the ToggleButtonGadget's current state. Specifies the ToggleButtonGadget widget ID. Specifies a Boolean value that indicates whether the ToggleButtonGadge... |
XmToggleButtonGetState(3X) -- A ToggleButton function that obtains the state of a ToggleButton
|
XmToggleButtonGetState obtains the state of a ToggleButton. Specifies the ToggleButton widget ID For a complete definition of ToggleButton and its associated resources, see XmToggleButton(3X). |
XmToggleButtonSetState(3X) -- A ToggleButton function that sets or changes the current state
|
XmToggleButtonSetState sets or changes the ToggleButton's current state. Specifies the ToggleButton widget ID. Specifies a Boolean value that indicates whether the ToggleButton state is selected or u... |
XmTrackingEvent(3X) -- A Toolkit function that provides a modal interaction
|
XmTrackingEvent provides a modal interface for selection of a component. It is intended to support context help. The function grabs the pointer and discards succeeding events until BSelect is released... |
XmTrackingLocate(3X) -- A Toolkit function that provides a modal interaction
|
XmTrackingLocate provides a modal interface for selection of a component. It is intended to support context help. The function grabs the pointer and discards succeeding events until BSelect is release... |
XmTranslateKey(3X) -- The default keycode-to-keysym translator
|
XmTranslateKey is the default XtKeyProc translation procedure for Motif applications. The function takes a keycode and modifiers and returns the corresponding keysym. XmTranslateKey serves two main pu... |
XmUninstallImage(3X) -- A pixmap caching function that removes an image from the image cache
|
XmUninstallImage removes an image from the image cache. Points to the image structure given to the XmInstallImage() routine |
XmUpdateDisplay(3X) -- A function that processes all pending exposure events immediately
|
XmUpdateDisplay provides the application with a mechanism for forcing all pending exposure events to be removed from the input queue and processed immediately. When a user selects a button within a Me... |
XmVaCreateSimpleCheckBox(3X) -- A RowColumn widget convenience creation function
|
XmVaCreateSimpleCheckBox creates an instance of a RowColumn widget of type XmWORK_AREA and returns the associated widget ID. This routine uses the ANSI C variable-length argument list (varargs) callin... |
XmVaCreateSimpleMenuBar(3X) -- A RowColumn widget convenience creation function
|
XmVaCreateSimpleMenuBar creates an instance of a RowColumn widget of type XmMENU_BAR and returns the associated widget ID. This routine uses the ANSI C variable-length argument list (varargs) calling ... |
XmVaCreateSimpleOptionMenu(3X) -- A RowColumn widget convenience creation function
|
XmVaCreateSimpleOptionMenu creates an instance of a RowColumn widget of type XmMENU_OPTION and returns the associated widget ID. This routine uses the ANSI C variablelength argument list (varargs) cal... |
XmVaCreateSimplePopupMenu(3X) -- A RowColumn widget convenience creation function
|
XmVaCreateSimplePopupMenu creates an instance of a RowColumn widget of type XmMENU_POPUP and returns the associated widget ID. This routine uses the ANSI C variable-length argument list (varargs) call... |
XmVaCreateSimplePulldownMenu(3X) -- A RowColumn widget convenience creation function
|
XmVaCreateSimplePulldownMenu creates an instance of a RowColumn widget of type XmMENU_PULLDOWN and returns the associated widget ID. This routine uses the ANSI C variable-length argument list (varargs... |
XmVaCreateSimpleRadioBox(3X) -- A RowColumn widget convenience creation function
|
XmVaCreateSimpleRadioBox creates an instance of a RowColumn widget of type XmWORK_AREA and returns the associated widget ID. This routine uses the ANSI C variable-length argument list (varargs) callin... |
XmWidgetGetBaselines(3X) -- Retrieves baseline information for a widget
|
XmWidgetGetBaselines returns an array that contains one or more baseline values associated with the specified widget. The baseline of any given line of text is a vertical offset in pixels from the ori... |
XmWidgetGetDisplayRect(3X) -- Retrieves display rectangle information for a widget
|
XmWidgetGetDisplayRect returns the width, height and the x and y coordinates of the upper left corner of the display rectangle of the specified widget. The display rectangle is the smallest rectangle ... |
xprt_register(3) -- miscellaneous library routines for ONC remote procedure calls
|
The RPC routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the... |
xprt_unregister(3) -- miscellaneous library routines for ONC remote procedure calls
|
The RPC routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the... |
y0(3) -- Compute Bessel functions
|
The j0(), j0f(), j0l(), j1(), j1f(), and j1l() functions return the value of the Bessel function of the first kind of orders 0 (zero) and 1, respectively. The jn(), jnf(), and jnl() functions return t... |
y1(3) -- Compute Bessel functions
|
The j0(), j0f(), j0l(), j1(), j1f(), and j1l() functions return the value of the Bessel function of the first kind of orders 0 (zero) and 1, respectively. The jn(), jnf(), and jnl() functions return t... |
yn(3) -- Compute Bessel functions
|
The j0(), j0f(), j0l(), j1(), j1f(), and j1l() functions return the value of the Bessel function of the first kind of orders 0 (zero) and 1, respectively. The jn(), jnf(), and jnl() functions return t... |
ypclnt(3) -- Network Information Service (NIS) client package
|
This package of functions provides an interface to the Network Information Service (NIS) database lookup service. The package can be loaded from the standard library, /lib/libc.a. Refer to ypfiles(4) ... |
yperr_string(3) -- Network Information Service (NIS) client package
|
This package of functions provides an interface to the Network Information Service (NIS) database lookup service. The package can be loaded from the standard library, /lib/libc.a. Refer to ypfiles(4) ... |
yppasswd(3) -- Update user password in Network Information Service (NIS) password map.
|
The yppasswd() routine uses Remote Procedure Call (RPC) and External Data Representation (XDR) routines to update a user password in an Network Information Service (NIS) password map. The RPC and XDR ... |
ypprot_err(3) -- Network Information Service (NIS) client package
|
This package of functions provides an interface to the Network Information Service (NIS) database lookup service. The package can be loaded from the standard library, /lib/libc.a. Refer to ypfiles(4) ... |
yp_all(3) -- Network Information Service (NIS) client package
|
This package of functions provides an interface to the Network Information Service (NIS) database lookup service. The package can be loaded from the standard library, /lib/libc.a. Refer to ypfiles(4) ... |
yp_bind(3) -- Network Information Service (NIS) client package
|
This package of functions provides an interface to the Network Information Service (NIS) database lookup service. The package can be loaded from the standard library, /lib/libc.a. Refer to ypfiles(4) ... |
yp_first(3) -- Network Information Service (NIS) client package
|
This package of functions provides an interface to the Network Information Service (NIS) database lookup service. The package can be loaded from the standard library, /lib/libc.a. Refer to ypfiles(4) ... |
yp_get_default_domain(3) -- Network Information Service (NIS) client package
|
This package of functions provides an interface to the Network Information Service (NIS) database lookup service. The package can be loaded from the standard library, /lib/libc.a. Refer to ypfiles(4) ... |
yp_master(3) -- Network Information Service (NIS) client package
|
This package of functions provides an interface to the Network Information Service (NIS) database lookup service. The package can be loaded from the standard library, /lib/libc.a. Refer to ypfiles(4) ... |
yp_match(3) -- Network Information Service (NIS) client package
|
This package of functions provides an interface to the Network Information Service (NIS) database lookup service. The package can be loaded from the standard library, /lib/libc.a. Refer to ypfiles(4) ... |
yp_next(3) -- Network Information Service (NIS) client package
|
This package of functions provides an interface to the Network Information Service (NIS) database lookup service. The package can be loaded from the standard library, /lib/libc.a. Refer to ypfiles(4) ... |
yp_order(3) -- Network Information Service (NIS) client package
|
This package of functions provides an interface to the Network Information Service (NIS) database lookup service. The package can be loaded from the standard library, /lib/libc.a. Refer to ypfiles(4) ... |
yp_unbind(3) -- Network Information Service (NIS) client package
|
This package of functions provides an interface to the Network Information Service (NIS) database lookup service. The package can be loaded from the standard library, /lib/libc.a. Refer to ypfiles(4) ... |
_BASE_ADDRESS(3) -- locations in program and definitions
|
These names refer neither to routines nor to locations with interesting contents except for _procedure_table, _procedure_string_table, and, for Tru64 UNIX, __istart and __fstart. Except for eprol, the... |
_cobol_main(3) -- locations in program and definitions
|
These names refer neither to routines nor to locations with interesting contents except for _procedure_table, _procedure_string_table, and, for Tru64 UNIX, __istart and __fstart. Except for eprol, the... |
_DYNAMIC(3) -- locations in program and definitions
|
These names refer neither to routines nor to locations with interesting contents except for _procedure_table, _procedure_string_table, and, for Tru64 UNIX, __istart and __fstart. Except for eprol, the... |
_DYNAMIC_LINK(3) -- locations in program and definitions
|
These names refer neither to routines nor to locations with interesting contents except for _procedure_table, _procedure_string_table, and, for Tru64 UNIX, __istart and __fstart. Except for eprol, the... |
_ebss(3) -- locations in program and definitions
|
These names refer neither to routines nor to locations with interesting contents except for _procedure_table, _procedure_string_table, and, for Tru64 UNIX, __istart and __fstart. Except for eprol, the... |
_edata(3) -- locations in program and definitions
|
These names refer neither to routines nor to locations with interesting contents except for _procedure_table, _procedure_string_table, and, for Tru64 UNIX, __istart and __fstart. Except for eprol, the... |
_end(3) -- locations in program and definitions
|
These names refer neither to routines nor to locations with interesting contents except for _procedure_table, _procedure_string_table, and, for Tru64 UNIX, __istart and __fstart. Except for eprol, the... |
_etext(3) -- locations in program and definitions
|
These names refer neither to routines nor to locations with interesting contents except for _procedure_table, _procedure_string_table, and, for Tru64 UNIX, __istart and __fstart. Except for eprol, the... |
_fbss(3) -- locations in program and definitions
|
These names refer neither to routines nor to locations with interesting contents except for _procedure_table, _procedure_string_table, and, for Tru64 UNIX, __istart and __fstart. Except for eprol, the... |
_fdata(3) -- locations in program and definitions
|
These names refer neither to routines nor to locations with interesting contents except for _procedure_table, _procedure_string_table, and, for Tru64 UNIX, __istart and __fstart. Except for eprol, the... |
_ftext(3) -- locations in program and definitions
|
These names refer neither to routines nor to locations with interesting contents except for _procedure_table, _procedure_string_table, and, for Tru64 UNIX, __istart and __fstart. Except for eprol, the... |
_getlong(3) -- Retrieves 32-bit quantities from a byte stream
|
The _getlong() function gets 32-bit quantities from the byte stream or arbitrary byte boundaries. The _getlong() function is one of a set of subroutines that form the resolver, a set of functions that... |
_getshort(3) -- Retrieves short quantities from a byte stream
|
the _getshort() function gets 16-bit quantities from the byte stream or arbitrary byte boundaries. The _getshort() function is one of a set of subroutines that form the resolver, a set of functions th... |
_GOT_OFFSET(3) -- locations in program and definitions
|
These names refer neither to routines nor to locations with interesting contents except for _procedure_table, _procedure_string_table, and, for Tru64 UNIX, __istart and __fstart. Except for eprol, the... |
_longjmp(3) -- Save and restores the current execution context
|
The setjmp() and longjmp() functions are useful when handling errors and interrupts encountered in low-level functions of a program. The setjmp() function saves the current stack context and signal ma... |
_procedure_string_table(3) -- locations in program and definitions
|
These names refer neither to routines nor to locations with interesting contents except for _procedure_table, _procedure_string_table, and, for Tru64 UNIX, __istart and __fstart. Except for eprol, the... |
_procedure_table(3) -- locations in program and definitions
|
These names refer neither to routines nor to locations with interesting contents except for _procedure_table, _procedure_string_table, and, for Tru64 UNIX, __istart and __fstart. Except for eprol, the... |
_procedure_table_size(3) -- locations in program and definitions
|
These names refer neither to routines nor to locations with interesting contents except for _procedure_table, _procedure_string_table, and, for Tru64 UNIX, __istart and __fstart. Except for eprol, the... |
_setjmp(3) -- Save and restores the current execution context
|
The setjmp() and longjmp() functions are useful when handling errors and interrupts encountered in low-level functions of a program. The setjmp() function saves the current stack context and signal ma... |
_sia_isagroup(3) -- checks a list of known
|
__sia_isagroup() is a utility routine for the sia_get_groups() routines to determine whether a given group is already in the known list of groups. |
_tolower(3) -- Translate characters
|
The toascii(), tolower(), _tolower(), toupper(), and _toupper() functions translate all characters, including multibyte characters, to their specified character values. The toascii() function converts... |
_toupper(3) -- Translate characters
|
The toascii(), tolower(), _tolower(), toupper(), and _toupper() functions translate all characters, including multibyte characters, to their specified character values. The toascii() function converts... |
__exc_last_chance(3) -- support routines for unhandled exceptions
|
When called as the result of an exception, exc_dispatch_exception(3) attempts to find a handler to process the exception by searching the stack frames of procedures in the call chain. It does this by ... |
__fstart(3) -- locations in program and definitions
|
These names refer neither to routines nor to locations with interesting contents except for _procedure_table, _procedure_string_table, and, for Tru64 UNIX, __istart and __fstart. Except for eprol, the... |
__istart(3) -- locations in program and definitions
|
These names refer neither to routines nor to locations with interesting contents except for _procedure_table, _procedure_string_table, and, for Tru64 UNIX, __istart and __fstart. Except for eprol, the... |
__sia_isagroup(3) -- checks a list of known
|
__sia_isagroup() is a utility routine for the sia_get_groups() routines to determine whether a given group is already in the known list of groups. |
a.out(4) -- Assembler and link editor output
|
a.out is the output file format of the assembler as(1) and the link editor ld(1). Both programs make a.out executable if there were no errors and no unresolved external references. The debugger uses t... |
acct(4) -- Accounting include files
|
The /usr/include/sys/acct.h header file defines a type acct structure for accounting information used by various accounting files. The information in the acct.h structure is used in records in account... |
acct.h(4) -- Accounting include files
|
The /usr/include/sys/acct.h header file defines a type acct structure for accounting information used by various accounting files. The information in the acct.h structure is used in records in account... |
acl(4) -- Access control list
|
Note The Tru64 UNIX ACLs are based on the POSIX P1003.6 Draft 13 standard. Introduction    [Toc]    [Back] Traditionally, UNIX systems control a user's access to files and directories using a method ... |
acucap(4) -- Automatic call unit capabilities file
|
The /etc/acucap file lists the types of autodial modems and describes their attributes. Whenever tip encounters an at field in /etc/remote file description, it searches /etc/acucap file description. I... |
Admin(4) -- Contains administrative files used by the uucp program
|
The /usr/spool/uucp/.Admin directory contains administrative files used by the uucp program to facilitate remote communications among systems. The directory contains the following files: Contains debu... |
advfs(4) -- A local file system and utilities
|
The Advanced File System (AdvFS), the file system default on the Tru64 UNIX operating system, features rapid crash recovery, high performance, and a flexible structure that enables you to manage your ... |
advfs_err(4) -- Lists and describes error messages
|
This following list provides the error number and a brief description of the error: EHANDLE_OVF Out of memory. EINVALID_HANDLE The access structure handle is out of range. E_DOMAIN_PANIC This is an in... |
aliases(4) -- Contains alias definitions for the sendmail program
|
By default, the aliases file contains the required aliases for the sendmail program. Do not delete these defaults because they are needed by the system. This file describes user ID aliases used by the... |
ar(4) -- Archive (library) file format
|
The archive command (ar) combines several files into one. Archives are used mainly as libraries to be searched by the link-editor ld. A file produced by ar has a magic string at the start, followed by... |
atm.conf(4) -- default ATM configuration file
|
The atm.conf file is the default ATM configuration file that is processed by running the atmconfig source command. The atm.conf file is a text file that contains atmconfig commands used to configure a... |
atmhosts(4) -- ATM host name file
|
The atmhosts file is an ASCII file that contains an single-line entry for each host on the ATM network. Each entry consists of an ATM host address, official host name, and any aliases. Parameters are ... |
audit(4) -- Contains debug messages from the uucico daemon
|
The /usr/spool/uucp/.Admin/audit file contains debug messages from the uucico daemon when that daemon is invoked as a result of a call from another system. If the uucico daemon is invoked from the loc... |
auditmask_style(4) -- Audit configuration file for auditconfig
|
The auditmask_style file shadows the /etc/sec/event_aliases file for use by the auditconfig utility. Event aliases only need to occur in the auditmask_style file if the audit mask style requires a spe... |
authcap(4) -- Format of security databases (Enhanced Security)
|
The security-relevant databases used by the enhanced security subsets include the user profile databases (and by extension thier optional NIS map source files), the file control database, the terminal... |
binlog.auth(4) -- authorization file for accepting remote binlog messages
|
The /etc/binlog.auth file specifies which remote hosts are allowed to forward binlog messages to the local host. For the sake of security, only messages coming from remote hosts listed in the local /e... |
binlog.conf(4) -- binlogd configuration file
|
The /etc/binlog.conf file is a system file that enables you to configure or filter events that are to be logged by the binary error logger, binlogd. The binlogd daemon ignores blank lines and lines th... |
bootptab(4) -- BOOTP and DHCP server database
|
The bootptab file is one of several text database files employed by joind, the BOOTP and DHCP server. The file's format is similar to that of the termcap(4) file. Format    [Toc]    [Back] There are ... |
builtins(4) -- Header file declaring functions that are unconditionally intrinsic.
|
A builtin is a function whose name is specially recognized by the compiler and is similar to declaring the function to be intrinsic. Intrinsic functions are functions for which the C compiler generate... |
cdfs(4) -- The Compact Disk-Read Only Memory File System (CDFS)
|
The ISO 9660 standard describes volume and file structures for information exchange on a Compact Disk-Read Only Memory (CD-ROM) volume. CDFS supports mounting, as another local file system type, CD-RO... |
cfgmgr.auth(4) -- Configuration management server authorization database
|
The cfgmgr.auth file lists the remote systems that are authorized to modify the local system's kernel subsystem configuration. Using the sysconfig command, system administrators can maintain the kern... |
charmap(4) -- Defines character symbols as character encodings
|
The character set description (charmap) file defines character symbols as character encodings. This file is the source file for a coded character set, or codeset. All supported codesets have the Porta... |
class.h(4) -- Allocate CPU resources based on scheduling classes
|
The class scheduling features included in the operating system software let you restrict the percentage of CPU time allowed different kinds of users and tasks. This helps you allocate CPU resources so... |
class_scheduling(4) -- Allocate CPU resources based on scheduling classes
|
The class scheduling features included in the operating system software let you restrict the percentage of CPU time allowed different kinds of users and tasks. This helps you allocate CPU resources so... |
client.pcy(4) -- BOOTP and DHCP client policy
|
The client.pcy file is a text database, read by the joinc daemon on startup, which governs the behavior of BOOTP and DHCP clients. If the JOINCONFIG variable is present in the joinc environment, it is... |
Command(4) -- Contains file transfer directions for the uucico daemon
|
Command (C.*) files contain the directions that the uucp uucico daemon follows when transferring files. The full pathname of a command file is a form of the following: /usr/spool/uucp/SystemName/C.Sys... |
core(4) -- Format of memory image file
|
The system writes out a memory image of a terminated process when any of various errors occur. See sigaction(2) for the list of reasons; the most common are memory violations, illegal instructions, bu... |
Corrupt(4) -- Contains copies of files that could not be processed
|
The /usr/spool/uucp/.Corrupt directory contains copies of files that could not be processed by the uucp program. For example, if a file is not in the correct form for transfer, the uucp program places... |
cpio(4) -- Format of cpio archive
|
The header structure, when the -c option of cpio(1) is not used, is: struct { short h_magic, h_dev; ushort h_ino, h_mode, h_uid, h_gid; short h_nlink, h_rdev h_mtime[2], h_namesize, h_filesize[2]' ch... |
cp_dirs(4) -- Database configuration file used by worldwide support software
|
The cp_dirs configuration file determines the locations for the following set of database or data files: The character attribute database for user-defined characters (see cedit(1) and cgen(1)) Font da... |
c_excpt(4) -- Header file defining structured exception handling keywords, intrinsics, and structures for the C la...
|
The c_excpt.h header file defines the keywords, intrinsic functions, and structures the C language compiler uses to set up a structured exception handler or termination handler. Structured Exception H... |
Data(4) -- Contains data to be sent to remote systems
|
Data (D.*) files contain the data to be sent to remote systems by the uucp uucico daemon. The full pathname of a data file is a form of the following: /usr/spool/uucp/SystemName/D.SystemNamexxxx### wh... |
ddr.dbase(4) -- Text database file of SCSI CAM device definitions
|
Dynamic Device Recognition (DDR) is a framework for describing the operating parameters and characteristics of SCSI devices to the SCSI CAM I/O subsystem. You use a utility, /sbin/ddr_config, and a te... |
default(4) -- System default database file (Enhanced Security)
|
The system default database is unique in that it defines system-wide global values. It is designed to provide values for users and devices at a global level so that an administrator is not required to... |
devassign(4) -- Device assignment database file (Enhanced Security)
|
The system supports a single device assignment database that contains entries for login terminals and X terminals. Authentication programs use information in the device assignment database to determin... |
Devices(4) -- Contains information about devices on the local system that can establish a connection to a remote c...
|
The /usr/lib/uucp/Devices file contains information about the devices on the local system that can establish a connection to a remote computer using the uucp program. This file includes information ab... |
dhcptags(4) -- DHCP and BOOTP server database
|
Parameters (or options) returned to the client by the DHCP/BOOTP protocol are encoded in the so-called vendor field of the BOOTP packet. Each option is identified numerically, and also carries a lengt... |
Dialcodes(4) -- Contains the initial digits of telephone numbers used to establish remote connections over a telepho...
|
The /usr/lib/uucp/Dialcodes file contains the initial digits of telephone numbers used by the uucp program to establish remote connections over a telephone line. The Dialcodes file simplifies entries ... |
Dialers(4) -- Lists modems used for uucp remote communications links
|
The /usr/lib/uucp/Dialers file lists the modems used by the uucp program and specifies the initial handshaking necessary to establish remote communications links. Handshaking is a series of expect-sen... |
dir(4) -- Format of directories
|
A directory behaves like an ordinary file except that no user may write into a directory. The fact that a file is a directory is indicated by a bit in the flag word of its inode entry. See the fs refe... |
Directories(4) -- Contains queued requests for file transfers and command executions on remote systems
|
The /usr/spool/uucp/SystemName directories are the uucp program spooling directories on the local system. The uucp program creates a SystemName directory for each system listed in the /usr/adm/uucp/Sy... |
disklabel(4) -- Disk pack label
|
Each disk or disk pack on a system may contain a disk label which provides detailed information about the geometry of the disk and the partitions into which the disk is divided. It should be initializ... |
disktab(4) -- Disk description file
|
The disktab database describes disk geometries and disk partition characteristics. It is used to initialize the disk label on the disk. The format is patterned after the termcap terminal database. Ent... |
dump(4) -- Incremental dump format
|
Tapes used by dump and restore contain: The format of the header record and of the first record of each description as given in the include file is: #define NTREC 10 #define TS_TAPE 1 #... |
dumpdates(4) -- Incremental dump format
|
Tapes used by dump and restore contain: The format of the header record and of the first record of each description as given in the include file is: #define NTREC 10 #define TS_TAPE 1 #... |
dumprestor(4) -- Incremental dump format
|
Tapes used by dump and restore contain: The format of the header record and of the first record of each description as given in the include file is: #define NTREC 10 #define TS_TAPE 1 #... |
dvdfs(4) -- The Digital Versatile Disk File System
|
The Digital Versatile Disk File System enables the reading of disks formatted in the Universal Disk Format (UDF). User data sectors in a DVD-ROM can contain any type of data in any format. However, fo... |
errors(4) -- Contains a record of uucico daemon errors
|
The /usr/spool/uucp/.Admin/errors file contains a record of uucico daemon errors that the uucp program cannot correct. For example, if the uucico daemon is unable to access a directory that is needed ... |
ethers(4) -- Database that maps Ethernet addresses to hostnames
|
The /etc/ethers file is used in conjunction with the reverse address resolution protocol daemon (rarpd) to map Ethernet addresses to hostnames. It contains information about the known (48-bit) Etherne... |
evm.auth(4) -- EVM authorization file
|
Authorization is control of the right to post, subscribe to, or retrieve an EVM event, or to execute services defined in the EVM daemon configuration file. The evm.auth file is a text file that contro... |
evmchannel.conf(4) -- EVM channel configuration file
|
The term event channel describes any facility used to publish or retrieve event information. It might refer to any of the following: A simple log file An event management system A program that runs in... |
evmdaemon.conf(4) -- EVM daemon configuration file
|
The Event Manager (EVM) daemon configuration file, evmdaemon.conf, is a text file that contains commands used to configure and start the Event Manager. Any portion of a line from an unquoted number si... |
evmfilterfile(4) -- Event Manager filter file
|
A filter file contains one or more filter descriptions, which can be referenced through certain EVM commands by using indirect filter syntax. An indirect filter specifier has the following form: @file... |
evmlogger.conf(4) -- EVM logger configuration file
|
The evmlogger.conf file is the Event Manager (EVM) logger configuration file. This file is read when the logger program, evmlogger, starts, and when it reloads its configuration. The evmlogger.conf fi... |
evmtemplate(4) -- Event Manager template file
|
A template event is a description of an event that is held centrally by EVM. The template is used for the following purposes: To register the event with the EVM daemon, so that it will allow the event... |
excpt(4) -- Data structures and prototypes for exception handling support
|
The excpt.h include file brings together all of the data structures and prototypes required to support the exception handling system. Calling Standard for Alpha Systems for an overview of the system. ... |
Execute(4) -- Contains instructions for running commands that require the resources of a remote system
|
The Execute (X.*) files contain instructions for running uucp commands that require the resources of a remote system. They are created by the uux command. The full pathname of a uux command execute fi... |
exports(4) -- Defines remote mount points for NFS mount requests
|
The exports file specifies remote mount points for the NFS mount protocol per the NFS server specification (see Network File System Protocol Specification, RFC1094). Each entry in the /etc/exports fil... |
fd(4) -- file descriptor files
|
The /dev/fd file system is a pseudo-file system layered beneath the Virtual File System (VFS). The file descriptor files (fd*) are those files that are accessible through file descriptors. The file de... |
fdmns(4) -- contains file domain names and devices
|
The fdmns directory ensures access to file domains by providing symbolic links to every volume in the file domain. The mkfdmn, rmvol, and addvol utilities automatically manage the fdmns directory. Eac... |
ffm(4) -- File-on-File Mounting File System
|
The File-on-File Mounting (FFM) file system allows regular files, character device special files, or block device special files to be mounted on regular files or directories. The ffm file system is us... |
files(4) -- File control database (Enhanced Security)
|
The file control database (/etc/auth/system/files) is designed to help the Information System Security Officer (ISSO) maintain the integrity of the system. The database contains entries for system dat... |
Foreign(4) -- Logs contact attempts from unknown systems
|
The /usr/lib/uucp/.Admin/Foreign file lists access attempts by unknown systems. The /usr/lib/uucp/remote.unknown shell script appends an entry to the Foreign file each time a remote computer that is n... |
forward(4) -- forward mail
|
The .forward file allows a user to forward messages to another host, or to invoke programs (such as vacation(1)) to process their mail. It is formatted as a series of comma-separated addresses in the ... |
fs(4) -- Specifies the format of the file system volume
|
Every file system storage volume (disk, nine-track tape, for instance) has a common format for certain vital information. Each such volume is divided into a certain number of blocks. The block size is... |
fstab(4) -- Static information about mounted file systems
|
The /etc/fstab file contains descriptive information about the known file systems and the disk partitions used. In Tru64 UNIX Version 5.0, the descriptive information for partitions used in swapping a... |
fs_config_data(4) -- Describes the configuration data for an AdvFS domain.
|
The output of fs_save_config contains the AdvFS domain configuration that is used as input to the fs_restore_config function. The configuration data file entities consist of domains, volumes, filesets... |
ftpusers(4) -- The ftpd security file
|
The ftpd security file rejects remote logins to local user accounts specified in /etc/ftpusers. Restricted accounts appear one to a line; white space is prohibited. Account names must match exactly th... |
gated.conf(4) -- Gate daemon configuration file (general information)
|
The gated.conf file contains configuration information that is read by the gated daemon at initialization time. This file contains statements that control tracing options, select routing protocols, ma... |
gated.control(4) -- Gate daemon configuration file (control statements)
|
Control statements control routes that are imported from routing peers and routes that are exported to these peers. These are the final statements to be included in the gated.conf file. The following ... |
gated.proto(4) -- Gate daemon configuration file (protocol statements)
|
Routing protocols determine the "best" route to each destination and distribute routing information among the systems on a network. Routing protocols are divided into two general groups: interior (i... |
gateways(4) -- Specifies Internet routing information to the routed daemon
|
The /etc/gateways file identifies gateways for the routed daemon. Ordinarily, the routed daemon queries the network and builds routing tables. The routed daemon builds the tables from routing informat... |
gettydefs(4) -- Terminal attributes
|
The gettydefs file supplies the getty command with information about various terminal attributes, such as the default initialization and the login message. The gettydefs file contains single line entr... |
group(4) -- Group file
|
The /etc/group database contains the following information for each group: Group name Encrypted password Numerical group ID A comma-separated list of all users allowed in the group Note Do not put any... |
hosts(4) -- The host name data base
|
The hosts file contains information regarding the known hosts on the network. For each host a single line should be present with the following information: IP_address canonical_hostname aliases Items ... |
hosts.equiv(4) -- A file containing the names of remote systems and users that can execute commands on the local syste...
|
The /etc/hosts.equiv file and the file in a user's home directory contain the names of remote hosts and users that are equivalent to the local host or user. An equivalent host or user is allowed to a... |
ifaccess.conf(4) -- Interface access filter configuration file
|
The /etc/ifaccess.conf file is an optional system file that specifies access filter entries for network interfaces. Interface access filtering provides a mechanism for detecting and preventing IP spoo... |
imapd.conf(4) -- IMAP configuration file
|
The /etc/imapd.conf file is the configuration file for the IMAP server. It defines local parameters for IMAP. Each line of the /etc/imapd.conf file has the form option: value where option is the name ... |
inet.local(4) -- File to invoke local network commands
|
The inet.local file is a file that is called by /sbin/init.d/inet after all the network interfaces are up and running, but before any other network services are started. The file can contain those com... |
inetd.conf(4) -- The default configuration files for the inetd daemon
|
If the inetd daemon is started without specifying an alternate configuration file, the inetd daemon reads the inetd.conf file and inetd.conf.local file, in this order, for information on how to handle... |
inetd.conf.local(4) -- The default configuration files for the inetd daemon
|
If the inetd daemon is started without specifying an alternate configuration file, the inetd daemon reads the inetd.conf file and inetd.conf.local file, in this order, for information on how to handle... |
inittab(4) -- Controls the initialization process
|
The inittab file provides the init program with instructions for creating and running initialization processes. The init program reads the inittab file each time init is invoked. The file typically co... |
inode(4) -- Specifies the format of the file system volume
|
Every file system storage volume (disk, nine-track tape, for instance) has a common format for certain vital information. Each such volume is divided into a certain number of blocks. The block size is... |
intro(4) -- Introduction to file formats
|
This section describes the formats of various include files, program output files, and system files. Some reference pages in this section may contain suffixes to allow their files to exist with those ... |
ip6rtrd.conf(4) -- IPv6 router daemon (ip6rtrd) configuration file
|
The ip6rtrd.conf file contains configuration information that is read by the ip6rtrd daemon at initialization time. This file contains statements that control information sent in router advertisements... |
ipnodes(4) -- The IP node name database
|
The ipnodes file contains information regarding the known IP nodes (both IPv4 and IPv6) on the network. For each node a single line should be present with the following information: IP_address canonic... |
iptos(4) -- Defines the IP Type Of Service (TOS) for FTP and Telnet
|
The /etc/iptos file configures the Type Of Service (TOS) of the Internet Protocol (IP) used by FTP and Telnet. The TOS field in the Internet datagram is to specify how the datagram should be handled. ... |
issue(4) -- Issue identification file
|
The /etc/issue file is a freely formatted ASCII file. If present, the getty program reads this file and writes its contents to any terminal spawned or respawned from the /etc/inittab file prior to wri... |
issue.net(4) -- Network issue identification file
|
The /etc/issue.net file is a freely formatted ASCII file. If present, the telnetd daemon reads this file and writes its contents over a new telnet connection prior to starting the login dialog. Use th... |
join.ipaddresses(4) -- Acceptable formats for string representations of IP addresses
|
A character string representation of an IP address, as used within JOIN, is written as one, two, three, or four numeric fields with a period (.), separating each field, and without interleaving whites... |
kitcap(4) -- Kit descriptor database for gentapes and gendisk utilities
|
The kitcap file is a database for kit descriptors. This database contains product codes, media codes, and the names of the directories, files, and subsets that make up a product description used by ge... |
krb.conf(4) -- Contains configuration information that describes the default realm of the host, the administration ...
|
The /krb5/krb.conf file is a text file that contains configuration information that describes the default realm of the host, the administration server, and Kerberos servers for known realms. It lists ... |
krb.realms(4) -- Contains configuration information that associates host names with realm names
|
The /krb5/krb.realms file is a text file that associates host names with their realm names. Secured applications use the krb.realms file to determine the realm from which to request a ticket to gain a... |
ldapcd.conf(4) -- Configuration file for LDAP authentication.
|
The ldapcd.conf file contains the configuration and operating parameters for the LDAP authentication daemon. To modify ldapcd.conf, use one of the following methods: Use the SysMan Menu options. Expan... |
ldapusers.deny(4) -- Contains the names of Tru64 UNIX users who will not be authenticated by LDAP authentication
|
The /etc/ldapusers.deny is a text file in which you enter the name of a Tru64 UNIX user who will not be authenticated by LDAP authentication. Users listed in the ldapusers.deny file are authenticated ... |
ldfcn(4) -- Common object file access routines
|
The common object file access routines are a collection of functions for reading an object file that is in common object file form (COFF). Although the calling program must know the detailed structure... |
limits(4) -- Header files for implementation-specific constants
|
The header file limits.h specifies the sizes of integral types as required by the proposed ANSI C standard. The header file float.h specifies the characteristics of floating types as required by the p... |
local(4) -- Symbolic link to CDSL root /cluster/members/{memb}
|
The .local.. file is a symbolic link to the /cluster/members/{memb} file system, which contains directories and links that support Context Dependent Symbolic Links (CDSLs). This file system supports t... |
local.users(4) -- Specifies mail recipients on the local host.
|
The local.users file contains a list of user names whose mail is to be delivered to the local host and whose return address is username@hostname. Entries in the local.hosts file are in addition to oth... |
locale(4) -- Contains one or more categories that describe a locale
|
A locale definition source file contains one or more categories that describe a locale. You can convert a locale definition source file into a locale by using the localedef command. Locales can be mod... |
locks(4) -- A directory that contains lock files for communication devices and remote systems that prevent multi...
|
Lock files are created by the uucico daemon, the cu command, the tip command, and the uugetty command in the /var/spool/locks directory. The files are created when the utility opens the serial line fo... |
Log(4) -- Contains the uucp program log files
|
The /usr/spool/uucp/.Log directories contain uucp program log files. The uucp program normally places status information about each transaction in the appropriate log file each time you use the networ... |
lprsetup(4) -- Printer configuration files
|
The lprsetup.dat file contains configuration data for all printers supported by Tru64 UNIX that have special options such as duplex printing. This file is generated automatically from individual print... |
lprsetup.dat(4) -- Printer configuration files
|
The lprsetup.dat file contains configuration data for all printers supported by Tru64 UNIX that have special options such as duplex printing. This file is generated automatically from individual print... |
ltf(4) -- labeled tape facility
|
The term ltf (Labeled Tape Facility) refers to the group of programs required to fulfill the features and functionality outlined here. References for the substance of this document are based on: Ameri... |
magic(4) -- Magic file for the file command
|
The magic file is used by the file command to identify files that have some sort of magic number. A magic number is any numeric or string constant that identifies the file containing the constant. The... |
matrix.conf(4) -- SIA (Security Integration Architecture) configuration file
|
The matrix.conf file provides the means to configure the SIA security mechanisms for security sensitive commands. Each security mechanism provider should either use the siacfg command to update the ma... |
mcicap(4) -- media changer capability database
|
The mcicap file is a database consisting of media changer descriptions. Each entry within the mcicap file describes a specific media changer, or a model of media changer. The entries within the mcicap... |
mh-alias(4) -- Alias file for MH message system
|
Aliasing allows you to send mail to a person or group of persons without typing their complete mail address. Both your MH personal alias file and the system alias file for mail delivery, /usr/lib/mh/M... |
mh-format(4) -- Format file for the MH message system
|
Several MH commands utilize either a format string or a format file during their execution. For example, scan(1) uses a format string which specifies how scan should generate the scan listing for each... |
mh-mail(4) -- Message format for the MH message system
|
MH processes messages in a particular format. Although neither Bell nor Berkeley mailers produce message files in the format that MH prefers, MH can read message files in that format. Each user has a ... |
mh_profile(4) -- User customization file for the MH message system
|
Each user of MH is expected to have a file named .mh_profile in his or her home directory. This file contains a set of static user parameters used by some or all programs in the the MH family. Each li... |
mountdtab(4) -- Table of local file systems mounted by remote NFS clients
|
The mountdtab file resides in the /etc directory and contains a list of all remote hosts that have mounted local file systems using the NFS protocols. Whenever a client performs a remote mount, the se... |
mqueue(4) -- Contains the log file and temporary files associated with the messages in the mail queue
|
The /usr/spool/mqueue directory contains temporary files associated with the messages in the mail queue and may contain the log file. Temporary files have names that include the mail queue ID (MQID) o... |
msgb(4) -- Defines a STREAMS message block
|
The msgb structure defines a message block. A message block carries data or information in a stream. A STREAMS message consists of message blocks linked through b_cont. Each message block points to a ... |
msqid_ds(4) -- Defines a message queue
|
The msqid_ds structure defines a message queue associated with a message queue ID. There is one queue per message queue ID. Collectively, the queues are stored as an array, with message queue IDs serv... |
mtstailor(4) -- System customization for MH message system
|
The file /usr/lib/mh/mtstailor defines run-time options for those MH programs that interact in some form with the message transport system. At present, these (user) programs are: ap, conflict, inc, ms... |
named.boot(4) -- named configuration file
|
With Berkeley Internet Name Domain (BIND) Version 8.1.1, the name and format of the named daemon configuration (or boot) file has changed. See named.conf(4) reference page for a description. named.boo... |
named.conf(4) -- named configuration file
|
This file is the default configuration (or boot) file for the named server. This configuration file replaces the named.boot file. The named daemon reads the start-up file when the named daemon starts ... |
named.stats(4) -- Contains BIND server statistics
|
The named.stats file contains server statistics for queries to and from hosts in a BIND environment. You can use this data to determine the load on a DNS server and diagnose problems. See the named(8)... |
namepool(4) -- DHCP server database
|
The namepool database provides joind with names that are available for dynamic assignment to clients of the DHCP protocol. For each DHCP server and domain name (NIS or DNS), the database contains a co... |
netgroup(4) -- List of network groups
|
The netgroup file defines network-wide groups used for permission checking when doing remote mounts, remote logins, and remote shells. For remote mounts, the information in the netgroup file is used t... |
netmasks(4) -- DHCP server database
|
The netmasks file is employed by joind, the DHCP server, to inform it about any networks having non-standard subnet masks. This file is only needed on those platforms which don't provide a netmasks d... |
netrc(4) -- Specifies automatic login information for ftp
|
The file contains the information used by the automatic login (autologin) feature of the ftp command. It is a hidden file in your home directory and must be owned by the user logging in, or by the roo... |
nets(4) -- JOIN DHCP server database
|
The nets file is employed by joind, the JOIN DHCP server, to tell it which networks to administer and the ranges of IP addresses available for dynamic assignment on each of those networks. FORMATÂ Â Â Â [... |
networks(4) -- Contains network name information
|
The networks file contains information about the known networks that comprise the DARPA (Defense Advanced Research Projects Agency) Internet. Each network is represented by a single line in the networ... |
nfs(4) -- Network File System (NFS) information
|
NFS is a facility for sharing files in a heterogeneous environment of processors, operating systems, and networks. Sharing is accomplished by mounting a remote file system or directory on a local syst... |
nfs_intro(4) -- Network File System (NFS) information
|
NFS is a facility for sharing files in a heterogeneous environment of processors, operating systems, and networks. Sharing is accomplished by mounting a remote file system or directory on a local syst... |
ntp.conf(4) -- Network Time Protocol (NTP) configuration file
|
The xntpd configuration file, /etc/ntp.conf, is read by xntpd at startup. The xntpd configuration file is relatively free of formatting. Comments, which may be freely inserted, begin with a # characte... |
ntp.drift(4) -- Network Time Protocol (NTP) drift file
|
When the NTP daemon (xntpd) is first started, it computes the error in the intrinsic frequency of the clock on the computer it is running on. This process usually takes about a day or two after the da... |
ntp.keys(4) -- Network Time Protocol (NTP) authentication key file
|
The NTP standard specifies an extension to allow verification of the authenticity of received NTP packets and to provide an indication of authenticity in outgoing packets. This is implemented in xntpd... |
numa_scheduling_groups(4) -- HP Tru64 UNIX NUMA Scheduling Groups description (libnuma library)
|
Normally, the kernel scheduler attempts to distribute the workload evenly over the entire machine. When the system resources are evenly utilized, the machine is considered to be balanced. When balanci... |
numa_types(4) -- Data types used by NUMA application interfaces
|
This reference page lists and describes the data types, flags, structures, and unions that are defined in the header file to support the HP Tru64 UNIX NUMA APIs. The program must call r... |
ogated.conf(4) -- Contains configuration information for the ogated daemon
|
The /etc/ogated.conf file contains configuration information that is read by the ogated daemon at initialization time. This file contains stanzas that control tracing options, select routing protocols... |
olar.config(4) -- Online Addition and Removal policy configuration files
|
The olar.config and olar.config.common files provide userdefinable policy settings that control the behavior of the Automatic Deallocation Facility. The Automatic Deallocation Facility will attempt to... |
olar.config.common(4) -- Online Addition and Removal policy configuration files
|
The olar.config and olar.config.common files provide userdefinable policy settings that control the behavior of the Automatic Deallocation Facility. The Automatic Deallocation Facility will attempt to... |
Old(4) -- Contains the combined uucp program log files
|
The /usr/spool/uucp/.Old directory contains the combined uucp program log files. The uucp program creates log files of the activities of the uucico and uuxqt daemons in the /usr/spool/uucp/.Log direct... |
passwd(4) -- Password files
|
A passwd file is a file consisting of records separated by newline characters, one record per user, containing seven colon (:) separated fields. These fields are as follows: User's login name. The de... |
patterns(4) -- Patterns for use with internationalization tools
|
The patterns file contains the patterns that must be matched for the internationalization tools extract, strextract, and strmerge. The pattern file in the following example is the default patterns fil... |
pax(4) -- Archive file format
|
The cpio, pax, and tar commands dump several files into one, in a medium suitable for transportation. This file is often referred to as a tar file, or tar tape, since it was originally designed to be ... |
pdsc(4) -- Defines structures describing procedures conforming to the Calling Standard for Alpha Systems .
|
The pdsc.h header file defines two basic data structures: the code range descriptor (crd) and the run-time procedure descriptor (rpd). Code range descriptors associate a contiguous sequence of address... |
Permissions(4) -- Contains information about the permissions that remote computers have with respect to login, file ac...
|
The /usr/lib/uucp/Permissions file contains information about the ways in which the remote computers listed in the Systems file are allowed to carry out uucico and uuxqt transactions with a local syst... |
phones(4) -- File containing the remote host phone number database
|
This file is normally unreadable, and so may contain privileged information. The format of the file is a series of lines of the form: systemname phone-number where systemname is defined in the /etc/re... |
Poll(4) -- Contains information specifying when the UNIX-toUNIX Copy Program (UUCP) should poll designated remo...
|
The /usr/lib/uucp/Poll file contains information for polling remote computers. Each entry in the Poll file contains the name of a remote computer to call, followed by a character, and a sequence... |
prestotab(4) -- Lists the file systems for Prestoserve to accelerate
|
The /etc/prestotab file contains descriptive information about the mounted file systems whose I/O will be automatically accelerated with Prestoserve when the system starts up. This file is created by ... |
printcap(4) -- Printer capability data base
|
The printcap file is used to describe printer characteristics. The format of the printcap file is a simplified version of the /etc/termcap database format. The lpd line printer daemon accesses the /et... |
proc(4) -- The process (/proc) file system and associated ioctl requests
|
The /proc file system is layered beneath the Virtual File System (VFS). It is a pseudo-file system that occupies no disk space. The /proc pseudo-file system appears to contain files, but these are act... |
processor_sets(4) -- Collections of processors
|
A processor set is a collection of processors. When a processor set is first created, it does not contain any processors. You can add processors to a processor set, remove processors from a processor ... |
procset(4) -- Send a signal to one or more processes
|
The contents of the structure define a set of target processes based on logical operations performed on the two sets of potential target processes indicated by the two pairs of id + type p... |
proplist(4) -- The storing, parsing, and retrieving of Extended File Attributes
|
Tru64 UNIX supports the storing, parsing, and retrieving of Extended File Attributes. An Extended File Attribute is a name and value pair that is contained in a variablesized structure called a Proper... |
protocols(4) -- Defines the Internet protocols used on the local host
|
The /etc/protocols file contains information about the known protocols used in the Internet. Each protocol is represented by a single line in the protocols file. Each entry is of the form: Name Number... |
protocols.map(4) -- Specifies node names for protocols configured on your machine.
|
This file contains the Phase IV, Phase V, UUCP, and X25 node names for your system if the respective protocols are running on your machine. The format of the file is as follows: protocols?Phase_IV_nam... |
prpasswd(4) -- Protected password authentication database (Enhanced Security)
|
An authentication profile is maintained for each user on the system. This user profile is kept in the protected password database, accessible only to trusted programs acting on behalf of the trusted c... |
prpwd(4) -- Protected password authentication database (Enhanced Security)
|
An authentication profile is maintained for each user on the system. This user profile is kept in the protected password database, accessible only to trusted programs acting on behalf of the trusted c... |
psm.h(4) -- Header file for the PSM vital process monitoring subsystem
|
The Process Set Manager (PSM) is a loadable kernel subsystem that monitors the state of vital processes. The PSM is layered the Kernel Set Manager (KSM), and uses the Category and MIB-id relationships... |
queuedefs(4) -- Queue description file for at, batch, and cron commands
|
The queuedefs file describes the characteristics of the queues managed by cron or specifies other characteristics for cron. Each noncomment line in this file describes either one queue or a cron chara... |
random(4) -- Kernel random number source devices
|
The /dev/random and /dev/urandom character device special files provide an interface to the kernel random number generator. The random number generator gathers environmental data from device drivers a... |
remote(4) -- Remote host description file
|
The /etc/remote file stores in an ASCII file, remote system attributes known by tip. Each line in the file provides a description for a single system. Fields are separated by colons (:). Lines ending ... |
remote.unknown(4) -- Logs access attempts by unknown remote systems
|
The /usr/lib/uucp/remote.unknown file contains a shell procedure. It is executed by the uucp program when a remote computer that is not listed in the local /usr/lib/uucp/Systems file attempts to commu... |
resolv.conf(4) -- Resolver configuration file
|
The resolver is a set of routines in the C library (resolver(4)) that provide access to the Internet Domain Name System. The resolver configuration file contains information that is read by the resolv... |
resolver(4) -- resolver configuration file
|
The resolver is a set of routines in the C library that provide access to the Internet Domain Name System. The resolver configuration file (resolv.conf) contains information that is read by the resolv... |
rhosts(4) -- Specifies remote users who can use a local user account
|
The file contains a list of remote users who are not required to supply a login password when they use the local user account and execute the rcp, rlogin, and rsh commands. The file contains a list of... |
routes(4) -- Specifies Internet routing information to the routing tables
|
Static routes can be defined in the /etc/routes file. The /etc/routes file identifies static routes that are automatically added to the network routing tables with the /usr/sbin/route add command. The... |
rpc(4) -- Remote procedure call file
|
The rpc file is an ASCII file that contains the following information: rpc name numerical rpc ID aliases Each rpc name is separated from the next by a new line. Items are separated by any number of bl... |
sccsfile(4) -- Contains Source Code Control System (SCCS) information
|
The sccsfile file is a text file consisting of six logical parts: checksum, delta table, user names, flags, comments, and body. Note that there are lines throughout an SCCS file that begin with the AS... |
securettys(4) -- Secure terminal database file
|
Security Note The terminal database file used on a trusted system is /etc/auth/system/ttys and is documented in the ttys(4) reference page. The /etc/securettys file specifies the tty lines that are co... |
semid_ds(4) -- Defines a semaphore set
|
The semid_ds structure defines a semaphore set associated with a semaphore ID. There is one semaphore set per semaphore ID. A semaphore set is implemented as an array of sem_nsems semaphores, with sem... |
sendmail.cf(4) -- Contains the sendmail configuration file data
|
The sendmail.cf file contains configuration information for the sendmail daemon. For further information on sendmail, see the sendmail(8) reference page, the sendmail book by O'Reilly & Associates, o... |
server.pcy(4) -- BOOTP and DHCP server policy
|
The server.pcy file is a text database that governs the behavior of BOOTP and DHCP servers. If the joind daemon is invoked to use text databases, it reads the server.pcy file on startup. If the JOINCO... |
services(4) -- Defines the sockets and protocols used for Internet services
|
The /etc/services file associates Internet service names and aliases with the port number and protocol used by the service. Each service is listed in this file on a single line of the form: ServiceNam... |
shells(4) -- Shell database
|
The shells file contains a list of the shells on the system. For each shell, the file should contain a single line consisting of the shell's path, relative to root. A # (number sign) indicates the be... |
shmid_ds(4) -- Defines a shared memory region
|
The shmid_ds structure defines a shared memory region associated with a shared memory region ID. There is one shared memory region per ID. Collectively, the shared memory regions are maintained in a s... |
shosts(4) -- Specifies remote users who can use a local user account
|
The file contains a list of remote users who are not required to supply a login password when they use the local user account and execute the rcp, rlogin, and rsh commands. The file contains a list of... |
sialog(4) -- SIA (Security Integration Architecture) log file
|
The sialog file provides SIA layer accounting information. This data includes the success and failure results of security-related commands such as login, passwd, and su. |
signal(4) -- Contains definitions and variables used by signal functions
|
The /usr/include/signal.h file defines the signals described in the following table. ------------------------------------------------------------------- Signal Number Meaning -------------------------... |
signal.h(4) -- Contains definitions and variables used by signal functions
|
The /usr/include/signal.h file defines the signals described in the following table. ------------------------------------------------------------------- Signal Number Meaning -------------------------... |
slhosts(4) -- File containing information on how to configure SLIP links
|
The slhosts file is the file that contains information for configuring SLIP links. If the system is configured to answer calls, the following events occur: A getty process prompts for a login name. If... |
sm(4) -- Status monitor directories and file structures
|
The directories /etc/sm and /etc/sm.bak are generated by the rpc.statd daemon. Each entry in /etc/sm represents the name of the system to be monitored by the status monitor. Upon its recovery, the sta... |
sm.bak(4) -- Status monitor directories and file structures
|
The directories /etc/sm and /etc/sm.bak are generated by the rpc.statd daemon. Each entry in /etc/sm represents the name of the system to be monitored by the status monitor. Upon its recovery, the sta... |
sms.sme(4) -- SysMan Station event file
|
Introduction to System Management Event Files The SysMan Station Event file (.sme) describes all the events to which the SysMan Station daemon (smsd) should subscribe. In addition to event names, it a... |
ssh2_config(4) -- Configuration file for the Secure Shell client
|
The configuration file for the Secure Shell client reads configuration data from the following sources, in this order: the system's global configuration file (/etc/ssh2/ssh2_config) the user's confi... |
sshd-check-conf(4) -- Check what the configuration allows or denies based on incoming user and/or host name
|
The shd-check-conf file checks how sshd2 will react to an incoming user, based on the user name and the remote host name given as parameters. The following parameters are checked: AllowHosts DenyHosts... |
sshd2_config(4) -- Configuration file for the sshd2 daemon
|
The sshd2 daemon reads configuration data from the /etc/ssh2/sshd2_config file (or the file specified with the sshd2 -f command). The file contains keyword-argument pairs, one per line. Empty lines an... |
sshd2_subconfig(4) -- Describes the subconfiguration that can be used for the sshd2 daemon
|
You can specify configuration options in subconfiguration files that have the same format as the main configuration file. They are read after the daemon forks a new process to handle the connection. I... |
ssh_certificates(4) -- Describes the configuration files and keywords needed when using certificates with the Secure Shell ...
|
When using certificates with Secure Shell software, you need the ssh2_config Version 1.1 and sshd2_config Version 1.1 files and one or more special mapping files holding the user authorization data. (... |
ssh_externalkeys(4) -- Describes the external key providers that can be used with ssh2 software
|
For applications capable of using external keys, two strings must be specified: The provider name The initialization string for the provider These strings can be given on the command line or in the co... |
stab(4) -- Symbol table types
|
The stab.h header file defines some values of the n_type field of the symbol table of a.out files. These are the types for permanent symbols (that is, not local labels, etc.) used by the old debugger ... |
stanza(4) -- Stanza file format
|
A stanza file format is used in conjunction with the libAF(3) stanza file library. The stanza file syntax rules are as follows: Separate entries by one or more blank lines. A colon (:) terminates a en... |
state(4) -- Status monitor directories and file structures
|
The directories /etc/sm and /etc/sm.bak are generated by the rpc.statd daemon. Each entry in /etc/sm represents the name of the system to be monitored by the status monitor. Upon its recovery, the sta... |
statmon(4) -- Status monitor directories and file structures
|
The directories /etc/sm and /etc/sm.bak are generated by the rpc.statd daemon. Each entry in /etc/sm represents the name of the system to be monitored by the status monitor. Upon its recovery, the sta... |
Status(4) -- Contains information about the status of the uucp program contacts with remote systems
|
The /usr/spool/uucp/.Status directory contains information about the status of the uucp program contacts with remote systems. For each remote system contacted, the uucp program creates a file in the d... |
stl_comp(4) -- setld compression option files (*.comp)
|
Each software product that is distributed for installation by the setld utility can have an associated compression option file (productname.comp) where productname is the unique three-character produc... |
stl_ctrl(4) -- setld software subset control files (*.ctrl)
|
Each software subset that is distributed for installation with the setld utility has an associated subset control file (subsetname.ctrl), for example: OATODB100.ctrl. This file, created by kits utilit... |
stl_image(4) -- setld software subset image data files (*.image)
|
Each software product that is distributed for installation with the setld utility has an associated image data file (prodcode.image) created by the kits utility, where prodcode is the unique three-cha... |
stl_inv(4) -- setld inventory file format (*.inv)
|
Each software subset that is distributed for installation by the setld utility has an associated inventory file (subsetname.inv) created by the kits utility, for example: OATODB100.inv. The inventory ... |
stl_key(4) -- setld kit manufacturing key files (*.k)
|
Each software product that is distributed for installation by the setld utility has an associated key file. The key file's name consists of the unique three-letter product code and a three-digit vers... |
stl_mi(4) -- Software distribution master inventory files (*.mi)
|
Each software product that is distributed for installation by the setld utility has an associated master inventory file. The master inventory file's name consists of the unique three-letter product c... |
stl_scp(4) -- Subset control program conventions for the setld utility (*.scp)
|
Each software subset that is distributed for installation by the setld utility can have an associated subset control program file (subsetname.scp), for example: OATODB100.scp. A subset control program... |
stl_sts(4) -- setld subset status file
|
The setld utility generates a subset status file, subset.sts, before installing each subset. This file describes the software subset's installation status, reflecting the success or failure of specif... |
streamadm(4) -- Defines configuration information about a STREAMS module or driver
|
The streamadm structure defines additional configuration information for a STREAMS module or driver. The operating system configuration procedure uses this structure in addition to the traditional str... |
strsetup.conf(4) -- Configuration file for STREAMS drivers
|
The /etc/strsetup.conf file is the configuration file for STREAMS drivers. The strsetup.conf file specifies one or more character special files (or nodes) to be created when a STREAMS driver is config... |
svc.conf(4) -- Database service selection configuration file
|
This file is obsolete, except for statically-built applications and sendmail, if the Name Service Switch is installed. See nsswitch.conf(5) for more information. The /etc/svc.conf file is a mandatory ... |
sysconfigtab(4) -- Configurable subsystem definition database file
|
The sysconfigtab file contains initial values for the attributes of subsystems that can be dynamically configured. The information in the sysconfigtab file is loaded into an in-memory kernel database ... |
syslog.auth(4) -- authorization file for accepting remote syslog messages
|
The /etc/syslog.auth file specifies which remote hosts are allowed to forward syslog messages to the local host. For the sake of security, only messages coming from remote hosts listed in the local /e... |
syslog.conf(4) -- syslogd configuration file
|
The /etc/syslog.conf file is a system file that enables you to configure or filter events that are to be logged by syslogd. You can specify more than one facility and its severity level by separating ... |
syslog_evm.conf(4) -- EVM syslog subscription configuration file
|
The syslog_evm.conf file is a text file that specifies what syslog messages will be forwarded from the syslog daemon to the Event Manager, EVM,in the form of EVM events. Those syslog messages are post... |
Systems(4) -- Contains information about remote systems that can be contacted using the uucp program.
|
The /usr/lib/uucp/Systems file contains an entry for each remote system that the local system can communicate with using uucp. The uucp program cannot establish a connection with a remote system unles... |
tar(4) -- Archive file format
|
The cpio, pax, and tar commands dump several files into one, in a medium suitable for transportation. This file is often referred to as a tar file, or tar tape, since it was originally designed to be ... |
telnetrc(4) -- Specifies setup commands for a telnet session
|
The .telnetrc file contains the setup information for a telnet session. It is a hidden file in your home directory and must be readable by the user logging in. The file can consist of multiple entries... |
Temporary(4) -- Stores data files during transfers to remote systems
|
The uucp Temporary (TM.*) files store data files during transfers to remote systems. After a Data (D.*) file is transferred to a remote system by the uucico daemon, the uucp program places it in a sub... |
term(4) -- Terminal driver tables for nroff
|
The nroff(1) command uses driver tables to customize its output for various types of output devices. These driver tables are written as C programs and compiled and installed in /usr/share/lib/term/tab... |
termcap(4) -- Terminal capability database
|
The termcap file is a database describing terminals used by tset and BSD curses. Terminals are described in the termcap database by specifying a set of capabilities that they have and by describing ho... |
terminfo(4) -- Describes terminals by capability
|
A terminfo file is a database that describes the capabilities and method of operation of various terminals. The database includes definitions of initialization sequences, padding requirements, cursor ... |
termios(4) -- Defines the structure of the termios file, which provides the terminal interface for POSIX compatibi...
|
The /usr/include/termios.h header file is used to obtain and modify attributes required by the terminal driver. These attributes control input and output processing. The definition values and structur... |
termios.h(4) -- Defines the structure of the termios file, which provides the terminal interface for POSIX compatibi...
|
The /usr/include/termios.h header file is used to obtain and modify attributes required by the terminal driver. These attributes control input and output processing. The definition values and structur... |
ttys(4) -- Terminal control database file (Enhanced Security)
|
Notes The secure terminal database file, /etc/securettys, controls root logins for all security levels. The file is described in the securettys(4) reference page. By default, the enhanced security ter... |
ttysrch(4) -- Lists absolute path names for tty name searches
|
The ttysrch file contains a list of absolute path names. This list is used by the ttyname(3) system call to resolve tty names that are not contained in the /dev directory. Each entry in the ttysrch fi... |
tzfile(4) -- Time zone information
|
The time zone information files used by tzset(3) begin with bytes reserved for future use, followed by six fourbyte values, written in a standard byte order (that is, with the high-order byte of the v... |
urandom(4) -- Kernel random number source devices
|
The /dev/random and /dev/urandom character device special files provide an interface to the kernel random number generator. The random number generator gathers environmental data from device drivers a... |
utmp(4) -- Login records
|
The utmp file records information about who is currently using the system. The file is a sequence of utmp entries, as defined in struct utmp in the utmp.h file. The utmp structure gives the name of th... |
utxd.conf(4) -- Configuration file used by utxd
|
The utxd.conf file is read by the utxd daemon and contains information about other utx daemons that have to be spawned. In this file, lines that begin with the character # are treated as comment lines... |
uudemon(4) -- Administrative shell scripts for polling remote systems, cleaning up spool directories, reporting st...
|
All the scripts can be run from the command line or can be run automatically by the cron daemon. To automatically run the scripts, remove the comment character (#) from the beginning of the relevant l... |
uudemon.admin(4) -- Administrative shell scripts for polling remote systems, cleaning up spool directories, reporting st...
|
All the scripts can be run from the command line or can be run automatically by the cron daemon. To automatically run the scripts, remove the comment character (#) from the beginning of the relevant l... |
uudemon.cleanu(4) -- Administrative shell scripts for polling remote systems, cleaning up spool directories, reporting st...
|
All the scripts can be run from the command line or can be run automatically by the cron daemon. To automatically run the scripts, remove the comment character (#) from the beginning of the relevant l... |
uudemon.hour(4) -- Administrative shell scripts for polling remote systems, cleaning up spool directories, reporting st...
|
All the scripts can be run from the command line or can be run automatically by the cron daemon. To automatically run the scripts, remove the comment character (#) from the beginning of the relevant l... |
uudemon.poll(4) -- Administrative shell scripts for polling remote systems, cleaning up spool directories, reporting st...
|
All the scripts can be run from the command line or can be run automatically by the cron daemon. To automatically run the scripts, remove the comment character (#) from the beginning of the relevant l... |
v5srvtab(4) -- Contains the service key table
|
The /krb5/v5srvtab file is the default service key table file that contains the principal entries that you extract from the principal database on the Key Distribution Center (KDC). Each service princi... |
volmake(4) -- Format of a volmake description file
|
Descriptions of configuration records can be given to the volmake utility either on the command line or in a file. Descriptions given on the command line can specify only one new record. Descriptions ... |
vol_pattern(4) -- Logical Storage Manager (LSM) search specifications
|
The vol_pattern search expression language can be used in volprint and voledit, and with some Logical Storage Manager support library functions, to locate Logical Storage Manager configuration records... |
Workspace(4) -- Holds temporary files used internally by file transport programs
|
The /usr/spool/uucp/.Workspace directory holds temporary files of various kinds used internally by uucp file transport programs. |
wtmp(4) -- Login records
|
The utmp file records information about who is currently using the system. The file is a sequence of utmp entries, as defined in struct utmp in the utmp.h file. The utmp structure gives the name of th... |
xferstats(4) -- Contains information about the status of file transfer requests
|
The /usr/spool/uucp/.Admin/xferstats file contains information about the status of each uucp file transfer request. The xferstats file contains the following information: System name Name of the user ... |
Xqtdir(4) -- Contains temporary files used by the uuxqt daemon to execute remote command requests
|
The /usr/spool/uucp/.Xqtdir directory contains temporary files used by the uuxqt daemon to execute remote command requests. |
ypfiles(4) -- Network Information Service (NIS) database and directory structure
|
The NIS database lookup service uses a database of dbm/ndbm, btree, or hash files in the /var/yp directory hierarchy. A dbm/ndbm database consists of two files created by calls to the dbminit(3) funct... |
AddCallBlock(5) -- Allows an Atom tool's instrumentation routine to add, within an application program, calls to analys...
|
The Atom application instrumentation routines allow you to add arbitrary procedure calls before and after objects, procedures, basic blocks, and instructions. You can also add procedure calls before a... |
AddCallEntry(5) -- Allows an Atom tool's instrumentation routine to add, within an application program, calls to analys...
|
The Atom application instrumentation routines allow you to add arbitrary procedure calls before and after objects, procedures, basic blocks, and instructions. You can also add procedure calls before a... |
AddCallInst(5) -- Allows an Atom tool's instrumentation routine to add, within an application program, calls to analys...
|
The Atom application instrumentation routines allow you to add arbitrary procedure calls before and after objects, procedures, basic blocks, and instructions. You can also add procedure calls before a... |
AddCallObj(5) -- Allows an Atom tool's instrumentation routine to add, within an application program, calls to analys...
|
The Atom application instrumentation routines allow you to add arbitrary procedure calls before and after objects, procedures, basic blocks, and instructions. You can also add procedure calls before a... |
AddCallProc(5) -- Allows an Atom tool's instrumentation routine to add, within an application program, calls to analys...
|
The Atom application instrumentation routines allow you to add arbitrary procedure calls before and after objects, procedures, basic blocks, and instructions. You can also add procedure calls before a... |
AddCallProgram(5) -- Allows an Atom tool's instrumentation routine to add, within an application program, calls to analys...
|
The Atom application instrumentation routines allow you to add arbitrary procedure calls before and after objects, procedures, basic blocks, and instructions. You can also add procedure calls before a... |
AddCallProto(5) -- Allows an Atom tool's instrumentation routine to add, within an application program, calls to analys...
|
The Atom application instrumentation routines allow you to add arbitrary procedure calls before and after objects, procedures, basic blocks, and instructions. You can also add procedure calls before a... |
AddXlateAddress(5) -- Atom routines used to determine the instrumented PC for selected instructions
|
Atom's Xlate routines allow you to determine the instrumented PC for selected instructions. You can use these functions to build a table that translates an instruction's PC in the instrumented appli... |
AddXlateEntry(5) -- Atom routines used to determine the instrumented PC for selected instructions
|
Atom's Xlate routines allow you to determine the instrumented PC for selected instructions. You can use these functions to build a table that translates an instruction's PC in the instrumented appli... |
AnalHeapBase(5) -- Obtains the base address of the analysis heap
|
An Atom tool's analysis routine calls the AnalHeapBase routine to obtain the base address of the analysis heap. Although Atom's default location for the analysis heap is usually sufficient for most ... |
ANSI(5) -- Support for industry standards
|
Programming interfaces and utilities conform to a number of standards. The full names and mnemonics for the industry standards supported by the operating system software, along with the manuals where ... |
appletviewer(5) -- The Java Development Kit tools
|
This reference page describes the java command only. The Java Development Kit (JDK) is part of the Java Virtual Machine (VM). If the JDK documentation was installed on your Tru64 UNIX system, you can ... |
armtech(5) -- Aurema's ARMTech (Active Resource Management Technology) resource management suite
|
This reference page provides a brief introduction to Aurema's ARMTech resource management software for Tru64 UNIX. Full documentation and usage information is provided in the software subsets. The so... |
ascii(5) -- Octal, hexadecimal, and decimal ASCII character sets
|
The octal character set is: 000 nul 020 dle 040 sp 060 0 100 @ 120 P 140 ` 160 p 001 soh 021 dc1 041 ! 061 1 101 A 121 Q 141 a 161 q 002 stx 022 dc2 042 " 062 2 102 B 122 R 142 b 162 r 003 etx 023 dc... |
atom_application_instrumentation(5) -- Allows an Atom tool's instrumentation routine to add, within an application program, calls to analys...
|
The Atom application instrumentation routines allow you to add arbitrary procedure calls before and after objects, procedures, basic blocks, and instructions. You can also add procedure calls before a... |
atom_application_navigation(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
atom_application_query(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
atom_application_resolvers(5) -- Allows an Atom tool's instrumentation routine to resolve procedure names and call targets
|
Atom's application resolver routines allow an Atom tool's instrumentation routine to find a procedure by name and to find a target procedure for a call site. You can use these routines only from an ... |
atom_application_symbols(5) -- Allows an Atom tool's instrumentation routine to find entry points by name or from procedure calls.
|
The Find* routines resolve the named symbol. FindObj searches for the named entry point in all of the objects and returns the object that contains the entry point with the name that is specified. It u... |
atom_description_file(5) -- Description of an Atom tool's instrumentation and analysis files.
|
An Atom tool's description file identifies and describes the tool's instrumentation and analysis files. It can also specify the flags to be used by the cc, ld, and atom commands when it is compiled,... |
atom_instrumentation_routines(5) -- Atom tool instrumentation routines
|
Atom invokes a tool's instrumentation routine on a given application program when that program is specified as the appl_prog parameter to the atom(1) command, and either of the following is true: The... |
atom_object_management(5) -- Allows an Atom tool's InstrumentAll routine to build, release, and write objects
|
Atom's object management routines allow an Atom tool's InstrumentAll routine to build, write, and release objects. You can use these routines only from an Atom tool's instrumentation file. See atom... |
aurema(5) -- Aurema's ARMTech (Active Resource Management Technology) resource management suite
|
This reference page provides a brief introduction to Aurema's ARMTech resource management software for Tru64 UNIX. Full documentation and usage information is provided in the software subsets. The so... |
big5(5) -- A character encoding system (codeset) for Traditional Chinese
|
The big5 codeset is one of several codesets that support the Traditional Chinese language. This codeset includes the following character sets: ASCII Big-5 The big5 codeset uses a combination of single... |
BlockPC(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
BuildObj(5) -- Allows an Atom tool's InstrumentAll routine to build, release, and write objects
|
Atom's object management routines allow an Atom tool's InstrumentAll routine to build, write, and release objects. You can use these routines only from an Atom tool's instrumentation file. See atom... |
catalan(5) -- Introduction to Catalan language support
|
This reference page describes the codeset, locale, device, and other kinds of support for the Catalan language. Codesets    [Toc]    [Back] The operating system supports the following coded character ... |
Catalan(5) -- Introduction to Catalan language support
|
This reference page describes the codeset, locale, device, and other kinds of support for the Catalan language. Codesets    [Toc]    [Back] The operating system supports the following coded character ... |
chinese(5) -- Introduction to Chinese language support
|
There are two kinds of written Chinese characters, traditional Chinese and simplified Chinese. The former is widely used in Hong Kong (HK) and Taiwan, while the latter is more widely used in the Peopl... |
Chinese(5) -- Introduction to Chinese language support
|
There are two kinds of written Chinese characters, traditional Chinese and simplified Chinese. The former is widely used in Hong Kong (HK) and Taiwan, while the latter is more widely used in the Peopl... |
code_page(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
config(5) -- OpenSSL CONF library configuration files
|
The OpenSSL CONF library can be used to read configuration files. It is used for the OpenSSL master configuration file openssl.cnf and in a few other places like SPKAC files and certificate extension ... |
cp1250(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp1251(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp1252(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp1253(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp1254(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp1255(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp1256(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp1257(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp1258(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp437(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp737(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp775(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp850(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp852(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp855(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp857(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp860(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp861(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp862(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp863(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp865(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp866(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp869(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp874(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp932(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp936(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp949(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
cp950(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
CreateXlate(5) -- Atom routines used to determine the instrumented PC for selected instructions
|
Atom's Xlate routines allow you to determine the instrumented PC for selected instructions. You can use these functions to build a table that translates an instruction's PC in the instrumented appli... |
czech(5) -- Introduction to Czech language support
|
This reference page describes the coded character set (codeset), locale, device, font, and other kinds of support for the Czech language as used in the Czech Republic. Codesets for Czech    [Toc]    [... |
Czech(5) -- Introduction to Czech language support
|
This reference page describes the coded character set (codeset), locale, device, font, and other kinds of support for the Czech language as used in the Czech Republic. Codesets for Czech    [Toc]    [... |
danish(5) -- Introduction to Danish language support
|
This reference page describes the coded character set (codeset), locale, device, and other support for the Danish language. Codesets    [Toc]    [Back] The operating system supports the following code... |
Danish(5) -- Introduction to Danish language support
|
This reference page describes the coded character set (codeset), locale, device, and other support for the Danish language. Codesets    [Toc]    [Back] The operating system supports the following code... |
dechanyu(5) -- A character encoding system (codeset) for Traditional Chinese
|
The DEC Hanyu (dechanyu) codset consists of the following sets of characters: ASCII The first and second character planes of CNS11643-1986 Digital Taiwan Supplemental Character Set (DTSCS) User-define... |
dechanzi(5) -- A character encoding system (codeset) for Simplified Chinese
|
The DEC Hanzi (dechanzi) codeset consists of the following character sets: ASCII GB2312-80 Extended GB DEC Hanzi uses a 2-byte data representation for symbols and ideographic characters that are defin... |
deckanji(5) -- A character encoding system (codeset) for Japanese
|
The DEC Kanji codeset consists of the following characters: ASCII or JIS X0201 Roman letters Katakana characters specified by JIS X0201 JIS X0208 characters User-defined characters (UDC) DEC Kanji use... |
deckorean(5) -- A character encoding system (codeset) for Korean
|
The DEC Korean (deckorean) codeset consists of the following character sets: ASCII KSC 5601-1987 For the symbols and ideographic characters defined in the KSC 5601-1987 character set, DEC Korean uses ... |
dingbats(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
dutch(5) -- Introduction to Dutch and Flemish language support
|
This reference page describes the coded character set (codeset), locale, device, and other support for the Dutch or Flemish language. Codesets    [Toc]    [Back] The operating system supports the foll... |
Dutch(5) -- Introduction to Dutch and Flemish language support
|
This reference page describes the coded character set (codeset), locale, device, and other support for the Dutch or Flemish language. Codesets    [Toc]    [Back] The operating system supports the foll... |
edata(5) -- Defines the last location of a program
|
The external names end, etext, and edata are defined for all programs. They are not functions, but identifiers associated with the following addresses: The first address following the program text. Th... |
end(5) -- Defines the last location of a program
|
The external names end, etext, and edata are defined for all programs. They are not functions, but identifiers associated with the following addresses: The first address following the program text. Th... |
EntryName(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
EntryPC(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
environ(5) -- User environment
|
An array of strings called the environment is made available by the execve() function when a process begins. By convention these strings have the form name=value. The following names are used by vario... |
errno(5) -- Returns error condition value
|
The errno external variable contains the most recent error condition set by a function. The symbolic values for errno are listed in the intro reference page and in the ERRORS section of the individual... |
etext(5) -- Defines the last location of a program
|
The external names end, etext, and edata are defined for all programs. They are not functions, but identifiers associated with the following addresses: The first address following the program text. Th... |
eucJP(5) -- A character encoding system (codeset) for Japanese
|
The Japanese EUC (Extended UNIX Code), or eucJP, codeset consists of the following character sets: CS0 (ASCII or JIS Roman) CS1 (JIS X0208) CS2 (JIS Katakana) CS3 (JIS X0212) CS0 is a primary characte... |
eucKR(5) -- A character encoding system (codeset) for Korean
|
EUC (Extended UNIX Code) is a codeset extended by AT&T Bell Laboratories for use in various countries in the world. Korean EUC is the EUC codeset for representing Korean data. The encoding of Korean E... |
eucTW(5) -- A character encoding system (codeset) for Traditional Chinese
|
The Taiwanese EUC (Extended UNIX Code), or eucTW, codeset consists of the following character sets: ASCII CNS 11643 (Plane 1 to Plane 16) Taiwanese EUC uses a combination of single-byte data and 2-byt... |
EUR(5) -- Euro currency sign
|
The Euro currency is the new currency for European countries belonging to the Economic and Monetary Union (EMU). Euro currency was introduced in 1999. By January 2002, the new currency is scheduled to... |
euro(5) -- Euro currency sign
|
The Euro currency is the new currency for European countries belonging to the Economic and Monetary Union (EMU). Euro currency was introduced in 1999. By January 2002, the new currency is scheduled to... |
Euro(5) -- Euro currency sign
|
The Euro currency is the new currency for European countries belonging to the Economic and Monetary Union (EMU). Euro currency was introduced in 1999. By January 2002, the new currency is scheduled to... |
evm(5) -- Event Management
|
Introduction to Events and Event Management The purpose of an event management system is to provide a means for any system component or application to indicate that something has happened that may be ... |
EVM(5) -- Event Management
|
Introduction to Events and Event Management The purpose of an event management system is to provide a means for any system component or application to indicate that something has happened that may be ... |
EvmCallback(5) -- Event Management callback function
|
An EVM callback function is a function that you provide to allow your program to handle messages arriving on an EVM connection. Most messages will be incoming events or responses to requests you have ... |
EvmConnection(5) -- Connection to the Event Management daemon
|
An EVM connection is the context through which data is passed to and from the EVM daemon. A connection has the following attributes: Connection Type Response Mode Transport Type Callback, and associat... |
EvmEvent(5) -- The structure of an EVM Event
|
An EVM event is a self-contained data structure, which can be manipulated and accessed using EVM API functions. Application code can: Create, duplicate and destroy an event Set and retrieve the values... |
EvmFilter(5) -- Event filter
|
An event filter is a specification of a set of interesting events. Event subscribers use filters to tell the EVM daemon which events they want to receive - for example, one subscriber may be only inte... |
FindEntry(5) -- Allows an Atom tool's instrumentation routine to find entry points by name or from procedure calls.
|
The Find* routines resolve the named symbol. FindObj searches for the named entry point in all of the objects and returns the object that contains the entry point with the name that is specified. It u... |
FindInst(5) -- Allows an Atom tool's instrumentation routine to find entry points by name or from procedure calls.
|
The Find* routines resolve the named symbol. FindObj searches for the named entry point in all of the objects and returns the object that contains the entry point with the name that is specified. It u... |
FindObj(5) -- Allows an Atom tool's instrumentation routine to find entry points by name or from procedure calls.
|
The Find* routines resolve the named symbol. FindObj searches for the named entry point in all of the objects and returns the object that contains the entry point with the name that is specified. It u... |
FindObjDepthFirst(5) -- Allows an Atom tool's instrumentation routine to find entry points by name or from procedure calls.
|
The Find* routines resolve the named symbol. FindObj searches for the named entry point in all of the objects and returns the object that contains the entry point with the name that is specified. It u... |
FindProc(5) -- Allows an Atom tool's instrumentation routine to find entry points by name or from procedure calls.
|
The Find* routines resolve the named symbol. FindObj searches for the named entry point in all of the objects and returns the object that contains the entry point with the name that is specified. It u... |
finnish(5) -- Introduction to Finnish language support
|
This reference page describes the coded character set (codeset), locale, device, and other support for the Finnish language. Codesets    [Toc]    [Back] The operating system supports the following cod... |
Finnish(5) -- Introduction to Finnish language support
|
This reference page describes the coded character set (codeset), locale, device, and other support for the Finnish language. Codesets    [Toc]    [Back] The operating system supports the following cod... |
flemish(5) -- Introduction to Dutch and Flemish language support
|
This reference page describes the coded character set (codeset), locale, device, and other support for the Dutch or Flemish language. Codesets    [Toc]    [Back] The operating system supports the foll... |
Flemish(5) -- Introduction to Dutch and Flemish language support
|
This reference page describes the coded character set (codeset), locale, device, and other support for the Dutch or Flemish language. Codesets    [Toc]    [Back] The operating system supports the foll... |
french(5) -- Introduction to French language support
|
This reference page describes the coded character set (codeset), locale, device, and other support for the French language. Codesets    [Toc]    [Back] The operating system supports the following code... |
French(5) -- Introduction to French language support
|
This reference page describes the coded character set (codeset), locale, device, and other support for the French language. Codesets    [Toc]    [Back] The operating system supports the following code... |
gb18030(5) -- A Chinese character set that extends
|
The GB18030-2000 character set, defined by the Chinese national standard organization, is an extension of the GBK character set, which itself is an extension to the GB2312-80 character set. (See the G... |
GB18030(5) -- A Chinese character set that extends
|
The GB18030-2000 character set, defined by the Chinese national standard organization, is an extension of the GBK character set, which itself is an extension to the GB2312-80 character set. (See the G... |
gbk(5) -- A character encoding system (codeset) for Simplified Chinese
|
The GBK character set is an extension to the GB 2312-80 character set. (The "K" in "GBK" is the first sound in the Chinese word "Kuo Zhan," which means "extension.") GBK includes all the Hanzi... |
GBK(5) -- A character encoding system (codeset) for Simplified Chinese
|
The GBK character set is an extension to the GB 2312-80 character set. (The "K" in "GBK" is the first sound in the Chinese word "Kuo Zhan," which means "extension.") GBK includes all the Hanzi... |
german(5) -- Introduction to German language support
|
This reference page describes the coded character set (codeset), locale, device, and other kinds of support for the German language. Codesets    [Toc]    [Back] The operating system supports the follo... |
German(5) -- Introduction to German language support
|
This reference page describes the coded character set (codeset), locale, device, and other kinds of support for the German language. Codesets    [Toc]    [Back] The operating system supports the follo... |
GetAnalName(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
GetBlockInfo(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
GetBlockProc(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetEntryBlock(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetEntryInfo(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
GetEntryProc(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetErrantShlibErr(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
GetErrantShlibName(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
GetFirstBlock(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetFirstEntry(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetFirstInst(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetFirstObj(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetFirstObjProc(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetInstBinary(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
GetInstBlock(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetInstBranchTarget(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetInstClass(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
GetInstInfo(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
GetInstRegEnum(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
GetInstRegUsage(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
GetLastBlock(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetLastEntry(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetLastInst(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetLastObj(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetLastObjProc(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetNextBlock(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetNextEntry(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetNextInst(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetNextObj(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetNextProc(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetObjInfo(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
GetObjInstArray(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
GetObjInstCount(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
GetObjName(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
GetObjOutName(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
GetPrevBlock(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetPrevEntry(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetPrevInst(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetPrevObj(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetPrevProc(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetProcInfo(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
GetProcObj(5) -- Allows an Atom tool's instrumentation routine to find locations in an application program
|
Atom's application navigation routines allow an instrumentation routine to locate areas of an application that are interesting to monitor or analyze. You can use these routines only from an Atom tool... |
GetProgInfo(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
GetTargetEntry(5) -- Allows an Atom tool's instrumentation routine to find entry points by name or from procedure calls.
|
The Find* routines resolve the named symbol. FindObj searches for the named entry point in all of the objects and returns the object that contains the entry point with the name that is specified. It u... |
GetTargetInst(5) -- Allows an Atom tool's instrumentation routine to find entry points by name or from procedure calls.
|
The Find* routines resolve the named symbol. FindObj searches for the named entry point in all of the objects and returns the object that contains the entry point with the name that is specified. It u... |
GetTargetName(5) -- Allows an Atom tool's instrumentation routine to find entry points by name or from procedure calls.
|
The Find* routines resolve the named symbol. FindObj searches for the named entry point in all of the objects and returns the object that contains the entry point with the name that is specified. It u... |
GetTargetObj(5) -- Allows an Atom tool's instrumentation routine to find entry points by name or from procedure calls.
|
The Find* routines resolve the named symbol. FindObj searches for the named entry point in all of the objects and returns the object that contains the entry point with the name that is specified. It u... |
GetTargetProc(5) -- Allows an Atom tool's instrumentation routine to find entry points by name or from procedure calls.
|
The Find* routines resolve the named symbol. FindObj searches for the named entry point in all of the objects and returns the object that contains the entry point with the name that is specified. It u... |
greek(5) -- Introduction to Greek language support
|
This reference page describes the codeset, locale, device, and other kinds of support for the Greek language. Codesets    [Toc]    [Back] The operating system supports the following coded character se... |
Greek(5) -- Introduction to Greek language support
|
This reference page describes the codeset, locale, device, and other kinds of support for the Greek language. Codesets    [Toc]    [Back] The operating system supports the following coded character se... |
hebrew(5) -- Introduction to Hebrew language support
|
This reference page describes the codeset, locale, device, and other kinds of support for the Hebrew language. Codesets    [Toc]    [Back] The operating system supports the following coded character s... |
Hebrew(5) -- Introduction to Hebrew language support
|
This reference page describes the codeset, locale, device, and other kinds of support for the Hebrew language. Codesets    [Toc]    [Back] The operating system supports the following coded character s... |
hier(5) -- Standard file system hierarchy
|
A Tru64 UNIX operating system has a standard file system hierarchy. So does the X11 Window System. The operating system has a unique root directory, the identity of which is compiled into the operatin... |
HKSCS(5) -- Codeset conversion support for the Hong Kong Supplementary Character Set
|
HKSCS, the Hong Kong Supplementary Character Codeset, is a supplementary character set developed by the Chinese government, in collaboration with the Chinese Language Interface Advisory Committee, to ... |
hostname(5) -- Host name resolution description
|
Host names are domains, where a domain is a hierarchical, dot-separated list of subdomains; for example, the machine monet, in the Berkeley subdomain of the EDU subdomain of the Internet would be repr... |
hungarian(5) -- Introduction to Hungarian language support
|
This reference page describes the codeset, locale, device, and other kinds of support for the Hungarian language. Codesets    [Toc]    [Back] The operating system supports the following coded characte... |
Hungarian(5) -- Introduction to Hungarian language support
|
This reference page describes the codeset, locale, device, and other kinds of support for the Hungarian language. Codesets    [Toc]    [Back] The operating system supports the following coded characte... |
i18n(5) -- Introduction to internationalization (I18N)
|
Internationalization refers to the process of developing programs without prior knowledge of the language, cultural data, or character-encoding schemes that the programs are expected to handle. In oth... |
i18n_intro(5) -- Introduction to internationalization (I18N)
|
Internationalization refers to the process of developing programs without prior knowledge of the language, cultural data, or character-encoding schemes that the programs are expected to handle. In oth... |
i18n_printing(5) -- Introduction to internationalized printing support
|
The operating system's optional subsets with worldwide support software provide special features to meet requirements for printing nonASCII text. These features include: Print filters for codesets ot... |
icelandic(5) -- Introduction to Icelandic language support
|
This reference page describes the coded character set (codeset), locale, device, and other support for the Icelandic language. Codesets    [Toc]    [Back] The operating system supports the following c... |
Icelandic(5) -- Introduction to Icelandic language support
|
This reference page describes the coded character set (codeset), locale, device, and other support for the Icelandic language. Codesets    [Toc]    [Back] The operating system supports the following c... |
iconv(5) -- Introduction to codeset conversion
|
Conversion of character encoding from one coded character set (codeset) to another is an operation that often has to be performed by the operating system and some applications. For example, the man co... |
iconv_ibmkanji(5) -- Specification for controlling conversion between IBM Kanji and Tru64 UNIX Japanese codesets
|
The iconv utility supports the ability to convert the encoding of characters between IBM Kanji System Characters (IBM Kanji) and one of the following Tru64 UNIX codesets: DEC Kanji, Super DEC Kanji, J... |
iconv_intro(5) -- Introduction to codeset conversion
|
Conversion of character encoding from one coded character set (codeset) to another is an operation that often has to be performed by the operating system and some applications. For example, the man co... |
iconv_JEF(5) -- Specification for controlling conversion between Fujitsu JEF and Tru64 UNIX Japanese codesets
|
The iconv utility supports the ability to convert the encoding of characters between Fujitsu JEF (Japanese processing Extended Feature) code and one of the following Tru64 UNIX codesets: DEC Kanji, Su... |
iconv_KEIS(5) -- Specification for controlling conversion between Hitachi KEIS and Tru64 UNIX Japanese codesets
|
The iconv utility supports the ability to convert the encoding of characters between Hitachi KEIS (Kanji processing Extended Information System) code and one of the following Tru64 UNIX codesets: DEC ... |
insight_manager(5) -- Web-based device status and configuration
|
Insight Manager is a Web-based utility that enables you to look across a heterogeneous computing environment and access information about any device connected to the network. Devices can be computer s... |
InstLineNo(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
InstPC(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
Instrument(5) -- Atom tool instrumentation routines
|
Atom invokes a tool's instrumentation routine on a given application program when that program is specified as the appl_prog parameter to the atom(1) command, and either of the following is true: The... |
InstrumentAll(5) -- Atom tool instrumentation routines
|
Atom invokes a tool's instrumentation routine on a given application program when that program is specified as the appl_prog parameter to the atom(1) command, and either of the following is true: The... |
InstrumentFini(5) -- Atom tool instrumentation routines
|
Atom invokes a tool's instrumentation routine on a given application program when that program is specified as the appl_prog parameter to the atom(1) command, and either of the following is true: The... |
InstrumentInit(5) -- Atom tool instrumentation routines
|
Atom invokes a tool's instrumentation routine on a given application program when that program is specified as the appl_prog parameter to the atom(1) command, and either of the following is true: The... |
intro(5) -- Introduction to miscellaneous reference pages
|
This section contains miscellaneous documentation on various topics. The section also contains information about text-processing macro packages used by nroff and other *roff commands. Some reference p... |
IsBranchTarget(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
IsInstType(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
ISO(5) -- Support for industry standards
|
Programming interfaces and utilities conform to a number of standards. The full names and mnemonics for the industry standards supported by the operating system software, along with the manuals where ... |
iso-2022(5) -- A character encoding mechanism standardized by the International Standards Organization (ISO)
|
The ISO-2022 standard defines a mechanism for handling single-byte and multibyte characters. The standard specifies four classes of character sets: The 94-charset class, which contains character sets ... |
ISO-2022(5) -- A character encoding mechanism standardized by the International Standards Organization (ISO)
|
The ISO-2022 standard defines a mechanism for handling single-byte and multibyte characters. The standard specifies four classes of character sets: The 94-charset class, which contains character sets ... |
iso-2022-jp(5) -- A character encoding system (codeset) for Japanese
|
The ISO-2022-JP codeset consists of the following character sets: ASCII For information on the ASCII character set, refer to ascii(5). JIS X0201-1976 Only the Roman letters in this character set are i... |
ISO-2022-JP(5) -- A character encoding system (codeset) for Japanese
|
The ISO-2022-JP codeset consists of the following character sets: ASCII For information on the ASCII character set, refer to ascii(5). JIS X0201-1976 Only the Roman letters in this character set are i... |
iso10646(5) -- Support for the Unicode and ISO/IEC 10646 standards
|
The operating system provides locales and codeset converters that support the following standards: The Unicode Standard, Version 3.0, Unicode, Inc., 2000 The Unicode Standard, Version 3.1, Unicode, In... |
iso2022(5) -- A character encoding mechanism standardized by the International Standards Organization (ISO)
|
The ISO-2022 standard defines a mechanism for handling single-byte and multibyte characters. The standard specifies four classes of character sets: The 94-charset class, which contains character sets ... |
iso2022jp(5) -- A character encoding system (codeset) for Japanese
|
The ISO-2022-JP codeset consists of the following character sets: ASCII For information on the ASCII character set, refer to ascii(5). JIS X0201-1976 Only the Roman letters in this character set are i... |
iso8859-1(5) -- A character encoding system (codeset)
|
The left hand part of the ISO 8859-1 code table includes the same characters as defined in the ASCII codeset (refer to ascii(5)). The following characters occupy the right hand part of the ISO 8859-1 ... |
ISO8859-1(5) -- A character encoding system (codeset)
|
The left hand part of the ISO 8859-1 code table includes the same characters as defined in the ASCII codeset (refer to ascii(5)). The following characters occupy the right hand part of the ISO 8859-1 ... |
iso8859-15(5) -- A character encoding system
|
ISO 8859-15 (Latin-9) is very similar to ISO 8859-1 (Latin-1) except for the inclusion of the euro currency sign (C=) and several other characters. Latin-9 is supported mainly as a means to supply fon... |
ISO8859-15(5) -- A character encoding system
|
ISO 8859-15 (Latin-9) is very similar to ISO 8859-1 (Latin-1) except for the inclusion of the euro currency sign (C=) and several other characters. Latin-9 is supported mainly as a means to supply fon... |
iso8859-2(5) -- A character encoding system (codeset) for Czech, Slovak, Slovene, Polish, and Hungarian
|
The left hand part of the ISO 8859-2 code table includes the same characters as defined in the ASCII codeset (refer to ascii(5)). The following characters occupy the right hand part of the ISO 8859-2 ... |
ISO8859-2(5) -- A character encoding system (codeset) for Czech, Slovak, Slovene, Polish, and Hungarian
|
The left hand part of the ISO 8859-2 code table includes the same characters as defined in the ASCII codeset (refer to ascii(5)). The following characters occupy the right hand part of the ISO 8859-2 ... |
iso8859-4(5) -- A character encoding system (codeset) for Lithuanian and other languages
|
The left hand part of the ISO 8859-4 code table includes the same characters as defined in the ASCII codeset (refer to ascii(5)). The following characters occupy the right hand part of the ISO 8859-4 ... |
ISO8859-4(5) -- A character encoding system (codeset) for Lithuanian and other languages
|
The left hand part of the ISO 8859-4 code table includes the same characters as defined in the ASCII codeset (refer to ascii(5)). The following characters occupy the right hand part of the ISO 8859-4 ... |
iso8859-5(5) -- A character encoding system (codeset) for Russian
|
The left hand part of the ISO 8859-5 code table includes the same characters as defined in the ASCII codeset (see ascii(5)). The following characters occupy the right hand part of the ISO 8859-5 code ... |
ISO8859-5(5) -- A character encoding system (codeset) for Russian
|
The left hand part of the ISO 8859-5 code table includes the same characters as defined in the ASCII codeset (see ascii(5)). The following characters occupy the right hand part of the ISO 8859-5 code ... |
iso8859-7(5) -- A character encoding system (codeset) for Greek
|
The left hand part of the ISO 8859-7 code table includes the same characters as defined in the ASCII codeset (refer to ascii(5)). The following characters occupy the right hand part of the ISO 8859-7 ... |
ISO8859-7(5) -- A character encoding system (codeset) for Greek
|
The left hand part of the ISO 8859-7 code table includes the same characters as defined in the ASCII codeset (refer to ascii(5)). The following characters occupy the right hand part of the ISO 8859-7 ... |
iso8859-8(5) -- A character encoding system (codeset) for Hebrew
|
The left hand part of the ISO 8859-8 code table includes the same characters as defined in the ASCII codeset (refer to ascii(5)). The following characters occupy the right hand part of the ISO 8859-8 ... |
ISO8859-8(5) -- A character encoding system (codeset) for Hebrew
|
The left hand part of the ISO 8859-8 code table includes the same characters as defined in the ASCII codeset (refer to ascii(5)). The following characters occupy the right hand part of the ISO 8859-8 ... |
iso8859-9(5) -- A character encoding system (codeset) for Turkish
|
The left hand part of the ISO 8859-9 code table includes the same characters as defined in the ASCII codeset (refer to ascii(5)). The following characters occupy the right hand part of the ISO 8859-9 ... |
ISO8859-9(5) -- A character encoding system (codeset) for Turkish
|
The left hand part of the ISO 8859-9 code table includes the same characters as defined in the ASCII codeset (refer to ascii(5)). The following characters occupy the right hand part of the ISO 8859-9 ... |
IsObjBuilt(5) -- Allows an Atom tool's InstrumentAll routine to build, release, and write objects
|
Atom's object management routines allow an Atom tool's InstrumentAll routine to build, write, and release objects. You can use these routines only from an Atom tool's instrumentation file. See atom... |
italian(5) -- Introduction to Italian language support
|
This reference page describes the codeset, locale, device, and other kinds of support for the Italian language. Codesets    [Toc]    [Back] The operating system supports the following coded character ... |
Italian(5) -- Introduction to Italian language support
|
This reference page describes the codeset, locale, device, and other kinds of support for the Italian language. Codesets    [Toc]    [Back] The operating system supports the following coded character ... |
japanese(5) -- Introduction to Japanese language support
|
There are two national standards that specify the Japanese character sets used for information interchange. The JIS X0201 standard specifies a single-byte character set that consists of Roman letters ... |
Japanese(5) -- Introduction to Japanese language support
|
There are two national standards that specify the Japanese character sets used for information interchange. The JIS X0201 standard specifies a single-byte character set that consists of Roman letters ... |
jar(5) -- The Java Development Kit tools
|
This reference page describes the java command only. The Java Development Kit (JDK) is part of the Java Virtual Machine (VM). If the JDK documentation was installed on your Tru64 UNIX system, you can ... |
java(5) -- The Java Development Kit tools
|
This reference page describes the java command only. The Java Development Kit (JDK) is part of the Java Virtual Machine (VM). If the JDK documentation was installed on your Tru64 UNIX system, you can ... |
javac(5) -- The Java Development Kit tools
|
This reference page describes the java command only. The Java Development Kit (JDK) is part of the Java Virtual Machine (VM). If the JDK documentation was installed on your Tru64 UNIX system, you can ... |
javadoc(5) -- The Java Development Kit tools
|
This reference page describes the java command only. The Java Development Kit (JDK) is part of the Java Virtual Machine (VM). If the JDK documentation was installed on your Tru64 UNIX system, you can ... |
javah(5) -- The Java Development Kit tools
|
This reference page describes the java command only. The Java Development Kit (JDK) is part of the Java Virtual Machine (VM). If the JDK documentation was installed on your Tru64 UNIX system, you can ... |
javakey(5) -- The Java Development Kit tools
|
This reference page describes the java command only. The Java Development Kit (JDK) is part of the Java Virtual Machine (VM). If the JDK documentation was installed on your Tru64 UNIX system, you can ... |
javap(5) -- The Java Development Kit tools
|
This reference page describes the java command only. The Java Development Kit (JDK) is part of the Java Virtual Machine (VM). If the JDK documentation was installed on your Tru64 UNIX system, you can ... |
jdb(5) -- The Java Development Kit tools
|
This reference page describes the java command only. The Java Development Kit (JDK) is part of the Java Virtual Machine (VM). If the JDK documentation was installed on your Tru64 UNIX system, you can ... |
JIS7(5) -- A character encoding system (codeset) for Japanese
|
JIS Kanji is a codeset that uses the JIS X0202 symbol extension method for encoding the JIS X0208 and JIS X0201 character sets. There are two types of JIS Kanji encoding: 7-bit JIS Kanji code and 8-bi... |
jiskanji(5) -- A character encoding system (codeset) for Japanese
|
JIS Kanji is a codeset that uses the JIS X0202 symbol extension method for encoding the JIS X0208 and JIS X0201 character sets. There are two types of JIS Kanji encoding: 7-bit JIS Kanji code and 8-bi... |
jiskanji7(5) -- A character encoding system (codeset) for Japanese
|
JIS Kanji is a codeset that uses the JIS X0202 symbol extension method for encoding the JIS X0208 and JIS X0201 character sets. There are two types of JIS Kanji encoding: 7-bit JIS Kanji code and 8-bi... |
jre(5) -- The Java Development Kit tools
|
This reference page describes the java command only. The Java Development Kit (JDK) is part of the Java Virtual Machine (VM). If the JDK documentation was installed on your Tru64 UNIX system, you can ... |
keyboard(5) -- Using keyboards for different native languages
|
The keyboard lets you type not only the characters printed on the keycaps, but all the characters from the character set for the language that your keyboard supports. For your keyboard to function cor... |
kkc(5) -- Kana-Kanji conversion
|
Kana-Kanji conversion is a very common input method used in a Japanese environment. The Asian tty driver, atty, supports this input method by working with the kkcd daemon through the utx facility. The... |
korean(5) -- Introduction to Korean language support
|
KS X 1001 is a Korean national standard that defines a set of graphic characters to be used for information interchange. The operating system supports this standard with coded character sets, locales,... |
Korean(5) -- Introduction to Korean language support
|
KS X 1001 is a Korean national standard that defines a set of graphic characters to be used for information interchange. The operating system supports this standard with coded character sets, locales,... |
l10n(5) -- Introduction to localization (L10N)
|
Localization refers to the process of establishing information within a computer system specific to each supported language, cultural data, and coded character set (codeset) combination. Each such com... |
l10n_intro(5) -- Introduction to localization (L10N)
|
Localization refers to the process of establishing information within a computer system specific to each supported language, cultural data, and coded character set (codeset) combination. Each such com... |
LANG(5) -- Introduction to internationalization (I18N)
|
Internationalization refers to the process of developing programs without prior knowledge of the language, cultural data, or character-encoding schemes that the programs are expected to handle. In oth... |
LC_ALL(5) -- Introduction to internationalization (I18N)
|
Internationalization refers to the process of developing programs without prior knowledge of the language, cultural data, or character-encoding schemes that the programs are expected to handle. In oth... |
LC_COLLATE(5) -- Introduction to internationalization (I18N)
|
Internationalization refers to the process of developing programs without prior knowledge of the language, cultural data, or character-encoding schemes that the programs are expected to handle. In oth... |
LC_CTYPE(5) -- Introduction to internationalization (I18N)
|
Internationalization refers to the process of developing programs without prior knowledge of the language, cultural data, or character-encoding schemes that the programs are expected to handle. In oth... |
LC_MESSAGES(5) -- Introduction to internationalization (I18N)
|
Internationalization refers to the process of developing programs without prior knowledge of the language, cultural data, or character-encoding schemes that the programs are expected to handle. In oth... |
LC_MONETARY(5) -- Introduction to internationalization (I18N)
|
Internationalization refers to the process of developing programs without prior knowledge of the language, cultural data, or character-encoding schemes that the programs are expected to handle. In oth... |
LC_NUMERIC(5) -- Introduction to internationalization (I18N)
|
Internationalization refers to the process of developing programs without prior knowledge of the language, cultural data, or character-encoding schemes that the programs are expected to handle. In oth... |
LC_TIME(5) -- Introduction to internationalization (I18N)
|
Internationalization refers to the process of developing programs without prior knowledge of the language, cultural data, or character-encoding schemes that the programs are expected to handle. In oth... |
lithuanian(5) -- Introduction to Lithuanian language support
|
This reference page describes the coded character set (codeset), locale, device, font, and other kinds of support for the Lithuanian language. Codesets    [Toc]    [Back] The operating system supports... |
Lithuanian(5) -- Introduction to Lithuanian language support
|
This reference page describes the coded character set (codeset), locale, device, font, and other kinds of support for the Lithuanian language. Codesets    [Toc]    [Back] The operating system supports... |
loader(5) -- Run-time linker and loader.
|
The loader is the run-time linker and shared object loader. You invoke loader when you run a dynamic executable. The loader maps in the main object and any shared libraries used by it, resolves reloca... |
locales(5) -- Introduction to localization (L10N)
|
Localization refers to the process of establishing information within a computer system specific to each supported language, cultural data, and coded character set (codeset) combination. Each such com... |
LOCPATH(5) -- Introduction to localization (L10N)
|
Localization refers to the process of establishing information within a computer system specific to each supported language, cultural data, and coded character set (codeset) combination. Each such com... |
man(5) -- The man macro packages for reference pages
|
The man macro package is used to format reference pages for unpaginated viewing, or for printing on ASCII printers. The man macro package is the default. The reference pages installed on the base syst... |
man.page(5) -- The man macro packages for reference pages
|
The man macro package is used to format reference pages for unpaginated viewing, or for printing on ASCII printers. The man macro package is the default. The reference pages installed on the base syst... |
me(5) -- Macros for formatting papers
|
This package of nroff macro definitions provides a formatting facility for technical papers in various formats. When producing two-column output on a terminal, filter the output through col. Many nrof... |
memory_trolling(5) -- Proactively locates and scrubs correctable memory errors
|
The operating system handles memory errors with a just-intime scrubbing model, where correctable errors are scrubbed when encountered by the operating system or an application. To enhance this capabil... |
ms(5) -- Text formatting macros
|
This package of nroff macro definitions provides a formatting facility for various styles of articles, theses, and books. When producing 2-column output on a terminal or lineprinter, or when reverse l... |
native2ascii(5) -- The Java Development Kit tools
|
This reference page describes the java command only. The Java Development Kit (JDK) is part of the Java Virtual Machine (VM). If the JDK documentation was installed on your Tru64 UNIX system, you can ... |
norwegian(5) -- Introduction to Norwegian language support
|
This reference page describes the coded character set (codeset), locale, device, and other support for the Norwegian language. Codesets    [Toc]    [Back] The operating system supports the following c... |
Norwegian(5) -- Introduction to Norwegian language support
|
This reference page describes the coded character set (codeset), locale, device, and other support for the Norwegian language. Codesets    [Toc]    [Back] The operating system supports the following c... |
nsswitch.conf(5) -- name-service switch configuration file
|
The nsswitch.conf file specifies how the nsdispatch(3) (name-service switch dispatcher) routines in the C library should operate. The configuration file controls how a process looks up various databas... |
odl(5) -- On-demand font loading
|
On-demand font loading (ODL) is a mechanism through which a terminal or a printer can download the relevant bitmap font information for a user-defined character (UDC) at the time this character has to... |
ODL(5) -- On-demand font loading
|
On-demand font loading (ODL) is a mechanism through which a terminal or a printer can download the relevant bitmap font information for a user-defined character (UDC) at the time this character has to... |
olar_intro(5) -- Introduction to Online Addition and Removal (OLAR) Management
|
Introduction to Online Addition and Removal (OLAR) Management Online addition and removal management is used to expand capacity, upgrade components, and replace failed components, while the operating ... |
OLAR_intro(5) -- Introduction to Online Addition and Removal (OLAR) Management
|
Introduction to Online Addition and Removal (OLAR) Management Online addition and removal management is used to expand capacity, upgrade components, and replace failed components, while the operating ... |
OSF_SOURCE(5) -- Support for industry standards
|
Programming interfaces and utilities conform to a number of standards. The full names and mnemonics for the industry standards supported by the operating system software, along with the manuals where ... |
polish(5) -- Introduction to Polish language support
|
This reference page describes the coded character set (codeset), locale, device, and other kinds of support for the Polish language. Codesets    [Toc]    [Back] The operating system supports the follo... |
Polish(5) -- Introduction to Polish language support
|
This reference page describes the coded character set (codeset), locale, device, and other kinds of support for the Polish language. Codesets    [Toc]    [Back] The operating system supports the follo... |
portuguese(5) -- Introduction to Portuguese language support
|
This reference page describes the coded character set (codeset), locale, device, and other support for the Portuguese language. Codesets    [Toc]    [Back] The operating system supports the following ... |
Portuguese(5) -- Introduction to Portuguese language support
|
This reference page describes the coded character set (codeset), locale, device, and other support for the Portuguese language. Codesets    [Toc]    [Back] The operating system supports the following ... |
POSIX(5) -- Support for industry standards
|
Programming interfaces and utilities conform to a number of standards. The full names and mnemonics for the industry standards supported by the operating system software, along with the manuals where ... |
ProcFileName(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
ProcGP(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
ProcName(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
ProcPC(5) -- Allows an Atom-tool instrumentation routine to obtain information about the parts of an application ...
|
Atom's application query routines allow an instrumentation routine to obtain information about the parts of an application program. You can use these routines only from an Atom tool's instrumentatio... |
rcsfile(5) -- format of RCS file
|
An RCS file's contents are described by the grammar below. The text is free format: space, backspace, tab, newline, vertical tab, form feed, and carriage return (collectively, white space) have no si... |
ReleaseObj(5) -- Allows an Atom tool's InstrumentAll routine to build, release, and write objects
|
Atom's object management routines allow an Atom tool's InstrumentAll routine to build, write, and release objects. You can use these routines only from an Atom tool's instrumentation file. See atom... |
ReplaceEntry(5) -- Allows an Atom tool's instrumentation routine to add, within an application program, calls to analys...
|
The Atom application instrumentation routines allow you to add arbitrary procedure calls before and after objects, procedures, basic blocks, and instructions. You can also add procedure calls before a... |
ReplaceProcedure(5) -- Allows an Atom tool's instrumentation routine to add, within an application program, calls to analys...
|
The Atom application instrumentation routines allow you to add arbitrary procedure calls before and after objects, procedures, basic blocks, and instructions. You can also add procedure calls before a... |
ReplaceProto(5) -- Allows an Atom tool's instrumentation routine to add, within an application program, calls to analys...
|
The Atom application instrumentation routines allow you to add arbitrary procedure calls before and after objects, procedures, basic blocks, and instructions. You can also add procedure calls before a... |
ReResolveProc(5) -- Allows an Atom tool's instrumentation routine to resolve procedure names and call targets
|
Atom's application resolver routines allow an Atom tool's instrumentation routine to find a procedure by name and to find a target procedure for a call site. You can use these routines only from an ... |
ResolveNamedProc(5) -- Allows an Atom tool's instrumentation routine to resolve procedure names and call targets
|
Atom's application resolver routines allow an Atom tool's instrumentation routine to find a procedure by name and to find a target procedure for a call site. You can use these routines only from an ... |
ResolveObjNamedProc(5) -- Allows an Atom tool's instrumentation routine to resolve procedure names and call targets
|
Atom's application resolver routines allow an Atom tool's instrumentation routine to find a procedure by name and to find a target procedure for a call site. You can use these routines only from an ... |
ResolveTargetProc(5) -- Allows an Atom tool's instrumentation routine to resolve procedure names and call targets
|
Atom's application resolver routines allow an Atom tool's instrumentation routine to find a procedure by name and to find a target procedure for a call site. You can use these routines only from an ... |
rmic(5) -- The Java Development Kit tools
|
This reference page describes the java command only. The Java Development Kit (JDK) is part of the Java Virtual Machine (VM). If the JDK documentation was installed on your Tru64 UNIX system, you can ... |
rmiregistry(5) -- The Java Development Kit tools
|
This reference page describes the java command only. The Java Development Kit (JDK) is part of the Java Virtual Machine (VM). If the JDK documentation was installed on your Tru64 UNIX system, you can ... |
rpc(5) -- rpc program number database
|
The rpc file contains user readable names that can be used in place of rpc program numbers. Each line has the following information: name of server for the rpc program rpc program number aliases Items... |
rsml(5) -- rsml and sml macro packages that support RSMLcoded reference pages
|
Reference pages that originate from the Open Software Foundation (OSF) and those created for Tru64 UNIX are coded using RSML (Reference Semantic Markup Language). This markup is implemented through a ... |
russian(5) -- Introduction to Russian language support
|
This reference page describes the coded character set (codeset), locale, device, and other kinds of support for the Russian language. Codesets    [Toc]    [Back] The operating system supports the foll... |
Russian(5) -- Introduction to Russian language support
|
This reference page describes the coded character set (codeset), locale, device, and other kinds of support for the Russian language. Codesets    [Toc]    [Back] The operating system supports the foll... |
sbig5(5) -- A character encoding system (codeset) for Traditional Chinese
|
The Shift Big-5 (sbig5) codeset is a variant of the Big-5 codeset (see big5(5)). The only difference between these codesets is that the second byte of some Big-5 characters are mapped to different val... |
sdeckanji(5) -- A character encoding system (codeset) for Japanese
|
The Super DEC Kanji codeset extends the DEC Kanji codeset to support the CS2 (JIS Katakana) and CS3 (JIS X0212) character sets that are also included in the Japanese EUC codeset. Super DEC Kanji is th... |
serialver(5) -- The Java Development Kit tools
|
This reference page describes the java command only. The Java Development Kit (JDK) is part of the Java Virtual Machine (VM). If the JDK documentation was installed on your Tru64 UNIX system, you can ... |
shiftjis(5) -- A character encoding system (codeset) for Japanese
|
The Shift JIS (SJIS) codeset consists of the following character sets: JIS X0201 JIS X0208 User-Defined Characters (UDC) Shift JIS Encoding    [Toc]    [Back] Shift JIS character codes use a combinati... |
siginfo(5) -- Details of signal generation
|
The siginfo structure provides processes with information on why a signal was generated, or a process that is monitoring child processes may receive information that specifies why a child process chan... |
sim(5) -- Software phrase input method
|
The phrase input method is an input method that is commonly used in a Chinese environment. The software phrase input method (SIM) is a a mechanism supported by the Asian tty driver, atty and the simd ... |
SIM(5) -- Software phrase input method
|
The phrase input method is an input method that is commonly used in a Chinese environment. The software phrase input method (SIM) is a a mechanism supported by the Asian tty driver, atty and the simd ... |
SJIS(5) -- A character encoding system (codeset) for Japanese
|
The Shift JIS (SJIS) codeset consists of the following character sets: JIS X0201 JIS X0208 User-Defined Characters (UDC) Shift JIS Encoding    [Toc]    [Back] Shift JIS character codes use a combinati... |
slovak(5) -- Introduction to Slovak language support
|
This reference page describes the coded character set (codeset), locale, device, font, and other kinds of support for the Slovak language. Codesets    [Toc]    [Back] The operating system supports the... |
Slovak(5) -- Introduction to Slovak language support
|
This reference page describes the coded character set (codeset), locale, device, font, and other kinds of support for the Slovak language. Codesets    [Toc]    [Back] The operating system supports the... |
slovene(5) -- Introduction to Slovene language support
|
This reference page describes the coded character set (codeset), locale, device, font, and other kinds of support for the Slovene language as used in the Slovene Republic. Codesets    [Toc]    [Back] ... |
Slovene(5) -- Introduction to Slovene language support
|
This reference page describes the coded character set (codeset), locale, device, font, and other kinds of support for the Slovene language as used in the Slovene Republic. Codesets    [Toc]    [Back] ... |
sml(5) -- rsml and sml macro packages that support RSMLcoded reference pages
|
Reference pages that originate from the Open Software Foundation (OSF) and those created for Tru64 UNIX are coded using RSML (Reference Semantic Markup Language). This markup is implemented through a ... |
spanish(5) -- Introduction to Spanish language support
|
This reference page describes the codeset, locale, device, and other kinds of support for the Spanish language. Codesets    [Toc]    [Back] The operating system supports the following coded character ... |
Spanish(5) -- Introduction to Spanish language support
|
This reference page describes the codeset, locale, device, and other kinds of support for the Spanish language. Codesets    [Toc]    [Back] The operating system supports the following coded character ... |
sshregex(5) -- Glob (wildcard) patterns
|
The sshregex file describes the regular expressions (or globbing patterns) used in filename globbing with the scp2 and sftp2 commands and in the ssh2_config and sshd2_config configuration files. Regex... |
standards(5) -- Support for industry standards
|
Programming interfaces and utilities conform to a number of standards. The full names and mnemonics for the industry standards supported by the operating system software, along with the manuals where ... |
SVID2(5) -- Support for industry standards
|
Programming interfaces and utilities conform to a number of standards. The full names and mnemonics for the industry standards supported by the operating system software, along with the manuals where ... |
SVID3(5) -- Support for industry standards
|
Programming interfaces and utilities conform to a number of standards. The full names and mnemonics for the industry standards supported by the operating system software, along with the manuals where ... |
swedish(5) -- Introduction to Swedish language support
|
This reference page describes the coded character set (codeset), locale, device, and other kinds of support for the Swedish language. Codesets    [Toc]    [Back] The operating system supports the foll... |
Swedish(5) -- Introduction to Swedish language support
|
This reference page describes the coded character set (codeset), locale, device, and other kinds of support for the Swedish language. Codesets    [Toc]    [Back] The operating system supports the foll... |
symbol(5) -- Coded character sets that are used on Microsoft Windows and NT systems
|
Code pages are coded character sets that are used on Microsoft Windows, Windows 95, and NT systems. Just as there are different UNIX codesets, there are different PC code pages, each supporting a part... |
sys_attrs(5) -- introduction to kernel subsystem attributes used for configuration and tuning
|
The operating system kernel is built from many mandatory and optional subsystems. If you are logged into the root account, the following command lists the subsystems included in the kernel for your sy... |
sys_attrs_ace(5) -- ace subsystem attributes
|
This reference page lists and describes attributes for the serial driver (ace) kernel subsystem, used only on the DEC 2000, AlphaServer, and AlphaStation family of processors. Refer to the sys_attrs(5... |
sys_attrs_advfs(5) -- advfs subsystem attributes
|
This reference page lists and describes attributes for the Advanced File System (advfs) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem ... |
sys_attrs_alt(5) -- alt subsystem attributes
|
This reference page lists and describes attributes for the alt (alt) kernel subsystem. This subsystem is used by the DEGPA Gigabit Ethernet network interface cards (NICs). The hardware and firmware fo... |
sys_attrs_ati64(5) -- ati64 subsystem attributes
|
The ATI64 graphics display devices (ati64) kernel subsystem has no attributes that you should ever modify. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem... |
sys_attrs_atm(5) -- Asynchronous Transfer Mode (ATM) subsystem attributes
|
This reference page lists and describes attributes for the following Asynchronous Transfer Mode (ATM) kernel subsystems: Base ATM support (atm) ATM Forum Integrated Layer Management Interface (atmilmi... |
sys_attrs_atmilmi3x(5) -- Asynchronous Transfer Mode (ATM) subsystem attributes
|
This reference page lists and describes attributes for the following Asynchronous Transfer Mode (ATM) kernel subsystems: Base ATM support (atm) ATM Forum Integrated Layer Management Interface (atmilmi... |
sys_attrs_atmip(5) -- Asynchronous Transfer Mode (ATM) subsystem attributes
|
This reference page lists and describes attributes for the following Asynchronous Transfer Mode (ATM) kernel subsystems: Base ATM support (atm) ATM Forum Integrated Layer Management Interface (atmilmi... |
sys_attrs_atmuni(5) -- Asynchronous Transfer Mode (ATM) subsystem attributes
|
This reference page lists and describes attributes for the following Asynchronous Transfer Mode (ATM) kernel subsystems: Base ATM support (atm) ATM Forum Integrated Layer Management Interface (atmilmi... |
sys_attrs_autofs(5) -- autofs subsystem attributes
|
This reference page lists and describes attributes for the AutoFS (autofs) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attributes. S... |
sys_attrs_bba(5) -- bba subsystem attributes
|
The ISDN and audio driver (bba) subsystem is used only on the DEC 3000 family of processors and has no attributes. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel s... |
sys_attrs_bcm(5) -- bcm subsystem attributes
|
This reference page lists and describes attributes for the bcm (bcm) kernel subsystem. This subsystem is used by the DEGXA Gigabit Ethernet Network Interface Cards (NICs). The hardware and firmware fo... |
sys_attrs_bparm(5) -- bparm subsystem attributes
|
This reference page lists and describes attributes for the Boot Parameters (bparm) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attri... |
sys_attrs_bsd_tty(5) -- bsd_tty subsystem attributes
|
This reference page lists and describes attributes for the BSD Terminal (bsd_tty) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attrib... |
sys_attrs_cam(5) -- SCSI CAM I/O subsystem attributes
|
This reference page lists and describes attributes for the following kernel subsystems associated with the SCSI CAM I/O system: cam cam_adapter-id cam_disk cam_tape An asterisk (*) precedes the name o... |
sys_attrs_cam_disk(5) -- SCSI CAM I/O subsystem attributes
|
This reference page lists and describes attributes for the following kernel subsystems associated with the SCSI CAM I/O system: cam cam_adapter-id cam_disk cam_tape An asterisk (*) precedes the name o... |
sys_attrs_cam_tape(5) -- SCSI CAM I/O subsystem attributes
|
This reference page lists and describes attributes for the following kernel subsystems associated with the SCSI CAM I/O system: cam cam_adapter-id cam_disk cam_tape An asterisk (*) precedes the name o... |
sys_attrs_cirrus(5) -- cirrus subsystem attributes
|
The Cirrus video graphics (cirrus) kernel subsystem has no attributes that you should ever modify. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attribu... |
sys_attrs_clubase(5) -- clubase subsystem attributes
|
This reference page lists and describes attributes for the cluster base (clubase) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attrib... |
sys_attrs_cm(5) -- system attributes for the cm kernel subsystem
|
This reference page describes attributes for the Configuration Manager (cm) kernel subsystem. See sys_attrs(5) for an introduction to the topic of system attributes. Maximum number of subsystems that ... |
sys_attrs_ddr(5) -- ddr subsystem attributes
|
The Dynamic Device Recognition (ddr) kernel subsystem has no attributes. See ddr_config(8) for information about configuring new devices into the operating system. See sys_attrs(5) for general informa... |
sys_attrs_dlb(5) -- dlb subsystem attributes
|
This reference page lists and describes attributes for the Data Link Bridge (dlb) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attrib... |
sys_attrs_dli(5) -- dli subsystem attributes
|
This reference page lists and describes attributes for the Data Link Interface (dli) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem att... |
sys_attrs_dlpi(5) -- DLPI subsystem attributes
|
This reference page lists and describes attributes for the Data Link Provider Interface (dlpi) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel sub... |
sys_attrs_ee(5) -- ee subsystem attributes
|
This reference page lists and describes attributes for the ee (ee) kernel subsystem. This subsystem is used by the Intel 10/100 Mb/s Ethernet adapters. Refer to the sys_attrs(5) reference page for an ... |
sys_attrs_eisa(5) -- eisa subsystem attributes
|
This reference page lists and describes attributes for the EISA Bus (eisa) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attributes. F... |
sys_attrs_emx(5) -- emx subsystem attributes
|
The Emulex Fibre Channel adapter (emx) kernel subsystem has read-only attributes that provide information about the adaptor driver. None of these attributes can be modified. Refer to the sys_attrs(5) ... |
sys_attrs_ffm_fs(5) -- ffm_fs subsystem attributes
|
The File-on-File Mount File System (ffm_fs) kernel subsystem has no attributes. |
sys_attrs_fta(5) -- fta subsystem attributes
|
The fta (fta) kernel subsystem is used by the Fiber Distributed Data Interface (FDDI) adapters. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attributes... |
sys_attrs_generic(5) -- system attributes for the generic kernel subsystem
|
This reference page describes the attributes for the Generic (generic) kernel subsystem. See sys_attrs(5) for general information about setting system attributes. A value that is set and used internal... |
sys_attrs_gpc_input(5) -- gpc_input subsystem attributes
|
This reference page lists and describes attributes for the GPC Input (gpc_input) kernel subsystem. This subsystem handles mouse and keyboard input for both old style LK* keyboards and serial mice, and... |
sys_attrs_i2o(5) -- i2o subsystem attributes
|
The Intelligent I/O (i2o) kernel subsystem has no attributes that you should ever modify. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attributes. |
sys_attrs_inet(5) -- inet subsystem attributes
|
This reference page lists and describes attributes for the Internet (inet) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attributes. T... |
sys_attrs_io(5) -- io subsystem attributes
|
This reference page lists and describes attributes for the I/O (io) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attributes. Amount o... |
sys_attrs_ipc(5) -- attributes for the ipc kernel subsystem
|
This reference page describes attributes for the Interprocess Communication (ipc) kernel subsystem. In the following list, attributes whose names are preceded by an asterisk (*) can be modified at run... |
sys_attrs_ipsec(5) -- ipsec subsystem attributes
|
This reference page lists and describes attributes for the Internet Protocol Security (ipsec) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subs... |
sys_attrs_iptunnel(5) -- iptunnel subsystem attributes
|
This reference page lists and describes attributes for the Internet Protocol Tunneling (iptunnel) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel ... |
sys_attrs_ipv6(5) -- ipv6 subsystem attributes
|
This reference page lists and describes attributes for the Internet Protocol Version 6 (ipv6) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subs... |
sys_attrs_isa(5) -- isa subsystem attributes
|
This reference page lists and describes attributes for the ISA Bus (isa) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attributes. For... |
sys_attrs_isp(5) -- isp subsystem attributes
|
The ISP (isp) kernel subsystem has no attributes that you should ever modify. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attributes. sys_attrs_isp(5) |
sys_attrs_kevm(5) -- kevm subsystem attributes
|
This reference page lists and describes attributes for the Kernel Event Manager (kevm) subsystem. See sys_attrs(5) for general guidelines about changing system attributes. See evm(5) for more informat... |
sys_attrs_lag(5) -- lag subsystem attributes
|
This reference page lists and describes attributes for the link aggregation group (lag) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem ... |
sys_attrs_lane(5) -- Asynchronous Transfer Mode (ATM) subsystem attributes
|
This reference page lists and describes attributes for the following Asynchronous Transfer Mode (ATM) kernel subsystems: Base ATM support (atm) ATM Forum Integrated Layer Management Interface (atmilmi... |
sys_attrs_lan_common(5) -- lan_common subsystem attributes
|
The Local Area Network (lan_common) kernel subsystem contains interfaces and data structures that are used in common by LAN drivers. This subsystem contains no attributes that you should ever modify. ... |
sys_attrs_lfa(5) -- lfa subsystem attributes
|
This reference page lists and describes attributes for the lfa (lfa) kernel subsystem. This subsystem is used by the HE622 and HE155 Asynchronous Transfer Mode (ATM) adapters. Refer to the sys_attrs(5... |
sys_attrs_lsm(5) -- lsm subsystem attributes
|
This reference page lists and describes attributes for the Logical Storage Manager (lsm) kernel subsystem. Refer to sys_attrs(5) for an introduction to the topic of kernel subsystem attributes. A valu... |
sys_attrs_lta(5) -- lta subsystem attributes
|
The lta (lta) kernel subsystem is used by the ATMworks 350 Asynchronous Transfer Mode (ATM) adapters and contains no attributes that you should modify. Refer to the sys_attrs(5) reference page for an ... |
sys_attrs_mchan(5) -- mchan subsystem attributes
|
The Memory Channel (mchan) kernel subsystem has no attributes that you should ever modify. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attributes. |
sys_attrs_net(5) -- net subsystem attributes
|
This reference page lists and describes attributes for the Network (net) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attributes. Num... |
sys_attrs_netrain(5) -- netrain subsystem attributes
|
This reference page lists and describes attributes for the Redundant Array of Independent Network adapters (NetRAIN) (netrain) kernel subsystem. Refer to the sys_attrs(5) reference page for an introdu... |
sys_attrs_pci(5) -- pci subsystem attributes
|
This reference page lists and describes attributes for the PCI (pci) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attributes. For thi... |
sys_attrs_ppp(5) -- ppp subsystem attributes
|
This reference page lists and describes attributes for the Point-to-Point Protocol (ppp) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem... |
sys_attrs_presto(5) -- presto subsystem attributes
|
This reference page lists and describes attributes for the Prestoserve (presto) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attribut... |
sys_attrs_proc(5) -- system attributes for the proc kernel subsystem
|
This reference page describes system attributes for the Process (proc) kernel subsystem. See sys_attrs(5) for an introduction to system attributes. Do not edit the system configuration file to directl... |
sys_attrs_psm(5) -- psm subsystem attributes
|
This reference page lists and describes attributes for the Process Set Manager (psm) kernel subsystem, which monitors the state of vital processes. The application interfaces to the psm subsystem are ... |
sys_attrs_pts(5) -- pts subsystem attributes
|
This reference page lists and describes attributes for the Pseudoterminal (pts) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attribut... |
sys_attrs_pwrmgr(5) -- pwrmgr subsystem attributes
|
This reference page lists and describes attributes for the Power Manager (pwrmgr) kernel subsystem. To change these attributes so that they take effect each time you boot the system, you create a stan... |
sys_attrs_qvision(5) -- qvision subsystem attributes
|
The QVision graphics display devices (qvision) kernel subsystem has no attributes that you should ever modify. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsy... |
sys_attrs_rt(5) -- rt subsystem attributes
|
This reference page lists and describes attributes for the Realtime (rt) kernel subsystem. Refer to sys_attrs(5) for an introduction to the topic of kernel subsystem attributes. Attributes whose names... |
sys_attrs_s3trio(5) -- s3trio subsystem attributes
|
The S3Trio graphics adapter (s3trio) kernel subsystem has no attributes that you should ever modify. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attri... |
sys_attrs_scc(5) -- scc and scc_input subsystem attributes
|
This reference page lists and describes attributes for the serial driver (scc) and keyboard driver (scc_input) kernel subsystems used on the DEC 3000 family of processors. Refer to the sys_attrs(5) re... |
sys_attrs_scc_input(5) -- scc and scc_input subsystem attributes
|
This reference page lists and describes attributes for the serial driver (scc) and keyboard driver (scc_input) kernel subsystems used on the DEC 3000 family of processors. Refer to the sys_attrs(5) re... |
sys_attrs_sec(5) -- sec subsystem attributes
|
This reference page lists and describes attributes for the Security (sec) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attributes. In... |
sys_attrs_snmpinfo(5) -- snmpinfo subsystem attributes
|
This reference page lists and describes attributes for the Simple Network Management Protocol (snmpinfo) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of ... |
sys_attrs_socket(5) -- socket subsystem attributes
|
This reference page lists and describes attributes for the Socket (socket) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attributes. T... |
sys_attrs_streams(5) -- streams subsystem attributes
|
This reference page lists and describes attributes for the STREAMS (streams) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attributes.... |
sys_attrs_strstd(5) -- strstd subsystem attributes
|
The STREAMS standard (strstd) kernel subsystem has no attributes. This subsystem must be configured into the kernel in order to use any of the following STREAMS drivers or modules: xtiso, dlb, dlpi, l... |
sys_attrs_tc(5) -- tc subsystem attributes
|
This reference page lists and describes attributes for the TURBOchannel Bus (tc) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attribu... |
sys_attrs_tu(5) -- tu subsystem attributes
|
This reference page lists and describes attributes for the tu (tu) kernel subsystem. This subsystem is used by the 10/100 Mb/s Ethernet adapters. Refer to the sys_attrs(5) reference page for an introd... |
sys_attrs_ufs(5) -- ufs subsystem attributes
|
This reference page lists and describes attributes for the UNIX File System (ufs) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attrib... |
sys_attrs_uipc(5) -- uipc subsystem attributes
|
This reference page lists and describes attributes for the AF_UNIX interprocess communication (uipc) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kern... |
sys_attrs_uni3x(5) -- Asynchronous Transfer Mode (ATM) subsystem attributes
|
This reference page lists and describes attributes for the following Asynchronous Transfer Mode (ATM) kernel subsystems: Base ATM support (atm) ATM Forum Integrated Layer Management Interface (atmilmi... |
sys_attrs_vfs(5) -- system attributes for the vfs kernel subsystem
|
This reference page describes system attributes for the Virtual File System (vfs) kernel subsystem. See sys_attrs(5) for general guidelines about changing system attributes. Some subsystem attributes ... |
sys_attrs_vga(5) -- vga subsystem attributes
|
The Video Graphics Adapter (vga) kernel subsystem has no attributes that you should ever modify. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attribute... |
sys_attrs_vlan(5) -- vlan subsystem attributes
|
This reference page lists and describes attributes for the virtual LAN (vlan) kernel subsystem. Refer to the sys_attrs(5) reference page for an introduction to the topic of kernel subsystem attributes... |
sys_attrs_vm(5) -- system attributes for the vm kernel subsystem
|
This reference page describes system attributes for the Virtual Memory (vm) kernel subsystem. See sys_attrs(5) for general guidelines about changing system attributes. In the following list, an asteri... |
sys_attrs_xpr(5) -- xpr subsystem attributes
|
The XPR (xpr) subsystem has no attributes. |
tactis(5) -- A character encoding system (codeset) for Thai.
|
The TACTIS (Thai API Consortium/Thai Industrial Standard) codeset consists of the following two character sets: ASCII (ISO 646-1983) TIS 620-2533 These characters are 8-bit coded, ranging from 00 to F... |
TACTIS(5) -- A character encoding system (codeset) for Thai.
|
The TACTIS (Thai API Consortium/Thai Industrial Standard) codeset consists of the following two character sets: ASCII (ISO 646-1983) TIS 620-2533 These characters are 8-bit coded, ranging from 00 to F... |
telecode(5) -- A character encoding system (codeset) for Traditional Chinese
|
The Telecode codeset (called Mitac Telex in early versions of the operating system) consists of 2 character planes. Each character plane has 8836 character positions. In plane 1, standard characters o... |
thai(5) -- Introduction to Thai language support
|
TIS 620-2533 is the Thai national standard that defines a primary set of graphic characters for information interchange. The operating system supports this standard with coded character set (codeset),... |
Thai(5) -- Introduction to Thai language support
|
TIS 620-2533 is the Thai national standard that defines a primary set of graphic characters for information interchange. The operating system supports this standard with coded character set (codeset),... |
Thread(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
ThreadAddr(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
ThreadCreationObj(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
ThreadCreationProc(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
ThreadExcludeObj(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
ThreadExcludeProc(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
ThreadForeach(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
ThreadGetId(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
ThreadIsInternal(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
ThreadLockedAdd(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
ThreadLookup(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
ThreadMutexLock(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
ThreadMutexPoll(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
ThreadMutexUnlock(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
ThreadRemove(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
ThreadTableFree(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
ThreadTableInit(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
ThreadTableLock(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
ThreadTableUnlock(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
ThreadTerminationObj(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
ThreadTerminationProc(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
ThreadUnlock(5) -- Atom services
|
Atom's Thread* routines help you write thread-safe analysis routines, for applications that use pthread_create and other POSIX thread services. See FILES below for a working example of a tool that us... |
truetype(5X) -- Support for TrueType fonts in the X Server
|
The X server has the capability to display TrueType fonts. The operating system currently supplies only Chinese TrueType fonts, but you can add other TrueType fonts to your system. Doing so makes them... |
TrueType(5X) -- Support for TrueType fonts in the X Server
|
The X server has the capability to display TrueType fonts. The operating system currently supplies only Chinese TrueType fonts, but you can add other TrueType fonts to your system. Doing so makes them... |
turkish(5) -- Introduction to Turkish language support
|
This reference page describes the coded character set (codeset), locale, device, font, and other kinds of support for the Turkish language. Codesets    [Toc]    [Back] The operating system supports th... |
Turkish(5) -- Introduction to Turkish language support
|
This reference page describes the coded character set (codeset), locale, device, font, and other kinds of support for the Turkish language. Codesets    [Toc]    [Back] The operating system supports th... |
ucontext(5) -- user context
|
The thread of control within an executing process is specified by the ucontext structure. This structure contains at least the following members: ucontext_t uc_link sigset_t uc_sigmask stack_t uc_stac... |
UCS-2(5) -- Support for the Unicode and ISO/IEC 10646 standards
|
The operating system provides locales and codeset converters that support the following standards: The Unicode Standard, Version 3.0, Unicode, Inc., 2000 The Unicode Standard, Version 3.1, Unicode, In... |
UCS-4(5) -- Support for the Unicode and ISO/IEC 10646 standards
|
The operating system provides locales and codeset converters that support the following standards: The Unicode Standard, Version 3.0, Unicode, Inc., 2000 The Unicode Standard, Version 3.1, Unicode, In... |
UIL(5X) -- The user interface language file format
|
The UIL language is used for describing the initial state of a user interface for a widget based application. UIL describes the widgets used in the interface, the resources of those widgets, and the c... |
unicode(5) -- Support for the Unicode and ISO/IEC 10646 standards
|
The operating system provides locales and codeset converters that support the following standards: The Unicode Standard, Version 3.0, Unicode, Inc., 2000 The Unicode Standard, Version 3.1, Unicode, In... |
Unicode(5) -- Support for the Unicode and ISO/IEC 10646 standards
|
The operating system provides locales and codeset converters that support the following standards: The Unicode Standard, Version 3.0, Unicode, Inc., 2000 The Unicode Standard, Version 3.1, Unicode, In... |
universal.utf8(5) -- Support for the Unicode and ISO/IEC 10646 standards
|
The operating system provides locales and codeset converters that support the following standards: The Unicode Standard, Version 3.0, Unicode, Inc., 2000 The Unicode Standard, Version 3.1, Unicode, In... |
UTF-16(5) -- Support for the Unicode and ISO/IEC 10646 standards
|
The operating system provides locales and codeset converters that support the following standards: The Unicode Standard, Version 3.0, Unicode, Inc., 2000 The Unicode Standard, Version 3.1, Unicode, In... |
UTF-32(5) -- Support for the Unicode and ISO/IEC 10646 standards
|
The operating system provides locales and codeset converters that support the following standards: The Unicode Standard, Version 3.0, Unicode, Inc., 2000 The Unicode Standard, Version 3.1, Unicode, In... |
UTF-8(5) -- Support for the Unicode and ISO/IEC 10646 standards
|
The operating system provides locales and codeset converters that support the following standards: The Unicode Standard, Version 3.0, Unicode, Inc., 2000 The Unicode Standard, Version 3.1, Unicode, In... |
WML(5X) -- The widget meta-language file format for creating uil compilers
|
The widget meta-language facility (WML) is used to generate the components of the user interface language (UIL) compiler that can change depending on the widget set. Using WML you can add support in U... |
wototo(5) -- Introduction to the Thai language standard
|
Wototo is the Thai language software standard. It describes Thai characters and their classifications. This standard also describes the methods used to input and output Thai characters. Thai Character... |
Wototo(5) -- Introduction to the Thai language standard
|
Wototo is the Thai language software standard. It describes Thai characters and their classifications. This standard also describes the methods used to input and output Thai characters. Thai Character... |
WriteObj(5) -- Allows an Atom tool's InstrumentAll routine to build, release, and write objects
|
Atom's object management routines allow an Atom tool's InstrumentAll routine to build, write, and release objects. You can use these routines only from an Atom tool's instrumentation file. See atom... |
XBD(5) -- Support for industry standards
|
Programming interfaces and utilities conform to a number of standards. The full names and mnemonics for the industry standards supported by the operating system software, along with the manuals where ... |
XCU(5) -- Support for industry standards
|
Programming interfaces and utilities conform to a number of standards. The full names and mnemonics for the industry standards supported by the operating system software, along with the manuals where ... |
XCURSES(5) -- Support for industry standards
|
Programming interfaces and utilities conform to a number of standards. The full names and mnemonics for the industry standards supported by the operating system software, along with the manuals where ... |
Xlate(5) -- Atom routines used to determine the instrumented PC for selected instructions
|
Atom's Xlate routines allow you to determine the instrumented PC for selected instructions. You can use these functions to build a table that translates an instruction's PC in the instrumented appli... |
XlateAddr(5) -- Atom routines used to determine the instrumented PC for selected instructions
|
Atom's Xlate routines allow you to determine the instrumented PC for selected instructions. You can use these functions to build a table that translates an instruction's PC in the instrumented appli... |
XlateInstTextSize(5) -- Atom routines used to determine the instrumented PC for selected instructions
|
Atom's Xlate routines allow you to determine the instrumented PC for selected instructions. You can use these functions to build a table that translates an instruction's PC in the instrumented appli... |
XlateInstTextStart(5) -- Atom routines used to determine the instrumented PC for selected instructions
|
Atom's Xlate routines allow you to determine the instrumented PC for selected instructions. You can use these functions to build a table that translates an instruction's PC in the instrumented appli... |
XlateLoadShift(5) -- Atom routines used to determine the instrumented PC for selected instructions
|
Atom's Xlate routines allow you to determine the instrumented PC for selected instructions. You can use these functions to build a table that translates an instruction's PC in the instrumented appli... |
XNS(5) -- Support for industry standards
|
Programming interfaces and utilities conform to a number of standards. The full names and mnemonics for the industry standards supported by the operating system software, along with the manuals where ... |
XPG4(5) -- Support for industry standards
|
Programming interfaces and utilities conform to a number of standards. The full names and mnemonics for the industry standards supported by the operating system software, along with the manuals where ... |
XPG4-UNIX(5) -- Support for industry standards
|
Programming interfaces and utilities conform to a number of standards. The full names and mnemonics for the industry standards supported by the operating system software, along with the manuals where ... |
XSH(5) -- Support for industry standards
|
Programming interfaces and utilities conform to a number of standards. The full names and mnemonics for the industry standards supported by the operating system software, along with the manuals where ... |
ace(7) -- Serial communications interface
|
The ace serial line controller provides a serial communications interface on DEC 2000, AlphaStation, and AlphaServer platforms. The serial communications ports that are controlled by ace adhere to the... |
alt(7) -- DEGPA Gigabit Ethernet interface
|
The alt interface provides access to Gigabit Ethernet (1000Mbs) through the DEGPA device. The interface supports full-duplex operation in a switched or point-topoint configuration, and provides the fo... |
arp(7) -- Address Resolution Protocol
|
The ARP protocol is used to map dynamically between DARPA Internet and Ethernet addresses. It is used by all the Ethernet interface drivers. The ARP protocol caches Internet-Ethernet address mappings.... |
atapi_ide(7) -- Interface for ATAPI or IDE (PC) devices
|
Devices commonly known for their use on PC devices as ATA or IDE devices are supported using the SCSI CAM device driver. The ATA standard has also been expanded to include what are known as ATAPI devi... |
atty(7) -- Asian terminal driver
|
This reference page describes the additional features supported in the Asian terminal driver used for conversational computing in a Japanese, Chinese, or Korean environment. See tty(7) for a descripti... |
audit(7) -- audit log interface
|
This is a special character device that provides an interface for the audit daemon process, /usr/sbin/auditd, to the kernel audit buffers. /dev is now a context dependent symbolic link (CDSL) to /clus... |
bcm(7) -- DEGXA Gigabit Ethernet interface
|
The bcm interface provides access to Gigabit Ethernet (1000Mbs) through the DEGXA device. The interface supports full-duplex operation in a switched or point-topoint configuration, and provides the fo... |
bind_intro(7) -- Introduction to the Berkeley Internet Name Domain (BIND) service
|
The Berkeley Internet Name Domain (BIND) service is a host name and address lookup service for the Internet network. The BIND service is based on the client-server model. It allows client systems to o... |
bind_manual_setup(7) -- Describes how to manually set up the Berkeley Internet Name Domain (BIND) service on your network.
|
Setting up a BIND domain includes configuring the following: Master server Slave servers Stub servers Caching-only servers Forward-only servers Clients Note Documentation for BIND prior to Version 8.1... |
bpf(7) -- BSD Packet Filter Extensions
|
The BSD Packet Filter (BPF) is similar to the Tru64 UNIX Packet Filter facility (see packetfilter(7)), but provides a slightly different programming interface. The BPF Extensions to the Tru64 UNIX pac... |
calcomp(7) -- Configuring a CalComp graphics tablet
|
This reference page provides information about how you configure a CalComp DrawingBoard III tablet, an input device supported by the Xinput extension to the Xserver. When the software for the tablet i... |
cdrom(7) -- SCSI disk interface
|
The rz driver is for all HP Small Computer System Interface (SCSI) disk drives. There is one major number used to represent SCSI disks, pointing to the driver. The minor number (for scsi) is the SCSI ... |
cidr(7) -- Classless Inter-Domain Routing
|
Classless Inter-Domain Routing, also known as CIDR, is an Internet addressing architecture designed to solve two problems: the growth in the size of the routing tables in the top-level routers and the... |
CIDR(7) -- Classless Inter-Domain Routing
|
Classless Inter-Domain Routing, also known as CIDR, is an Internet addressing architecture designed to solve two problems: the growth in the size of the routing tables in the top-level routers and the... |
clone(7) -- Opens a major and minor device pair on a STREAMS driver
|
The clone driver is a "pass through" device driver that allows other drivers to select unique minor device numbers on each open. In effect, the driver passes an open operation through to the other d... |
comet(7) -- PowerStorm 4D10T, Elsa GLoria, IntraServer Combo device driver
|
The PowerStorm 4D10T, Elsa GLoria, and IntraServer Combo cards are inexpensive graphics accelerators based on 3DLabs' Permedia2 graphics chip. Supported cards offer up to 8MB of video memory and a la... |
console(7) -- Console interface
|
Return to the monitor by halting the machine from the operating system or pressing the HALT button on the rear panel. Enter help at the prompt to receive a description of valid console commands. For e... |
dc(7) -- serial line/mouse/keyboard
|
The dc serial line controller provides DECstation 2100, DECstation 3100, DECstation 5000, and DECstation 5100 computer systems with keyboard, mouse, and serial communications interfaces. The serial co... |
des_modes(7) -- Variants of DES and other crypto algorithms of OpenSSL
|
Several crypto algorithms for OpenSSL can be used in a number of modes. Those are used for using block ciphers in a way similar to stream ciphers, among other things. Electronic Codebook Mode (ECB)Â Â Â ... |
devio(7) -- device information interface
|
The devio interface obtains status, device attributes, and other information by polling the controlling device driver. There are three ioctl requests associated with this interface: DEVIOCGET, DEVGETI... |
devpoll.h(7) -- Device driver for a fast poll on many file descriptors
|
The /dev/poll driver supports the monitoring of one or more sets of file descriptors. Access to the /dev/poll driver is supported through the open(), write(), and ioctl() functions. By using open(), w... |
dhcp(7) -- Dynamic Host Configuration Protocol (DHCP) introductory information
|
The Dynamic Host Configuration Protocol (DHCP) enables you to automatically assign IP addresses to clients on networks from a pool of addresses. The IP address assignment and configuration occurs auto... |
DHCP(7) -- Dynamic Host Configuration Protocol (DHCP) introductory information
|
The Dynamic Host Configuration Protocol (DHCP) enables you to automatically assign IP addresses to clients on networks from a pool of addresses. The IP address assignment and configuration occurs auto... |
disk(7) -- SCSI disk interface
|
The rz driver is for all HP Small Computer System Interface (SCSI) disk drives. There is one major number used to represent SCSI disks, pointing to the driver. The minor number (for scsi) is the SCSI ... |
dlb(7) -- STREAMS pseudodevice driver for bridging BSD Drivers to STREAMS
|
The dlb STREAMS pseudodevice driver provides a communication path between BSD-style device drivers and STREAMS protocol stacks. The dlb STREAMS pseudodevice driver is the Stream end in a Stream that c... |
dlpi(7) -- STREAMS pseudodevice driver for bridging BSD Drivers to STREAMS
|
The dlb STREAMS pseudodevice driver provides a communication path between BSD-style device drivers and STREAMS protocol stacks. The dlb STREAMS pseudodevice driver is the Stream end in a Stream that c... |
dsk(7) -- SCSI disk interface
|
The rz driver is for all HP Small Computer System Interface (SCSI) disk drives. There is one major number used to represent SCSI disks, pointing to the driver. The minor number (for scsi) is the SCSI ... |
ee(7) -- Intel (82558/82559) PCI 10/100 Ethernet
|
The ee interface supports the Intel 82558 and 82559-based HP adapters (including the DE60x line of adapters). These PCI bus adapters support standard 10/100 Ethernet operation, and provide equivalent ... |
emx(7) -- Device Driver for the Emulex Fibre Channel Host Adapter
|
The emx driver controls and manages the Emulex Fibre Channel Host Adapter. The emx driver is fully integrated with the CAM SCSI I/O subsystem to provide connectivity to FCP (Fibre Channel Protocol, su... |
eucioctl(7) -- Interface to EUC-handling modules and drivers
|
The eucioctl interface is used with STREAMS modules and drivers for tty and pty devices that handle Extended UNIX Code (EUC) code sets. This interface consists of ioctl commands, which control charact... |
faa(7) -- DEFAA FDDI Network Interface
|
The faa interface is a high-speed Futurebus+ adapter to a 100 megabit per second Fiber Distributed Data Interface (FDDI) timed token ring network adapter. The faa interface allows the host system to b... |
fd(7) -- Floppy disk interface
|
The fd device driver and fdi controller make up the interface to the integrated Floppy Disk Interface (FDI). If the minor number is less than 64, the driver select number is indicated by bits 4 and 5,... |
fta(7) -- DEFTA, DEFPA, and DEFEA FDDI Network Interfaces
|
The fta interface can be a high-speed TURBOchannel (DEFTA), PCI (DEFPA), or EISA (DEFEA) adapter to a 100 megabit per second Fiber Distributed Data Interface (FDDI) timed token ring network. The fta i... |
fza(7) -- DEFZA FDDI Network Interface
|
The fza interface is a high speed TURBOchannel bus to a 100 Mbit/second Fiber Distributed Data Interface (FDDI) timed token ring network adapter. The fza interface allows the host system to be an FDDI... |
gated_intro(7) -- Information about the gate daemon and its implementation
|
This reference page contains a glossary of terms that are used in any discussion of gated and the gated.conf file. |
icmp(7) -- Internet Control Message Protocol
|
The Internet Control Message Protocol (ICMP) is the error and control message protocol used by the Internet Protocol (IP) and the Internet Protocol family. It may be accessed through a raw socket for ... |
ifnet(7) -- STREAMS ifnet module for bridging STREAMS device drivers to sockets
|
ifnet is a STREAMS-based module that provides a bridge between STREAMS-based device drivers written to the Data Link Provider Interface (DLPI) and sockets. By using ifnet, STREAMS-based DLPI device dr... |
inet(7) -- Internet Protocol family
|
The Internet Protocol family is a collection of protocols layered atop the Internet Protocol (IP) Version 4 and Version 6 transport layers, and utilizing the Internet address format. The Internet fami... |
intro(7) -- Introduction to special files
|
Section 7 describes the special files, related driver functions, and networking support available in the system. In this section of the reference pages, the SYNOPSIS heading of each configurable devic... |
ip(7) -- Internet Protocol (IPv4 and IPv6)
|
The Internet Protocol (IP) is the transport layer protocol used by the Internet Protocol family. Options may be set at the IP level when using higher-level protocols that are based on IP (such as the ... |
ipsec(7) -- Internet Protocol Security Architecture
|
Internet Protocol Security (IPsec) is a security framework that is designed to provide interoperable, high quality, cryptographically-based security for Internet Protocol Version 4 (IPv4) and Internet... |
iscc(7) -- serial communications interface
|
An onboard Zilog 8530 DUART provides AXPvme-based Single Board Computers with console (CON) and auxiliary (AUX) serial communications ports. Both serial communications ports can operate at baud rates ... |
kmem(7) -- mapped kernel memory interface
|
The kmem character special device provides access to mapped kernel memory. Byte addresses in kmem are equivalent to mapped kernel memory addresses. References to unmapped or user space addresses will ... |
lag(7) -- Link aggregation (also called trunking) introductory information
|
Link aggregation, or trunking, enables administrators to combine two or more physical Ethernet Network Interface Cards (NICs) and create a single virtual link. (Upperlayer software sees this link aggr... |
lat(7) -- Local Area Transport (LAT) support
|
The LAT protocol supports communications between host computer systems and terminal servers with terminals, PCs, printers, modems and other devices over local area networks (LAN). LAT software has the... |
lat_intro(7) -- Local Area Transport (LAT) support
|
The LAT protocol supports communications between host computer systems and terminal servers with terminals, PCs, printers, modems and other devices over local area networks (LAN). LAT software has the... |
lat_manual_setup(7) -- Describes how to manually set up the Local Area Transport (LAT)
|
To run LAT on your system, you must configure LAT in your system's kernel (see the Network Administration: Connections manual). Optionally, you can customize your LAT setup. The customization section... |
ldterm(7) -- STREAMS line discipline module
|
The ldterm module is a STREAMS module that supplies the line discipline for terminal devices. This module provides most of the functions of the terminal interface described in the /usr/include/termios... |
le(7) -- LeMAC Ethernet interface
|
The le interface provides access to a 10 Mb/s Ethernet network through the LeMAC controller. The host's Internet address is specified at boot time with an SIOCSIFADDR ioctl. The le interface employs ... |
lfa(7) -- DAPCA/DAPBA Asynchronous Transfer Mode (ATM) Network Interface
|
The lfa interface can be either the ATM HE622 ATM adapter (DAPCA) or the ATM HE155 ATM adapter (DAPBA), providing transmission rates of 622 megabits per second and 155 megabits per second, respectivel... |
ln(7) -- Lance Ethernet interface
|
The ln interface provides access to a 10 Mb/s Ethernet network through the Lance controller. The host's Internet address is specified at boot time with an SIOCSIFADDR ioctl. The ln interface employs ... |
lo(7) -- Software loopback network interface
|
The loopback interface is a software loopback mechanism which is used for performance analysis, software testing, and/or local communication. As with other network interfaces, the loopback interface m... |
log(7) -- STREAMS log driver
|
The STREAMS log driver allows user-level processes, and STREAMS drivers and modules, to perform error logging and event tracing. This is done via a user interface and a kernel interface. The interface... |
mail_intro(7) -- Introductory information on the Tru64 UNIX mail system
|
The Tru64 UNIX mail system enables you to exchange mail with other users on your system, as well as with other systems connected to your local network and with users on other networks (provided your s... |
mail_manual_setup(7) -- Describes how to manually set up and start mail
|
Manually setting up and starting your Tru64 UNIX mail system involves stopping and starting the sendmail utility, making changes to the /var/adm/sendmail/sendmail.cf and /var/adm/sendmail/hostname.m4 ... |
mbone.info(7) -- General information about the Multicast Backbone (MBONE)
|
The MBONE is a virtual network. Hosts share information, including audio and video, using multicast addresses. The following is a list of references to publicly available information and software that... |
mc(7) -- SCSI medium changer interface
|
The medium changer (mc) interface provides a means for applications to control the robotic medium changers found in tape and optical libraries or jukeboxes. The mc driver may be used for any supported... |
mem(7) -- physical memory interface
|
The mem character special device file provides access to physical main memory. Byte addresses in mem are equivalent to physical memory in RAM. References to I/O space addresses or to nonexistent RAM w... |
mfa(7) -- DEMFA FDDI Network Interface
|
The mfa interface is a high speed XMI adapter to a 100 Mbit/second Fiber Distributed Data Interface (FDDI) timed token ring network adapter. The mfa interface allows the host system to be an FDDI sing... |
modem(7) -- Describes guidelines for using modems
|
The Tru64 UNIX system enables you to use a variety of modems for point-to-point connections to systems that are not in close proximity to each other. These connections can be Serial Line Internet Prot... |
mtio(7) -- magnetic tape interface
|
This description applies to all mass storage tape drives. The /dev/tape directory special files, such as tape0, tape20_d0, tape3_d7, refer to the mass storage tape drives. Tape drives can exist on dif... |
netintro(7) -- Introduction to socket networking facilities
|
This section is a general introduction to the networking facilities available in the system. Documentation in this part of Section 7 is broken up into three areas: protocol families (domains), protoco... |
networking(7) -- Introduction to socket networking facilities
|
This section is a general introduction to the networking facilities available in the system. Documentation in this part of Section 7 is broken up into three areas: protocol families (domains), protoco... |
network_manual_setup(7) -- Describes how to manually set up the network
|
Setting up the network manually includes the following tasks: Configuring the network interfaces Optionally, enabling the following network daemons: rwhod routed gated writesrv Optionally, setting up ... |
nfs_manual_setup(7) -- Describes how to manually set up the Network File System (NFS)
|
This reference page describes how to manually set up the Network File System (NFS). Setting up NFS includes configuring the following: Servers Clients, using /etc/fstab Clients, using Automount or Aut... |
niff(7) -- Network Interface Failure Finder (NIFF) introductory information.
|
The Network Interface Failure Finder, NIFF, is a facility for detecting and reporting possible failures in network interface cards (NICs) or their connections. Detection is done by monitoring device c... |
nifftmt(7) -- Traffic monitoring for the Network Interface Failure Finder (NIFF)
|
The NIFF traffic monitor thread checks the connectivity of network interfaces and issues events when it detects a change in an interface's connectivity. It does this by monitoring the interface's da... |
nis_intro(7) -- Network Information Service (NIS) introductory information
|
The Network Information Service (NIS) is a distributed name service that allows participating hosts to share access to a common set of system and network files. NIS allows the system administrator to ... |
nis_manual_setup(7) -- Describes how to manually set up the Network Information Service (NIS)
|
Setting up NIS includes configuring the following: Master server Slave servers Clients Note You must have the Additional Networking Services subset installed to create an NIS master or slave server. T... |
nr(7) -- Redundant Array of Independent Network Adapters (NetRAIN)
|
The NetRAIN virtual interface configures multiple interfaces on the same LAN segment into a single interface. One of the real interfaces is always active while the others remain idle. If the active in... |
ntp_intro(7) -- Network Time Protocol (NTP) introductory information
|
The Tru64 UNIX software supports two time services: Network Time Protocol (NTP) Time Synchronization Protocol (TSP) Because it can be traced to clocks of high absolute accuracy, NTP provides a more ac... |
ntp_manual_setup(7) -- Describes how to manually set up the Network Time Protocol (NTP)
|
Setting up the Network Time Protocol (NTP) manually includes selecting your most accurate time source and then configuring the following: Local NTP servers NTP clients You can also choose to set your ... |
null(7) -- Data sink
|
Data written on a null special file are discarded. Reads from a null special file always return 0 (zero) bytes. |
packetfilter(7) -- Ethernet packet filter
|
The packet filter pseudo-device driver provides a raw interface to Ethernets and similar network data link layers. Packets received that are not used by the kernel (for example, to support the IP and ... |
pckt(7) -- STREAMS module for constructing message packets on a pty
|
The pckt module is a STREAMS module that can be used with a pseudoterminal to transfer messages in packet mode. The packet mode feature of pty devices allows the user process on the master side of the... |
pcmcia(7) -- Guidelines for adding PCMCIA cards
|
This reference page provides detailed instructions on adding PCMCIA card support to certain processors. Supported Configurations    [Toc]    [Back] PCMCIA (PC Card) support is limited to the following... |
pfm(7) -- The on-chip performance counter pseudo-device
|
The pfm pseudo-device is the interface to Alpha implementation-specific on-chip performance counters. A set of ioctl calls form the interface, as defined in the header file. The kernel ... |
poll(7) -- Device driver for a fast poll on many file descriptors
|
The /dev/poll driver supports the monitoring of one or more sets of file descriptors. Access to the /dev/poll driver is supported through the open(), write(), and ioctl() functions. By using open(), w... |
ports(7) -- Device (tty and lp) names for serial and parallel ports
|
AlphaStation and AlphaServer systems provide one or two 9-pin serial communication ports. These ports are usually labelled 1 (COMM1) and 2 (COMM2), but they may be identified by different icons. Using... |
port_names(7) -- Device (tty and lp) names for serial and parallel ports
|
AlphaStation and AlphaServer systems provide one or two 9-pin serial communication ports. These ports are usually labelled 1 (COMM1) and 2 (COMM2), but they may be identified by different icons. Using... |
ppp_manual_setup(7) -- Describes how to manually set up Pointto-Point Protocol (PPP) connections
|
The Point-to-Point Protocol (PPP) provides a standard way to transmit IP datagrams over a serial link and a standard way for the systems (peers) at either end of the link to negotiate various optional... |
presto(7) -- The Prestoserve pseudodevice driver
|
The Prestoserve pseudodevice driver presto caches synchronous writes in nonvolatile memory. Prestoserve causes synchronous writes to be performed at memory speeds, rather than at disk speeds. Synchron... |
ptem(7) -- Null STREAMS module for pseudoterminal emulation
|
The ptem module is a null STREAMS module that Tru64 UNIX provides to applications for use in place of the AT&T System V Release 4 ptem module. The AT&T System V Release 4 ptem module emulates a pseudo... |
pty(7) -- Pseudo terminal driver
|
The pty driver provides support for a device-pair termed a pseudo terminal. A pseudo terminal is a pair of character devices, a master device and a slave device. The slave device provides an interface... |
ra(7) -- MSCP disk interface
|
This is a driver for all MSCP disk controllers. All controllers communicate with the host through a packet-oriented protocol termed the Mass Storage Control Protocol (MSCP). The following rules are us... |
RAID(7) -- Small Computer System Interface
|
The operating system interfaces to disk and tape devices through the Small Computer System Interface (SCSI). SCSI support is limited to the HP-supplied storage devices and certain third-party devices.... |
re(7) -- SWXCR RAID interface
|
The re driver is for the SWXCR RAID Array controller. The following rules are used to determine the major and minor numbers that are associated with an re type disk. There are two major numbers used t... |
ri(7) -- I2O RAID disk interface
|
The ri driver supports 32-bit and 64-bit PCI backplane RAID controllers with Intelligent I/O (I2O) host interface supporting backend SCSI channels. I2O is an open architecture for developing device dr... |
route(7) -- Kernel packet forwarding database
|
The UNIX operating system provides packet routing facilities. The kernel maintains a routing information database, which is used in selecting the appropriate network interface when transmitting packet... |
rsvp(7) -- Resource ReSerVation Protocol general information
|
Resource ReSerVation Protocol, also known as RSVP, is an Internet protocol that enables Internet applications to request enhanced quality-of-service (QoS). The Internet application uses the RSVP Appli... |
RSVP(7) -- Resource ReSerVation Protocol general information
|
Resource ReSerVation Protocol, also known as RSVP, is an Internet protocol that enables Internet applications to request enhanced quality-of-service (QoS). The Internet application uses the RSVP Appli... |
rz(7) -- SCSI disk interface
|
The rz driver is for all HP Small Computer System Interface (SCSI) disk drives. There is one major number used to represent SCSI disks, pointing to the driver. The minor number (for scsi) is the SCSI ... |
sad(7) -- STREAMS Administrative Driver
|
The sad driver provides an interface to the autopush facility using the ioctl() function. As an interface, the sad driver enables administrative tasks to be performed on STREAMS modules and drivers. S... |
scc(7) -- Serial keyboard/mouse/communications interface
|
Two base board Zilog scc dual UARTS provide DEC 3000 series personal systems with keyboard, mouse, and serial communications interfaces. The serial communications interfaces can operate at baud rates ... |
SCSI(7) -- Small Computer System Interface
|
The operating system interfaces to disk and tape devices through the Small Computer System Interface (SCSI). SCSI support is limited to the HP-supplied storage devices and certain third-party devices.... |
slip_manual_setup(7) -- Describes how to manually set up the Serial Line Internet Protocol (SLIP)
|
The Serial Line Internet Protocol (SLIP) is a protocol used to run IP over serial lines, including RS-232 cables connecting two systems and telephone circuits. Unlike Ethernet, a serial line provides ... |
streamio(7) -- STREAMS ioctl commands
|
The STREAMS ioctl commands perform control operations on Streams. User processes can use these commands on all STREAMS file types. When the Stream head receives a STREAMS ioctl function, it interprets... |
strlog(7) -- STREAMS log driver
|
The STREAMS log driver allows user-level processes, and STREAMS drivers and modules, to perform error logging and event tracing. This is done via a user interface and a kernel interface. The interface... |
sys_attrs_vba_univ(7) -- Describes how
|
VMEbus UNIVERSE II setup allows you to run the operating system on UNIVERSE II-based Alpha VME systems. For information about installing the operating system on these systems, see the Installation Gui... |
sys_attrs_vba_vipvic(7) -- Describes how to
|
VMEbus setup allows you to run the operating system on the following VIP/VIC-based AXPvme and Alpha VME systems: AXPvme single-board computers (SBCs) Alpha VME 4/224 and 4/228 SBCs Alpha VME 5/352 and... |
sys_attrs_vme_vba(7) -- VMEbus backplane Ethernet interface
|
The VMEbus backplane (vb) interface provides access to an Ethernet network through the VMEbus backplane driver, which acts as an Ethernet Datalink Layer driver. This interface allows VMEbus-based syst... |
tablet(7) -- Configuring a CalComp graphics tablet
|
This reference page provides information about how you configure a CalComp DrawingBoard III tablet, an input device supported by the Xinput extension to the Xserver. When the software for the tablet i... |
tape(7) -- SCSI magnetic tape interface
|
The Small Computer System Interface (SCSI) tape driver provides a standard tape drive interface as described in mtio(7). This is the tape driver for any HP SCSI tape device. Facilities are provided wh... |
tcp(7) -- Internet Transmission Control Protocol (TCP)
|
The TCP protocol provides reliable, flow-controlled, twoway transmission of data. It is a byte-stream protocol used to support the SOCK_STREAM abstraction. The TCP protocol uses the standard Internet ... |
te(7) -- TGEC Ethernet interface
|
The te interface provides access to a 10 Mb/s Ethernet network through the TGEC controller. The host's Internet address is specified at boot time with an SIOCSIFADDR ioctl. The te interface employs t... |
timod(7) -- STREAMS module for converting ioctl() calls into TI messages
|
The timod module is a STREAMS module that converts ioctl() calls from a transport user supporting the Transport Interface (TI) into messages that a transport protocol provider supporting TI can consum... |
tirdwr(7) -- STREAMS module for reads and writes by TI transport users
|
The tirdwr module is a STREAMS module that provides a transport user supporting the Transport Interface (TI) with an alternate interface to a transport protocol provider supporting TI. This alternate ... |
tms(7) -- TMSCP magnetic tape interface
|
The TMSCP driver provides a standard tape drive interface, as described in mtio(7). This is a driver for any controller that adheres to the Tape Mass Storage Control Protocol (TMSCP). The TMSCP contro... |
tra(7) -- DETRA 4 Mb/s or 16 Mb/s Token Ring interface
|
The tra interface is a Token Ring TURBOchannel adapter that can operate at 4 Mb/s or 16 Mb/s. The adapter uses a TMS380 chip to implement the Token Ring protocol. The host's Internet address is speci... |
ttty(7) -- Thai terminal driver
|
This section describes special features supported by the Thai terminal driver, which is used for conversational computing in a Thai environment. See tty(7) for a general description of terminal interf... |
tty(7) -- General terminal interface
|
This section describes both a particular special file /dev/tty and the terminal drivers used for conversational computing. Much of the terminal interface performance is governed by the settings of a t... |
tu(7) -- Tulip Ethernet and Fast Ethernet interface
|
The tu interface provides access to regular 10 Mb/s Ethernet as well as to the newer 100 Mb/s Fast Ethernet (IEEE 802.3 100BaseTX) network. In particular, the tu interface provides access to the follo... |
tz(7) -- SCSI magnetic tape interface
|
The Small Computer System Interface (SCSI) tape driver provides a standard tape drive interface as described in mtio(7). This is the tape driver for any HP SCSI tape device. Facilities are provided wh... |
udp(7) -- Internet user datagram protocol (UDP)
|
UDP is a simple, unreliable datagram protocol that is used to support the SOCK_DGRAM abstraction for the Internet Protocol family. UDP sockets are connectionless, and are normally used with the sendto... |
utx(7) -- UNIX terminal extension pseudo device
|
The utx pseudo device provides a communication mechanism between any server process and the terminal driver subsystem. More specifically, this pseudo device provides ioctl(2) and other I/O functions u... |
uucp_intro(7) -- UNIX-to-UNIX Copy Program (UUCP) introductory information
|
The UNIX-to-UNIX Copy Program (UUCP) is a group of programs that support communications between two computers running UNIX operating systems. Tru64 UNIX supports the HoneyDanBer version of UUCP. The U... |
uucp_manual_setup(7) -- Describes how to manually set up the
|
Setting up UUCP manually includes the following tasks: Checking for required directories Optionally, creating the UUCP manager's account Creating UUCP accounts for remote systems Configuring remote c... |
vb(7) -- VMEbus backplane Ethernet interface
|
The VMEbus backplane (vb) interface provides access to an Ethernet network through the VMEbus backplane driver, which acts as an Ethernet Datalink Layer driver. This interface allows VMEbus-based syst... |
vlan(7) -- Virtual LAN (VLAN) introductory information
|
A Virtual Local Area Network (VLAN) provides administrators with the ability to create logical groups of systems that can communicate as if they were on the same LAN. Multiple VLANs can exist on the s... |
VLAN(7) -- Virtual LAN (VLAN) introductory information
|
A Virtual Local Area Network (VLAN) provides administrators with the ability to create logical groups of systems that can communicate as if they were on the same LAN. Multiple VLANs can exist on the s... |
vme_manual_setup(7) -- Describes how to
|
VMEbus setup allows you to run the operating system on the following VIP/VIC-based AXPvme and Alpha VME systems: AXPvme single-board computers (SBCs) Alpha VME 4/224 and 4/228 SBCs Alpha VME 5/352 and... |
vme_univ_manual_setup(7) -- Describes how
|
VMEbus UNIVERSE II setup allows you to run the operating system on UNIVERSE II-based Alpha VME systems. For information about installing the operating system on these systems, see the Installation Gui... |
vmzcore(7) -- compressed memory core dump interface
|
The vmzcore character special device file provides access to in-memory compressed kernel core dumps. During the boot sequence, savecore uses this device to recover an existing dump. (See the savecore(... |
xna(7) -- The DEMNA Ethernet interfaces
|
The xna driver provides access to a 10-MB Ethernet network through the DEMNA adapter. The DEMNA is an Ethernet-toXMI adapter. The host's Internet address is specified at boot time with an SIOCSIFADDR... |
xti(7) -- General information on XTI
|
The X/Open Transport Interface (XTI) specification defines an independent transport-service interface that allows multiple users to communicate at the transport level of the Open Systems Interconnect ... |
xti_internet(7) -- Internet Protocol-specific information on XTI
|
This reference page provides protocol-specific information that is relevant for TCP and UDP transport providers. It includes information on the following: General notes Options Functions |
zero(7) -- source of zeroes
|
This is a special file that provides a means of obtaining zeroes. A read from a zero special file returns a buffer full of zeroes. This file is of infinite length. Writes to a zero special file succee... |
ac(8) -- Outputs connect-session records
|
The ac command prints to the default output device the total connect time in hours to the nearest hundredth for all users, or the connect time for any user(s) specified with the -p option. It also pri... |
acct(8) -- Provide accounting commands for shell scripts
|
There are a number of commands in the /usr/sbin/acct directory that, along with other accounting commands, enable you to produce a wide range of system accounting records and files. For example, the r... |
acctcms(8) -- Produces command usage summaries from accounting records
|
The acctcms command outputs data in a format called TOTAL COMMAND SUMMARY. This command reads each file specified, combines and sorts all records for identically named processes, and writes them in a ... |
acctcom(8) -- Displays selected process accounting record summaries
|
The acctcom command displays process accounting records from files specified by the file operand, from standard input, or from the /var/adm/pacct file. If you do not specify a file and if standard inp... |
acctcon(8) -- Display connect-time accounting summaries
|
The acctcon1 and acctcon2 commands are described separately. acctcon1 The acctcon1 command is invoked by the runacct shell procedure to write a sequence of login and logout records. One record for eac... |
acctcon1(8) -- Display connect-time accounting summaries
|
The acctcon1 and acctcon2 commands are described separately. acctcon1 The acctcon1 command is invoked by the runacct shell procedure to write a sequence of login and logout records. One record for eac... |
acctcon2(8) -- Display connect-time accounting summaries
|
The acctcon1 and acctcon2 commands are described separately. acctcon1 The acctcon1 command is invoked by the runacct shell procedure to write a sequence of login and logout records. One record for eac... |
acctdisk(8) -- Perform disk-usage accounting
|
Normally the acctdisk and acctdusg commands are called from the dodisk shell procedure to do disk-usage accounting. The dodisk shell procedure is invoked when the cron daemon executes commands in the ... |
acctdusg(8) -- Perform disk-usage accounting
|
Normally the acctdisk and acctdusg commands are called from the dodisk shell procedure to do disk-usage accounting. The dodisk shell procedure is invoked when the cron daemon executes commands in the ... |
acctmerg(8) -- Merges total-accounting files into an intermediary file or a daily accounting file
|
The acctmerg command combines process, connect time, fee, disk usage, and queuing (printer) total-accounting records in tacct binary or tacct ASCII format (see the tacct structure in the acct.h file f... |
accton(8) -- Perform process-accounting procedures
|
The three acctprc commands, acctprc1, acctprc2, and accton, are used in the runacct shell procedure to produce process-accounting reports. acctprc1 [InFile] The acctprc1 command is used to read record... |
acctprc(8) -- Perform process-accounting procedures
|
The three acctprc commands, acctprc1, acctprc2, and accton, are used in the runacct shell procedure to produce process-accounting reports. acctprc1 [InFile] The acctprc1 command is used to read record... |
acctprc1(8) -- Perform process-accounting procedures
|
The three acctprc commands, acctprc1, acctprc2, and accton, are used in the runacct shell procedure to produce process-accounting reports. acctprc1 [InFile] The acctprc1 command is used to read record... |
acctprc2(8) -- Perform process-accounting procedures
|
The three acctprc commands, acctprc1, acctprc2, and accton, are used in the runacct shell procedure to produce process-accounting reports. acctprc1 [InFile] The acctprc1 command is used to read record... |
acctwtmp(8) -- Modify connect time accounting records to change formats and to make corrections in the records
|
fwtmp [-ic] The fwtmp command reads records from standard input and writes records to standard output. Normally, information in record fields of the /var/adm/wtmp file is entered as binary data by the... |
addgroup(8) -- Adds a new group interactively
|
Security Note If you have enhanced security installed on your system, you should use the dxaccounts program to add a group. See Security and the dxaccounts(8) reference page for more information. The ... |
adduser(8) -- Adds a new user interactively
|
Security Note If you have enhanced security installed on your system, you should use the dxaccounts command to add users. See the Security manual and the dxaccounts(8) reference page for more informat... |
addvol(8) -- Adds a volume to an existing domain
|
A newly created domain consists of one volume which can be a disk or a logical volume. The addvol utility enables you to grow the number of volumes within an existing domain. You can add volumes immed... |
advfsd(8) -- Starts the AdvFS graphical user interface (GUI) daemon
|
The AdvFS daemon, advfsd, is a process required by the AdvFS GUI (dtadvfs). The advfsd daemon issues commands and obtains system information on behalf of the AdvFS GUI. The /usr/var/advfs/daemon/socke... |
advfsstat(8) -- Displays AdvFS performance statistics
|
The advfsstat command displays a wide selection of AdvFS performance statistics. It reports in units of one disk block (512 bytes) per interval, with the default being one second. Any number of option... |
advscan(8) -- Locates AdvFS volumes on disk devices
|
The advscan command locates AdvFS volumes (disk partitions or LSM volumes) that are in AdvFS domains. Given the AdvFS volumes, you can re-create or fix the /etc/fdmns directory of a named domain or LS... |
ap(8) -- Parses addresses RFC 822-style
|
The ap program parses addresses according to the ARPA Internet standard. It also understands many nonstandard formats. It is useful for seeing how MH will interpret an address. The ap program treats e... |
arp(8) -- Displays and controls Address Resolution Protocol (ARP) tables
|
The arp command displays or modifies the current ARP entry for the host specified by hostname. The host may be specified by name or number, using Internet dot notation. With no options, the program di... |
atmarp(8) -- Creates ATM Logical IP Subnet (LIS) interface,
|
The atmarp command creates a logical IP subnet (LIS) interface over the ATM network. You can create multiple LIS interfaces on an ATM driver. Hosts connected to ATM communicate directly to other hosts... |
atmconfig(8) -- Configures the ATM subsystem
|
The atmconfig command configures ATM networking and displays information about the ATM networks. The command only controls the base ATM modules; it does not control specific device drivers, convergenc... |
atmelan(8) -- Configures LAN-Emulation clients as network interfaces.
|
The atmelan command creates and configures LAN-Emulation Clients (LEC) as network interfaces. The first interface created appears as elan0, the second as elan1, and so on. The atmelan command can also... |
atmifmp(8) -- Configures the ATM subsystem for switching IP traffic only
|
The atmifmp command enables and disables IP switching on a Tru64 UNIX end system that has an attached ATMworks ATM adapter. The IP switching architecture is based on the Ipsilon Networks, Inc. referen... |
atmsetup(8) -- Configures Asynchronous Transfer Mode (ATM) adapters and services
|
The atmsetup command by default invokes the SysMan ATM Configuration application, which is the recommended configuration method. This application enables you to configure and run ATM on your system. S... |
atmsig(8) -- Allows the configuration and management of the UNI signaling module
|
The atmsig command configures ATM UNI signaling on the end system. It also displays state information about the signaling module, and can be used to disable and enable the ILMI and signaling. The vari... |
audgen(8) -- Generates an audit record
|
The audgen utility generates an audit record, which is placed in the auditlog. Standard audit event information, such as identification information and a timestamp, are automatically inserted. The aud... |
auditconfig(8) -- Audit subsystem configuration graphical interface (Enhanced Security)
|
The auditconfig graphical user interface is used interactively to establish the audit environment on your system. The interface can be selected from the Sysman menu, syman_station (including PC client... |
auditd(8) -- Audit daemon
|
The audit daemon, auditd, operates as a server, monitoring /dev/audit for local audit data, monitoring a known port for data from remote cooperating audit daemons, and monitoring an AF_UNIX socket for... |
auditmask(8) -- Gets or sets audit masks
|
The auditmask command is used to: Get or set the system audit mask and the audit style flag Get or set a process' audit mask and its audit control flag Execute a process under a specified audit mask ... |
audit_setup(8) -- Audit subsystem configuration graphical interface (Enhanced Security)
|
The auditconfig graphical user interface is used interactively to establish the audit environment on your system. The interface can be selected from the Sysman menu, syman_station (including PC client... |
audit_tool(8) -- Audit log reduction tool
|
The audit_tool command, or audit reduction tool, displays selected portions of the collected audit data. If no arguments are provided, a brief help message is displayed. The audit log file may be comp... |
audit_tool.ultrix(8) -- Audit log reduction tool
|
The audit_tool command, or audit reduction tool, displays selected portions of the collected audit data. If no arguments are provided, a brief help message is displayed. The audit log file may be comp... |
authck(8) -- Checks internal consistency of the authentication databases (Enhanced Security)
|
The authck program checks both the overall structure and internal field consistency of all components of the authentication databases. It reports all problems it finds. To invoke this program you must... |
autofs(8) -- Automatically and transparently mounts and unmounts NFS file systems
|
The autofsd daemon automatically and transparently mounts and unmounts NFS file systems on an as-needed basis. Like the automount daemon, it provides another alternative to using the /etc/fstab file f... |
autofsd(8) -- Automatically and transparently mounts and unmounts NFS file systems
|
The autofsd daemon automatically and transparently mounts and unmounts NFS file systems on an as-needed basis. Like the automount daemon, it provides another alternative to using the /etc/fstab file f... |
autofsmount(8) -- Installs and removes AutoFS intercept points
|
The autofsmount command installs and removes intercept points that are used by the kernel to automatically and transparently mount and unmount NFS file systems. It also removes file systems that were ... |
automount(8) -- Automatically and transparently mounts and unmounts NFS file systems
|
The automount daemon automatically and transparently mounts and unmounts NFS file systems on an as-needed basis. It provides an alternative to using /etc/fstab for NFS mounting file systems on client ... |
autopush(8) -- Manages the system's database of automatically pushed STREAMS modules
|
The autopush command manages the system's database of information for the automatic configuration of STREAMS devices. The autopush command's options are mutually exclusive. The command initializes t... |
autosysconfig(8) -- Maintains the list of dynamic kernel subsystems that are automatically configured
|
Use the autosysconfig program to maintain the kernel's list of dynamic subsystems that are automatically configured at each system startup. The following list describes the autosysconfig commands: Ad... |
badsect(8) -- Creates files to contain bad sectors
|
The badsect command makes a file to contain a bad sector. Normally, bad sectors are made inaccessible by the standard formatter, which provides a forwarding table for bad sectors to the driver. If a d... |
balance(8) -- Balances the percentage of used space among volumes in a domain.
|
The balance utility evenly distributes the percentage of used space between volumes in a multivolume domain. This improves performance and evens the distribution of future file allocations. Use the sh... |
bcheckrc(8) -- Command script for checking and mounting local file systems
|
The bcheckrc script controls the checking and mounting of local file systems during system startup. An entry in the inittab file causes the system to execute the bcheckrc run commands, for example: fs... |
bindconfig(8) -- Configures DNS/BIND services for a single system or cluster
|
The Domain Name System (DNS) configuration section of the SysMan Menu allows you to configure a system as a Berkeley Internet Name Domain (BIND) client, which queries a BIND server for host name and a... |
binex(8) -- Binary event log extraction utility
|
The binex utility operates on log files produced by the binary error log daemon binlogd. It can be used to summarize the contents of a binlog file, to copy a selected range of events to another file f... |
binlogd(8) -- Binary event-log daemon
|
The binlogd daemon logs binary event records to the files specified in the /etc/binlog.conf configuration file. Each binary event record includes an event class and severity code, which are described ... |
biod(8) -- The local NFS compatible asynchronous I/O daemon
|
The nfsiod daemon runs on an NFS compatible client machine and spawns several IO threads to service asynchronous I/O requests to its server. The I/O threads improve performance of both NFS reads and w... |
bootpd(8) -- Internet Boot Protocol (BOOTP) server
|
The bootpd daemon implements an Internet Boot Protocol server as defined in RFC 951, RFC 1532, and RFC 1533. In order to use the bootpd daemon, you must install the Obsolete Commands and Utilities sub... |
bootpgw(8) -- Internet BOOTP Protocol gateway
|
The bootpgw daemon implements a simple BOOTP gateway that can be used to forward requests and responses between clients and BOOTP servers (for example, bootpd) on different subnets. In order to use th... |
bprelay(8) -- BOOTP relay agent
|
The bprelay daemon forwards DHCP or BOOTP packets to the specified list of servers (server). Servers may be identified either by their IP addresses or by their names. The bprelay agent normally runs a... |
bptojdb(8) -- Converts bootptab entries into permanent, static IP entries for JOIN databases.
|
The bptojdb program reads entries in a standard bootptab file and creates permanent, static IP entries for the JOIN databases. After reading the bootptab file, bptojdb displays to the standard output ... |
btcreate(8) -- Builds a bootable Standalone System (SAS) kernel on tape
|
Use the btcreatecommand to build a bootable Standalone System (SAS) kernel on tape. The SAS kernel has a built-in memory file system (mfs), which contains the minimum commands, files, and directories ... |
btextract(8) -- Extracts the file systems from tape in singleuser mode in memory
|
The btextract command is a shell script that restores file systems from tapes that contain the bootable Standalone System (SAS) kernel. The SAS kernel is created using the btcreate utility. You can pe... |
bttape(8) -- Bootable Tape Creation utility
|
The Bootable Tape Creation utility is used by the system administrator to create a bootable system image, that consists of a standalone kernel and copies of specified file systems. This standalone ker... |
catman(8) -- Creates or rebuilds formatted reference pages and the whatis database
|
The catman command creates formatted versions of the online reference pages from the nroff source files. The command also creates from the NAME entries in source files the whatis database that is used... |
cddevsuppl(8) -- Sets and gets the major and minor numbers of
|
The cddevsuppl command is used to map and unmap the major and minor numbers of a device file on a mounted Rock Ridge format CD-ROM. The -m mapfile option maps the major and minor number of device file... |
cdmntsuppl(8) -- Sets and gets administrative CD-ROM features
|
The cdmntsuppl command sets up administrative CD-ROM features, such as default ownership and access permissions, mapping of user and group identifications, conversions of file names, and the setting o... |
cdslinvchk(8) -- Checks the CDSL inventory of the base operating system and layered applications.
|
Use the cdslinvchk script to verify the current inventory of Context Dependent Symbolic Links (CDSLs) on a running system. CDSLs are special symbolic links that enable a system to work in a cluster. I... |
cfgmgr(8) -- Configuration management server
|
The cfgmgr configuration management server works with the kernel load server (kloadsrv) daemon to manage the subsystems that are dynamically configurable, loadable, or both. The cfgmgr server starts u... |
chargefee(8) -- Provide accounting commands for shell scripts
|
There are a number of commands in the /usr/sbin/acct directory that, along with other accounting commands, enable you to produce a wide range of system accounting records and files. For example, the r... |
chat(8) -- Automated conversational script with a modem
|
The chat program defines a conversational exchange between the computer and the modem. Its primary purpose is to establish the connection between the Point-to-Point Protocol Daemon (pppd) and the pppd... |
checkdba(8) -- Check the JOIN IP address lease database for internal consistency
|
The checkdba command checks the records that comprise the DHCP IP address lease database for internal consistency and prints inconsistent records to standard out (stdout). If the database is consisten... |
chfile(8) -- Changes attributes of AdvFS files
|
The chfile command lets you view or change the I/O mode that will be used when write requests are made to the file. There are three settings for this I/O mode: The default setting. Write requests are ... |
chfsets(8) -- Changes attributes of AdvFS filesets
|
The chfsets command enables you to change and display fileset quotas (file usage limits and block usage limits) of any AdvFS fileset. It also allows you to turn object safety, fragging, and DMAPI on a... |
chroot(8) -- Changes the root directory of a command
|
Only root can use the chroot command. The chroot command changes the root directory from / to the specified directory when the command executes. (The command specified includes both the command name a... |
chvol(8) -- Changes the attributes of a volume
|
The chvol command can be run at anytime to change the attributes of a volume in an active domain; the system does not have to be quiescent. If you attempt to change the attributes of a volume in a dom... |
ckpacct(8) -- Provide accounting commands for shell scripts
|
There are a number of commands in the /usr/sbin/acct directory that, along with other accounting commands, enable you to produce a wide range of system accounting records and files. For example, the r... |
class_admin(8) -- Administer daemons and databases for class scheduling.
|
Class scheduling allows you to organize users and groups into classes and specify the maximum percentage of CPU usage permitted each class. The class_admin utility is used to set up and maintain class... |
clonefset(8) -- Creates a read-only copy of an AdvFS fileset.
|
The clonefset utility enables you to perform online backups of active files by making a read-only copy (clone) of an active fileset. Once you create and mount a clone fileset, you can back up the clon... |
clri(8) -- Clears i-nodes
|
The clri command is obsoleted for normal file system repair work by the fsck command. The clri command writes zeros on the i-nodes with the decimal i-numbers on the specified filesystem. After clri ha... |
clu_get_info(8) -- Gets information about a cluster and its members
|
When invoked on a member of a cluster, the clu_get_info command displays general information about the cluster and its members. The information includes: The name of the cluster and the number of memb... |
cmx(8) -- Generic communication exerciser
|
The cmx exerciser writes, reads, and validates random data and packet lengths on a specified communications line. The line being tested must have a loopback connector attached to the distribution pane... |
codconfig(8) -- Configures Compaq Capacity on Demand (CCoD) with the list of initially used (purchased) CPUs
|
You must be root or have the appropriate permissions to use this application. The /usr/sbin/codconfig command configures CCoD with capacity CPUs that are either initially purchased with the system, pu... |
collect(8) -- Collects data that describes the current system status
|
Collect is a system monitoring tool that records or displays specific operating system data. Any set of the subsystems, such as file systems, message queue, tty, or header can be included in or exclud... |
comsat(8) -- The biff server
|
The comsat server receives reports of incoming mail and notifies users who request this service. comsat is invoked by the inetd(8) daemon when it receives messages on a datagram port associated with t... |
config(8) -- Builds system configuration files
|
The doconfig command calls the config command to build a set of system configuration files from a file that describes the sort of system that is being configured. The config command also takes as inpu... |
config_hmmod(8) -- web-based configuration report daemon
|
The config_hmmod daemon is the subagent that provides the web-based interface for the Tru64 UNIX Configuration Report. This daemon is available only with Version 5.0 and higher of the Tru64 UNIX opera... |
conflict(8) -- search for alias/password conflicts
|
The conflict program checks to see if the interface between MH and transport system is in good shape. It also checks for maildrops in /usr/spool/mail which do not belong to a valid user. It assumes th... |
consvar(8) -- Manipulate system firmware console environment variables
|
Use the consvar command to get, set, list, and save console environment variables available on SRM system firmware. Some firmware versions on some platforms do not comply with the Alpha SRM when deali... |
convauth(8) -- convert security authorization databases into database format
|
The convauth utility is used to convert existing ASCII system authorization database files to database format for faster access and updates. In the case of the ttys and user-profile data, this greatly... |
convuser(8) -- convert user profile information between BASE and ENHANCED formats
|
The convuser utility is used to provide migration between BASE and ENHANCED security levels, as well as to provide support for the use of existing account-creation scripts. The most common uses are to... |
cp382dof(8) -- Filter for Traditional Chinese CP382 printer controller
|
The cp382dof filter is used to filter text data destined for the CP382 printer controller. The filter handles the device dependencies of the printers and performs accounting functions. At the time of ... |
cpqthresh_mib(8) -- Tru64 UNIX SNMP subagent daemon that supports thresholding
|
The cpqthresh_mib daemon is the subagent that provides SNMP data about user-defined threshold information to HP Insight Manager. A threshold is a limit you can set for a monitored item to produce an a... |
cpq_mibs(8) -- Tru64 UNIX SNMP subagent daemon for supported MIBS
|
The cpq_mibs daemon is the subagent that implements support for the supported Tru64 UNIX MIBs. It currently supports the following MIBs: cpqHealth cpqHost cpqScsi cpqStdEq cpqSysInfo cpqNIC This daemo... |
crashdc(8) -- Diagnostic data collection for a running or crashed system
|
The crashdc utility examines the core image of the operating system to extract critical diagnostic data. This utility is a shell script that invokes several tools and commands that extract selected pa... |
cron(8) -- The system clock daemon
|
The cron daemon runs shell commands at specified dates and times. Commands that are to run according to a regular or periodic schedule are found within the crontab files. Commands that are to run once... |
db_archive(8) -- displays security database log files no longer involved in active transactions (Enhanced Security)
|
A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio... |
db_checkpoint(8) -- Periodically checkpoint the security database log (Enhanced Security)
|
A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio... |
db_dump(8) -- Reads and writes the security databases (Enhanced Security)
|
A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio... |
db_dump185(8) -- Reads and writes the security databases (Enhanced Security)
|
A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio... |
db_load(8) -- Loads standard input to a database files (Enhanced Security)
|
A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio... |
db_printlog(8) -- Displays database log file (Enhanced Security)
|
A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio... |
db_recover(8) -- Restores the database to a consistent state (Enhanced Security)
|
A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio... |
db_stat(8) -- Displays statistics for the database files (Enhanced Security)
|
A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio... |
dcheck(8) -- Checks directory consistency
|
The fsck command supersedes the dcheck command for normal consistency checking. The dcheck command reads the directories in a file system and compares the link-count in each inode with the number of d... |
ddr_config(8) -- Compile and display the SCSI CAM I/O device database
|
Dynamic Device Recognition (DDR) is a framework for describing the operating parameters and characteristics of SCSI devices to the SCSI CAM I/O subsystem. You use a utility, /sbin/ddr_config, and a te... |
defragcron(8) -- Schedules AdvFS file domains for defragmenting
|
The defragcron utility runs the defragment utility to a schedule that you specify on all active AdvFS file domains or on the active domains you specify. The typical use of this utility is to run it as... |
defragment(8) -- Makes the files in a file domain more contiguous
|
When a file consists of many discontiguous file extents, the file is fragmented on the disk. File fragmentation reduces the read/write performance because more I/O operations are required to access a ... |
deliver(8) -- Delivers mail to an IMAP mailbox
|
The deliver command reads a message from the standard input and delivers it to one or more IMAP mailboxes. The deliver command reads its configuration options out of the imapd.conf file. Depending on ... |
depord(8) -- Sort subset names into dependency order
|
The depord command reads the subset *.ctrl files in the specified directories for dependency information, then sorts the subset name argument list (and, optionally, prerequisite subset names) in depen... |
devswmgr(8) -- utility to manage the device switch database
|
The devswmgr command helps you manage the device switch table by displaying information about the devices drivers in the table. You can also use the command to release device switch table entries. Typ... |
dhcpcemu(8) -- Emulate a DHCP client
|
The dhcpcemu command emulates a DHCP/BOOTP client. Options are provided to set the most important fields in the BOOTP request packet. A packet is constructed, is sent through the interface specified, ... |
dhcpconf(8) -- Controller for DHCP client configuration
|
The dhcpconf command and its companion joinc implement the client side of the Dynamic Host Configuration Protocol, DHCP. The responsibilities of dhcpconf are as follows: Control invocation and termina... |
dhcpparm(8) -- Daemon for client configuration
|
The dhcpparm command displays the value(s) of the parameter requested on the command line as supplied by the DHCP protocol. If the DHCP parameter implies more than one value (for example, a list of ga... |
dirclean(8) -- Clean directories based on time and type criteria
|
The dirclean utility recursively removes files that meet the constraints supplied by the option list. The utility is typically used to clean out old files from directories, such as /tmp, that are used... |
diskconfig(8) -- Manages the configuration of disks on the system
|
Disk Configuration is used by the system administrator or UNIX system manager to manage the configuration of disk devices on the system. Use Disk Configuration to: Modify disk configuration parameters... |
disklabel(8) -- Reads and writes a disk pack label and formats disk partitions
|
Use the disklabel command to install, examine, or modify the label on a disk drive or pack. The disk label contains information about the disk, such as its type and physical operands. See rz(7) for in... |
diskusg(8) -- Generates disk accounting data by user ID
|
The diskusg command generates intermediate disk accounting information about files in the specified file_spec or from standard input. The diskusg command obtains user login names from the /etc/passwd ... |
diskx(8) -- disk exerciser program
|
The diskx program is intended to test various aspects of disk driver functionality. These tests provide more comprehensive functional coverage than the dskx utility. Main functional areas which are te... |
dl510kaof(8) -- Filter for the Korean DL510-KA printer
|
The dl510kaof filter is used to filter text data sent to the DL510-KA printer. The filter handles the device dependencies of the printer and performs accounting functions. At completion of each print ... |
dmu(8) -- Dataless management utility
|
The dataless management utility (dmu) manages Dataless Management Services (DMS) environments and clients, letting you install, configure, and list DMS environments, and add, list, modify, or remove D... |
dn_setup(8) -- Creates and maintains device name databases.
|
The /sbin/dn_setup script runs automatically at system startup to create device special file names and is not normally used by administrators. However, you might see device-related error messages at t... |
doconfig(8) -- Builds the kernel described by system configuration files
|
The /usr/sbin/doconfig program builds a new kernel, optionally allowing you to edit the configuration file before the new kernel is built. You might need to build a new kernel when you: Add or remove ... |
dodisk(8) -- Provide accounting commands for shell scripts
|
There are a number of commands in the /usr/sbin/acct directory that, along with other accounting commands, enable you to produce a wide range of system accounting records and files. For example, the r... |
dohash(8) -- Hashes or unhashes IMAP configuration directories
|
The dohash command converts the IMAP configuration directories from the format for older versions of the Cyrus IMAP4 Revision 1 server to the new format for Version 1.6.1 or higher. Starting with Vers... |
dop(8) -- Allows a user to execute a privileged program without knowing the root password. The dop command als...
|
The dop (Division of Privileges) command can execute an action after proper authentication from the privilege database file. For more information, see the Security guide. |
dp(8) -- parse dates RFC 822-style
|
The dp command parses dates according to the ARPA Internet standard. It also understands many non-standard formats, such as those produced by TOPS-20 sites and some UNIX sites using ctime(3). It is us... |
dsfmgr(8) -- Manages device special files in the /dev directory and their associated databases
|
Use the dsfmgr command to manage device special files using the file naming format introduced in Version 5.0. You also use the dsfmgr command to create and maintain device special files according to t... |
dtadvfs(8) -- Starts the AdvFS graphical user interface
|
The AdvFS graphical user interface (GUI) organizes AdvFS functionality into system management tasks and makes them available through a graphical interface. Issue the dtadvfs command to display the Adv... |
dtsetup(8) -- Configure and Customize the Common Desktop Environment (CDE)
|
The CDE Setup application, dtsetup, provides you with a mechanism to customize your Common Desktop Environment by using a graphical user interface. It also provides System Administrators a means to cr... |
dump(8) -- Performs incremental file system dumps
|
The dump command copies to the default /dev/tape/tape0_d0, or to the alternate storage device specified with the -f option, all files and any associated extended attributes (including ACLs, see the ac... |
dumpfs(8) -- Dump UFS file system information
|
The dumpfs command prints out the super block and cylinder group information for the specified UFS file system(s) or special device. The listing is very long and detailed. This command is useful for g... |
dumpsys(8) -- Copies a snapshot of memory to a dump file
|
The dumpsys command allows you to save a snapshot of the system memory to a dump file. There are times when system memory requires analysis but it may not be possible to halt the system and take a nor... |
dxaccounts(8) -- Graphical interface for account administration
|
The Account Manager application, dxaccounts, helps you manage user accounts on your Tru64 UNIX system. It operates on both base security level systems and enhanced security (C2) level systems. The Acc... |
dxarchiver(8) -- Archives and restores files to and from disk and tape devices
|
Use the Archiver application, dxarchiver, to: Copy and store multiple files to a single, named archive file or output device such as a tape or floppy disk Uncompress incoming archive files and compres... |
dxaudit(8X) -- Motif Interface for the Audit Subsystem
|
The dxaudit application is a Motif graphical user interface which can be used to administer the audit subsystem. Three major areas comprise the audit subsystem: Control, Collection, and Reporting. Cur... |
dxdevices(8X) -- Windows interface for device configuration
|
The dxdevices interface program provides control over the device assignment database and the terminal control database. You can use dxdevices to assign security attributes to terminals and X displays.... |
dxdw(8) -- Runs and repeats command line commands
|
The Display Window application, dxdw, can be used to run commands at specified time intervals. You can use Display Window to: Run a command and display a transcript of the output Repeat a command at r... |
dxfileshare(8) -- Exports local directories and mounts directories from the network
|
Use the File Sharing application, dxfileshare, to: Export (or share) local UNIX directories to the network Stop exporting UNIX local directories to the network Specify which directories mounted from t... |
dxhosts(8) -- Provides host management capabilities for local and remote hosts
|
Use the Host Manager application, dxhosts, to: Add or delete a host from the list of preferred hosts Enable or disable X Window System(TM) access for all or selected hosts Start applications on a remo... |
dxkerneltuner(8) -- Modifies or displays kernel subsystem attributes
|
The Kernel Tuner application, dxkerneltuner, is used to maintain and manage the attributes of loadable kernel subsystems. It enables you to update the current and boot time values of updatable kernel ... |
dxlicenses(8) -- Adds, lists, issues, and deletes software product licenses
|
When you buy software, the vendor from which you purchase the software issues an agreement called a license, which gives you authorization to use the product. Most of the information required by the L... |
dxlsm(8X) -- Graphical interface, also called the Visual Administrator, for the Logical Storage Manager (LSM)
|
The Visual Administrator (dxlsm) is a graphical user interface (GUI) for LSM. The Visual Administrator interface provides the user with graphical elements such as icons, windows, and menus to ease the... |
dxpower(8) -- controls energy saving features on systems that can be power managed
|
The Power Manager application, dxpower, is used to maintain and manage the power management features on computers and peripherals that can be power managed. Power Manager lets you place monitors in th... |
dxpresto(8X) -- Graphically displays Prestoserve state and statistics.
|
The dxpresto command is an X Window System application that graphically displays a machine's Prestoserve state and statistics. The dxpresto command uses a Remote Procedure Call (RPC) protocol to comm... |
dxproctuner(8) -- Manages and monitors system processes
|
The Process Tuner application, dxproctuner, is used to monitor and manage processes. Use Process Tuner to: Display a list of processes and their characteristics Display the processes running for yours... |
dxsetacl(8X) -- Graphical interface for setting the ACL on a file or directory
|
The dxsetacl command provides a graphical interface for examining and setting file access control lists (ACLs). If a path is specified on the command line, the file system object represented by path i... |
dxshutdown(8) -- Performs various types of automated system shutdown.
|
The Shutdown Manager application, dxshutdown, provides the system administrator with a graphical user interface for running user-specified scripts at shutdown time in addition to performing the follow... |
dxsysinfo(8) -- Monitors system information such as CPU activity, memory, swap space, and file system usage
|
Use the System Information application, dxsysinfo, to: Obtain general information about the operating system and version, amount of RAM, and number of CPUs Monitor CPU activity, in-use memory, availab... |
edauth(8) -- update and list authentication and capabilities (authcap) database information (Enhanced Security)
|
The edauth utility displays and modifies the system databases used by the enhanced security subsets. These include the user profile databases and their NIS map source files, the file control database,... |
edquota(8) -- Edits quotas.
|
The edquota command invokes an editor that allows you to add and modify user and group quotas and modify file system quota grace periods. Use the quota command to display the existing quota informatio... |
emxmgr(8) -- Displays Fibre Channel worldwide name to target ID mappings for emx devices (obsolete)
|
The emxmgr utility enables you to review the mappings of Fibre Channel worldwide names to device target identifiers (IDs) for the emx device driver. The emxmgr utility interacts with the emx driver to... |
envconfig(8) -- Configures the Environmental Monitoring daemon
|
The envconfig utility is used to customize the envmond daemon. You must have root privileges to use this utility. Using this utility, you can: Specify whether or not Environmental Monitoring is turned... |
envmond(8) -- Environmental Monitoring daemon
|
Environmental Monitoring provides a means of detecting system threshold conditions, that if exceeded, could result in a loss of data or damage to the system itself. Using the envmond daemon, threshold... |
esmd(8) -- Essential Services Monitor daemon
|
The Essential Services Monitor (ESM) daemon, esmd, maintains the availability of essential system daemons by automatically restarting them if they terminate. The ESM daemon monitors the Event Manager ... |
evmchmgr(8) -- Event Manager channel manager
|
The EVM channel manager is started automatically by the EVM daemon, and usually should not be run as a stand-alone program. It reads a set of channel definitions from the channel configuration file an... |
evmd(8) -- Event Manager daemon
|
The Event Manager (EVM) daemon, evmd, receives events from posting clients and distributes them to subscribing clients that have indicated that they are interested in receiving the events. The daemon ... |
evmlogger(8) -- Event Manager logger
|
About the EVM Logger The Event Manager (EVM) logger is started automatically by the EVM daemon at startup. It reads from its configuration file /etc/evmlogger.conf a set of definitions of event logs a... |
evmreload(8) -- Reload Event Manager configuration files
|
The evmreload command posts control events that instruct EVM resident components to reload their configuration files. It should be run to cause EVM to begin using the new configuration any time a conf... |
evmstart(8) -- Starts the Event Manager
|
This shell script starts the EVM daemon. It is intended for use by the system startup scripts, but it can also be used to restart EVM if it has been terminated for any reason. |
evmstop(8) -- Stops the Event Manager
|
This shell script stops EVM, and brings down the daemon. It is intended for use by the system shutdown scripts. Since EVM is required to be running for many system functions to operate correctly, this... |
evmviewer(8) -- View events
|
The evmviewer is a SysMan Menu application that lets you retrieve events and display them. Events may be retrieved from the log files on one or more hosts, or from a file of events stored on your loca... |
expand_dump(8) -- Produces a non-compressed kernel crash dump file
|
By default, kernel crash dump files (vmzcore.#) are compressed during the crash dump. Compressed core files can be examined by the latest versions of debugging tools that have been recompiled to suppo... |
extendfs(8) -- Extends UFS file systems
|
Use the extendfs command to increase the storage space in a UFS file system. The file system must not be mounted when you perform this operation. To extend a mounted (in use) UFS file system, use the ... |
fastboot(8) -- Reboots the system without checking file systems
|
The fastboot command reboots the system without checking file systems. The program creates the fastboot file then invokes the reboot program. The system start-up script contains instructions to look f... |
fasthalt(8) -- Halts the system
|
The fasthalt command halts the system and flags a subsequent reboot to skip the execution of fsck. The program creates the fastboot file, then invokes the halt program. The system start-up script cont... |
fddisk(8) -- FDI disk maintenance utility
|
The fddisk utility, an FDI (integrated Floppy Disk Interface) disk maintenance program, can format a floppy disk, scan a floppy disk for bad blocks, and read and write selected blocks. It can be used ... |
fddi_config(8) -- Displays and modifies the Fiber Distributed Data Interface (FDDI) parameters
|
The fddi_config command allows you to display all the parameters you can set for a specified FDDI interface and to modify one or more parameters depending on your configuration requirements. If you ch... |
fdetach(8) -- Detaches a STREAMS-based file descriptor from a file
|
The fdetach command dissociates a STREAMS-based file descriptor from a file, which is pointed to by the path parameter. The STREAMS-based file descriptor was associated with the file by a prior progra... |
filterlog(8) -- Logs and reports system Correctable Read Data (CRD) memory errors on specific systems.
|
This utility ensures that only genuine memory errors are reported to system log files on certain system types. The command filterlog is called directly by the binary eventlog daemon, binlogd to filter... |
fingerd(8) -- The user information server for networks
|
The fingerd program is a protocol that provides an interface to the finger(1) command. By default, the fingerd program is disabled. To enable it, edit the /etc/inetd.conf file, uncomment the line cont... |
fitset(8) -- determines if a software subset fits on a system
|
The fitset utility is used to determine if the files in a software subset will fit on a system. The fitset utility reads software subset inventory records from the standard input and calculates the nu... |
fixfdmn(8) -- Checks and repairs corrupted AdvFS domains.
|
The fixfdmn utility checks and repairs corrupt AdvFS domains and filesets. Only on-disk metadata is repaired, as there is currently no way to check or repair the contents of user files. Because the fi... |
freezefs(8) -- The freezefs utility causes the specified fileset's domain to enter into a metadata stable state. Al...
|
To allow coherent hardware snapshots in multivolume domain configurations, filesystem metadata must be consistent across all volumes when the individual volumes are snapped or cloned. These configurat... |
fsck(8) -- Check and repair UFS file systems
|
The fsck command is a front-end program for the ufs_fsck program, which checks and repairs UFS file systems. Do not use this command for AdvFS file systems: instead, see advfs(4). The fsck program has... |
fsdb(8) -- File system debugger
|
Since fsdb reads the disk raw, it is able to circumvent normal file system security. Extreme caution is advised in determining its availability on the system. Suggested permissions are 500, owned by b... |
fsx(8) -- file system exerciser
|
The fsx exerciser spawns the background process fsxr, and these two processes exercise a file system by creating, opening, writing, opening, reading, validating, closing, and unlinking a test file. Th... |
ftpd(8) -- The File Transfer Protocol server daemon, including anonymous service
|
The ftpd command is the DARPA (Defense Advanced Research Projects Agency) Internet File Transfer Protocol server process. The server uses the TCP protocol and listens at the port specified in the FTP ... |
fuser(8) -- Lists process IDs of processes that are using one or more files or file structures
|
The fuser utility writes to standard output the process IDs of processes that are running on the local system and have one or more files or file structures in use. The utility writes to standard error... |
fverify(8) -- verify software subsets
|
The fverify command reads subset inventory records from standard input and verifies that the attributes for the files on the system match the attributes listed in the corresponding records. When invok... |
fwtmp(8) -- Modify connect time accounting records to change formats and to make corrections in the records
|
fwtmp [-ic] The fwtmp command reads records from standard input and writes records to standard output. Normally, information in record fields of the /var/adm/wtmp file is entered as binary data by the... |
fwupgrade(8) -- Updates the system firmware from a loadable firmware image (*.exe or *.sys)
|
The fwupgrade command provides a means of updating the system firmware when a (*.exe or *.sys) loadable firmware update image is available. A firmware upgrade will shut down the system and require a f... |
gated(8) -- gateway routing daemon
|
The gated routing daemon is based on Release 4.0.6 from NextHop Technologies, Inc. The gated daemon replaces routed and egpup, and currently handles the RIP, BGP, EGP, HELLO, and OSPF routing protocol... |
gdc(8) -- operational user interface for gated(8)
|
The gdc command provides a user-oriented interface for the operation of the gated routing daemon. It provides support for starting and stopping the daemon, for the delivery of signals to manipulate th... |
genufi(8) -- Generates a User File Inventory (UFI) file
|
The genufi utility creates a User File Inventory (UFI) file that contains the names of user files created or copied to your system after an installation. Some of these files reside on file systems tha... |
getty(8) -- Sets the terminal type, modes, speed, and line discipline
|
The getty command sets and manages terminals by setting up speed, terminal flags, and the line discipline. If command options are provided, getty adapts the system to those specifications. getty print... |
groupadd(8) -- Adds a new group definition
|
The groupadd command is part of a set of command-line interfaces (CLI) that are used to create and administer user groups on the system. When the Advanced Server for UNIX (ASU) is installed and runnin... |
groupdel(8) -- Deletes a group definition from the system
|
The groupdel command lets the system administrator delete existing groups from the system by group name. The -x options local, distributed, ldap and let the system administrator specify whether the gr... |
groupmod(8) -- Modifies a group definition on the system
|
The groupmod command is part of a set of command-line interfaces (CLI) that are used to create and administer user groups on the system. When The Advanced Server for UNIX (ASU) is installed and runnin... |
grpck(8) -- Checks the password and group files for inconsistencies
|
The pwck command scans the /etc/passwd file, or the named file, and writes to standard out any inconsistencies. The scan checks the number of fields, login name, user ID, group ID, and existence of a ... |
gshmmod(8) -- GS series platform view and discovery daemon
|
The gshmmod daemon is the subagent that provides view and discovery information and a consolidated view of GS series platforms for HP Insight Manager. It should be installed on one partition of a GS s... |
halt(8) -- Stops the processor
|
If other users are logged into the system, or if the system is operating at a multiuser run level, use the /usr/sbin/shutdown -h command to halt the system. If only the root user is logged in, and you... |
hardware(8) -- Command line interface for managing hardware components
|
The hwmgr command enables you to manage hardware components and the software subsystems that maintain information about the components. A hardware component can be a storage peripheral, such as a disk... |
hwmgr(8) -- Command line interface for managing hardware components
|
The hwmgr command enables you to manage hardware components and the software subsystems that maintain information about the components. A hardware component can be a storage peripheral, such as a disk... |
hwmgr_get(8) -- Commands that display and set component attributes and display component category names
|
The commands described in this reference page are a subset of the command options available from the hwmgr utility. Refer to hwmgr(8) for more information. Use these commands to: Display or set the va... |
hwmgr_ops(8) -- Hardware management commands for performing operations on components
|
The commands described in this reference page are a subset of the command options available from the hwmgr utility. Refer to hwmgr(8) for more information. Use the hwmgr operational commands to perfor... |
hwmgr_set(8) -- Commands that display and set component attributes and display component category names
|
The commands described in this reference page are a subset of the command options available from the hwmgr utility. Refer to hwmgr(8) for more information. Use these commands to: Display or set the va... |
hwmgr_show(8) -- Displays information from kernel-based hardware subsystems
|
The commands described in this reference page are a subset of the command options available from the hwmgr utility. Refer to hwmgr(8) for more information. Hardware subsystems maintain on-disk databas... |
hwmgr_view(8) -- Displays information about the status of the system and its hardware components
|
The commands described in this reference page are a subset of the options that you can use with the hwmgr command. See hwmgr(8) for an overview of the commands. Use the hwmgr view command option to di... |
icheck(8) -- File system storage consistency check
|
The icheck command is obsoleted for normal consistency checking by fsck. The icheck command examines a file system, builds a bit map of used blocks, and compares this bit map against the free map main... |
ifconfig(8) -- Configures or displays network interface parameters
|
You use the ifconfig command at boot time to define the network address of each interface. You can also use the ifconfig command at other times to display all interfaces that are configured on a syste... |
iftcntl(8) -- View and modify network interface traffic control settings
|
The iftcntl command installs flows and filters on network interfaces that support traffic control. The Resource ReSerVation Protocol (RSVP) typically performs this dynamically when it receives an appl... |
ikdebug(8) -- Integrated kernel debugger
|
The ikdebug debugger is the integrated interactive mode of the kdebug kernel debugger. It provides interactive symbolic kernel debugging without the need of a second host system to run dbx or kdbx. It... |
ils(8) -- Lists files in stl_inv format
|
For each name argument, ils creates an stl_inv record on the standard output which represents that file. If no names are present and the -f option is not specified, ils does nothing. |
imapd(8) -- Internet Message Access Protocol (IMAP) server process
|
The IMAP4rev1 server, imapd, accepts commands on its standard input and responds on its standard output. It is normally invoked by the inetd command and it reads its configuration options out of the i... |
imapquota(8) -- Reports and fixes mail quota usage
|
The imapquota command generates a report listing quota roots, giving their limits and usage. If the -f option is given, imapquota first fixes any inconsistencies in the quota subsystem, such as mailbo... |
inetd(8) -- Internet services daemon
|
The inetd daemon should be run at boot time by inetd in the /sbin/init.d directory. At startup, it determines how many RADs are present (if on NUMA-capable hardware) and starts an inetd child daemon o... |
init(8) -- Process control initialization
|
The init program initializes the system by creating and controlling processes. The processes run by init at each run level are defined in the inittab file. The init program reads and processes the ent... |
insightd(8) -- Insight Manager daemon for Tru64 UNIX
|
The insightd daemon is an agent that provides a web-based interface for the Insight Manager SNMP agents for Tru64 UNIX. This daemon is started and stopped automatically by the /sbin/init.d/insightd sc... |
install-mh(8) -- initialize the MH environment
|
When a user runs any MH program for the first time, the program invokes install-mh (with the -auto switch) to query the user for the initial MH environment. The user does not invoke this program direc... |
installupdate(8) -- Invokes the Update Installation procedure
|
An Update Installation updates the base operating system software and the worldwide language support (WLS) software to the next released version of the operating system on a single system. The Update ... |
intro(8) -- Introduction to system maintenance and operation commands
|
This section contains information related to system operation and maintenance. In particular, commands (such as newfs) used to create new file systems and commands (such as fsck, icheck, and ncheck) u... |
invsync(8) -- Synchronizes system inventory
|
The invsync utility creates a Master Synchronization Inventory (MSI) file and a Customized File Inventory (CFI) file. These files can be used to preserve the customized or modified state of your syste... |
ip6rtrd(8) -- IPv6 routing daemon
|
The ip6rtrd daemon sends IPv6 Router Advertisement (RA) packets of the Neighbor Discovery Protocol. These packets enable any listening host to autoconfigure itself without manual intervention. In addi... |
ip6_setup(8) -- IPv6 configuration program
|
The ip6_setup utility allows you to configure the IPv6 networking software on your system. To run ip6_setup, enter the following command and then answer the questions: # ip6_setup You must know your I... |
iprsetup(8) -- Internet Protocol router setup
|
The iprsetup command sets the ipgateway and ipforwarding variables in the running kernel allowing your system to function as an Internet Protocol router. When ipfirewall variable is set to one, the fo... |
ipsecd(8) -- The IP Security (IPsec) daemon
|
The ipsecd daemon controls the operation of the IP security protocols in the system. It combines the function of an IPsec policy manager and Internet Key Exchange (IKE) daemon. When started, ipsecd re... |
ipsec_certmake(8) -- Creates X.509 certificates, requests, and Certificate Revocation Lists (CRLs)
|
The ipsec_certmake command enables you to create the following: X.509 V3 public key certificates and hierarchies of public key certificates Certificate revocation lists (CRLs) PKCS10-formatted certifi... |
ipsec_certview(8) -- Displays the contents of IPsec certificate files
|
The ipsec_certview command displays the contents of files containing public-key certificate information. This command and other related certificate commands provided in this IPsec implementation are i... |
ipsec_convert(8) -- Converts the format of IPsec certificate files
|
The ipsec_convert command converts files that contain public-key certificate information among the formats supported by the Tru64 UNIX IPsec software. This command and other related certificate comman... |
ipsec_keypaircheck(8) -- Checks if public and private keys match
|
The ipsec_keypaircheck command enables you to verify that public and private keys match. You specify public keys with either public-key or cert-file. You specify private keys with private-key. This co... |
ipsec_keytool(8) -- Generate RSA and DSA keys, and convert existing key formats
|
The ipsec_keytool command generates RSA and DSA keys for use by other IPsec tools. In addition, the command converts existing keys from one format to another. This command and other related certificat... |
ipsec_mgr(8) -- Manipulate the state of the IPsec subsystem
|
The ipsec_mgr command enables you to manipulate the state of the IPsec subsystem. It is currently limited to deleting an existing Security Association (SA). To delete an SA, you specify any Security P... |
iptunnel(8) -- Creates, deletes, and displays configured tunnels
|
The iptunnel command creates configured tunnels for sending and receiving the following types of encapsulated packets: IPv4 or IPv6 packets encapsulated as the payload of an IPv4 datagram. This is cal... |
ipv6sniff(8) -- Internet Protocol Version 6 (IPv6) search and analysis tool
|
The ipv6sniff tool searches one or more files to assist you in locating potential IPv6 porting issues. The tool searches for the following: IPv4-only socket usage and options IPv4 name and address res... |
it(8) -- configure a system after installation
|
The it program executes scripts before transferring control of the system to the user, typically before the first user logs in. The it program executes programs that collect information such as system... |
itruns(8) -- set up files for use by the it command
|
The itruns program sets up scripts to be run by it(8). (These programs are typically used within system configuration and installation scripts.) The itruns command searches for /sbin/it.d/bin/file. If... |
javaexecutedata(8) -- Mark JAVA libraries exempt for Buffer Overflow Protection security feature
|
This script is intended to be run immediately following the installation of the UNIX patch kit that contains the Buffer Overflow Protection security feature. Java libraries throughout the system need ... |
jdbdump(8) -- Dumps fields from the DHCP dynamic databases.
|
The jdbdump command reads the databases used by the joind daemon to store information on client IP address leases and dynamic names and prints selected fields. Each record is terminated by a newline, ... |
jdbmod(8) -- Adds, modifies, or deletes data in the DHCP dynamic databases.
|
The jdbmod command modifies the databases used by joind to store information on client IP address leases and dynamic names. The jdbmod command allows the user to load preassigned hardware-IP address c... |
jdbreg(8) -- Registers hosts in the DHCP dynamic databases.
|
The jdbreg program registers (or removes) hosts for configuration by DHCP. When the registered_hosts_only policy is in effect, the server configure only clients whose MAC addresses are so registered. ... |
jdbshow(8) -- Display the contents of a specific JOIN server database
|
The jdbshow command displays the contents of the specified JOIN server databases. The databases are identified by letter, for example, the letter a refers to dba.hsh. The jdbshow command expects to fi... |
joinc(8) -- Daemon for DHCP client configuration
|
The joinc daemon implements the client half of the Dynamic Host Configuration Protocol (DHCP) with hardware extensions. (JOIN is a trademark of Competitive Automation.) The DHCP protocol, among other ... |
joind(8) -- BOOTP and DHCP server daemon
|
The joind server is the server that provides configurations to clients on the network using the DHCP or BOOTP protocols; it normally runs as a daemon process, and may be started either from the shell ... |
kdbx(8) -- Analyzes running kernels and dump files
|
The kdbx debugger is a crash analysis and kernel debugging tool; it is an interactive program that serves as a frontend to the dbx debugger. The kdbx debugger is extensible, customizable, and insensit... |
khostname(8) -- Displays the fully qualified domain name required for building principal names and configuration fil...
|
The khostname command returns the fully qualified domain name required for building principal names and configuration files. The names returned by khostname are used in the krb.conf and krb.realms fil... |
killall(8) -- Terminates all processes started by the user, except the calling process
|
This command provides a convenient means of killing all processes created by the shell that you control. When started by the superuser, the killall command kills all processes that can be terminated, ... |
kkcd(8) -- Daemon that supports the Kana-Kanji conversion service
|
The kkcd daemon supports Kana-Kanji conversion for the Japanese language and is available only when Japanese support subsets are installed on the system. The daemon converts an English or Kana string ... |
kloadsrv(8) -- Invokes the kernel load server daemon
|
This command invokes the kloadsrv daemon, which loads kernel modules into the kernel. Command options in the first line of the synopsis are valid when you invoke kloadsrv automatically during system s... |
kmknod(8) -- Creates device special files for static kernel layered products
|
The kmknod command obtains information from a running kernel and determines if any device special files must be created for use by the kernel layered products that are statically configured. To enable... |
kopt(8) -- Displays a menu of optional kernel components that can be selected to build into the kernel
|
When you invoke the kopt command, a menu of optional kernel components is displayed where you specify the kernel components you want to build into the kernel. Individual selections are separated by a ... |
kreg(8) -- Maintains the system file that registers kernel layered products
|
The kreg command maintains the /usr/sys/conf/.product.list system file, which registers static kernel layered products. The kreg command creates the file if it does not exist. The file enables system ... |
la280of(8) -- Filter for the Japanese LA280 printer
|
The la280of filter is used to filter text data for the Japanese LA280 printer. The filter handles the device dependencies of the printer and performs accounting functions. At print job completion time... |
la380cbof(8) -- Simplified Chinese filter for the LA380 printer
|
The la380cbof filter is used to filter text data for the LA380-CB printer. The filter handles the device dependencies of the printer and performs accounting functions. At print job completion times, a... |
la380kof(8) -- Filter for the Korean LA380 printer
|
The la380kof filter filters text data for the LA380-K printer. The filter handles the device dependencies of the printer and performs accounting functions. At print job completion times, accounting re... |
la380of(8) -- Filter for Japanese LA380 printer
|
The la380of filter is used to filter Japanese text data for the LA380 printer. The filter handles the device dependencies of the printer and performs accounting functions. At print job completion time... |
la84of(8) -- Filter for the Japanese LA84 printer
|
The la84of filter is used to filter text data for the Japanese LA84 printer. The filter handles the device dependencies of the printer and performs accounting functions. At print job completion times,... |
la86of(8) -- Filter for the Japanese LA86 printer
|
The la86of filter is used to filter text data for the Japanese LA86 printer. The filter handles the device dependencies of the printer and performs accounting functions. At print job completion times,... |
la88cof(8) -- Filter for the Simplified Chinese LA88 printer
|
The la88cof filter is used to filter text data for the LA88-C printer. The filter handles the device dependencies of the printer and performs accounting functions. At print job completion times, accou... |
la88of(8) -- Filter for the Japanese LA88 printer
|
The la88of filter is used to filter text data for the LA88-J printer. The filter handles the device dependencies of the printer and performs accounting functions. At print job completion times, accoun... |
la90of(8) -- Filter for the Japanese LA90 printer
|
The la90of filter is used to filter text data for the Japanese LA90 printer. The filter handles the device dependencies of the printer and performs accounting functions. At print job completion times,... |
lagconfig(8) -- Configures or displays link aggregation groups (or trunk groups)
|
The lagconfig command allows you to perform the following tasks: Create link aggregation group virtual interfaces. Enable a port (physical interface) for link aggregation. Display attributes for a spe... |
lan_config(8) -- Modifies low-level configuration parameters for a given LAN interface
|
The lan_config command allows you to modify the type of medium, speed, and mode of operation (half- or fullduplex). You can also use the lan_config command to enable or disable autonegotiation, if the... |
last(8) -- Displays information about previous logins
|
The last command displays, in reverse chronological order, all previous logins and logouts entered in the currently active /var/adm/wtmp file. The list of output records can be restricted to maxlines ... |
lastcomm(8) -- Outputs information about the last commands executed
|
The lastcomm command outputs information about all previously executed commands that are recorded in the /var/adm/pacct file in reverse chronological order. You may specify a particular command with t... |
lastlogin(8) -- Provide accounting commands for shell scripts
|
There are a number of commands in the /usr/sbin/acct directory that, along with other accounting commands, enable you to produce a wide range of system accounting records and files. For example, the r... |
latcp(8) -- Local Area Transport (LAT) Control Program
|
The latcp utility provides the essential functions for LAT control and management. It allows nonprivileged users to display host, port, circuit, and server information and privileged users to perform ... |
latsetup(8) -- Local Area Transport (LAT) setup utility
|
The latsetup command provides an interactive, menu-driven facility for administrating LAT on your system. (For introductory information on LAT, see the lat_intro(7) reference page.) To use latsetup, L... |
learp(8) -- Displays the contents of a LAN-Emulation Address
|
Each LAN-Emulation Client interface (displayed as elann in netstat output) has an Address Resolution Protocol (LEARP) table that contains mappings of 6-byte medium access control (MAC) addresses to 20... |
llconvert(8) -- Modify lastlog records from DIGITAL UNIX releases 4.0x and prior to new format
|
The llconvert command reads records from the lastlog file, such as /var/adm/lastlog, and converts the record format to the updated struct lastlog format. If no output file is specified or if the outpu... |
lmf(8) -- License Management Facility (LMF)
|
The lmf utility maintains a file of registered software licenses called the License Database. The lmf utility creates the License Database from information on the Product Authorization Key (PAK) that ... |
lmfsetup(8) -- License Management Facility (LMF) registration script
|
You use the lmfsetup script to register data supplied by a Product Authorization Key (PAK). The lmfsetup script prompts you for the data associated with each field on a PAK. Once you enter all the dat... |
ln03jaof(8) -- Filter for the Japanese LN03S-JA printer
|
The ln03jaof filter is used to filter text data for the LN03S-JA printer. The filter handles the device dependencies of the printer and performs accounting functions. At print job completion times, ac... |
ln03rof(8) -- ASCII to PostScript translation filter
|
The ln03rof and related filters translate ASCII to PostScript, handles the device dependencies of a PostScript printer and performs some accounting functions. PostScript printers print documents forma... |
ln05jaof(8) -- Filter for the Japanese DEClaser 2300 printer
|
The ln05jaof filter is used to filter text data for the Japanese DEClaser 2300 printer. The filter handles the device dependencies of the printer and performs accounting functions. At print job comple... |
ln05rof(8) -- ASCII to PostScript translation filter
|
The ln03rof and related filters translate ASCII to PostScript, handles the device dependencies of a PostScript printer and performs some accounting functions. PostScript printers print documents forma... |
ln06rof(8) -- ASCII to PostScript translation filter
|
The ln03rof and related filters translate ASCII to PostScript, handles the device dependencies of a PostScript printer and performs some accounting functions. PostScript printers print documents forma... |
ln07rof(8) -- ASCII to PostScript translation filter
|
The ln03rof and related filters translate ASCII to PostScript, handles the device dependencies of a PostScript printer and performs some accounting functions. PostScript printers print documents forma... |
ln08rof(8) -- ASCII to PostScript translation filter
|
The ln03rof and related filters translate ASCII to PostScript, handles the device dependencies of a PostScript printer and performs some accounting functions. PostScript printers print documents forma... |
ln09of(8) -- ASCII to PostScript translation filter
|
The ln03rof and related filters translate ASCII to PostScript, handles the device dependencies of a PostScript printer and performs some accounting functions. PostScript printers print documents forma... |
ln10jaof(8) -- Filter for the Japanese DEClaser 2400 printer
|
The ln10jaof filter is used to filter text data for the DEClaser 2400 printer. The filter handles the device dependencies of the printer and performs accounting functions. At print job completion time... |
ln14of(8) -- ASCII to PostScript translation filter
|
The ln03rof and related filters translate ASCII to PostScript, handles the device dependencies of a PostScript printer and performs some accounting functions. PostScript printers print documents forma... |
lockd(8) -- Network lock daemon
|
The rpc.lockd daemon processes lock requests that are either sent locally by the kernel or remotely by another lock daemon. The NFS locking service makes this advisory locking support possible by usin... |
lockinfo(8) -- Displays kernel locking statistics for SMP and NUMA platforms
|
The lockinfo utility collects and displays locking statistics for the kernel SMP locks. It uses the /dev/lockdev pseudo driver to collect data. Locking statistics can be gathered when the lockmode att... |
log(8) -- Records input and output from a program
|
The log program runs and logs the input to and output from to the file. Input and output are logged until exits, the log program exits, and the exit status of <... |
lpc(8) -- Line printer control program
|
The lpc command is used by the system administrator to control the operation of the line printer system. For each line printer configured in the /etc/printcap file, the lpc command may be used for dis... |
lpd(8) -- line printer daemon
|
The lpd line printer daemon (spool area handler) normally is invoked at boot time. The daemon makes a single pass through the printcap(4) file to determine the existing printers and to print all files... |
lprsetup(8) -- printer set up program
|
The lprsetup command provides an interactive facility for administrating the printers on your system. This utility is the command-line equivalent of printconfig, which is a graphical user interface av... |
lptest(8) -- Generates the line printer ripple test pattern
|
The lptest command writes a traditional ripple test pattern to the standard output. In 96 lines, a pattern containing all 96 printable ASCII characters in each column position of the line is printed. ... |
LSM(8) -- Introduction to Logical Storage Manager (LSM) terms and commands
|
The following LSM commands provide a shell-level interface used by the system administrator and higher-level applications and scripts to query and manipulate LSM objects: volassist, volclonedg, vold, ... |
lsm(8) -- Introduction to Logical Storage Manager (LSM) terms and commands
|
The following LSM commands provide a shell-level interface used by the system administrator and higher-level applications and scripts to query and manipulate LSM objects: volassist, volclonedg, vold, ... |
lsmbstartup(8) -- Starts the Logical Storage Manager (LSM) during system reboot
|
When LSM initially starts, it automatically adds the following lines in the /etc/inittab file, which ensure that the lsmbstartup script is called during a system reboot: lsm:23:wait:/sbin/lsmbstartup ... |
lsmsa(8) -- Starts the Storage Administrator (SA) graphical user interface (GUI)
|
SA is the graphical user interface for LSM and AdvFS. SA runs on a Tru64 UNIX system supporting the Java Runtime Environment. If LSM is not initialized and running, then the GUI starts in AdvFS-only m... |
lsmsad(8) -- Starts the Storage Administrator (SA) daemon
|
The SA daemon, lsmsad, is a process required by lsmsa, the SA graphical user interface (GUI). The daemon, automatically started by lsmsa, issues commands and obtains system information on behalf of SA... |
lsmsetup(8) -- Initializes Logical Storage Manager (LSM) by creating the rootdg disk group
|
The volsetup script is an interactive script that should be run after installing LSM. The diskname or partition parameter specifies the name of at least one disk or partition to be used in creating th... |
mailauth(8) -- manipulate alternate authorization database for Post Office Protocol (POP), Internet Message Access ...
|
The mailauth program allows a POP, IMAP, or APOP (an alternate authentication method for POP) user to change the secret value used to generate their authentication credentials. In addition, both the s... |
mailconfig(8) -- Sets up the routing and delivery of mail for the system.
|
The Mail Configuration application, mailconfig, is used by the system administrator to set up the routing and delivery of mail for the system. The protocols that can be used are: DECnet, DECnet/OSI, M... |
mailq(8) -- Sends mail over the Internet
|
The sendmail command sends a message to one or more recipients, routing the message over whatever networks are necessary. The sendmail command does internetwork forwarding as necessary to deliver the ... |
mailsetup(8) -- Configures the host's mail system
|
The mailsetup script sets up the sendmail system on your host. You can use this script to do a quick setup where defaults are used or to do a more extensive setup. Alternatively, you can use the mailc... |
mailstats(8) -- Displays statistics about mail traffic
|
The mailstats command reads the information in the /var/adm/sendmail/sendmail.st file (or in the file specified with the -f option), formats it, and writes it to standard output. Note also that you ca... |
mailusradm(8) -- Administer User Mail
|
The Mail User Administration application is used by the system administrator to administer the mail system. Specifically, the mail administrator can change the mail service type of a single user, a gr... |
makedbm(8) -- Makes a Network Information Service (NIS) map file
|
The makedbm command takes the file specified by the argument infile and converts it to a single file or a pair of files in dbm(3), btree(3), or hash(3) format. The dbm(3) files are stored as outfile.p... |
MAKEDEV(8) -- makes system special files
|
The MAKEDEV shell script is normally used to install special files. It resides in the /dev directory, the normal location of special files. Arguments to MAKEDEV are usually of the form device-name? wh... |
makekey(8) -- generate encryption key
|
The makekey command improves the usefulness of encryption schemes depending on a key by increasing the amount of time required to search the key space. It reads 10 bytes from its standard input, and w... |
makemap(8) -- Create database maps for sendmail
|
The makemap command creates the database maps used by the keyed map lookups in sendmail(8). It reads input from the standard input and outputs them to the indicated mapname. The makemap command handle... |
map-mbone(8) -- Multicast connection mapper
|
The map-mbone program displays information about all multicast routers that are reachable from the multicast starting_router. If not specified on the command line, the default multicast starting_route... |
memx(8) -- memory exerciser
|
The memx memory exerciser spawns processes to exercise memory by writing and reading three patterns: 1's and 0's, 0's and 1's, and a random pattern. You specify the number of processes to spawn an... |
mfs(8) -- Constructs a new UFS file system
|
The newfs command creates a new UFS file system on the specified special-device of type disk-type. Note The newfs command cannot be used to create Advanced File System (AdvFS) domains. Instead, use th... |
migrate(8) -- Move a file or file pages to another volume in an AdvFS file domain
|
The migrate utility moves the specified simple (unstriped) file to another volume in the same file domain. The utility also moves pages of a simple file or pages of a striped file segment to another v... |
mkcdsl(8) -- Make a context-dependent symbolic link (CDSL)
|
A context-dependent symbolic link (CDSL) is a special form of a symbolic link, described in ln(1), whose target pathname includes a variable ({memb}). The value of {memb} is determined during pathname... |
mkfdmn(8) -- Creates a new AdvFS domain
|
The mkfdmn command creates a domain, which is a logical construct containing both physical volumes (disks or disk partitions) and filesets. When you create a domain, you must specify one volume. This ... |
mkfset(8) -- Creates a fileset in an existing AdvFS domain
|
The mkfset command creates an AdvFS fileset within an existing domain. You can have more than one fileset in a domain unless that fileset is enabled for the data management API (DMAPI), then only one ... |
mkisofs(8) -- Creates a hybrid ISO9660/JOLIET/HFS filesystem with optional Rock Ridge attributes.
|
Use the mkisofs pre-mastering program to generate an ISO9660/JOLIET/HFS hybrid filesystem. The Hierarchical File System (HFS) is the native file system used on Macintosh computers. The image of this f... |
mklost+found(8) -- Makes a lost+found directory for fsck
|
The mklost+found command creates a lost+found directory in the current directory. mklost+found also creates (and then removes) a number of empty files so that there will be empty slots for fsck. The f... |
mknod(8) -- Creates a special file
|
The mknod command makes a directory entry. The first argument is the name of the special device file. Select a name that is descriptive of the device. The mknod command has two forms. In the first for... |
mkpasswd(8) -- Creates a version of the basic user database organized for efficient searches
|
The mkpasswd command creates an auxiliary version of the basic user database in a form organized for efficient searches by the getpwuid subroutine and the getpwnam subroutine. The mkpasswd command rea... |
mkproto(8) -- Constructs a prototype file system
|
The mkproto command is used to bootstrap a new file system. First a new file system is created using newfs. mkproto is then used to copy files from the old file system into the new file system accordi... |
mksas(8) -- Builds a network-bootable Standalone System (SAS) kernel
|
Use the mksas utility to build a network-bootable Standalone System (SAS) kernel. Only specific system configurations and types of processor can support network booting. The network-bootable kernel ha... |
monacct(8) -- Provide accounting commands for shell scripts
|
There are a number of commands in the /usr/sbin/acct directory that, along with other accounting commands, enable you to produce a wide range of system accounting records and files. For example, the r... |
mosy(8) -- The managed object syntax compiler.
|
The mosy program reads a description of an SNMP-managed objects module (extracted from a MIB) and produces a simple ASCII file containing equivalent definitions. The output file is used by various man... |
mount(8) -- Mounts and unmounts file systems
|
Use the mount command to make a file system available for use, or mounted. Use the umount command to make a file system unavailable for use, or unmounted. Use the mount command with the -q option to d... |
mountd(8) -- Services remote NFS compatible mount requests
|
The mountd daemon is the server for NFS protocol mount requests from clients. The mountd daemon responds to requests from remote computer systems to mount directories. When it receives a SIGHUP signal... |
mountlist(8) -- Checks for mounted AdvFS filesets
|
The mountlist command checks for mounted AdvFS filesets. Use the -v option (verbose mode) to print a list of all of the mounted filesets. This command is used by the setld -d function. The /usr/.smdb.... |
mrinfo(8) -- Displays configuration information from a multicast router
|
The mrinfo command displays the configuration information from the multicast router multicast_router. The mrinfo command sends the ASK_NEIGHBORS IGMP message to the specified multicast router. If the ... |
mrouted(8) -- IP multicast routing daemon
|
The mrouted program is an implementation of the DistanceVector Multicast Routing Protocol (DVMRP), an earlier version of which is specified in RFC1075. The mrouted program maintains topological knowle... |
mtrace(8) -- Print multicast path from a source to a receiver
|
The mtrace program utilizes a tracing feature implemented in multicast routers (mrouted Version 3.3 and later) that is accessed by an extension to the IGMP protocol. A trace query is passed, hop-by-ho... |
mtu(8) -- POLYCENTER Common Agent MIB Translator Utility
|
The mtu utility translates MIB specification files (.mib) into EMA Management Specification files (.ms). The management specifications can be loaded into the POLYCENTER Common Agent Management Informa... |
named(8) -- Internet domain name server (DNS)
|
The named daemon is the Internet domain name server. See RFC 1033, RFC 1034, and RFC 1035 for more information on the Internet name-domain system. Without any arguments, named reads the default config... |
named-xfer(8) -- Pulls BIND zones from another server
|
The named transfer daemon, /usr/sbin/named-xfer, is a server that is usually run by the named daemon, /usr/sbin/named, but it can also be run manually with the given arguments. The named transfer daem... |
ncheck(8) -- Lists i-number or tag and pathname for files in a local file system.
|
The ncheck command with no options generates a list of all files on every specified file system. The list includes the path name and the corresponding i-number or tag of each file. Each directory file... |
nd6hostd(8) -- Neighbor discovery and autoconfiguration daemon for IPv6 hosts
|
The nd6hostd daemon receives and processes IPv6 Router Advertisement (RA) packets of the Neighbor Discovery Protocol. This enables a system to autoconfigure itself without manual intervention. The dae... |
netconfig(8) -- Launches the SysMan Menu to the Network Setup Wizard
|
The Network Setup Wizard of the SysMan Menu can be used to configure and modify the configuration of a TCP/IP network on a Tru64 UNIX system. Use the Network Setup Wizard, netconfig, to do the followi... |
newaliases(8) -- Sends mail over the Internet
|
The sendmail command sends a message to one or more recipients, routing the message over whatever networks are necessary. The sendmail command does internetwork forwarding as necessary to deliver the ... |
newfs(8) -- Constructs a new UFS file system
|
The newfs command creates a new UFS file system on the specified special-device of type disk-type. Note The newfs command cannot be used to create Advanced File System (AdvFS) domains. Instead, use th... |
nfsconfig(8) -- Launches the SysMan Menu at the Network File System Configuration (NFS) level, where you can configu...
|
The NFS Configuration section of SysMan Menu is used by the System Administrator or the UNIX system manager to manage NFS configuration issues. It allows the system to be configured as an NFS server (... |
nfsd(8) -- The remote NFS compatible server
|
The nfsd daemon runs on a server machine to service NFS requests from client machines. The daemon spawns a number of server threads that process NFS requests from client machines. At least one server ... |
nfsiod(8) -- The local NFS compatible asynchronous I/O daemon
|
The nfsiod daemon runs on an NFS compatible client machine and spawns several IO threads to service asynchronous I/O requests to its server. The I/O threads improve performance of both NFS reads and w... |
nfslogsum(8) -- Summarize nfswatch log file
|
The nfslogsum command summarizes log files produced by the nfswatch program. By default the log file nfswatch.log is summarized; an alternate log file can be specified on the command line. Each nfswat... |
nfsportmon(8) -- Turns the port monitor on or off
|
The nfsportmon command turns the port monitor on or off at the kernel level. By default, the port monitor is turned off. When the port monitor is on, NFS server port checking is activated. This checki... |
nfsstat(8) -- Network File System statistics
|
The nfsstat command displays statistical information about the Network File System (NFS) and Remote Procedure Call (RPC) interfaces in the kernel (by reading /dev/kmem). It can also be used to reiniti... |
nfswatch(8) -- Monitor an NFS server
|
The nfswatch program monitors all incoming network traffic to an NFS file server and divides it into several categories. The number and percentage of packets received in each category is displayed on ... |
niffconfig(8) -- Configuration program for the Network Interface Failure Finder (NIFF)
|
The niffconfig command arranges for one or more network interfaces to be monitored for possible loss of connectivity. Timing parameters that govern how quickly an interface can be declared suspect or ... |
niffd(8) -- Network Interface Failure Finder daemon
|
The Network Interface Failure Finder daemon, niffd, is a traffic generator for network interfaces that have been classified inactive by the kernel Traffic Monitor Thread (TMT). The purpose of niffd is... |
nissetup(8) -- Sets up the Network Information Service (NIS) environment
|
The nissetup (formerly ypsetup) script configures and runs NIS on your system. You can use nissetup to initially set up your NIS configuration, to change your current NIS configuration, or to remove y... |
nslookup(8) -- Queries Internet name servers interactively
|
The nslookup command is a program that is used to query Internet domain name servers. The nslookup command has two modes: interactive and noninteractive. Noninteractive mode is used to print just the ... |
nss2svc(8) -- keep /etc/svc.conf in sync with /etc/nsswitch.conf
|
The /usr/sbin/nss2svc utility migrates those portions of the /etc/nsswitch.conf file which are compatible with the /etc/svc.conf format into the latter file. By default (in the absence of the -I optio... |
nssetup(8) -- manage the /etc/nsswitch.conf file
|
The /usr/sbin/nssetup utility displays, manipulates, and validates the /etc/nsswitch.conf file. It can be used in two modes: command-line, or interactive. The user enter interactive mode by running th... |
ntalkd(8) -- The remote communications server for the talk command
|
The talkd server notifies a user or callee when a client or caller wants to initiate a conversation. The talkd daemon sets up the conversation if the callee accepts the invitation. The caller initiate... |
ntpdate(8) -- set the date and time via NTP (Network Time Protocol)
|
The ntpdate command sets the local date and time by polling the Network Time Protocol server(s) on the host(s) given as arguments to determine the correct time. It must be run as root on the local hos... |
ntpq(8) -- Network Time Protocol (NTP) monitor program for xntpd
|
The ntpq program is used to monitor NTP hosts running xntpd. The program may be run either in interactive mode or controlled using command line arguments. Requests to read arbitrary variables can be a... |
ntptrace(8) -- Traces a chain of NTP hosts back to their master time source
|
The ntptrace command determines where a given Network Time Protocol (NTP) server gets its time from, and follows the chain of NTP servers back to their master time source. If given no arguments, it st... |
nulladm(8) -- Provide accounting commands for shell scripts
|
There are a number of commands in the /usr/sbin/acct directory that, along with other accounting commands, enable you to produce a wide range of system accounting records and files. For example, the r... |
nvbmtpg(8) -- Display pages of an AdvFS BMT file
|
The nvbmtpg utility formats, dumps, and displays pages of the Bitfile Metadata Table (BMT) files. For Tru64 UNIX Version 5.0 and beyond, the utility also formats, dumps, and displays pages of the Rese... |
nvfragpg(8) -- Displays the pages of an AdvFS frag file
|
Use the nvfragpg utility to display information about frag file metadata. Each fileset in an AdvFS domain has one frag file. Frag files are collections of file fragments. The file fragments in a frag ... |
nvlogpg(8) -- Displays the log file of an AdvFS domain
|
The nvlogpg command locates the log file of an AdvFS file domain and displays records from it in various ways. The log file for a domain is a bitfile, organized as an array of 8 Kb disk pages. Each pa... |
nvtagpg(8) -- Displays a disk block formatted as a tag directory
|
The nvtagpg utility displays formatted pages of a root tag file or a fileset tag file. The utility also can save a copy of a tag file. Each AdvFS domain has a root tag file that lists all the filesets... |
odld(8) -- Daemon that supports the Software On-Demand Loading (SoftODL) service
|
The odld daemon supports the Software On-Demand Loading (SoftODL) service. This service handles font files for user-defined characters. It is available only when optional Tru64 UNIX subsets with softw... |
offline(8) -- Stops and starts processors in a multiprocessor system
|
On a multiprocessor system, the psradm command puts one or more processors off line (stops a processor) or on line (starts a processor). The processor_id variable specifies an integer that uniquely id... |
ogated(8) -- The gateway routing daemon
|
The ogated daemon manages multiple routing protocols, including the Routing Information Protocol (RIP), Exterior Gateway Protocol (EGP), and Local Network Protocol (HELLO). The ogated process can be c... |
online(8) -- Stops and starts processors in a multiprocessor system
|
On a multiprocessor system, the psradm command puts one or more processors off line (stops a processor) or on line (starts a processor). The processor_id variable specifies an integer that uniquely id... |
ospf_monitor(8) -- Monitors OSPF gateways
|
The ospf_monitor command enables you to query OSPF routers to obtain detailed information on IO statistics, error logs, link-state data bases, AS external data bases, the OSPF routing table, configure... |
os_mibs(8) -- Tru64 UNIX extensible SNMP subagent daemon
|
The os_mibs daemon is a subagent that implements the standard MIB support for Tru64 UNIX. It currently supports MIB II, the FDDI MIB, the Token Ring MIB, Host Resources MIB, and the Ethernet-like Inte... |
pac(8) -- Outputs printer/plotter accounting information
|
When printer accounting is enabled in the /etc/printcap file, and you use the pac command in a shell script or from the standard input, pac outputs printer/plotter accounting records to the standard o... |
pcfof(8) -- Generic print filter for ANSI, PCL, and multi-language PostScript printers
|
The pcfof filter is a generic print filter that can be used with text and PostScript files and handle printer device dependencies. The type of printer that the filter is supporting is determined by th... |
pcnfsd(8) -- The (PC)NFS authentication and print request server
|
The pcnfsd daemon is an server that supports ONC clients on PC (DOS, OS/2, Macintosh, and other) systems. This reference page describes Version 2 of the pcnfsd server. The rpc.pcnfsd daemon is started... |
pfconfig(8) -- Configure packet filter parameters
|
The pfconfig command allows the system manager to configure certain parameters of the packet filter driver (see packetfilter(7)). These parameters are configured separately for each interface; the int... |
ping(8) -- Sends ICMP ECHO_REQUEST packets to network hosts
|
The ping command uses the ICMP (Internet Control Message Protocol) protocol's mandatory ECHO_REQUEST datagram to elicit an ICMP ECHO_RESPONSE from the specified host or gateway host, where host is a ... |
pmerge(8) -- Builds a network bootable kernel.
|
The kernel, vmunix, is not bootable over the network. The pmerge utility prepends the bootfile onto the kernel image (kernel.name) to create a new operating system image (new.kernel) that is bootable ... |
pmgrd(8) -- The Performance Manager metrics server daemon
|
The Performance Manager (PM) metrics server (pmgrd) is a UNIX daemon process that provides general UNIX performance metrics on request. The pmgrd metrics server supports the extensible SNMP agent mech... |
pop3d(8) -- POP3 server
|
The pop3d server is an implementation of the Post Office Protocol Version 3 from Qualcomm, Incorporated. It provides remote users with the ability to manage electronic mail on a UNIX system. Authentic... |
popcv(8) -- Migrate passwords from the /var/spool/pop/POP file to the mailauth database
|
The popcv utility gives system administrators the ability to migrate passwords from the /var/spool/pop/POP file to the mailauth database. Once the passwords are in the mailauth database, use the maila... |
portmap(8) -- The DARPA port to RPC program number mapper
|
The portmap daemon is a server that converts Remote Procedure Call (RPC) program numbers into Defense Advanced Research Projects Agency (DARPA) protocol port numbers. It must be running in order to ma... |
post(8) -- deliver a message
|
The program post is called by send(1) to deliver the message in the named file to local and remote users. In fact, all of the functions attributed to send on its reference page are performed by post, ... |
ppdof(8) -- Text to PostScript print filter
|
The ppdof filter translates ASCII to PostScript and handles the device dependencies of a PostScript printer. It is recommended that the ppdof filter be specified for both the :of and the :if fields in... |
pppd(8) -- Point-to-Point Protocol (PPP) daemon
|
The Point-to-Point Protocol (PPP) provides a method for transmitting datagrams over serial point-to-point links. PPP is composed of three parts: a method for encapsulating datagrams over serial links,... |
pppstats(8) -- Print Point-to-Point Protocol (PPP) statistics
|
The pppstats utility reports PPP-related statistics at regular intervals for the specified PPP interface. If interface is unspecified, it will default to ppp0. The display is split horizontally into i... |
prctmp(8) -- Provide accounting commands for shell scripts
|
There are a number of commands in the /usr/sbin/acct directory that, along with other accounting commands, enable you to produce a wide range of system accounting records and files. For example, the r... |
prdaily(8) -- Provide accounting commands for shell scripts
|
There are a number of commands in the /usr/sbin/acct directory that, along with other accounting commands, enable you to produce a wide range of system accounting records and files. For example, the r... |
presto(8) -- Controls and monitors the Prestoserve file system accelerator
|
The presto command allows you to accelerate file systems, obtain Prestoserve status, and administer Prestoserve. If invoked with no options, presto displays the Prestoserve state (either UP, DOWN, or ... |
prestoctl_svc(8) -- Prestoserve control daemon
|
The prestoctl_svc RPC-based daemon supports the use of the dxpresto graphical interface for Prestoserve. You must run the prestoctl_svc daemon if you want to use dxpresto to monitor and administer a P... |
prestosetup(8) -- Configures the Prestoserve software
|
The prestosetup command is an interactive facility that allows you to set up Prestoserve on your system. Prestoserve speeds up synchronous disk writes, including NFS server access, by reducing the amo... |
printconfig(8) -- Used to add, delete, or modify printer configurations
|
Use the Printer Configuration application, printconfig, to add, delete, or modify printer configurations for this workstation's local and remote printers. For each printer that you configure, you can... |
printpw(8) -- Outputs the contents of the password database
|
The printpw command outputs the contents of the /etc/passwd database file in ASCII format to the standard output. When printpw is called with no option, all usernames in the database are output. The /... |
probenis(8) -- Probes for existence of NIS server
|
The probenis command probes the network to determine whether or not NIS is available. Although part of the JOIN package, it does not explicitly depend on the configuration database and can be used sta... |
proplistd(8) -- Services remote NFS compatible property list requests
|
The proplistd daemon services sideband protocol requests from NFS clients for property list operations. Requests may be to get, set, and or delete the property list associated with an NFS served file ... |
protect_headers_setup(8) -- Sets up header files for the
|
The protect_headers_setup script walks the directory tree rooted at /usr/include (or dirname if specified) and performs one of several actions determined by the option argument. For -l, it creates sym... |
prpasswdd(8) -- Enhanced security daemon
|
The enhanced security daemon, prpasswdd, manages writes to the protected password authentication database, as well as the other enhanced security databases. It prevents file lock contention among mult... |
prtacct(8) -- Provide accounting commands for shell scripts
|
There are a number of commands in the /usr/sbin/acct directory that, along with other accounting commands, enable you to produce a wide range of system accounting records and files. For example, the r... |
psradm(8) -- Stops and starts processors in a multiprocessor system
|
On a multiprocessor system, the psradm command puts one or more processors off line (stops a processor) or on line (starts a processor). The processor_id variable specifies an integer that uniquely id... |
ps_level1of(8) -- ASCII to PostScript translation filter
|
The ln03rof and related filters translate ASCII to PostScript, handles the device dependencies of a PostScript printer and performs some accounting functions. PostScript printers print documents forma... |
ps_level2of(8) -- ASCII to PostScript translation filter
|
The ln03rof and related filters translate ASCII to PostScript, handles the device dependencies of a PostScript printer and performs some accounting functions. PostScript printers print documents forma... |
pwck(8) -- Checks the password and group files for inconsistencies
|
The pwck command scans the /etc/passwd file, or the named file, and writes to standard out any inconsistencies. The scan checks the number of fields, login name, user ID, group ID, and existence of a ... |
quot(8) -- Displays information about user files
|
The quot command displays information about each file system's users and the files that they own. If you do not specify a file system, the quot command processes all file systems of type ro, rw, or r... |
quotacheck(8) -- Checks file system quota consistency
|
The quotacheck command examines each of the specified file systems, building a table of current disk usage. It then compares this table against the table stored in the disk quota file for the file sys... |
quotaoff(8) -- turns quota enforcement on or off
|
The quotaon and quotaoff commands enable or disable user and group quotas that have been established using the edquota command. To turn the quotas on or off, the file systems specified must have the u... |
quotaon(8) -- turns quota enforcement on or off
|
The quotaon and quotaoff commands enable or disable user and group quotas that have been established using the edquota command. To turn the quotas on or off, the file systems specified must have the u... |
radisk(8) -- Digital Storage Architecture (DSA) disk maintenance program
|
The radisk Digital Storage Architecture (DSA) disk maintenance program allows you to maintain DSA disk devices. The radisk command must be used on unmounted disk partitions to ensure correct results. ... |
rarpd(8) -- Reverse address resolution protocol (RARP) daemon
|
The rarpd daemon maps the Ethernet address of a machine to the machine's Internet Protocol (IP) address. When rarpd is invoked, it reads the /etc/ethers file (by default) and waits to process a RARP ... |
rc.config(8) -- Gets, sets, or deletes runtime configuration
|
The rcmgr command retrieves, sets, or deletes runtime configuration variables stored in the hierarchy of configuration files: /etc/rc.config, /etc/rc.config.common, and /etc/rc.config.site. These thre... |
rc0(8) -- Runs command script executed when stopping the system
|
The rc0 script contains run commands that enable a smooth shutdown and bring the system to a single-user state; run levels 0 and s. In addition to commands listed in within the script itself, rc0 cont... |
rc2(8) -- Run command script executed when entering a multiuser run level
|
The rc2 script contains run commands that enable initialization of the system to a multiuser state; run level 2. In addition to commands listed within the script itself, rc2 contains instructions to r... |
rc3(8) -- Run command script executed when entering a multiuser run level
|
The rc3 script contains run commands that enable initialization of the system to a multiuser state; run level 3. In addition to commands listed within the script itself, rc3 contains instructions to r... |
rcinet(8) -- Restarts, starts, or stops Internet network services on the system
|
The rcinet script allows system administrators to restart, start, or stop the Internet network services on the system while it is running in multiuser mode by using one of the options. |
rcmgr(8) -- Gets, sets, or deletes runtime configuration
|
The rcmgr command retrieves, sets, or deletes runtime configuration variables stored in the hierarchy of configuration files: /etc/rc.config, /etc/rc.config.common, and /etc/rc.config.site. These thre... |
rdate(8) -- network date client
|
The rdate command is invoked at boot time to reset the system date and time to the current network date and time. The rdate program sends a broadcast datagram packet on the specified network or on the... |
rdistd(8) -- Remote file distribution server program
|
The rdistd daemon is the server program for the nrdist command. It is normally run by nrdist using rsh(1). The -S argument must be specified. The option is required so that rdistd is not accidentally ... |
rdump(8) -- Performs incremental file system dumps
|
The dump command copies to the default /dev/tape/tape0_d0, or to the alternate storage device specified with the -f option, all files and any associated extended attributes (including ACLs, see the ac... |
reboot(8) -- Restarts the machine
|
When the system is running and multiple users are logged in, use the shutdown -r command to perform a reboot operation. If no users are logged in, use the reboot command. The reboot command normally s... |
reconstruct(8) -- Reconstructs IMAP mailboxes
|
The reconstruct command rebuilds one or more IMAP mailboxes. When invoked with the -m switch, it rebuilds the master mailboxes file. It can be used to recover from almost any sort of data corruption. ... |
remove(8) -- Provide accounting commands for shell scripts
|
There are a number of commands in the /usr/sbin/acct directory that, along with other accounting commands, enable you to produce a wide range of system accounting records and files. For example, the r... |
removeuser(8) -- Deletes user accounts interactively
|
Security Note If you have enhanced security installed on your system, you should use the dxaccounts command to remove users. See the Security manual and the dxaccounts(8) reference page for more infor... |
renamefset(8) -- Rename an existing AdvFS fileset
|
The renamefset command assigns a new name to an existing fileset within an AdvFS file domain. Before renaming a fileset, unmount the fileset and its clone fileset, if there is one. After renaming a fi... |
renice(8) -- Alters the priority of a running process
|
The renice command alters the scheduling priority of one or more running processes. The ID operands (in the recommended syntax format) or the option arguments (in the obsolescent syntax format) are in... |
repquota(8) -- Summarizes file system quotas.
|
The repquota command prints a summary of the disk usage and quotas for the specified file systems. The command provides a snapshot of the quota statistics, which may be inaccurate if there is current ... |
restore(8) -- Restores files from tapes written with the dump or rdump command, respectively
|
The restore and rrestore commands are used to read files and associated extended attributes (including ACLs, see the acl(4) and proplist(4) reference pages), from a local or remote file system backup ... |
rexecd(8) -- The remote execution server
|
The rexecd daemon is the server for the rexec(3) routine. The server provides remote execution facilities with authentication based on usernames and passwords. The rexecd daemon listens for service re... |
ripquery(8) -- Queries RIP gateways
|
The ripquery command is used to request all routes known by a RIP gateway by sending a RIP request or POLL command. The routing information in any routing packets returned is displayed numerically and... |
ris(8) -- Remote installation services (RIS) utility
|
The ris utility manages remote installation services (RIS), letting you install software from a RIS server over a TCP/IP local area network to a RIS client. You can install the base operating system o... |
rlogind(8) -- The remote login server
|
The rlogind daemon is the server for the rlogin(1) program. The server provides a remote login facility with authentication based on privileged port numbers from trusted hosts. The rlogind daemon list... |
rmfdmn(8) -- removes a file domain
|
Use the rmfdmn utility to remove an existing, but unused, file domain and all its filesets from the system. When you remove a file domain: The file domain and its filesets are destroyed The directory ... |
rmfset(8) -- Removes a fileset or a clone fileset from an AdvFS file domain
|
The rmfset command removes a fileset (and all of its files) from an existing AdvFS file domain. Unless you use the -f option, you are prompted with the following request before a fileset is removed: r... |
rmt(8) -- Allows remote access to magnetic tape devices
|
The rmt command is started as a server process when requests from an rdump or rrestore call enter the system to operate a storage device through an interprocess communications connection. After the re... |
rmvol(8) -- Removes a volume from an existing domain
|
The rmvol utility enables you to decrease the number of volumes within an existing domain. When you attempt to remove a volume, the file system automatically migrates the contents of that volume to an... |
route(8) -- Manipulates the routing tables manually
|
The route command is a program used to manually manipulate the network routing tables. It normally is not needed, as a system routing table management daemon, such as gated or routed, should tend to t... |
routed(8) -- Manages network routing tables
|
Use the routed daemon to manage the RIP only. Use gated to manage RIP plus other protocols. When routed starts, it finds any interfaces to directly connected hosts and networks that are configured int... |
rpc.lockd(8) -- Network lock daemon
|
The rpc.lockd daemon processes lock requests that are either sent locally by the kernel or remotely by another lock daemon. The NFS locking service makes this advisory locking support possible by usin... |
rpc.pcnfsd(8) -- The (PC)NFS authentication and print request server
|
The pcnfsd daemon is an server that supports ONC clients on PC (DOS, OS/2, Macintosh, and other) systems. This reference page describes Version 2 of the pcnfsd server. The rpc.pcnfsd daemon is started... |
rpc.rquotad(8) -- Remote quota server
|
The rquotad daemon is an RPC server that returns quotas for a user of a local file system which is mounted by a remote machine over the NFS. The results are used by the quota command to display user q... |
rpc.rstatd(8) -- Kernel statistics server
|
The rpc.rstatd daemon is a server that returns performance statistics obtained from the kernel. The rup(1) command uses the rpc.rstatd to collect the uptime information that it displays. The rpc.rstat... |
rpc.rusersd(8) -- Network username server
|
The rpc.rusersd daemon is a server that returns a list of users on the host. The rpc.rusersd daemon can be started by inetd(8) by removing the comment character (#) at the beginning of the rusersd ent... |
rpc.rwalld(8) -- Network rwall server
|
The rwalld is a server that handles rwall(1) and shutdown(2) requests. It is implemented by calling wall(1) to all the appropriate network machines. The rwalld daemon is normally invoked by inetd(8) b... |
rpc.sprayd(8) -- Spray server
|
The rpc.sprayd daemon is a server that records the packets sent by the spray(8) command. The rpc.sprayd daemon is normally invoked by the inetd(8) daemon by removing the comment character (#) at the b... |
rpc.statd(8) -- Network status monitor daemon
|
The rpc.statd daemon monitors the status of the client and server sites in response to a request made by the local rpc.lockd daemon. When a site failure is detected, the rpc.statd daemon notifies the ... |
rpc.yppasswdd(8) -- server daemon for modifying the Network Information Service (NIS) password file
|
The yppasswdd daemon is a server that handles password change requests from yppasswd(1). It changes a password entry in the specified file, which is assumed to be in the same format described in passw... |
rpcinfo(8) -- report remote procedure call (RPC) information
|
The rpcinfo command makes a remote procedure call (RPC) call to an RPC server and displays its findings based on the specified options. The program-number argument can be either a name or a number. If... |
rquotad(8) -- Remote quota server
|
The rquotad daemon is an RPC server that returns quotas for a user of a local file system which is mounted by a remote machine over the NFS. The results are used by the quota command to display user q... |
rrestore(8) -- Restores files from tapes written with the dump or rdump command, respectively
|
The restore and rrestore commands are used to read files and associated extended attributes (including ACLs, see the acl(4) and proplist(4) reference pages), from a local or remote file system backup ... |
rshd(8) -- The remote shell server daemon
|
The rshd daemon is the server for the rcmd(3) routine and for the rsh(1) program. The server provides remote execution facilities with authentication based on privileged port numbers from trusted host... |
rstatd(8) -- Kernel statistics server
|
The rpc.rstatd daemon is a server that returns performance statistics obtained from the kernel. The rup(1) command uses the rpc.rstatd to collect the uptime information that it displays. The rpc.rstat... |
rsvpd(8) -- Resource ReSerVation Protocol (RSVP) daemon
|
The rsvpd daemon is the RSVP daemon that starts automatically at boot time. Upon startup, rsvpd performs the following actions: Writes its PID to the /var/run/rsvpd.pid file. Detects all existing inte... |
rsvpstat(8) -- Display resource reservation status
|
The rsvpstat utility displays the Resource ReSerVation Protocol (RSVP) state on the local system. By default, rsvpstat displays a list of all RSVP sessions. Alternatively, you can specify either the -... |
runacct(8) -- Runs daily accounting
|
The runacct command is the daily accounting shell procedure. This shell procedure is normally invoked from the cron daemon to process connection, fee, disk usage, queuing (printer), and process accoun... |
runsyscheck(8) -- Utilities for generating system configuration information and analysis [Versions 124 through 126]
|
The sys_check utility is a system census and configuration verification tool that is also used to aid in diagnosing system errors and problems. Use sys_check to create an HTML report of your system's... |
rusersd(8) -- Network username server
|
The rpc.rusersd daemon is a server that returns a list of users on the host. The rpc.rusersd daemon can be started by inetd(8) by removing the comment character (#) at the beginning of the rusersd ent... |
rvdump(8) -- Performs full and incremental backups on filesets
|
The vdump command backs up files and any associated extended attributes (including ACLs, see the proplist(4) and acl(4) reference pages) from a single mounted fileset or clone fileset to a local stora... |
rvrestore(8) -- Restores files from savesets that are produced by vdump and rvdump
|
The vrestore and rvrestore commands restore data from a saveset previously archived by the vdump command or the rvdump command. The data, which can be restored from a file, a pipe (not applicable for ... |
rwalld(8) -- Network rwall server
|
The rwalld is a server that handles rwall(1) and shutdown(2) requests. It is implemented by calling wall(1) to all the appropriate network machines. The rwalld daemon is normally invoked by inetd(8) b... |
rwhod(8) -- The system status server
|
The rwhod daemon is the server that maintains the database used by the rwho(1) and ruptime(1) programs. Its operation is predicated on the ability to broadcast messages on a network. The rwhod server ... |
sa(8) -- Summarizes accounting records
|
The sa command helps you manage the large volume of accounting information that is generated each day when system accounting has been enabled by the system administrator or by the superuser. When you ... |
salvage(8) -- Recover file data from damaged AdvFS file domains
|
The salvage utility helps you recover file data after an AdvFS file domain has become unmountable due to some type of data corruption. Errors that could cause data corruption of a file domain include ... |
savecore(8) -- Copies a core dump from swap partitions to a file
|
The savecore command is usually invoked automatically during system startup. It determines whether a crash dump has been made, and if there is enough file system space to save it (see the following in... |
savemeta(8) -- Takes a snapshot of an AdvFS domain's metadata
|
This script saves a snapshot of the specified domain metadata into a directory, savedir, that has the following structure: savedir/volume_directory/RBMT_file /BMT_file /SBM_file /log_file /tag_file /f... |
sched_stat(8) -- Displays CPU usage and process-scheduling statistics for SMP and NUMA platforms
|
The sched_stat utility helps you determine how well the system load is distributed among CPUs, what kinds of jobs are getting (or not getting) sufficient cycles on each CPU, and how well cache affinit... |
screend(8) -- Internet (IP) gateway screening daemon
|
The screend daemon is used in conjunction with the gateway screen facility to decide which IP packets should be forwarded when the system is acting as an IP gateway. Only the super-user may run this p... |
screenmode(8) -- Enable or disable gateway screening
|
The screenmode command enables or disables gateway screening if the argument is on or off, respectively. See the screen(2) reference page for more information on gateway screening. When no argument is... |
screenstat(8) -- Show gateway screening statistics
|
The screenstat command displays statistics about kernel gateway screening. The display is sent to the standard output. The format of the screenstat report is as follows: total packets screened: 16754 ... |
scsimgr(8) -- manage SCSI devices and device databases
|
Note See the hwmgr(8) and dsfmgr(8) reference pages for information on utilities that supersede the scsimgr utility. The scsimgr utility automatically makes device special files for new devices. The s... |
scu(8) -- SCSI CAM Utility Program
|
The SCSI utility program, scu, interfaces with the CAM I/O subsystem and the peripherals attached to the SCSI buses. Use this program to maintain and diagnose problems with SCSI peripherals and the CA... |
secauthmigrate(8) -- Convert ULTRIX auth(5) authentication data to authcap(4) authentication data (Enhanced Security)
|
The secauthmigrate utility reads records from the specified files or from standard input (-). These records must be formatted according to the ULTRIX auth(Section 5) format. These can be generated by ... |
secconfig(8) -- Security features setup graphical interface (Enhanced Security)
|
The secconfig utility is a graphical interface used to select the level of system security needed. It can convert from Base to enhanced security mode, and configure base and enhanced security features... |
secsetup(8) -- Security features setup graphical interface (Enhanced Security)
|
The secconfig utility is a graphical interface used to select the level of system security needed. It can convert from Base to enhanced security mode, and configure base and enhanced security features... |
sendmail(8) -- Sends mail over the Internet
|
The sendmail command sends a message to one or more recipients, routing the message over whatever networks are necessary. The sendmail command does internetwork forwarding as necessary to deliver the ... |
sendmail.m4(8) -- Introduction to using m4 macros to create a sendmail.cf configuration file
|
The mailsetup script enables you to create new mail configurations. If you have experience creating sendmail.cf configuration files or your system requires specialized configuration files, you might w... |
setld(8) -- Software subset management utility
|
The setld command is an interactive program for installing and managing software subsets. Software products are organized into subsets that may be loaded, configured, inventoried, and deleted. The loa... |
settz(8) -- Set system time zone information.
|
The settz command sets the system time zone information, based on the current /etc/zoneinfo database configuration. If the /etc/zoneinfo database is not configured, it sets the system time information... |
setup(8) -- invokes a system setup menu for console and workstation displays without graphics capabilities
|
Use this application to do initial installation and configuration of your system. You must have superuser or root privileges to invoke the Setup menu. If your system does not have graphics capabilitie... |
shblk(8) -- Displays disk blocks, as unformatted hexadecimal numbers
|
The shblk command displays the selected blocks as hexadecimal numbers. The blocks are not formatted to any data or metadata representation. You must be the root user to use this command. |
shfragbf(8) -- Displays frag file information
|
Use the shfragbf command to display how much space is used on the frag file. Output includes the following information. Type The frag type is 0K (not in use), 1K for 1K frags, etc. Grps Specifies the ... |
shleases(8) -- Displays a DHCP client's IP address leases.
|
The shleases command reads the file that contains information about a client's leases and displays its contents on stdout. By default this file is /etc/join/leases. There are as many leases as there ... |
shmx(8) -- shared memory exerciser
|
The shmx memory exerciser spawns the background process shmxb, and these two processes exercise the shared memory segments. They alternate writing and reading the other process' data in the segments.... |
showdbs(8) -- Display the contents of DHCP server's dynamic database
|
The showdbs command displays the contents of the DHCP server's dynamic databases -- the leases granted, the hardware and IP address of the lessor, duration and, if the server is configured to supply ... |
showdhc(8) -- Displays the contents of DHCP client configuration files
|
The showdhc command reads the files specified on the command line and, assuming they are configuration files, displays the data contained in them. The format of the output is a single line as shown in... |
showfdmn(8) -- Displays attributes of an AdvFS file domain
|
The showfdmn command displays the attributes of a file domain and detailed information about each volume in the file domain. The command displays the following file domain attributes: Id A unique numb... |
showfile(8) -- displays the attributes of AdvFS directories and files
|
The showfile command displays the attributes of one or more AdvFS files. The command also displays the extent map of each file. An extent is a contiguous area of disk space that the file system alloca... |
showfsets(8) -- Displays information about filesets in an AdvFS domain
|
The showfsets command displays the filesets (or clone filesets) and their characteristics in a specified domain. The characteristics of a fileset are: Fileset Identifier A fileset identifier is a comb... |
showmount(8) -- Shows remote NFS compatible mounts on a host
|
The showmount command shows status information about the NFS server on host. By default, it prints the names of all hosts that have NFS file systems mounted from the server host. See NFS: Network File... |
shutacct(8) -- Provide accounting commands for shell scripts
|
There are a number of commands in the /usr/sbin/acct directory that, along with other accounting commands, enable you to produce a wide range of system accounting records and files. For example, the r... |
shutdown(8) -- Shuts down a single system or an entire cluster
|
The shutdown command provides an automated shutdown procedure. You must be root to use this command. When shutting down a single system, use the shutdown command shown in the first format line in the ... |
siacfg(8) -- Update a matrix.conf file for adding or removing SIA mechanisms
|
The siacfg utility provides a way to update the /etc/sia/matrix.conf files without the errors which are likely during hand-editing. The use of this utility also prevents the proliferation of pre-built... |
siainit(8) -- SIA (Security Integration Architecture) initialization command
|
The siainit command is the SIA's initialization command and is executed only at a reboot. The siainit command informs the configured security mechanisms of a reboot and allows each security mechanism... |
simd(8) -- Daemon that supports the software phrase input method (SIM) service
|
The simd daemon processes input key strokes when the software phrase input method of the atty terminal driver is activated. The utxd pseudo device driver acts as an communication channel between the a... |
sizer(8) -- Displays information about the system or kernel, or creates a system configuration file
|
The sizer program reports information about the running system, including the name of the kernel file. This program is also used by the doconfig program to create a system configuration file. Note tha... |
slattach(8) -- Attaches a serial line to a network interface
|
The slattach command assigns a tty line to a network interface, allowing terminal devices to communicate across a network. The tty line is attached to the first available network interface (sl0, sl1, ... |
smsd(8) -- The SysMan Station daemon
|
The SysMan Station is a client-server application consisting of a daemon (smsd) and the SysMan Station graphical user interface (sysman_station(8)). The SysMan Station provides the ability to monitor ... |
smtpd(8) -- Sends mail over the Internet
|
The sendmail command sends a message to one or more recipients, routing the message over whatever networks are necessary. The sendmail command does internetwork forwarding as necessary to deliver the ... |
snmpd(8) -- Simple Network Management Protocol (SNMP) agent daemon
|
The snmpd daemon is an extensible SNMP agent that starts automatically at boot time. It listens on the snmp service port specified in the /etc/services file for SNMP requests and for local subagents w... |
snmpd.conf(8) -- Simple Network Management Protocol (SNMP) agent daemon
|
The snmpd daemon is an extensible SNMP agent that starts automatically at boot time. It listens on the snmp service port specified in the /etc/services file for SNMP requests and for local subagents w... |
snmpi(8) -- The extensible SNMP subagent data initializer
|
The snmpi program emits subtree object table initialization C code to be compiled and linked with the method routines as part of an extensible SNMP subagent. For a complete description of using snmpi ... |
snmp_request(8) -- Sends SNMPv1 and SNMPv2 request PDUs to an agent and prints the agent's response
|
The snmp_request program sends an SNMP Get, GetBulk, GetNext, or Set request to a logically remote SNMP agent, and prints the agent's response. |
snmp_traprcv(8) -- A program that listens for SNMP trap messages and prints any it receives
|
The snmp_traprcv program listens on the SNMP Trap port specified in the /etc/services file. If no entry exists in the /etc/services file, the program listens on port 162. If any SNMP trap messages arr... |
snmp_trapsnd(8) -- A program that sends SNMPv1 and SNMPv2 traps
|
The snmp_trapsnd program encodes an SNMPv1 Trap protocol data unit (PDU) (see RFC 1215) or a SNMPv2 Trap PDU (see RFC 1905) into an SNMP message, and sends it to the specified host(s). All data fields... |
spray(8) -- Spray packets
|
The spray command uses RPC to send a one-way stream of packets to the specified host and reports how many were received, as well as the transfer rate. The host argument can be either a name or an Inte... |
sprayd(8) -- Spray server
|
The rpc.sprayd daemon is a server that records the packets sent by the spray(8) command. The rpc.sprayd daemon is normally invoked by the inetd(8) daemon by removing the comment character (#) at the b... |
srconfig(8) -- Displays and controls source routing functions and parameters for communication on token ring networ...
|
The srconfig command reads and modifies entries in the your local system's source routing database. For every remote system on an extended token ring network with which your local system communicates... |
sshd(8) -- Secure shell daemon
|
The sshd2 Secure Shell daemon runs on the Secure Shell server. It is normally run as root, and is the server counterpart for ssh2. Together, these programs replace and extend the rlogin and rsh servic... |
sshd-check-conf(8) -- Checks what the configuration allows or denies based on the incoming user and/or the host name
|
The sshd-check-conf command checks how the sshd2 daemon will react to an incoming user, based on the user name and the remote host name given as parameters. The following parameters are checked: Allow... |
sshd2(8) -- Secure shell daemon
|
The sshd2 Secure Shell daemon runs on the Secure Shell server. It is normally run as root, and is the server counterpart for ssh2. Together, these programs replace and extend the rlogin and rsh servic... |
startppp(8) -- Starts the pppd daemon for PPP dial-in connections
|
A system configured for PPP dial-in connections answers calls from remote systems. If your system is configured as a PPP dial-in system, a getty process is continuously run on the serial line that is ... |
startslip(8) -- Configures SLIP connections
|
The startslip program configures two types of SLIP connections: Dial-in connections -- The system is to answer calls from remote systems. Dial-out connections -- The system is to place calls to a remo... |
startup(8) -- Provide accounting commands for shell scripts
|
There are a number of commands in the /usr/sbin/acct directory that, along with other accounting commands, enable you to produce a wide range of system accounting records and files. For example, the r... |
statd(8) -- Network status monitor daemon
|
The rpc.statd daemon monitors the status of the client and server sites in response to a request made by the local rpc.lockd daemon. When a site failure is detected, the rpc.statd daemon notifies the ... |
strace(8) -- Writes STREAMS event trace messages to standard output
|
The strace command gets STREAMS event trace messages from STREAMS drivers and modules via the STREAMS log driver (strlog), and writes these messages to standard output. You can limit the messages stra... |
strclean(8) -- Removes outdated STREAMS error log files
|
The strclean command cleans the STREAMS error logger directory of log files (error.mm-dd) that contain error messages sent by the STREAMS log driver (strlog). If no other directory is specified (the l... |
strerr(8) -- Receives error messages from the STREAMS log driver
|
The strerr daemon receives error messages from the STREAMS log driver (strlog) for addition to the STREAMS error log files (error.mm.dd) in the STREAMS error logger directory (/var/adm/streams by defa... |
stripe(8) -- Stripes a file across several volumes in an AdvFS domain.
|
The stripe utility enables you to improve the read/write performance of a file. The stripe utility directs a zerolength file (a file with no data written to it yet) to be spread evenly across several ... |
strsetup(8) -- STREAMS setup and information command
|
The strsetup command displays the setup of your STREAMS modules and creates the appropriate character special files for the STREAMS-based drivers in your kernel configuration. |
sulogin(8) -- single-user login program (Enhanced Security)
|
The sulogin program is run by the init process on the console terminal when entering single-user mode. The sulogin program checks the system configuration to determine whether entering single-user mod... |
svcsetup(8) -- set up the svc.conf file
|
Note This file is obsolete, except for statically-built applications and sendmail, if the Name Service Switch is in use. See nsswitch.conf(5) for more information. The svcsetup script modifies the svc... |
swapon(8) -- Specifies additional disk partitions for paging and swapping
|
The swapon command is used to specify additional disk partitions for paging and swapping. A paging partition is a block special device. (Tru64 UNIX does not currently support paging and swapping to a ... |
switchlog(8) -- moves an AdvFS file domain transaction log
|
The switchlog command relocates the transaction log of the specified file domain to a different volume in the same file domain. Moving the transaction log within a multivolume file domain is typically... |
sync(8) -- Flush file system metadata and data from memory buffers to disk.
|
The sync utility runs the sync function, which flushes (writes) system metadata and data from all unwritten memory buffers to disk. For example, the data flushed includes, for UFS, modified inodes and... |
sysconfig(8) -- Maintains the kernel subsystem configuration
|
The sysconfig command is used to query or modify the kernel subsystem configuration. Use this command to add subsystems to your running kernel, reconfigure subsystems already in the kernel, ask for in... |
sysconfigdb(8) -- Manage the subsystem configuration database
|
The sysconfigdb command is used to manage the /etc/sysconfigtab subsystem configuration database. However, it can also be used to maintain any text file that has the same format as the /etc/sysconfigt... |
syslogd(8) -- Logs system messages
|
The syslogd daemon reads and logs messages to a set of files described in the /etc/syslog.conf configuration file. Each message logged consists of one line. A message can contain a priority code, mark... |
sysman(8) -- Front end command used to invoke several SysMan services
|
The sysman command provides a common interface for invoking several SysMan services: A menu driven, task oriented system management tool. SysMan Menu and its associated tasks can run on a character ce... |
sysman_cli(8) -- Command line interface to SysMan system management data.
|
The sysman -cli command provides a generic command line interface to System Management (SysMan) data. The SysMan data is defined as that which is used to configure a system, or perform management task... |
sysman_clone(8) -- Saves SysMan configuration information, which can be used to clone configurations on similar systems
|
The sysman -clone command provides the ability to save certain SysMan configuration information from a previously configured system and duplicate that configuration information to one or more systems ... |
sysman_hmmod(8) -- web-based SysMan daemon
|
The sysman_hmmod daemon is the subagent that provides the web-based interface for the Tru64 UNIX SysMan application. This daemon is available only with Version 5.0 and higher of the Tru64 UNIX operati... |
sysman_intro(8) -- Introduction of SysMan applications
|
SysMan is a suite of applications for managing Tru64 UNIX systems. The SysMan applications provide a simple, easy to use, graphical user interface (GUI) for common system management tasks including in... |
sysman_menu(8) -- Graphical interface to run system management tasks
|
SysMan Menu is used by the system administrator to obtain system management data and run selected system management tasks. SysMan Menu provides a menu of system management tasks in a tree type display... |
sysman_station(8) -- Graphical interface for the SysMan Station
|
The SysMan Station is a client-server application consisting of a daemon (smsd(8)) and the SysMan Station graphical user interface (sysman_station). The SysMan Station monitors and manages a single sy... |
SYSV_PTY(8) -- Makes the system use the SVR4 pseudo terminal name space
|
The SYSV_PTY shell script activates the SVR4 pty (pseudo terminal) name space as the default. The SVR4 pty special files have a name in the form of /dev/pts/N. The SYSV_PTY shell script takes no argum... |
sys_check(8) -- Utilities for generating system configuration information and analysis [Versions 124 through 126]
|
The sys_check utility is a system census and configuration verification tool that is also used to aid in diagnosing system errors and problems. Use sys_check to create an HTML report of your system's... |
tag2name(8) -- Display the path name of an AdvFS file
|
Internally, AdvFS identifies files by tag numbers (similar to inodes in UFS). Internal messages, error messages, and output from diagnostic utilities usually specify a tag number in place of a file na... |
talkd(8) -- The remote communications server for the talk command
|
The talkd server notifies a user or callee when a client or caller wants to initiate a conversation. The talkd daemon sets up the conversation if the callee accepts the invitation. The caller initiate... |
tapex(8) -- Tape exerciser program
|
The tapex program tests tape driver functionality. Functions that are tested include: Writing records onto a tape and verifying the records Using records in a range of sizes Record-length testing Rand... |
tcpdump(8) -- Dump traffic on a network
|
The tcpdump utility prints out the headers of packets on a network interface that match the boolean expression. Decoding of tftp options complies with RFC 1782 (see the tftpd(8) and tftp(1) reference ... |
tcpslice(8) -- Extracts sections of or merges tcpdump files
|
The tcpslice program extracts portions of packet-trace files generated using the tcpdump -w command. It can also be used to concatenate files. The tcpslice command copies to stdout all packets from it... |
telnetd(8) -- The DARPA telnet protocol server daemon
|
The telnetd daemon is a server that supports the DARPA (Defense Advanced Research Projects Agency) standard telnet virtual terminal protocol. The telnetd daemon is invoked by the Internet server (see ... |
tftpd(8) -- The DARPA Trivial File Transfer Protocol (TFTP) server
|
The tftpd daemon is a server that supports the DARPA (Defense Advanced Research Projects Agency) Trivial File Transfer Protocol and complies with RFC-1350, RFC-1782, and RFC-1783. The TFTP server oper... |
thailpof(8) -- Generic filter for printing Thai text files
|
The thailpof filter is a generic print filter for Thai text files. The filter handles the device dependencies of printers and performs accounting functions. At print job completion times, accounting r... |
thawfs(8) -- The freezefs utility causes the specified fileset's domain to enter into a metadata stable state. Al...
|
To allow coherent hardware snapshots in multivolume domain configurations, filesystem metadata must be consistent across all volumes when the individual volumes are snapped or cloned. These configurat... |
timed(8) -- The network time daemon
|
The timed daemon is not invoked at boot time by default. You can use the /usr/sbin/timedsetup utility to configure the timed daemon. The timed daemon synchronizes the host's clock with those of other... |
timedc(8) -- Controls the timed daemon
|
The timedc program (timed control program) controls the operation of the timed daemon. The timedc program can be used to perform the following tasks: Measure the differences between machines' clocks.... |
timedsetup(8) -- Performs initial setup of the time server daemon (timed).
|
The timedsetup command is an interactive script that can be used to perform initial time service configuration for your system. By default, timed does not start at boot time. The timedsetup script ask... |
timezone(8) -- Sets timezone information
|
The timezone command is an interactive program for setting and changing the timezone for users running in the SVID 2 habitat. The program prompts you for specific information regarding the timezone fo... |
traceroute(8) -- Prints the route that packets take to a network host
|
The Internet is a large and complex aggregation of network hardware, connected together by gateways. The traceroute command tracks the route packets follow from gateway to gateway. The command uses th... |
trpt(8) -- Transliterates protocol trace
|
The trpt command, used for debugging sockets, queries the buffer of Transmission Control Protocol (TCP) trace records. The TCP trace record buffer is created when a socket is marked for debugging with... |
tunefs(8) -- Tunes an existing UFS file system
|
The tunefs command changes the dynamic parameters of a UFS file system that affect the layout policies. The parameters to be changed are indicated by the options specified. You should unmount a file s... |
turnacct(8) -- Provide accounting commands for shell scripts
|
There are a number of commands in the /usr/sbin/acct directory that, along with other accounting commands, enable you to produce a wide range of system accounting records and files. For example, the r... |
udelta(8) -- print differences between two subset inventories
|
The udelta command reads records from sorted inventory files inv1 and inv2. Records from each file are compared by file name. Each record from inv1 which does not have a corresponding record in inv2 i... |
udetect(8) -- Find subset files that have changed since installation
|
The udetect command reads setld inventory records from standard input. For each record, the file in the path field is checksummed and checked with the lstat(2) system call. Records for which there are... |
uerf(8) -- Event report formatter
|
The uerf command produces a record of system events. These events include event messages relating to the system hardware and the software kernel as well as information about system status, startup, an... |
ufs_fsck(8) -- Check and repair UFS file systems
|
The fsck command is a front-end program for the ufs_fsck program, which checks and repairs UFS file systems. Do not use this command for AdvFS file systems: instead, see advfs(4). The fsck program has... |
umount(8) -- Mounts and unmounts file systems
|
Use the mount command to make a file system available for use, or mounted. Use the umount command to make a file system unavailable for use, or unmounted. Use the mount command with the -q option to d... |
undohash(8) -- Hashes or unhashes IMAP configuration directories
|
The dohash command converts the IMAP configuration directories from the format for older versions of the Cyrus IMAP4 Revision 1 server to the new format for Version 1.6.1 or higher. Starting with Vers... |
updadmin(8) -- Invokes the Update Installation Cleanup utility to remove or archive backup files created by an Upda...
|
The updadmin command invokes the Update Administration Cleanup utility, which removes or archives the backup files that were created by an Update Installation process. There are no flags or options as... |
update(8) -- Periodically updates the file system
|
The update command flushes data from memory to disk every 30 seconds. This ensures that the file system is up to date in the event of a system crash. This command is provided as a statically-linked ex... |
updmerge(8) -- DO NOT USE THE updmerge UTILITY!
|
Caution DO NOT USE THE updmerge UTILITY! The updmerge utility lets you merge files that have been preserved from a previous installation into a new installation environment. Any user file or customize... |
updmv(8) -- Moves customized, user, and inventory data files to or from storage.
|
The updmv utility moves files listed in the User File Inventory (UFI) file and the Customized File Inventory (CFI) file to or from storage. The UFI file, created by the genufi utility, identifies user... |
useradd(8) -- Adds a new user login account
|
The useradd command is part of a set of command-line interfaces (CLI) that are used to create and administer user accounts on the system. When The Advanced Server for UNIX (ASU) is installed and runni... |
userdel(8) -- Deletes a user login account from the system.
|
The userdel command is part of a set of command line interfaces (CLI) that are used to create and administer user accounts on the system. When The Advanced Server for UNIX (ASU) is installed and runni... |
usermod(8) -- Modifies a user's login information on the system.
|
The usermod command is part of a set of command-line interfaces (CLI) that are used to create and administer user accounts on the system. When the Advanced Server for UNIX (ASU) is installed and runni... |
use_sys_check(8) -- Utilities for generating system configuration information and analysis [Versions 124 through 126]
|
The sys_check utility is a system census and configuration verification tool that is also used to aid in diagnosing system errors and problems. Use sys_check to create an HTML report of your system's... |
usync(8) -- synchronize two setld inventory files to reflect current system status
|
The usync command is used to achieve inventory synchronization by merging two inventory files according to the pathname field of the inventory records. The result is directed to standard output. If th... |
utxd(8) -- Daemon that spawns service daemons used by the Asian terminal driver
|
The utxd daemon spawner acts as an agent for the Asian terminal driver (atty). The utxd daemon spawns other daemons that support special services required for Asian language input. The service daemons... |
uucheck(8) -- Checks for files and directories required by uucp
|
The uucheck command verifies the presence of the files and directories required by the uucp program. In addition to checking for the presence of files required by uucp, the uucheck command also checks... |
uucico(8) -- Transfers uucp command, data, and execute files to remote systems
|
The uucico daemon transports uucp Command (C.*), Data (D.*), and Execute (E.*) files that are created by the uucp and uux commands to a specified remote system. Both the local and remote systems run t... |
uucleanup(8) -- Deletes selected old files from the uucp spool directory
|
The uucleanup program removes outdated files from the spool directory (/usr/spool/uucp). The uucleanup program scans the /usr/spool/uucp directory for old files and takes appropriate action to remove ... |
uucpd(8) -- Manages communications between the uucp program and TCP/IP
|
The uucpd daemon enables uucp connections through the Transmission Control Protocol (TCP)/Internet Protocol (IP). This daemon handles the login of uucp connections and starts uucico to process the uuc... |
uucpsetup(8) -- The uucp setup program
|
The uucpsetup command provides an interactive facility for setting up and updating the uucp files necessary to configure your system for uucp connections. To set up uucp initially, run the uucpsetup c... |
uugetty(8) -- Sets the terminal type, modes, speed, and line.
|
The uugetty command sets and manages terminals by setting up speed, terminal flags, and the line discipline. If command options are provided, uugetty adapts the system to those specifications; uugetty... |
uumonitor(8) -- Monitors the UUCP system
|
The uumonitor command displays a synopsis in tabular format of the current UUCP status. The format of each line in the table is as follows: system_name #C #X most_recent_status CNT:# time Table entrie... |
uusched(8) -- Schedules work for the file transport program
|
The uusched daemon schedules work for the uucp file transport program, uucico. The uusched daemon schedules the transfer of files that are queued in the /usr/spool/uucp/SystemName directory. This daem... |
vdf(8) -- Displays disk information for AdvFS domains and filesets
|
The vdf utility is a script that reformats output from the showfdmn, showfsets, shfragbf, and df utilities in order to display information about the disk usage of AdvFS domains and filesets. In additi... |
vdump(8) -- Performs full and incremental backups on filesets
|
The vdump command backs up files and any associated extended attributes (including ACLs, see the proplist(4) and acl(4) reference pages) from a single mounted fileset or clone fileset to a local stora... |
verify(8) -- Checks the AdvFS on-disk metadata structures
|
The verify command mounts all the filesets in a domain at temporary mount points to process them and unmounts them when finished. If you have chosen the -a option, existing mount points will be retain... |
versw(8) -- Manages the transition from the active version of the operating system to a new version
|
The versw utility manages the transition from the active version of the operating system to a new version. You must be root to use this utility. The active and new operating system versions are record... |
vfast(8) -- Runs the vfast utility in the background to reduce file fragmentation, and to balance volume free sp...
|
The vfast utility runs at the operating system level with low overhead, continuously defragmenting and balancing files, consolidating free space and distributing the file I/O over the volumes of a dom... |
vfilepg(8) -- Display pages of an AdvFS file
|
The vfilepg utility formats, dumps, and displays AdvFS file pages. A file page is the unit of disk storage for AdvFS file: 8 Kbytes of contiguous disk space. The utility has the following functions: F... |
vipw(8) -- Edits the /etc/passwd file
|
You use the vipw command to edit the /etc/passwd file with the editor defined by the EDITOR environment variable. If this environment variable is not set, the default editor is vi. The vipw command pe... |
vlanconfig(8) -- Configures or displays virtual Local Area Network (VLAN) interfaces
|
The vlanconfig command allows you to perform the following tasks: Create VLAN virtual interfaces. Display attributes for a specified VLAN virtual interface or an interface on which VLANs have been con... |
volassist(8) -- Create, mirror, back up, grow, shrink, move, add logs to, and support online backup of LSM volumes
|
The volassist command is an LSM command that finds space for and creates volumes, adds mirrors and logs to existing volumes, extends and shrinks existing volumes, provides for the migration of data fr... |
volclonedg(8) -- Creates a copy of an LSM disk group whose underlying disks have been cloned via hardware.
|
The volclonedg command allows you to create a copy of a disk group using disks that have been cloned via hardware. This command is available on both standalone systems and clusters. LSM must be instal... |
vold(8) -- Logical Storage Manager configuration daemon
|
The Logical Storage Manager configuration daemon, vold, is responsible for maintaining configurations of disks and disk groups in the Logical Storage Manager. The vold daemon takes requests from other... |
voldctl(8) -- Controls the Logical Storage Manager volume configuration daemon
|
The voldctl utility manages some aspects of the state of the Logical Storage Manager volume configuration daemon, vold, and manages configuration aspects related to bootstrapping the rootdg disk group... |
voldg(8) -- Manages Logical Storage Manager disk groups
|
The voldg utility performs basic administrative operations on disk groups. Operations include the creation of disk groups, the addition of disks to a disk group, and disk group imports and deports. Th... |
voldisk(8) -- Defines and manages Logical Storage Manager disks
|
The voldisk utility performs basic administrative operations on disks. Operations include initializing and replacing disks, as well as taking care of some bookkeeping necessary for the disk model pres... |
voldiskadd(8) -- Adds one or more disks for use with the Logical Storage Manager
|
The voldiskadd interactive utility sets up new disks that are added to the system after the initial system installation and configures the disks for use by the Logical Storage Manager. A valid disk la... |
voldiskadm(8) -- Menu interface for LSM disk administration
|
The voldiskadm script is an interactive tool that presents you with a menu of possible operations. When you select an operation, the script guides you through the necessary steps, and prompts for data... |
voldisksetup(8) -- Sets up a disk for use with the Logical Storage Manager (LSM)
|
The voldisksetup command is normally called by the voldiskadd command as part of initial disk configuration. The voldisksetup utility configures one or more disks for use by the Logical Storage Manage... |
voledit(8) -- Creates, removes, and modifies Logical Storage Manager (LSM) records
|
The voledit utility sets and changes various attributes for Logical Storage Manager configuration records that do not depend upon volume usage types. See volume(8) for operations that can set usage-ty... |
volencap(8) -- Encapsulates disks, disk partitions,
|
The /usr/sbin/volencap command encapsulates one or more disks or disk partitions, including storage in an AdvFS domain. On a single system, this includes the root file system partitions /, /usr, and /... |
volevac(8) -- Evacuates all volumes from a disk
|
The volevac script moves subdisks off the specified Logical Storage Manager disk (medianame) to the specified destination disks (new_medianame ...). Note that only those subdisks that are associated w... |
volinfo(8) -- Print accessibility and usability of volumes
|
The volinfo utility reports a usage-type-dependent condition on one or more volumes in a disk group. A report for each volume specified by the volume operand is written to the standard output. If no v... |
volinstall(8) -- Sets up Logical Storage Manager (LSM) environment after LSM installation
|
The volinstall script sets up LSM special device files, and add the following lines to the /etc/inittab file: lsmr:s:sysinit:/sbin/lsmbstartup -b /dev/console 2>&1 lsm:23:wait:/sbin/lsm... |
volintro(8) -- Introduction to Logical Storage Manager (LSM) terms and commands
|
The following LSM commands provide a shell-level interface used by the system administrator and higher-level applications and scripts to query and manipulate LSM objects: volassist, volclonedg, vold, ... |
voliod(8) -- Starts, stops, and reports on Logical Storage Manager kernel I/O daemons
|
The voliod utility starts, stops, or reports on Logical Storage Manager kernel I/O daemons. When invoked with no arguments, voliod prints the current number of volume I/O daemons on the standard outpu... |
vollogcnvt(8) -- Logical Storage Manager BCL-to-DRL logging conversion utility
|
The vollogcnvt utility is a migration tool for Logical Storage Manager (LSM) administrators who are using the Block-Change Logging (BCL) feature. In the Version 5.0 release of Tru64 UNIX, the BCL feat... |
volmake(8) -- Create Logical Storage Manager objects
|
The volmake utility creates subdisk, plex, and volume records for the Logical Storage Manager. Records can be created entirely from parameters specified on the command line, or they can be created usi... |
volmend(8) -- Mends simple problems in configuration records
|
The volmend utility performs various Logical Storage Manager usage-type-specific operations on subdisk, plex, and volume records. The first operand is a keyword that determines the specific operation ... |
volmigrate(8) -- Moves AdvFS domain storage from physical storage to LSM volumes (volmigrate) or from LSM volumes to ...
|
The volmigrate and volunmigrate commands are available on both standalone systems and clusters. The volmigrate command moves an AdvFS domain from physical storage to an LSM volume and leaves the origi... |
volmirror(8) -- Mirrors volumes on a disk or control default mirroring
|
The volmirror command provides a mechanism to mirror all the contents of a specified disk, to mirror all currently unmirrored volumes in the specified disk group, or to change or display the current d... |
volnotify(8) -- Displays Logical Storage Manager configuration events
|
The volnotify utility displays events related to disk and configuration changes managed by the Logical Storage Manager configuration daemon, vold. The volnotify utility displays requested event types ... |
volplex(8) -- Perform Logical Storage Manager operations on plexes
|
The volplex utility performs Logical Storage Manager operations on plexes and on volume-and-plex combinations. The first operand is a keyword that determines the specific operation to perform. The rem... |
volprint(8) -- Displays records from the Logical Storage Manager configuration
|
The volprint utility displays complete or partial information from records in Logical Storage Manager disk group configurations. Records can be selected by name or with special search expressions (see... |
volreattach(8) -- Reattaches disk drives that have once again become accessible
|
The volreattach utility attempts to reattach disks using the same disk group and media names they had before detachment. This operation may be necessary if a disk has a transient failure, or if some d... |
volreconfig(8) -- Encapsulates disks, disk partitions,
|
The /usr/sbin/volencap command encapsulates one or more disks or disk partitions, including storage in an AdvFS domain. On a single system, this includes the root file system partitions /, /usr, and /... |
volrecover(8) -- Performs volume recovery operations
|
The volrecover utility performs plex attach, RAID 5 subdisk recovery, and resynchronization operations for the named volumes or for volumes that use the named disks (medianame). If no medianame or vol... |
volrestore(8) -- Restores a complete or partial Logical Storage Manager (LSM) configuration
|
The volrestore command restores an LSM configuration database that was backed up using the volsave command. The volsave command saves configuration information in a set of files, called a description ... |
volrootmir(8) -- Creates mirror of areas necessary for booting on a new disk
|
The volrootmir script creates a copy of all areas involved in booting on the specified target disk and adds those copies as mirrors to the relevant system volumes. When used without the -a option, vol... |
volsave(8) -- Saves a Logical Storage Manager (LSM) configuration
|
You can save the LSM configuration records for a disk group by saving the output of the volprint(8) utility in a description file that the volmake(8) utility can use. The volsave command provides an e... |
volsd(8) -- Perform Logical Storage Manager operations on subdisks
|
The volsd utility performs Logical Storage Manager operations on subdisks and on plex-and-subdisk combinations. The first operand is a keyword that determines the specific operation to perform. The re... |
volsetup(8) -- Initializes Logical Storage Manager (LSM) by creating the rootdg disk group
|
The volsetup script is an interactive script that should be run after installing LSM. The diskname or partition parameter specifies the name of at least one disk or partition to be used in creating th... |
volstat(8) -- Logical Storage Manager statistics management utility
|
The volstat utility prints and resets statistics information on one or more volumes, plexes, subdisks, or disks. The volstat utility reads statistics from the /dev/volinfo device to report performance... |
voltrace(8) -- Trace operations on volumes
|
The voltrace utility prints kernel error or I/O trace event records on the standard output or writes them to a file in binary format. Binary trace records written to a file can be read back and format... |
volume(8) -- Performs Logical Storage Manager operations on volumes
|
The volume utility performs Logical Storage Manager operations on volumes. The first operand is a keyword that determines the specific operation to perform. The remaining operands specify configuratio... |
volunmigrate(8) -- Moves AdvFS domain storage from physical storage to LSM volumes (volmigrate) or from LSM volumes to ...
|
The volmigrate and volunmigrate commands are available on both standalone systems and clusters. The volmigrate command moves an AdvFS domain from physical storage to an LSM volume and leaves the origi... |
volunroot(8) -- Remove Logical Storage Manager hooks for bootable volumes
|
The volunroot script restores the accessibility of the root, swap, and other file systems on the boot disk directly through disk partitions instead of through volume devices. The script also removes o... |
volwatch(8) -- Monitors the Logical Storage Manager (LSM) for failure events and performs hot sparing
|
The volwatch command monitors LSM waiting for exception events to occur. When an exception event occurs, the volwatch command uses mailx(1) to send mail to: The root account. The user accounts specifi... |
vrestore(8) -- Restores files from savesets that are produced by vdump and rvdump
|
The vrestore and rvrestore commands restore data from a saveset previously archived by the vdump command or the rvdump command. The data, which can be restored from a file, a pipe (not applicable for ... |
vsbmpg(8) -- Display a page from a Storage Bitmap (SBM) file
|
Storage Bitmaps (SBMs) are used by the AdvFS to track free and allocated disk space of AdvFS volumes. Each volume in an AdvFS domain has one SBM file. The vsbmpg utility displays pages of a SBM file. ... |
w2ksetup(8) -- Setup script for Windows 2000 Single Sign On
|
Use the w2ksetup script to configure the Windows 2000 Single Sign On (SSO) after you install the optional software subsets. To use this script, you must have access to a Windows 2000 account that is a... |
wnn(8) -- Sets up the 8-bit option for sendmail and
|
The wwsetup script performs one or both of the following tasks: Enables or disables 8-bit transmission code, which is an option supported by sendmail software By default, sendmail uses the 7-bit SMTP ... |
wol(8) -- Send network packet over subnet to turn on target system power
|
The wol utility (wake-on-LAN) generates and transmits a network packet to power on a remote system on the same subnet. Before you can use the wol utility, you must enable the remote system management ... |
writesrv(8) -- Lets users send messages to and receive messages from a remote system
|
The writesrv daemon allows users to send messages to users on a remote system, and to receive responses from users on a remote system by using the write command. The writesrv command receives incoming... |
wtmpconvert(8) -- Modify connect time accounting records from DIGITAL UNIX releases 4.0x and prior to new format
|
The wtmpconvert command reads records from a connect time accounting file, such as /var/adm/wtmp, and converts the record format to the updated struct utmp format. If no output file is specified or if... |
wtmpfix(8) -- Modify connect time accounting records to change formats and to make corrections in the records
|
fwtmp [-ic] The fwtmp command reads records from standard input and writes records to standard output. Normally, information in record fields of the /var/adm/wtmp file is entered as binary data by the... |
wwconfig(8) -- Configures tty features for Asian countries
|
The wwconfig procedure integrates installed Asian tty features into the running kernel, removes those features from the kernel, or lists the installed or currently active features. Currently, you can ... |
wwpsof(8) -- Generic I18N (internationalized) print filter for PostScript printers
|
The wwpsof filter is a generic text-to-PostScript converter that converts the various single-byte and multibyte characters used in an international environment to printable PostScript input. The filte... |
wwsetup(8) -- Sets up the 8-bit option for sendmail and
|
The wwsetup script performs one or both of the following tasks: Enables or disables 8-bit transmission code, which is an option supported by sendmail software By default, sendmail uses the 7-bit SMTP ... |
xjoin(8) -- Graphical user interface program to configure DHCP server
|
The xjoin program is a graphical user interface program that enables you to configure the DHCP server and server databases. For more information on DHCP, see dhcp(7). To start xjoin, enter the followi... |
xntpd(8) -- Network Time Protocol (NTP) daemon
|
The xntpd daemon maintains a system's time-of-day in agreement with Internet standard time servers. The xntpd daemon is a complete implementation of the Network Time Protocol (NTP) version 3 standard... |
xntpdc(8) -- Monitor and control program for the Network Time Protocol daemon
|
Note The latest versions of the xntpdc command and xntpd daemon, delivered with NTP Version 4, are incompatible with previous versions of NTP. If you use the latest xntpdc command to collect informati... |
ypbind(8) -- Network Information Service (NIS) server and binder processes
|
The Network Information Service (NIS) provides a distributed data lookup service for sharing data among networked systems. NIS data is stored in database files called maps. The databases consist of db... |
ypmake(8) -- rebuild Network Information Service (NIS) database using the make command
|
The make command uses the /var/yp/Makefile file to build an NIS database. With no arguments, make creates databases for any NIS maps that are out-of-date, and then executes yppush(8) to notify slave s... |
yppasswdd(8) -- server daemon for modifying the Network Information Service (NIS) password file
|
The yppasswdd daemon is a server that handles password change requests from yppasswd(1). It changes a password entry in the specified file, which is assumed to be in the same format described in passw... |
yppoll(8) -- determine which version of a Network Information Service (NIS) map is at a master NIS server host
|
The yppoll command asks a ypserv process for the domain, order number, and master NIS server (also known as map parameters) associated with the named map. If the server is a v.1 NIS protocol server, y... |
yppush(8) -- force propagation of a changed Network Information Service (NIS) map
|
The yppush command copies a new version of a Network Information Service (NIS) map from the master NIS server to the slave NIS servers. It is normally run only on the master NIS server by the make uti... |
ypserv(8) -- Network Information Service (NIS) server and binder processes
|
The Network Information Service (NIS) provides a distributed data lookup service for sharing data among networked systems. NIS data is stored in database files called maps. The databases consist of db... |
ypset(8) -- point ypbind at a particular server
|
The ypset command tells ypbind to get Network Information Service (NIS) map information for the specified domain from the ypserv process running on server. If server is down, or isn't running ypserv,... |
ypsetup(8) -- Sets up the Network Information Service (NIS) environment
|
The nissetup (formerly ypsetup) script configures and runs NIS on your system. You can use nissetup to initially set up your NIS configuration, to change your current NIS configuration, or to remove y... |
ypxfr(8) -- Transfer a Network Information Service (NIS) map from a NIS server to the local host
|
The ypxfr command moves a NIS map, specified by the mapname argument, to the local host by making use of normal NIS services. It creates a temporary map in the directory /var/yp/domain (which must alr... |
ypxfrd(8) -- High speed NIS map transfer daemon
|
The ypxfrd daemon is the transfer agent that handles map transfer requests from yppush on the master server and ypxfr on slave servers and clients. This program performs the actual transfer of the NIS... |
zdump(8) -- Time zone dumper
|
The zdump command prints the current time in each zonename named on the command line. |
zeero(8) -- Zero out disks prior to rewrite.
|
The zeero command writes zeros throughout a disk partition including the disk label. You must be super user to use this command. |
zic(8) -- Time zone compiler
|
The zic compiler reads text from the file(s) named on the command line and creates the time conversion information files specified. If the filename parameter is specified as a dash (-), the standard i... |
adjmsg(9r) -- STREAMS: Removes the specified number of bytes from a message
|
The adjmsg interface removes a specified number of bytes from a message. The absolute value of the len_to_trim argument specifies how many bytes that adjmsg removes. If the number of bytes passed to l... |
allocb(9r) -- STREAMS: Allocates a message block
|
The allocb interface attempts to allocate a STREAMS message block. Buffer allocation fails only when the system is out of memory. If no buffer is available, you can call the bufcall interface, which h... |
assert_wait_mesg(9r) -- General: Asserts that the current kernel thread is about to block (sleep)
|
The assert_wait_mesgroutine asserts that the current kernel thread is about to block (sleep) until the specified event occurs. This routine sets a thread wait bit in the pointer to the thread structur... |
backq(9r) -- STREAMS: Gets a pointer to the previous queue
|
The backq interface returns a pointer to the queue preceding the current queue (the current_queue argument). If the current queue is a read queue, backq returns a pointer to the queue downstream from ... |
BADADDR(9r) -- General: Probes the address during device autoconfiguration
|
The BADADDR routine generates a call to a machine-dependent routine that does a read access check of the data at the supplied address and dismisses any machine check exception that may result from the... |
bcanput(9r) -- STREAMS: Tests for flow control in a specified priority band
|
The bcanput interface, like the canput interface, searches through the stream (starting at the message queue identified by the message_queue argument) until it finds a queue that contains a service in... |
bcmp(9r) -- General: Compares two byte strings
|
The bcmp routine compares byte string b1 to byte string b2. The routine compares exactly n bytes. No check is made for null bytes. |
bcopy(9r) -- General: Copies a series of bytes with a specified limit
|
The bcopy routine copies n bytes from string b1 to buffer b2. No check is made for null bytes. The copy is nondestructive, that is, the address ranges of b1 and b2 can overlap. |
biodone(9r) -- General: Indicates that block I/O is complete
|
The biodone routine is called after an I/O operation to mark the buf structure as completed. It sets the b_flags member to B_SWAP, B_UBC, or B_ASYNC to indicate the type of I/O operation that has comp... |
blkclr(9r) -- General: Zero a block of memory
|
The blkclr routine zeros n bytes of memory beginning at the address specified by b1. |
brelse(9r) -- General: Deallocates a buf structure
|
The brelse routine deallocates a buf structure that was previously allocated by the getnewbuf routine. The buf structure contains information describing an I/O request. Device drivers call the brelse ... |
btop(9r) -- General: Converts bytes to number of pages
|
The btop routine converts the specified byte address to the number of pages. |
buf(9s) -- General: Describes arbitrary I/O
|
The buf data structure describes arbitrary I/O, but is usually associated with block I/O and physio. A systemwide pool of buf data structures exists for block I/O; however, many kernel modules that ar... |
bufcall(9r) -- STREAMS: Gets a buffer when allocb fails
|
The bufcall interface serves as a timeout call of indeterminate length. When a buffer allocation request fails, you can use bufcall to schedule the interface passed to the function argument to be call... |
BUF_LOCK(9r) -- General: Locks the specified I/O buffer
|
The BUF_LOCK routine locks the specified I/O buffer. The routine masks all disk and tape controller interrupts (by calling the splbio routine). It sets the mutual exclusion buffer lock member, b_lock,... |
BUF_UNLOCK(9r) -- General: Unlocks the specified I/O buffer
|
The BUF_UNLOCK routine unlocks the specified I/O buffer that was locked in a previous call to BUF_LOCK. The routine masks all disk and tape controller interrupts (by calling the splbio routine). It re... |
canput(9r) -- STREAMS: Tests for room in a message queue
|
The canput interface searches through the stream (starting at the message queue identified by the message_queue argument) until it finds a queue that contains a service interface where the message can... |
cfgmgr_get_state(9r) -- General: Determines the configuration state
|
The cfgmgr_get_state routine obtains the configuration state of the specified device driver. The specified device driver is in either the static configuration state or the dynamic configuration state.... |
cfgmgr_set_status(9r) -- General: Reports failure to the cfgmgr framework
|
The cfgmgr_set_status routine reports to the cfgmgr framework that a failure has occurred during static configuration. If the specified device driver is in the static configuration state, it does not ... |
cfg_attr_t(9s) -- General: Contains information for managing the loading and unloading of kernel modules
|
The cfg_attr_t data structure contains information for managing the configuring and unconfiguring of kernel modules. The cfgmgr framework passes a pointer to this data structure to the kernel module'... |
cfg_configure(9r) -- General: Loads and configures a kernel subsystem
|
The cfg_configure routine is used to configure a subsystem. If the subsystem is not loaded into the kernel, this routine loads the subsystem. The routine then configures the subsystem using the attrib... |
cfg_query(9r) -- General: Determines the values of selected subsystem attributes
|
The cfg_query( ) routine obtains information about a list of subsystem attributes. You can obtain information about one or more attributes. When your application calls the cfg_query( ) routine, it pas... |
cfg_reconfigure(9r) -- General: Reconfigures the attribute values for a kernel subsystem
|
The cfg_reconfigure( ) routine is used to modify attribute values for a subsystem. The modifications made by this routine take effect immediately because they are made to the in-memory copy of the sub... |
cfg_subsysop(9r) -- Kernel routine used to perform subsystemdefined operations
|
The cfg_subsysop( ) routine performs a subsystem defined operation. The semantics of the operation are defined by the subsystem and implemented in the subsystem's configure routine. |
cfg_subsys_attr_t(9s) -- General: Contains attribute information for kernel modules
|
The cfg_subsys_attr_t data structure contains information that kernel modules use to describe a variety of attributes. Kernel module writers declare and initialize an array of cfg_subsys_attr_t data s... |
cfg_unconfigure(9r) -- General: Unconfigures a kernel subsystem
|
The cfg_unconfigure kernel routine is used to unconfigure a subsystem. If the subsystem is not configured into the kernel, this routine returns an error. If subsystem is sucessfully unconfigured, the ... |
clear_wait(9r) -- General: Clears the wait condition
|
The clear_wait routine clears the wait condition for the specified kernel thread and starts executing the kernel thread, if appropriate. If the kernel thread is interruptible and is still waiting for ... |
contig_free(9r) -- General: Frees a block of memory previously allocated by contig_malloc
|
The contig_free routine frees the memory allocated in a previous call to contig_malloc. If the memory came from the saved memory pool, contig_free puts it back in the saved memory pool; otherwise, the... |
contig_malloc(9r) -- General: Allocates physically contiguous memory
|
The contig_malloc routine allocates physically contiguous memory during the boot process (before single-user mode). The routine carves out an area of physically contiguous memory from a contiguous mem... |
copyb(9r) -- STREAMS: Copies a message block
|
The copyb interface allocates a new message block and copies into it the data from the block pointed to by the message block (the message_block argument). The new message block is at least as large as... |
copyin(9r) -- General: Copies data from a user address space to a kernel address space
|
The copyin routine copies a specified amount of data from the unprotected user address space to the protected kernel address space. |
copyinstr(9r) -- General: Copies a null-terminated string from a user address space to a kernel address space
|
The copyinstr routine copies a specified null-terminated string from the unprotected user address space to a specified address in the protected kernel address space. |
copymsg(9r) -- STREAMS: Copies a message to a new message
|
The copymsg interface: Forms a new message by allocating new message blocks Copies (by calling the copyb interface) the contents of the message referred to by the message_block argument Returns a poin... |
copyout(9r) -- General: Copies data from a kernel address space to a user address space
|
The copyout routine copies a specified amount of data from the protected kernel address space to the unprotected user address space. |
copyoutstr(9r) -- General: Copies a null-terminated string from a kernel address space to a user address space
|
The copyoutstr routine copies a specified null-terminated string from the protected kernel address space to the unprotected user address space. |
copystr(9r) -- General: Copies a null-terminated character string with a specified limit
|
The copystr routine copies string s1 to the buffer pointed to by s2. The routine stops after copying a null character or after copying maxlength characters, whichever comes first. The s2 buffer is not... |
copy_to_phys(9r) -- General: Copies data from a virtual address to a physical address
|
The copy_to_phys routine copies a specified amount of virtually addressed memory to physically addressed memory. The addresses reside only in system memory space and not in the memory space on I/O bus... |
cpu(9v) -- Global Variable: Provides a unique logical processor-type family identifier
|
The cpu global variable provides a unique logical family identifier of the processor type of the running system. The logical system name can represent a single processor or a family of processor types... |
current_task(9r) -- General: Returns a pointer to the task structure associated with the currently running kernel thread
|
The current_task routine returns a pointer to the task structure associated with the currently running kernel thread. A device driver typically calls this routine in preparation for doing a DMA operat... |
current_thread(9r) -- General: Is a pointer to the currently running kernel thread
|
The current_thread routine is a pointer to the currently running kernel thread. Typically, kernel modules use this routine to reference the wait_result member of the thread structure pointer associate... |
datamsg(9r) -- STREAMS: Tests whether a message is a data message
|
The datamsg interface tests the type of message to determine if it is a data message type. The following list identifies the data message value types: Ordinary data Requests a real-time delay Internal... |
decl_simple_lock_data(9r) -- General: Declares a simple lock structure
|
The decl_simple_lock_data routine declares a simple lock structure, slock, of the specified name. You declare a simple lock structure to protect data structures and device register access. You use dec... |
DELAY(9r) -- General: Delays the calling routine a specified number of microseconds
|
The DELAY routine delays the calling routine a specified number of microseconds. DELAY spins, waiting for the specified number of microseconds to pass before continuing execution. For example, the fol... |
do_config(9r) -- EISA/ISA: Initializes the device to its assigned configuration
|
The do_config routine initializes the specified controller based on its power-up resource assignments. If the device uses either an interrupt or a DMA channel, then do_config also performs any setup r... |
dupb(9r) -- STREAMS: Duplicates a message block descriptor
|
The dupb interface creates a new message block structure to reference the message block pointed to by the message_block_ptr argument. Unlike copyb, the dupb interface does not copy the information in ... |
dupmsg(9r) -- STREAMS: Duplicates a message
|
The dupmsg interface forms a new message by copying the message block descriptors pointed to by the message_block_ptr argument and linking them. The dupmsg interface calls dupb for each message block.... |
enableok(9r) -- STREAMS: Enables a queue for service
|
The enableok interface allows the queue associated with the queue_pointer argument to be rescheduled for service. The interface cancels the effect of a previous call to the noenable interface on the q... |
esballoc(9r) -- STREAMS: Allocates a message block with a shared buffer
|
The esballoc interface creates a STREAMS message and attaches a user-supplied data buffer in place of a STREAMS data buffer. The interface calls allocb to obtain a message and data block header. The u... |
ffs(9r) -- General: Finds the first set bit in a mask
|
The ffs routine returns the bit position of the first bit you set in the mask argument. The scan proceeds from the least significant bit to the most significant bit of the mask. |
flushband(9r) -- STREAMS: Flushes messages for a specified priority band
|
The flushband interface flushes messages associated with the priority band specified by the pri argument. If pri is zero (0), flushband flushes only normal and high priority messages. Otherwise, flush... |
flushq(9r) -- STREAMS: Removes a message from a queue
|
The flushq interface frees messages and their associated data structures by calling the freemsg interface. If the queue's count falls below the low-water mark and the QWANTW bit is set, flushq enable... |
FREE(9r) -- General: Deallocates (frees) the allocated kernel virtual memory
|
The FREE routine deallocates (frees) the allocated kernel virtual memory, which you allocated in a previous call to MALLOC. |
freeb(9r) -- STREAMS: Frees a message block
|
The freeb interface deallocates a message block. If the reference count of the db_ref member of the datab structure is greater than the value 1, freeb decrements the count. If db_ref equals the value ... |
freemsg(9r) -- STREAMS: Frees all message blocks in a message
|
The freemsg interface calls the freeb interface to free all message and data blocks associated with the message pointed to by the message_block_ptr argument. |
fubyte(9r) -- General: Returns a byte from user address space
|
The fubyte routine returns 1 byte from the unprotected user address space to the calling program. |
fuibyte(9r) -- General: Returns a byte from user instruction address space
|
|
fuiword(9r) -- General: Returns a word from user instruction address space
|
|
fuword(9r) -- General: Returns a word from user instruction address space
|
The fuword routine returns one word from the unprotected user address space to the calling program. |
getnewbuf(9r) -- General: Allocates a buf structure
|
The getnewbuf routine allocates a buf structure for performing I/O operations. This routine guarantees that the members of the structure are properly initialized prior to initiating the I/O request. D... |
getq(9r) -- STREAMS: Gets a message from the front of the queue
|
The getq interface is used by a service interface to retrieve its enqueued messages. A module or driver may include a service interface to process enqueued messages. Once the STREAMS scheduler calls t... |
get_info(9r) -- General: Returns system-specific information
|
The get_info routine returns system-specific data assigned to the hardware platform that the driver operates on. For example, a device driver might request system-specific information for the followin... |
get_random_bytes(9r) -- General: Returns the requested number of random bytes and stores them in a buffer.
|
The get_random_bytes() routine returns the requested number of random bytes and stores them in a buffer. This routine is for kernel modules that cannot be in a wait state. |
get_random_bytes_wait(9r) -- General: Returns the requested number of random bytes and places them in a buffer.
|
The get_random_bytes_wait() routine returns the requested number of random bytes and places them in a buffer. This routine is for kernel modules that can be in a wait state. |
gsignal(9r) -- General: Sends a signal to a process group
|
The gsignal routine sends a signal to a process group, invoking psignal for each process that is a member of the specified process group. |
htonl(9r) -- General: Convert word and longword values
|
The htonl routine converts the specified longword value from host-to-network byte order. The htons routine converts the specified word value from host-to-network byte order. The TCP/IP protocols speci... |
htons(9r) -- General: Convert word and longword values
|
The htonl routine converts the specified longword value from host-to-network byte order. The htons routine converts the specified word value from host-to-network byte order. The TCP/IP protocols speci... |
hz(9v) -- Global Variable: Stores the number of clock ticks per second
|
The hz global variable is set to the number of clock ticks per second. The value is useful for timing purposes. For example, if a kernel module wants to schedule a routine to be run in 2 seconds, you ... |
insq(9r) -- STREAMS: Inserts a STREAMS message into a queue
|
The insq interface inserts a STREAMS message into a queue. The message to be inserted (the message_to_be_inserted argument) is placed in the queue (the message_queue argument) immediately before the m... |
insque(9r) -- General: Add or remove an element from the queue
|
The insque routine adds the element that the elem argument specifies to the queue. The routine inserts elem in the next position after pred in the queue. The remque routine removes the element that th... |
intro(9) -- Introduction to kernel module routines, data structures, and global variables
|
Section 9 describes the routines, data structures, and global variables used to develop kernel modules. The descriptions are presented in alphabetical order. Each reference page carries one of the fol... |
IS_KSEG_VA(9r) -- General: Determine if
|
The IS_KSEG_VA routine determines if the specified address is located in the kernel-unmapped address space. The IS_SEG0_VA routine determines if the specified address is located in the user-mapped add... |
IS_SEG0_VA(9r) -- General: Determine if
|
The IS_KSEG_VA routine determines if the specified address is located in the kernel-unmapped address space. The IS_SEG0_VA routine determines if the specified address is located in the user-mapped add... |
IS_SEG1_VA(9r) -- General: Determine if
|
The IS_KSEG_VA routine determines if the specified address is located in the kernel-unmapped address space. The IS_SEG0_VA routine determines if the specified address is located in the user-mapped add... |
kernel_isrthread(9r) -- General: Starts a fixed priority kernel thread dedicated to interrupt service
|
The kernel_isrthread routine creates and starts a kernel thread at the specified entry point. This kernel thread handles only interrupt service requests in the specified task and at the specified prio... |
kernel_thread_w_arg(9r) -- General: Starts a kernel thread with a calling argument passed in
|
The kernel_thread_w_arg routine creates and starts a kernel thread in the specified task at the specified entry point with a specified argument. The kernel_thread_w_arg routine passes the specified ar... |
KSEG_TO_PHYS(9r) -- General: Converts a kernel-unmapped virtual address to a physical address
|
The KSEG_TO_PHYS routine converts a kernel-unmapped virtual address to a kernel physical address. Device drivers can use this physical address in DMA operations. Prior to calling KSEG_TO_PHYS, device ... |
lbolt(9v) -- Global Variable: Is a periodic wakeup mechanism
|
You use the lbolt global variable as a periodic wakeup mechanism. Wakeups are done on the lbolt variable once per second. For example, if a kernel module was polling for an event once per second, you ... |
linkb(9r) -- STREAMS: Concatenates two message blocks
|
The linkb interface creates a new message by adding the message specified in the message_to_be_added argument to the tail of the message specified in the message argument. The continuation pointer (th... |
lock(9s) -- General: Contains complex lock-specific information
|
The lock data structure is the complex lock structure that contains complex lock-specific information. A kernel module writer using the complex lock method declares a pointer to a lock data structure ... |
lock_done(9r) -- General: Releases a complex lock
|
The lock_done routine releases a lock that was previously asserted by one of the following complex lock routines: lock_read, lock_try_read, lock_try_write, and lock_write. |
lock_init(9r) -- General: Initializes a complex lock
|
The lock_init routine initializes a complex lock. You identify this lock by declaring a pointer to a complex lock structure and passing it as the first argument. The complex lock structure pointer mus... |
lock_read(9r) -- General: Asserts a complex lock with read-only access
|
The lock_read routine asserts a lock with read-only access for the resource associated with the specified lock structure pointer. The lock_read routine allows multiple kernel threads to access the res... |
lock_terminate(9r) -- General: Terminates, using a complex lock
|
The lock_terminate routine determines that the driver is done using the complex lock forever. The complex lock must be free (that is, the driver does not hold the lock) before calling lock_terminate. ... |
lock_try_read(9r) -- General: Tries to assert a complex lock
|
The lock_try_read routine tries to assert a complex lock (without blocking) with read-only access for the resource associated with the specified lock structure pointer. To release a complex lock with ... |
lock_try_write(9r) -- General: Tries to assert a complex lock with write access
|
The lock_try_write routine tries to assert a complex lock (without blocking) with write access for the resource associated with the specified lock structure pointer. To release a complex lock with wri... |
lock_write(9r) -- Asserts a complex lock with write access
|
The lock_write routine asserts a lock with exclusive write access for the resource associated with the specified lock structure pointer. This means that once a write lock is asserted, no other kernel ... |
MALLOC(9r) -- General: Allocates a variable-size section of kernel virtual memory
|
The MALLOC routine (macro) allocates at least size bytes from the kernel memory and returns the address of the allocated memory. A kernel module can allocate the memory in interrupt and process contex... |
mb(9r) -- General: Performs a memory barrier
|
The Alpha architecture does not guarantee read/write ordering. That is, the memory subsystem is free to complete read and write operations in any order that is optimal, without regard for the order in... |
mpsleep(9r) -- General: Blocks the current kernel thread
|
The mpsleep routine blocks (puts to sleep) the current kernel thread until a wakeup is issued on the address you specify in the channel argument. This routine is the symmetric multiprocessor (SMP) sle... |
msgdsize(9r) -- STREAMS: Returns the number of bytes in a message
|
The msgdsize interface counts the number of bytes in a data message. Only bytes included in the data blocks with a message type of M_DATA (ordinary data) is included in the count. |
noenable(9r) -- STREAMS: Prevents a queue from being scheduled
|
The noenable interface prevents the queue associated with the queue argument from being scheduled for service by the insq, putbq, or putq interfaces when enqueuing an ordinary priority message. You ca... |
ntohl(9r) -- General: Convert longword and word values
|
The ntohl routine converts the specified longword value from network-to-host byte order. The ntohs routine converts the specified word value from network-to-host byte order. The TCP/IP protocols speci... |
ntohs(9r) -- General: Convert longword and word values
|
The ntohl routine converts the specified longword value from network-to-host byte order. The ntohs routine converts the specified word value from network-to-host byte order. The TCP/IP protocols speci... |
OTHERQ(9r) -- STREAMS: Gets a pointer to a module's other queue
|
The OTHERQ interface returns a pointer to the other of the two queue structures that make up a STREAMS module or driver. If the queue argument points to the read queue, the OTHERQ interface returns th... |
ovbcopy(9r) -- General: Copies a byte string with a specified limit
|
The ovbcopy routine copies n bytes from string b1 to buffer b2. No check is made for null bytes. The address ranges of b1 and b2 can overlap. |
page_size(9v) -- Global Variable: Is the virtual page size
|
The page_size global variable is the size of a virtual page on a CPU. A device driver can use this global variable to partition I/O transfers so that they never cross a virtual page boundary. You shou... |
panic(9r) -- General: Causes a system crash
|
The panic routine causes a system crash, usually because of fatal errors. It sends to the console terminal and error logger the specified message and, possibly, other system-dependent information (for... |
PHYS_TO_KSEG(9r) -- General: Converts a physical address to a
|
The PHYS_TO_KSEG routine converts a kernel physical address to a kernel-unmapped virtual address. |
pmap_extract(9r) -- General: Extracts a physical page address
|
The pmap_extract routine extracts the physical page address associated with the specified pmap (physical map) and virt_addr (virtual address) arguments. The virtual address includes the offset within ... |
pmap_kernel(9r) -- General: Returns the physical map handle for the kernel
|
The pmap_kernel routine returns the physical map handle for the kernel. |
pmap_set_modify(9r) -- General: Sets the modify bits of the specified physical page
|
The pmap_set_modify routine informs the pmap module that the specified physical page was modified through a backdoor mechanism. |
printf(9r) -- General: Write formatted text to some output device
|
The printf and uprintf routines are scaled-down versions of the corresponding C library routines. The printf routine prints diagnostic information directly on the console terminal and writes ASCII tex... |
privileged(9r) -- General: Checks for proper privileges
|
The privileged routine checks for an appropriate privilege when the security feature is enabled. Use privileged with a privilege number and with the error_code argument set to the constant EPERM to em... |
psignal(9r) -- General: Sends a signal to a process
|
The psignal routine posts a signal to the specified process. The posting of a signal causes that signal to be added to the set of pending signals for the specified process. Depending on the state of t... |
pullupmsg(9r) -- STREAMS: Concatenates bytes in a message
|
The pullupmsg interface tries to combine multiple data blocks into a single block. The interface concatenates and aligns the first len data bytes of the message pointed to by the message_block_ptr arg... |
putbq(9r) -- STREAMS: Places a message at the head of a queue
|
The putbq interface places a message at the beginning of the appropriate section of the message queue. There are always sections for high priority and ordinary messages. If other priority bands are us... |
putctl(9r) -- STREAMS: Puts a control message on a queue
|
The putctl interface tests the type argument to make sure a data type was not specified. It then attempts to allocate a message block. The putctl interface fails if a message block cannot be allocated... |
putctl1(9r) -- Puts a control message with a 1-byte parameter on a queue
|
Like the putctl interface, the putctl1 interface tests the type argument to make sure a data type was not specified. It then attempts to allocate a message block. In addition, the putctl1 interface ca... |
putnext(9r) -- STREAMS: Sends a message to the next module in the stream
|
The putnext interface passes a message to the puthere interface of the next queue in the stream. |
putq(9r) -- STREAMS: Puts a message on a queue
|
The putq interface puts a message on a driver's queue after the module's put interface has finished processing the message. The putq interface places the message after any other messages of the same... |
qenable(9r) -- STREAMS: Enables a queue
|
The qenable interface puts the queue associated with the queue_pointer argument on the linked list of those whose service interfaces are ready to be called by the STREAMS scheduler. |
qreply(9r) -- STREAMS: Sends a message in the reverse direction
|
The qreply interface sends a message on a stream in the opposite direction from the queue specified in the queue_pointer argument. It calls the OTHERQ interface to find the queue's module partner. |
qsize(9r) -- STREAMS: Finds the number of messages on a queue
|
The qsize interface evaluates the queue associated with the queue_pointer argument and returns the number of messages it contains. |
queue_init(9r) -- General: Initializes the specified queue
|
The queue_init routine initializes the specified queue. Kernel modules call this routine prior to calling select_enqueue to initialize the links member of the sel_queue data structure. This member spe... |
RD(9r) -- STREAMS: Gets a pointer to a module's read queue
|
The RD interface accepts a write queue pointer as an argument and returns a pointer to the read queue of the same module. |
register_callback(9r) -- General: Registers a configuration callback routine
|
The register_callback routine registers a kernel module's callback routine. The kernel calls a kernel module's callback routine when execution reaches the point specified in the point and order argu... |
remque(9r) -- General: Add or remove an element from the queue
|
The insque routine adds the element that the elem argument specifies to the queue. The routine inserts elem in the next position after pred in the queue. The remque routine removes the element that th... |
rmalloc(9r) -- General: Allocates size units from the given resource map
|
The rmalloc routine allocates size units from the given resource map. In a map, the addresses are increasing, and the list is terminated by a zero size. The actual units managed by the map are arbitra... |
rmfree(9r) -- General: Frees space previously allocated into the specified resource map
|
The rmfree routine frees the space previously allocated with a call to rmalloc. It frees a space of the size specified by the size argument at the address specified by the addr argument. |
rmget(9r) -- General: Allocates size units from the given resource map
|
The rmget routine allocates the number of units specified in size, starting at the address specified in addr. |
rminit(9r) -- General: Initializes a resource map
|
The rminit routine initializes the specified resource map to have mapsize - 2 segments. The routine also identifies this resource map with the string passed to the name argument. It prints this name i... |
rmvb(9r) -- STREAMS: Removes a message block from a message block
|
The rmvb interface removes a message block (the message_to_be_removed argument) from a message block (the message_block_ptr argument) and returns a pointer to the altered message block. The rmvb inter... |
rmvq(9r) -- STREAMS: Removes a message block from a queue
|
The rmvq interface removes a message block from a queue. You can remove a message block from anywhere on a queue. To prevent modules and drivers from having to deal with the internals of message linki... |
round_page(9r) -- General: Rounds the specified address
|
The round_page routine rounds the specified address (or byte count) to a multiple of the page size. For example, round_page would round a 1-byte count to be equal to the size of one page. This routine... |
select_dequeue(9r) -- General: Removes the last kernel thread waiting for an event
|
The select_dequeue routine removes the last kernel thread waiting for an event to occur on the specified device. This routine is called to terminate a select call. Typically, a kernel module's xxsele... |
select_dequeue_all(9r) -- General: Removes all kernel threads waiting for an event
|
The select_dequeue_all routine is similar in functionality to the select_dequeue routine. The difference is that select_dequeue_all removes all kernel threads (not just the last one) while waiting for... |
select_enqueue(9r) -- General: Adds the current kernel thread
|
The select_enqueue routine adds the current kernel thread to the list of kernel threads waiting for a select event on the specified device. This routine is called when a kernel module's select routin... |
select_wakeup(9r) -- General: Wakes up a kernel thread
|
The select_wakeup routine wakes up a kernel thread that is suspended while waiting for an event on the specified device. A user-level process can use the select system call to cause the process to be ... |
sel_queue(9s) -- General: Defines a queue of select events
|
The sel_queue data structure provides kernel module writers with a generic queue of select events. You must initialize the links member by calling the queue_init routine prior to using the select_enqu... |
simple_lock(9r) -- General: Asserts a simple lock
|
The simple_lock routine asserts a lock with exclusive access for the resource associated with the specified slock structure pointer. This means that no other kernel thread can gain access to the locke... |
simple_lock_init(9r) -- General: Initializes a simple lock structure
|
The simple_lock_init routine initializes the simple lock structure that you previously declared with the decl_simple_lock_data routine. You need to initialize the simple lock structure only once. Afte... |
simple_lock_terminate(9r) -- General: Terminates, using a simple lock
|
The simple_lock_terminate routine determines that the kernel module is done using the simple lock permanently. The kernel module must free the simple lock (that is, the kernel module does not hold the... |
simple_lock_try(9r) -- General: Tries to assert a simple lock
|
The simple_lock_try routine tries to assert a lock with read and write access for the resource associated with the specified simple lock. The main difference between this routine and simple_lock is th... |
simple_unlock(9r) -- General: Releases a simple lock
|
The simple_unlock routine releases a simple lock for the resource associated with the specified simple lock structure pointer. This simple lock was previously asserted by calling the simple_lock or si... |
sleep(9r) -- General: Puts a calling process to sleep
|
The sleep routine puts a calling process to sleep on the address specified by the channel argument. Some common addresses are the lbolt argument, a buf structure, and a proc structure. This address sh... |
slock(9s) -- General: Contains simple lock-specific information
|
The slock data structure is the simple spin lock structure that contains simple lock-specific information. The user of the simple lock method declares a slock data structure by calling the decl_simple... |
spl(9r) -- General: Sets the processor priority to mask different levels of interrupts
|
The operating system supports the naming of spl routines to indicate the associated device types. Named spl routines make it easier to determine which routine you should use to set the priority level ... |
strcmp(9r) -- General: Compares two null-terminated character strings
|
The strcmp routine lexicographically compares string s1 to string s2. The routine does not continue the comparison beyond the first null character it finds. A fatal error occurs if you call strcmp wit... |
strcpy(9r) -- General: Copies a null-terminated character string
|
The strcpy routine copies string s2 to buffer s1. The routine stops copying after it copies a null character. Note that the character size is 1 byte. |
strlen(9r) -- General: Returns the number of characters in a
|
The strlen routine returns the number of characters in s. The count does not include the terminating null character. Note that the character size is 1 byte. |
strlog(9r) -- General: Submits messages for logging
|
The strlog routine submits formatted messages to the log driver. You can retrieve the messages with the getmsg system call. The flags argument specifies the type of message and where it is to be sent.... |
strncmp(9r) -- General: Compares two strings, using a specified number of characters
|
The strncmp routine compares string s1 to string s2, using the number of characters specified in n. |
strncpy(9r) -- General: Copies a null-terminated character string with a specified limit
|
The strncpy routine copies string s2 to buffer s1. The routine stops copying after it copies a null character or n characters, whichever comes first. If the length of s2 as determined by the null char... |
strqget(9r) -- General: Obtains information about a queue
|
The strqget routine gives modules and drivers a way to obtain information about a queue or a particular band of a queue without directly accessing STREAMS data structures. The values that can be retur... |
strqset(9r) -- General: Changes information about a queue
|
The strqset routine gives modules and drivers a way to change information about a queue or a particular band of a queue without directly accessing STREAMS data structures. The values that can be retur... |
subyte(9r) -- General: Writes a byte into user address space
|
The subyte routine copies 1 byte from the protected kernel address space to the unprotected user address space. |
suibyte(9r) -- General: Writes a byte into user instruction address space
|
|
suiword(9r) -- General: Writes a word into user instruction address space
|
|
suser(9r) -- General: Checks whether the current user is the superuser
|
The suser routine checks whether the current user is the superuser. If the test succeeds and ac_flag is not a null pointer, the ASU flag is set in the flag_field structure pointed to by ac_flag. The m... |
suword(9r) -- General: Writes a word into user address space
|
The suword routine copies one word from the protected kernel address space to the unprotected user address space. |
svatophys(9r) -- General: Converts a system virtual address to a physical address
|
The svatophys routine converts a system virtual address to the corresponding physical address. All address and data structure manipulation done within the kernel is performed using system virtual addr... |
swap_lw_bytes(9r) -- General: Perform
|
The swap_lw_bytes interface performs a longword byte swap. The swap_word_bytes interface performs a short word byte swap. The swap_words interface performs a word byte swap. Many computer vendors supp... |
swap_words(9r) -- General: Perform
|
The swap_lw_bytes interface performs a longword byte swap. The swap_word_bytes interface performs a short word byte swap. The swap_words interface performs a word byte swap. Many computer vendors supp... |
swap_word_bytes(9r) -- General: Perform
|
The swap_lw_bytes interface performs a longword byte swap. The swap_word_bytes interface performs a short word byte swap. The swap_words interface performs a word byte swap. Many computer vendors supp... |
task(9s) -- General: Contains task-specific information
|
The task data structure contains task-related information. |
thread(9s) -- General: Contains kernel threads-related information
|
The thread data structure contains kernel threads-related information. Kernel modules typically use the wait_result member (with the current_thread routine) to check for the result of the wait. The va... |
thread_block(9r) -- General: Blocks (puts to sleep) the current kernel thread
|
The thread_block routine blocks (puts to sleep) the current kernel thread and selects the next kernel thread to start (run). The routine schedules the next kernel thread onto this CPU. When a kernel t... |
thread_halt_self(9r) -- General: Handles asynchronous traps for
|
The thread_halt_self routine performs the work associated with a variety of asynchronous traps (ASTs) for a kernel thread that terminates itself. A kernel thread terminates itself (or one kernel threa... |
thread_set_timeout(9r) -- General: Sets a timer for the current kernel thread
|
The thread_set_timeout routine must be called as follows: Lock the resource. Call assert_wait_mesg to assert that the current kernel thread is about to block. Unlock the resource. Call thread_set_time... |
thread_terminate(9r) -- General: Prepares to stop or stops execution of the specified kernel thread
|
The thread_terminate routine prepares to stop or permanently stops execution of the specified kernel thread. You created and started this kernel thread in a previous call to the kernel_isrthread or ke... |
thread_wakeup(9r) -- General: Wakes up all kernel threads waiting for the specified event
|
The thread_wakeup routine wakes up all kernel threads waiting for the event specified in the event argument. This routine is actually a convenience wrapper for the thread_wakeup_prim routine with the ... |
thread_wakeup_one(9r) -- General: Wakes up the first kernel thread waiting on a channel
|
The thread_wakeup_one routine wakes up only the first kernel thread in the hash chain waiting for the event specified in the event argument. This routine is actually a convenience wrapper for the thre... |
timeout(9r) -- General: Initializes a callout queue element
|
The timeout routine initializes a callout queue element to make it easy to execute the specified routine at the time specified in the time argument. You often use callout routines for infrequent polli... |
trunc_page(9r) -- General: Truncates the specified address
|
The trunc_page routine truncates the specified address to be aligned on a page boundary. This routine shields the driver writer from having to know the page size of the system, which could vary in dif... |
uio(9s) -- General: Describes I/O, either single vector or multiple vectors
|
The uio data structure describes, either singler-vector or multiple-vector I/O. Typically, kernel modules do not manipulate the members of this data structure. However, the data structure is presented... |
uiomove(9r) -- General: Moves data between user and system virtual space
|
The uiomove routine moves data between user and system virtual space. Data can be moved in either direction. Accessibility to the logical user buffer is verified before the move is made. Accessibility... |
unbufcall(9r) -- STREAMS: Cancels a pending bufcall request
|
The unbufcall interface cancels a pending bufcall request. The id argument is a nonzero identifier for the request to be canceled. This nonzero identifier is returned to the module from a previous cal... |
unix_master(9r) -- General: Forces execution onto the master CPU
|
The unix_master routine forces execution of the kernel thread onto the master CPU (also called the boot CPU). In other words, unix_master binds the kernel thread to the master CPU. To release the kern... |
unix_release(9r) -- General: Releases binding of the kernel thread
|
The unix_release routine releases a kernel thread from being bound to the master CPU. This binding was enforced in a previous call to the unix_master routine. |
unlinkb(9r) -- STREAMS: Removes a message block from the head of a message
|
The unlinkb interface removes the first message block from the message block pointed to by the message_ptr argument. The interface returns a pointer to the new message block, minus the removed message... |
unregister_callback(9r) -- General: Deregisters a configuration callback routine
|
The unregister_callback routine deregisters a kernel module's configuration callback routine. The kernel module previously registered its routine or routines by calling the register_callback routine.... |
untimeout(9r) -- General: Removes the scheduled routine from the callout queues
|
The untimeout routine removes the scheduled routine from the callout queue. The specified routine was placed on the callout queue in a previous call to the timeout routine. The argument formal paramet... |
uprintf(9r) -- General: Write formatted text to some output device
|
The printf and uprintf routines are scaled-down versions of the corresponding C library routines. The printf routine prints diagnostic information directly on the console terminal and writes ASCII tex... |
vm_map_pageable(9r) -- General: Sets pageability of the specified address range
|
The vm_map_pageable routine ensures that the address range you specified in the start and end arguments is accessible. If the address range is accessible by the specified process, the memory associate... |
vtop(9r) -- General: Converts any virtual address to a physical address
|
The vtop routine converts a specified virtual address to a physical address. |
wakeup(9r) -- General: Wakes up all processes sleeping on a specified address
|
The wakeup routine wakes up all processes sleeping on the address specified by the channel argument. All processes sleeping on this address are awakened and made ready to be scheduled according to the... |
WR(9r) -- STREAMS: Gets a pointer to this module's write queue
|
The WR interface accepts a read queue pointer as an argument and returns a pointer to the write queue of the same module. |
write_const_data(9r) -- Modify kernel text or const data that is replicated across RADs on a NUMA platform
|
The write_const_data() function modifies kernel text or const data that has been replicated in memory accessed by different CPUs. This function also ensures that the modifications are visible to all C... |