Home
        man pages section 5 - Oracle Documentation
         Contents
1.                                                                 Break   Macro Name Initial Value Reset  Explanation   BT date n bottom title  printed at foot of page   BXx   n print word x in a box   CM ift n cut mark between pages   CT   yy chapter title  page number moved to CF  TM only    DAx ifn n force date x at bottom of page  today if no x   DE   y end display  unfilled text  of any kind   DS xy I y begin display with keep  x I  L  C  B  y indent  IDy 8n  5i y indented display with no keep  y indent  LD   y left display with no keep   CD   y centered display with no keep   BD   y block display  center entire block  EF x   n even page footer x  3 part as for   t1   EH x   n even page header x  3 part as for   t1    EN   y end displayed equation produced by eqn   EQxy   y break out equation  x L LC  y equation number   FE   n end footnote to be placed at bottom of page   FP   n numbered footnote paragraph  may be redefined  FSx   n start footnote  x is optional footnote label   HD undef n optional page header below header margin  Ix   n italicize x  if no x  switch to italics   IPxy   yy indented paragraph  with hanging tag x  y indent   IXxy   y index words x y and so on  up to 5 levels    KE   n end keep of any kind    KF   n begin floating keep  text fills remainder of page   KS   y begin keep  unit kept together on a single page   LG   n larger  increase point size by 2   LP   yy left  block  paragraph    MCx   yy multiple columns  x column width   ND x ift n no date
2.                         Name Register Controls Takes Effect Default   cl contents level table of contents   2   De display eject display 0   Df display floating display 5   Ds display spacing display lv   Hb heading break heading 2   Hc heading centering heading 0   Hi heading indent heading 1   Hi heading spacing heading 1   Hu heading unnumbered heading 2   Li list indentation list 6  nroff   5  troff    Ls list spacing list 6   Pi paragraph indent paragraph 5   Pt paragraph type paragraph 1   Si static indent display 5  nroff   3  troff                 When resetting these values  make sure to specify the appropriate units  Setting the  line length to 7  for example  will result in output with one character per line  Setting  Pi to 0 suppresses paragraph indentation    Here is a list of string registers available in  mm  they may be used anywhere in the  text     Standards  Environments  and Macros 255    mm 5     256                                                                                                       Name String   s Function    Q quote   innroff         introff      U unquote   innroff    introff       dash     in nroff      in troff       MO month  month of the year       DY day  current date   Noe automatically numbered footnote  NRI acute accent  before letter   NEC  grave accent  before letter       circumflex  before letter   NES cedilla  before letter       umlaut  before letter   NES tilde  before letter      BU bullet item     DT date  month day  
3.                The conversions are performed according to the following tables  All values in the  tables are given in octal     For the conversion of ISO 8859 1 to ISO 646  all characters not in the following table  are mapped unchanged     Converted to Underscore       137        For the conversion of ISO 8859 1 to ISO 646de  all characters not in the following  tables are mapped unchanged     Standards  Environments  and Macros 135    iconv  8859 1 5     ISO 8859 1 to ISO  646da  DANISH     136       Conversions Performed                            ISO 8859 1 ISO 646de ISO 8859 1 ISO 646de  247 100 337 176  304 133 344 173  326 134 366 174  334 135 374 175  Converted to Underscore      137   100 133 134 135 173 174 175 176  200 201 202 203 204 205 206 207  210 211 212 213 214 215 216 217  220 221 222 223 224 225 226 227  230 231 232 233 234 235 236 237  240 241 242 243 244 245 246  250 251 252 253 254 255 256 257  260 261 262 263 264 265 266 267  270 271 272 273 274 275 276 277  300 301 302 303 305 306 307  310 311 312 313 314 315 316 317  320 321 322 323 324 325 327  330 331 332 333 335 336 337  340 341 342 343 345 346 347  350  351  352   353  354  355  356  357  360 361 362 363 364 365 367  370 371 372 373 375 376 377       For the conversion of ISO 8859 1 to ISO 646da  all characters not in the following  tables are mapped unchanged        Conversions Performed                         ISO 8859 1 ISO 646da ISO 8859 1 ISO 646da  305 135 345 175  306 133 346 173  330 134 
4.           345 375 40             For the conversion of MS 852 to DHN  all characters not in the following table are             mapped unchanged   Conversions Performed  MS 852 DHN MS 852 DHN   200 205 40 244 200  206 212 245 211  207 40 246 247 40  210 214 250 202  211 214 40 251 213  215 207 253 220  216 40 254 270 40  217 201 275 210  220 226 40 276 221  227 206 306 336 40  230 217 340 205  233 234 40 342 40  235 203 343 204  236 237 40 344 215  242 216 345 375 40  252 254                       usr lib iconv   so   usr lib iconv   t     usr lib iconv iconv data    iconv 1   iconv 3C   iconv 5     conversion modules  conversion tables    list of conversions supported by conversion  tables    134 man pages section 5  Standards  Environments  and Macros   Last Revised 18 Apr 1997    NAME    DESCRIPTION    CONVERSIONS    ISO 8859 1 to ISO  646  7 bit ASCII     ISO 8859 1 to ISO  646de  GERMAN        iconv_8859 1 5   iconv_8859 1     code set conversion tables for ISO 8859 1  Latin 1     The following code set conversions are supported        Code Set Conversions Supported                               Code Symbol Target Code Symbol Target Output  ISO 8859 1 8859 ISO 646 646 7 bit ASCII  ISO 8859 1 8859 ISO 646de 646de German  ISO 8859 1 8859 ISO 646da 646da Danish  ISO 8859 1 8859 ISO 646en 646en English ASCII  ISO 8859 1 8859 ISO 646es 646es Spanish  ISO 8859 1 8859 ISO 646fr 646fr French  ISO 8859 1 8859 ISO 646it 646it Italian  ISO 8859 1 8859 ISO 646sv 646sv Swedish       
5.           mapped unchanged   Conversions Performed  MS 1251 KOI8 R MS 1251 KOI8 R   24 4 310 351  200 261 311 352  201 262 312 353  202 40 313 354  203 242 314 355  204 207 40 315 356  210 255 316 357  211 40 317 360  212 271 320 362  213 40 321 363                         Standards  Environments  and Macros 115    iconv_1251 5        Conversions Performed       MS 1251    KOI8 R    MS 1251    KOI8 R          214  215  216  217  220  221 227  230  231  232  233  234  235  236  237  241  242  243  244 247  250  251  252  253 254  255  256  257  260 261  262  263       272  274  273  277  241  40  255  40  251  40  252  254  253  257  276  256  270  40  263  40  264  40  55  40  267  40  266  246       322  323  324  325  326  327  330  331  332  333  334  335  336  337  340  341  342  343  344  345  346  347  350  351  352  353  354  355       364  365  346  350  343  376  373  375  377  371  370  374  340  361  301  302  327  307  304  305  326  332  311  312  313  314  315  316          116 manpages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    MS 1251 to PC  Cyrillic       iconv_1251 5        Conversions Performed                      MS 1251 KOI8 R MS 1251 KOI8 R  264 267 40 356 317  270 243 357 320  271 260 360 322  272 244 361 323  273 40 362 324  274 250 363 325  275 265 364 306  276 245 365 310  277 247 366 303  300 34 367 336  301 342 370 333  302 367 371 335  303 347 372 337  304 344 373 331  305 345 374 330  306 366 375 334  307 372 3
6.         An argument  when surrounded by  brackets is optional     l Arguments separated by a vertical bar  are exclusive  You can supply only one  item from such a list     Arguments followed by an ellipsis can be  repeated  When an ellipsis follows a  bracketed set  the expression within the  brackets can be repeated     Functions   If required  the data declaration  or  include  directive  is shown first  followed by the function  declaration  Otherwise  the function declaration is  shown      SH DESCRIPTION A narrative overview of the command or function s  external behavior  This includes how it interacts with  files or data  and how it handles the standard input   standard output and standard error  Internals and  implementation details are normally omitted  This  section attempts to provide a succinct overview in  answer to the question   what does it do         240 manpages section 5  Standards  Environments  and Macros   Last Revised 30 Jan 1995    FILES    SEE ALSO    man 5     Literal text from the synopsis appears in constant  width  as do literal filenames and references to items  that appear elsewhere in the reference manuals   Arguments are italicized     If a command interprets either subcommands or an  input grammar  its command interface or input  grammar is normally described in a USAGE section   which follows the OPTIONS section  The  DESCRIPTION section only describes the behavior of  the command itself  not that of subcommands     The list of options alon
7.         LC CTYPE  This category specifies character classification  character conversion  and widths  of multibyte characters  When LC  CTYPE is set to a valid value  the calling  utility can display and handle text and file names containing valid characters for  that locale  Extended Unix Code  EUC  characters where any individual  character can be 1  2  or 3 bytes wide  and EUC characters of 1  2  or 3 column  widths  The default  C  locale corresponds to the 7 bit ASCII character set  only  characters from ISO 8859 1 are valid  The information corresponding to this  category is stored in a database created by the 1ocaledef    command  This  environment variable is used by ctype 3C   mblen 3C   and many commands   such as cat 1   ed 1   1s 1   and vi 1      LC MESSAGES  This category specifies the language of the message database being used  For  example  an application may have one message database with French messages   and another database with German messages  Message databases are created by  the mkmsgs 1  command  This environment variable is used by exstr 1    gettxt 1   srchtxt 1   gettxt 3C   and gettext 3C      LC MONETARY  This category specifies the monetary symbols and delimiters used for a  particular locale  The information corresponding to this category is stored in a  database created by the 1ocaledef 1  command  This environment variable is  used by 1ocaleconv 3C      LC NUMERIC  This category specifies the decimal and thousands delimiters  The information
8.        Standards  Environments  and Macros 251    mm 5     252                                                                            Break    Macro Name Initial Value Reset  Explanation    AS m  n  n 0 y begin abstract    AU   y author s name    AV X   y signature and date line of verifier x   JB   n embolden x  if no x  switch to  boldface    BE   y end block text    BIxy x  n embolden x and underline y    BL i y bullet list    BRXY   n embolden x and use Roman font for  y    BS   n start block text     CN   y same as  DE  nroff     CS   y cover sheet    CW   n same as  DS I  nroff     DE   y end display    DF pI fll rp  p Ljf N y start floating display  position  p  L C CB  L left  I indent   C center  CB center block fill  f  N  Y   right position rp  fill only     DL i  s    y start dash list    DS pI fll rp  p L f N y begin static display  see   DF for  argument descriptions     ECx n  n 1 y equation title  equation x  number n    EF x   n even footer appears at the bottom of  even numbered pages  x  l  c  r   I left  c center  r right     EH x   n even header appears at the top of  even numbered pages  x  l  c  r   I left  c center  r right    EN   y end displayed equation produced  by ean    EQ   y break out equation produced by  eqn    EXx n  n 1 y exhibit title  exhibit x          man pages section 5  Standards  Environments  and Macros    Last Revised 1 Jan 1997    mm 5                                                                                      Break  
9.        argument purpose  LFS CFLAGS obtain compilation flags necessary to enable the large file  compilation environment   FS LDFLAGS obtain link editor options   FS LIBS obtain link library names   FS LINTFLAGS obtain lint options                         m Set the compile time flag FILE OFFSET BITS to 64 before including any  headers  Applications may combine objects produced in the large file compilation  environment with objects produced in the transitional compilation environment   but must be careful with respect to interoperability between those objects   Applications should not declare global variables of types whose sizes change  between compilation environments     Access to   The fseek    and fte11    functions do not map to functions named   seek64    and  Additional Large     te1164     rather  the large file additions   seeko    and ftello     have  File Interfaces   functionality identical to fseek    and   te11   and do map to the 64 bit functions  fseeko64    and fte11064     Applications wishing to access large files should use  fseeko   and ftello   in place of fseek    and fte11     See the   seek 3C  and    te11 3C  manual pages for information about fseeko   and ftello          Standards  Environments  and Macros 203    Ifcompile 5     204    EXAMPLES    SEE ALSO    NOTES       Applications wishing to access   seeko    and ftello   as well as the POSIX and  X Open specification conforming interfaces should define the macro    LARGEFILE SOURCE to be 1 and 
10.        profil 2   monitor 3C     man pages section 5  Standards  Environments  and Macros    Last Revised 3 Jul 1990    NAME    DESCRIPTION    Authorizations    Creating  Authorization  Checks       rbac 5     rbac   role based access control    The addition of role based access control  RBAC  to the Solaris operating environment  gives developers the opportunity to deliver fine grained security in new and modified  applications  RBAC is an alternative to the all or nothing security model of traditional  superuser based systems  With RBAC  an administrator can assign privileged  functions to specific user accounts  or special accounts called roles      There are two ways to give applications privileges     1  Administrators can assign special attributes such as setUID to application binaries   executable files      2  Administrators can assign special attributes such as setUID to applications using  execution profiles     Special attribute assignment along with the theory behind RBAC is discussed in detail  in  Role Based Access Control  chapter of the System Administration Guide  Security  Services  This chapter describes what authorizations are and how to code for them     An authorization is a unique string that represents a user s right to perform some  operation or class of operations  Authorization definitions are stored in a database  called auth attr 4  For programming authorization checks  only the authorization  name is significant     Some typical values in an auth
11.       Architecture defines processor or specific hardware   See  p option of uname 1    In  some cases  it may indicate required adapters or peripherals     This refers to the software package which contains the command or component being  described on the man page  To be able to use the command  the indicated package  must have been installed  For information on how to add a package see pkgadd 1M      OS utilities and libraries which are free of dependencies on the properties of any code  sets are said to have Code Set Independence  CSI   They have the attribute of being  CSI enabled  This is in contrast to many commands and utilities in Solaris  for  example  that work only with Extended Unix Codesets  EUC   an encoding method  that allows concurrent support for up to four code sets and is commonly used to  represent Asian character sets     However  for practical reasons  this independence is not absolute  Certain assumptions  are still applied to the current CSI implementation     m File code is a superset of ASCII       To support multi byte characters and null terminated UNIX file names  the NULL  and    slash  characters cannot be part of any multi byte characters       Only  stateless  file code encodings are supported  Stateless encoding avoids shift   locking shift  designation  invocation  and so forth  although single shift is not  excluded     m Process code  wchar_t values  is implementation dependent and can change over  time or between implementations or betwe
12.       int openat          ftw h      int ftw         const struct stat       ey  int nftw       const struct stat       ey     lt libgen h gt     char  copylist      off t      lt stdio h gt     int fgetpos       1f64 5   int aio write64 struct aiocb64      int lio listioe4        const struct aiocbe64            struct dirent64  readdire64       struct dirent64  readdir64 r       int att ropen64     int creat64     int open64       int openat64       int ftw64         const struct stat64       e    int nftw64         const struct stat64       e       char  copylist64         off64 t     int fgetpos64       Standards  Environments  and Macros 199    1f64 5     200       FILE    open      FILE    reopen     int fseeko       OEE trmo     int fsetpos       const fpos t      off t ftello       FILE  tmpfile        lt stdlib h gt     int mkstemp          sys async h      intaioread    off t   D  intaiowrite      off t     2      lt ucbinclude sys dir h gt     int alphasort    struct direct       struct direct       struct direct  readdir    int scandir        struct direct              e      lt sys dirent h gt     FILE  fopen64     FILE  freopen64     int fseeko64       off64 t         int fsetpos64       const fpos64 t      off64 t ftelloe4       FILE  tmpfilee4       int mkstemp64        int aioread64     off64 t   e    int aiowrite  4         of   64 t          int alphasort64    struct direct 64       struct direct64        struct direct64  readdir  4     int scandir64       
13.       pam  krb5 5     pam  krb5   authentication  account  session  and password management PAM  modules for Kerberos V5     usr lib security pam krb5 so 1    The Kerberos V5 service module for PAM   usr lib security pam krb5 so 1   provides functionality for all four PAM modules  authentication  account  management  session management  and password management  The   pam krb5 so 1 module is a shared object that can be dynamically loaded to provide  the necessary functionality upon demand  Its path is specified in the PAM  configuration file     The Kerberos V5 authentication component provides functions to verify the identity of  a user  pam sm authenticate     and to refresh the Kerberos credentials cache    pam sm setcred   pam sm authenticate    authenticates a user principal  though the Kerberos authentication service  If the authentication request is successful   the authentication service sends a ticket granting ticket  tgt  back to the   pam krb5 so 1 module  which then verifies that the TGT came from a valid KDC by  attempting to get a service ticket for the local host service  For this to succeed  the local  host s keytab file   etc krb5 krb5 keytab  must contain the entry for the local  host service  for example  host  hostname com REALM where hostname com is the fully  qualified local hostname and REALM is the default realm of the local host as defined  in  etc krb5 krb5 conf   Once the TGT is verified  it is stored in the credentials  cache for later use by Kerber
14.      An ERE can be limited to matching strings that begin or end a line  this is called  anchoring  The circumflex and dollar sign special characters are considered ERE  anchors when used anywhere outside a bracket expression  This has the following  effects     1     A circumflex     outside a bracket expression anchors the expression or  subexpression it begins to the beginning of a string  such an expression or  subexpression can match only a sequence starting at the first character of a string   For example  the EREs  ab and   ab  match ab in the string abcdef  but fail to  match in the string cdefab  and the ERE a b is valid  but can never match because  the a prevents the expression  b from matching starting at the first character     A dollar sign       outside a bracket expression anchors the expression or  subexpression it ends to the end of a string  such an expression or subexpression  can match only a sequence ending at the last character of a string  For example  the  EREs ef  and  ef   match ef in the string abcdef  but fail to match in the string  cdefab  and the ERE e f is valid  but can never match because the f prevents the  expression e  from matching ending at the last character     localedef l   regcomp 3C   attributes 5   environ 5   locale 5   regexp 5     man pages section 5  Standards  Environments  and Macros    Last Revised 12 Jul 1999       NAME    SYNOPSIS    DESCRIPTION    Basic Regular  Expressions       regexp 5   regexp  compile  step  advance
15.      The Solaris DHCP service bundles three modules with the service  which are  described below  There are three dhcpsvc   con   4  DHCP service configuration  parameters pertaining to public modules  RESOURCE  PATH  and RESOURCE CONFIG   See dhcpsvc   con   4  for more information about these parameters     This module stores its data in ASCII files  Although the format is ASCII  hand editing  is discouraged  It is useful for DHCP service environments that support several  hundred to a couple thousand of clients and lease times are a few hours or more     This module s data may be shared between DHCP servers through the use of NFS     This module stores its data in binary files  It is useful for DHCP service environments  with many networks and many thousands of clients  This module provides an order of  magnitude increase in performance and capacity over SUNWfiles     This module s data cannot be shared between DHCP servers     This module stores its data within a NIS  domain  It is useful in environments where  NIS  is already deployed and facilitates sharing among multiple DHCP servers  This  module suports several hundred to a few thousand clients with lease times of several  hours or more     The NIS  service should be hosted on a machine with ample CPU power  memory   and disk space  as the load on NIS  is significant when it is used to store DHCP data   Periodic checkpointing of the NIS  service is necessary in order to roll the transaction  logs and keep the NIS  se
16.     The following code set conversions are supported        Code Set Conversions Supported                            Code Symbol Target Code Symbol Target Output  ISO 646  646 ISO 8859 1 8859 US ASCII  ISO 646de ISO 8859 1 8859 German  646de  ISO 646da ISO 8859 1 8859 Danish  646da  ISO 646en ISO 8859 1 8859 English ASCII  646en  ISO 646es   646es ISO 8859 1 8859 Spanish  ISO 646fr   646fr ISO 8859 1 8859 French  ISO 646it   646it ISO 8859 1 8859 Italian  ISO 646sv ISO 8859 1 8859 Swedish  646sv                         The conversions are performed according to the following tables  All values in the  tables are given in octal     For the conversion of ISO 646 to ISO 8859 1  all characters in ISO 646 can be mapped  unchanged to ISO 8859 1    For the conversion of ISO 646de to ISO 8859 1  all characters not in the following table  are mapped unchanged        Conversions Performed          ISO 646de ISO 8859 1 ISO 646de ISO 8859 1  100 247 173 344  133 304 174 366  134 326 175 374  135 334 176 337                   For the conversion of ISO 646da to ISO 8859 1  all characters not in the following table  are mapped unchanged     126 manpages section 5  Standards  Environments  and Macros    Last Revised 28 Apr 1997    ISO 646en   ENGLISH ASCID  to ISO 8859 1    ISO 646es   SPANISH  to ISO  8859 1    ISO 646fr   FRENCH  to ISO  8859 1       iconv_646 5        Conversions Performed                   ISO 646da ISO 8859 1 ISO 646da ISO 8859 1  133 306 173 346  134 330 174 370  135 
17.     man pages section 5  Standards  Environments  and Macros    Last Revised 25 Feb 1992       Request       c T    sie  a2     EN     EQxy       Initial    Value    Cause  Break  yes  yes  yes  yes  yes  yes    no    yes    yes  yes    yes    yes    yes    me 5     Explanation    End delayed text    End footnote    End list    End major quote    End index item    End floating keep    Define paper section    m defines the part of the paper     and can be C  chapter   A  appendix   P  preliminary   for instance     abstract  table of contents  etc      B  bibliography   RC  chapters  renumbered from page one each  chapter   or RA  appendix renumbered  from page one     Begin chapter  or appendix  etc     as set by       T is   the chapter title    One column format on a new page   Two column format    Space after equation produced by eqn  or neqn    Precede equation  break out and   add space  Equation number is y    The optional argument x may be I   to indent equation  default     L to left adjust the equation  or   C to center the equation     End gremlin picture     Standards  Environments  and Macros 247    me 5     Request     GS        TS x     acAN     ba  n     bu  DXX    LA     ef XYZ   eh x yz   fo x yz     hx     he  x yz     hl       Initial    Value    no    no    no    no    HII    HII    HII    HI    Cause  Break  yes  yes  yes  yes  yes    yes    no    no    yes    yes    no    yes  no  no  no  no    no    no    yes    Explanation    Begin gremlin picture    E
18.     pam unix account 5  pam unix auth 5  and pam unix session 5      Standards  Environments  and Macros 299    prof 5     300    NAME  SYNOPSIS    DESCRIPTION    EXAMPLES    SEE ALSO       prof   profile within a function     define MARK   include  lt prof h gt     void MARK  name       MARK introduces a mark called name that is treated the same as a function entry point   Execution of the mark adds to a counter for that mark  and program counter time  spent is accounted to the immediately preceding mark or to the function if there are no  preceding marks within the active function     name may be any combination of letters  numbers  or underscores  Each name in a  single compilation must be unique  but may be the same as any ordinary program    symbol     For marks to be effective  the symbol MARK must be defined before the header prof  h  is included  either by a preprocessor directive as in the synopsis  or by a command line  argument     cc  p  DMARK work c    If MARK is not defined  the MARK  rame  statements may be left in the source files  containing them and are ignored  prof  g must be used to get information on all  labels     In this example  marks can be used to determine how much time is spent in each loop   Unless this example is compiled with MARK defined on the command line  the marks  are ignored      include  lt prof h gt   work             int i  j     MARK  100p1    for  i   0  i  lt  2000  i            MARK  loop2     for  j   0  j  lt  2000  j          
19.    Directories containing Java programs and libraries      usr kernel  Subtree of platform amp hyphen dependent loadable kernel modules  not needed in the  root filesystem  An approved installation location for bundled Solaris software      usr kvm  A mount point  retained for backward compatibility  that formerly contained  platform specific binaries and libraries     Standards  Environments  and Macros 55    filesystem 5         usr lib  Platform amp hyphen dependent libraries  various databases  commands and daemons  not invoked directly by a human user  An approved installation location for  bundled Solaris software  The analogous location for add on system software or for  applications is  opt  packagename   lib      usr lib 64  Symbolic link to the most portable 64 bit Solaris interfaces      usr lib acct  Accounting scripts and binaries  See acct 1M       usr lib class  Scheduling amp hyphen class specific directories containing executables for  priocnt1 1  and dispadmin 1M       usr lib dict  Database files for spe11 1       usr lib font  troff 1 font description files      usr lib fs  File system type dependent modules  generally not intended to be invoked directly  by the user      usr lib iae4  x86 64   bit  plattorm amp hyphen dependent libraries  various databases  commands  and daemons not invoked directly by a human user  Note that ia64 is an example  name  the actual name might be different  An approved installation location for  bundled Solaris software  The 
20.    Standards  Environments  and Macros 295    pam unix account 5   NAME  SYNOPSIS    DESCRIPTION    ERRORS    ATTRIBUTES    SEE ALSO    NOTES       pam unix account   PAM account management module for UNIX    pam unix account so 1    pam unix account provides functionality to the PAM account management stack   The function pam 3PAM  function retrieves password aging information from the  repositories specified in nsswitch conf 4  and verifies that the user s account and  password have not expired     The following options can be passed to the module   debug syslog 3C  debugging information at the LOG  DEBUG level  nowarn Turn off warning messages    server policy Ifthe account authority for the user  as specified by PAM  USER  is  a server  do not apply the Unix policy from the passwd entry in  the name service switch     The following values are returned     PAM AUTHTOK EXPIRED Password expired and no longer usable  PAM BUF ERR Memory buffer error  PAM IGNORE Ignore module  not participating in result    PAM NEW AUTHTOK REQD Obtain new authentication token from the user    PAM SERVICE ERR Error in underlying service module       PAM SUCCESS Successfully obtains authentication token    See attributes 5 for descriptions of the following attributes        ATTRIBUTE TYPE ATTRIBUTE VALUE       Interface Stability Evolving             MT Level MT Safe with exceptions          pam 3PAM   pam authenticate 3PAM   syslog 3C   1ibpam 3LIB   pam  conf   4    nsswitch conf 4  attributes 
21.    The implementation may treat a dollar sign as an anchor when used as the last  character of a subexpression  The dollar sign will anchor the expression to the end  of the string being matched  the dollar sign can be said to match the end of string  following the last character     3  A BRE anchored by both   and   matches only an entire string  For example  the  BRE  abcde    matches strings consisting only of abcdef     4   and   are not special in subexpressions   Note  The Solaris implementation does not support anchoring in BRE subexpressions     The rules specififed for BREs apply to Extended Regular Expressions  EREs  with the  following exceptions     m The characters       and   have special meaning  as defined below     mw The   and   characters  when used as the duplication operator  are not preceded by  backslashes  The constructs V   and    simply match the characters   and     respectively     m The back reference operator is not supported     m Anchoring      is supported in subexpressions     An ERE ordinary character  a special character preceded by a backslash  or a period  matches a single character  A bracket expression matches a single character or a single  collating element  An ERE matching a single character enclosed in parentheses matches  the same as the ERE without parentheses would have matched     An ordinary character is an ERE that matches itself  An ordinary character is any  character in the supported character set  except for the ERE specia
22.    _t f blocks   tf bfree   _t f_bavial   t f files   _t f_ffree     tf favail     Standards  Environments  and Macros 197    1f64 5     System Interfaces    198    ino_t   blkent_t   fsblkent t     fsfilcnt t       unistd h       lt sys unistd h gt      lt aio h gt     int aio_cancel        struct aiocb       intaio error    const struct aiocb       int aio_fsync        struct aiocb       intaio read struct aiocb      intaio return struct aiocb      intaio suspend     const struct aiocb               ino64 t   blkent64 t   fsblkent64 t     fsfilcnto4 t      LFS64 LARGEFILE        LFS64 STDIO    CS LFS64 CFLAGS    CS LFS64 LDFLAGS       CS LFS64 LIBS                CS LFS64 LINTFLAGS    The following tables display the standard API and the corresponding transitional  interfaces for 64 bit file offsets  The interfaces are grouped by header  The interface  name and the affected data types are displayed in courier font      intaio cancele4       struct aiocbe4       intaio errore4    const struct aiocb64       intaio fsynce4       struct aiocbe4       intaio reade4 struct aiocb64      intaio returne4 struct aiocbe64      intaio suspende4     const struct aiocb64            man pages section 5  Standards  Environments  and Macros    Last Revised 1 Aug 2001       intaio write struct aiocb      int lio listio         const struct aiocb             lt dirent h gt     struct dirent  readdir       struct dirent  readdir r         fcntl h      int att ropen     int creat     int open  
23.    day       hour       min      EXAMPLE 2 To show pi written to 5 decimal places      pi       5   n    lt value of pi      EXAMPLE 3 To show an input file format consisting of five colon separated fields     oo  oo    S 59 99 99 9 sWVn      arg1      lt arg2 gt    lt arg3 gt     arg4       arg      awk 1   printf l   printf 3C   scan   3C     Standards  Environments  and Macros 95    fsattr 5   NAME   fsattr     extended file attributes    DESCRIPTION   Attributes are logically supported as files within the file system  The file system is  therefore augmented with an orthogonal name space of file attributes  Any file   including attribute files  can have an arbitrarily deep attribute tree associated with it   Attribute values are accessed by file descriptors obtained through a special attribute  interface  This logical view of  attributes as files  allows the leveraging of existing file  system interface functionality to support the construction  deletion  and manipulation  of attributes      on      The special files     and       retain their accustomed semantics within the attribute  hierarchy  The     attribute file refers to the current directory and the       attribute file  refers to the parent directory  The unnamed directory at the head of each attribute tree  is considered the  child  of the file it is associated with and the       file refers to the  associated file  For any non directory file with attributes  the       entry in the unnamed  directory refers to a
24.    iconv  646  126       iconv  852  129    345    code set conversion tables  Continued       iconv 8859 1  135      iconv  8859 2  141      iconv  8859 5  147      iconv  dhn  155      iconv  koi8 r  159      iconv  mac cyr  167     iconv_maz  175      iconv  pc cyr  179   compilation environment  transitional      Ifcompile64  206   crypt unix     traditional UNIX crypt  algorithm  32   CSI     attributes of interfaces  18    D  data storage modules for the DHCP service      dhcp modules  35  dhcp     Dynamic Host Configuration  Protocol  33  dhcp  modules     data storage modules for the  DHCP service  35  document production  man     macros to format manual pages  238  mansun     macros to format manual  pages  242  me     macros to format technical  papers  246  mm     macros to format articles  theses and  books  251  ms     macros to format articles  theses and  books  258  Dynamic Host Configuration Protocol      dhcp  33    E  environ     user environment  37  environment variables   HOME  37   LANG  37   LC COLLATE  37   LC CTYPE  37   LC MESSAGES  37   LC MONETARY  37    environment variables  Continued   LC NUMERIC  37  LC TIME  37  MSGVERB  37  NETPATH  37  PATH  37  SEV_LEVEL  37  TERM  37  TZ  37  eqnchar     special character definitions for  eqn  42  extended file attributes     fsattr  96  extensions     localedef extensions description  file  43    F    file format notation     formats  formats  91  file name pattern matching     fnmatch  63  filesystem   
25.    pam  projects     account management PAM module for projects     usr lib security pam projects so 1    The projects service module for PAM   usr lib security pam projects so 1   provides functionality for the account management PAM module  The   pam projects so 1 module is a shared object that can be dynamically loaded to  provide the necessary functionality upon demand  Its path is specified in the PAM  configuration file     pam projects so 1is designed to be stacked on top of the   pam unix account so 1 module for all services  This module is normally  configured as  required   implying that any user lacking a default project will be  denied login     The project account management component provides a function to perform account  management  pam sm acct mgmt     This function uses the getdefaultproj     function  see getprojent 3PROJECT   to retrieve the user s default project entry  from the proj ect 4  database  It then sets the project ID attribute of the calling  process  using the settaskid 2  system call     If the user does not belong to any project defined in the proj ect  4  database  or if the  settaskid   system call failed to set the project ID attribute of the calling process   the module will display an error message and will return error code   PAM PERM DENIED     See attributes 5  for description of the following attributes     ATTRIBUTE TYPE ATTRIBUTE VALUE  MT Level MT Safe with exceptions    settaskid 2  getprojent 3PROJECT   Libpam 3LIB   pam 3PAM  
26.    simple regular expression compile and match    routines     define INIT declarations   define GETC  void  getc code   define PEEKC  void  peekc code   define UNGETC void  ungetc code   define RETURN  ptr  return code   define ERROR  val  error code    extern char  locl   loc2   locs      include  lt regexp h gt     char  compile  char  instring  char  expbuf  const char  endfug  int  eof     int step const char  string  const char  expbuf      int advance const char  string  const char  expbuf       Regular Expressions  REs  provide a mechanism to select specific strings from a set of  character strings  The Simple Regular Expressions described below differ from the  Internationalized Regular Expressions described on the regex 5  manual page in the  following ways     m only Basic Regular Expressions are supported  m the Internationalization features   character class  equivalence class  and  multi character collation   are not supported     The functions step     advance     and compile    are general purpose regular  expression matching routines to be used in programs that perform regular expression  matching  These functions are defined by the  lt regexp   h gt  header     The functions step    and advance    do pattern matching given a character string  and a compiled regular expression as input     The function compile    takes as input a regular expression as defined below and  produces a compiled expression that can be used with step    or advance       A regular ex
27.    steamer flies     would match    tramp        steamer         trampflies     or  steamerflies   Contrary to some forms of regular expressions   vgrindef alternation binds very tightly  Grouping parentheses are likely to be  necessary in expressions involving alternation     The keyword list is just a list of keywords in the language separated by spaces  If the   oc  boolean is specified  indicating that upper and lower case are equivalent  then all  the keywords should be specified in lower case     EXAMPLE 1 A sample program     The following entry  which describes the C language  is typical of a language entry     C e the C programming language V   pb   d    d  p d    a     Nd       bb   be   cb    ce    sb   se  e      le  e    tl      kw asm auto break case char continue default do double else enum   extern float for fortran goto if int long register return short   sizeof static struct switch typedef union unsigned void while  define    else  endif  if  ifdef  ifndef  include  undef   define endif    ifdef ifndef include undef defined     Note that the first field is just the language name  and any variants of it   Thus the C  language could be specified to vgrind 1  as    c or    C        Standards  Environments  and Macros 339    vgrindefs 5   FILES    usr lib vgrindefs file containing vgrind descriptions    SEE ALSO   ex 1   1ex 1   troff   1   vgrind 1        340 man pages section 5  Standards  Environments  and Macros   Last Revised 10 Aug 1994    NAME    DESCRIPT
28.    the reference would look like this     wiz com  wiz nisplus server 133 33 33 33    For NIS  the reference information is of the form      lt domainname gt    server name gt     For example  if the machine woz  nis server serves the NIS domain Woz   COM  the  reference would look like this     Woz COM woz nis server    Standards  Environments  and Macros 69    fns dns 5     After obtaining this information  you then edit the DNS table  see in named 1M    and add a TXT record with this reference information  The TXT record must be  associated with a DNS domain that includes an NIS record  For example  the reference  information shown in the examples above would be entered as follows     For NIS      TXT  XFNNISPLUS wiz com  wiz nisplus server 133 33 33 33     For NIS     TXT  XFNNIS woz com woz nis server     Note the mandatory double quotes           delimiting the contents of the TXT record   After making any changes to the DNS table  you must notify the server by either  restarting it or sending it a signal to reread the table      kill  HUP    cat  etc named pid      This update effectively adds the next naming system reference to DNS  You can look  up this reference using fnlookup 1  to see if the information has been added  properly  For example  the following command looks up the next naming system  reference of the DNS domain Wiz   COM        nlookup  v     Wiz COM     Note the mandatory trailing slash               After this administrative step has been taken  clie
29.   200 307 236 234  201 374 237 40  202 351 240 217  203 342 241 257  204 344 242 363  205 40 243 323  206 271 244 361  207 347 245 321  210 40 246 237  211 353 247 277  212 213 40 250 251 40  214 356 252 254  215 346 253 255 40  216 304 256 253                   176   man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    Mazovia to MS 852       iconv maz 5                       Mazovia MS 1250 Mazovia MS 1250   217 245 257 273  220 312 260 340 40  221 352 341 337  222 263 342 345 40  223 364 346 265  224 366 347 360 40  225 306 361 261  226 227 40 362 365 0  230 214 366 367  231 326 367 40  232 334 370 260  233 40 371 40  234 243 372 267  235 40 373 376 40  274 212          For the conversion of Mazovia to MS 852  all characters not in the following table are             mapped unchanged   Conversions Performed  Mazovia MS 852 Mazovia MS 852   205 40 234 235  206 245 235 40  210 213 40 236 230  215 206 237 40  217 244 240 215  220 250 241 275  221 251 243 340  222 210 244 344  225 217 245 343                      Standards  Environments  and Macros 177    iconv maz 5     Mazovia to DHN    FILES    SEE ALSO          Conversions Performed                      Mazovia MS 852 Mazovia MS 852  226 227 40 246 253  230 227 247 276  233 40 250 375 40  227 327       For the conversion of Mazovia to DHN  all characters not in the following table are             mapped unchanged   Conversions Performed  Mazovia DHN Mazovia DHN   200 205 40 234 203  206 2
30.   215  216  217  220 231  232  233  234  235  236  237  240  241  242  243  244  245  246  247  250  251  252  253  254  255          40   346  40   227  233  246  215  40   347  40   230  234  247  253  377  363  364  235  317  244  40   365  371  40   270  256  252  360       311  312  313  314  315  316  317  320  321  322  323  324  325  326  327  330  331  332  333  334  335  336  337  340  341  342  343  344       220  250  323  267  326  327  322  321  343  325  340  342  212  231  236  374  336  351  353  232  355  335  341  352  240  203  307  204          man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    MS 1250 to  Mazovia       iconv_1250 5        Conversions Performed                      MS 1250 MS 852 MS 1250 MS 852  256 40 345 222  257 275 346 206  260 370 347 207  261 40 350 237  262 362 351 202  263 210 352 251  264 357 353 211  265 267 40 354 330  270 367 355 241  271 245 356 214  272 255 357 324  273 257 360 320  274 225 361 344  275 361 362 345  276 226 363 242  277 276 364 223  300 350 365 213  301 265 366 224  302 266 367 366  303 306 370 375  304 216 371 205  305 221 372 243  306 217 374 201  307 200 375 354  310 254 376 356          For the conversion of MS 1250 to Mazovia  all characters not in the following table are    mapped unchanged     Standards  Environments  and Macros    109    iconv_1250 5     110                         Conversions Performed  MS 1250 Mazovia MS 1250 Mazovia  200 213 40 310 311 40  214 
31.   306  316  326  336  346  356  366  376    For the conversion of ISO 8859 1 to ISO 646fr  all characters not in the following tables  are mapped unchanged        Conversions Performed                               ISO 8859 1 ISO 646fr ISO 8859 1 ISO 646fr  243 043 347 134  247 135 350 175  250 176 351 173  260 133 371 174  340 100  Converted to Underscore       137     Standards  Environments  and Macros 137    iconv  8859 1 5     043  100 133 134 135 173 174 175 176  200 201 202 203 204 205 206 207  210 211 212 213 214 215 216 217  220 221 222 223 224 225 226 227  230 231 232 233 234 235 236 237  240 241 242 244 245 246  251 252 253 254 255 256 257  261 262 263 264 265 266 267  270 271 272 273 274 275 276 277  300 301 302 303 304 305 306 307  310 311 312 313 314 315 316 317  320 321 322 323 324 325 326 327  320 331  332 333 334 335 336 337  341 342 343 344 345 346  352 353 354 355 356 357  360 361 362 363 364 365 366 367  370 372 373 374 375 376 377       ISO 8859 1 to ISO   For the conversion of ISO 8859 1 to ISO 646it  all characters not in the following tables  646it  ITALIAN    are mapped unchanged                             Conversions Performed  ISO 8859 1 ISO 646it ISO 8859 1 ISO 646it   243 043 350 175   247 100 351 135   260 133 354 176   340 173 362 174   347 134 371 140  Converted to Underscore      137     TI   100 133 134 135 173 174 175 176       200 201 202 203 204 205 206 207  210 211 212 213 214 215 216 217  220 221 222 223 224 225 226 227  230 231 232 233
32.   64 5  manual page  since these names are used by the implementation  to name the alternative entry points     When using Sun WorkShop Compiler  C 5 0  applications conforming to the  specifications listed above should be compiled using the utilities and flags indicated in  the following table     Specification Compiler Flags Feature Test Macros       ANSI ISO C c89 none    Standards  Environments  and Macros 331    standards 5     332    SEE ALSO                                                 Specification Compiler Flags Feature Test Macros  SVID3 cc  Xt none  POSIX 1 1990 c89   POSIX SOURCE  POSIX 1 1990 and c89   POSIX SOURCE and POSIX C SOURCE 2  POSIX 2 1992 C Language  Bindings Option  POSIX 1b 1993 c89   POSIX C SOURCE 199309L  POSIX 1c 1996 c89   POSIX C SOURCE 199506L  CAE XPG3 cc  Xa  XOPEN SOURCE  CAE XPG4 c89  XOPEN SOURCE and XOPEN VERSION 4  SUS  CAE XPG4v2   includes c89    XOPEN SOURCE and  XNS4   XOPEN SOURCE EXTENDED 1  SUSv2  includes XNS5  c89 XOPEN SOURCE 500          For platforms supporting the LP64  64 bit  programming environment where the  SC5 0 Compilers have been installed  SUSv2 conforming LP64 applications using  XNS5 library calls should be built with command lines of the form     c89   getconf XBS5 LP64 OFF64 CFLAGS   D XOPEN SOURCE 500 V    getconf XBS5 LP64 OFF64 LDFLAGS  foo c  o foo      getconf XBS5 LP64 OFF64 LIBS   l1xnet    sysconf 3C   environ 5   1  64 5     man pages section 5  Standards  Environments  and Macros    Last Revised 29
33.   DEBUG level     If PAM USER  see pam set item 3PAM   is specified as type normal in the  user attr 4  database  the module returns PAM IGNORE     If PAM RUSER  see pam set item 3PAM   is not set  the uid of the process loading  the module is used to determine PAM RUSER     The module returns success if the user attr 4  entry for PAM RUSER has an entry in  the roles field for PAM USER  otherwise it returns PAM PERM DENIED     This module is generally stacked above the account management module  pam unix so 1  The error messages indicating that roles cannot be logged into  correctly are only issued if the user has entered the correct password     Here are some sample entries from pam  conf 4  demonstrating the use of the  pam roles so 1 module     dtlogin account requisite  usr lib security  1SA pam roles so 1  dtlogin account required  usr lib security  ISA pam unix so 1       su account requisite  usr lib security  1SA pam roles so 1   su account requisite  usr lib security  1SA pam roles so 1       rlogin account requisite  usr lib security  ISA pam_roles so 1  rlogin account required  usr lib security  1SA pam unix so 1         The dtlogin program invokes pam roles so 1 PAM RUSER is the username  corresponding to the uid of the dt login process  which is 0  The user_attr entry  for root user  uid 0  is empty  so all role logins are prevented through dt login  The  same rule applies to Login     The su program invokes pam roles so 1 PAM RUSER is the username of the  userid
34.   Legacy management applications can administer WBEM enabled software in the  Solaris operating environment  Developers can write agents or providers that convert  information from these protocols to WBEM  and they can write adapters that convert  WBEM information into these protocols     See attributes 5  for descriptions of the following attributes              ATTRIBUTE TYPE ATTRIBUTE VALUE  Availability SPARC and x86  Architecture SUNWwbapi  SUNWwbcor  SUNWwbcou     SUNWwbdev  SUNWwbdoc  SUNWwbpro       CSI Enabled                appletviewer 1   cimworkshop 1M   init  wbem 1M   mofcomp 1M    mofreg 1M   snmpdx 1M   wbemadmin 1M   woemconfig 1M    wbemlogviewer 1M   attributes 5     Standards  Environments  and Macros 343    wbem 5        344 manpages section 5  Standards  Environments  and Macros    Last Revised 5 Nov 2001    Index    A    account management PAM module for projects      pam projects  285  ANSI     standards and specifications supported  by Solaris  328  architecture     attributes of interfaces  18  ascii     ASCII character set  16  attributes     attributes of interfaces  18  attributes of interfaces     architecture  18  attributes of interfaces     attributes  18  attributes of interfaces     availability  18  attributes of interfaces     CSI  18  attributes of interfaces     MT Level  18  attributes of interfaces     stability  18  attributes     characteristics of commands   utilities  and device drivers  Architecture  18  Availability  18  Interfa
35.   Libpam 3LIB   pam  conf   4    attributes 5  pam authtok check 5  pam authtok get 5     pam authtok store 5   pam dhkeys 5  pam passwd auth 5   pam unix 5    pam unix account 5  pam unix auth 5  pam unix session 5     NOTES   The interfaces in 1ibpam 3LIB  are MT Safe only if each thread within the  multi threaded application uses its own PAM handle     The pam unix 5  module might not be supported in a future release  Similar  functionality is provided by pam authtok check 5  pam authtok get 5    pam authtok store 5   pam dhkeys 5   pam passwd auth 5     pam unix account 5  pam unix auth 5  and pam unix session 5         268 man pages section 5  Standards  Environments  and Macros   Last Revised 21 Jan 2003    NAME  SYNOPSIS    DESCRIPTION    ERRORS    ATTRIBUTES    SEE ALSO    NOTES       pam  authtok store 5   pam  authtok store     password management module    pam authtok store so 1    pam authtok store provides functionality to the PAM password management  stack  It provides one function  pam sm chauthtok       When invoked with flags set to PAM UPDATE AUTHTOK  this module updates the  authentication token for the user specified by PAM USER     The authentication token PAM OLDAUTHTOK can be used to authenticate the user  against repositories that need updating  NIS  LDAP   After successful updates  the  new authentication token stored in PAM AUTHTOK is the user s valid password     This module honors the PAM REPOSITORY item  which  if set  specifies which  repository 
36.   Macro Name Initial Value Reset  Explanation  number n    FD f  r  f 10 r 1 n set footnote style format f  0 11    renumber r  0 1     FE   y end footnote    FGx n  n 1 y figure title  figure x  number n    FS   n start footnote    HI t    y produce numbered heading level  l  1 7   title t    HUt   y produce unnumbered heading  title  t   Ix   n underline x    IBxy   n underline x and embolden y    IRXY   n underline x and use Roman font on  y    LE  s  s 0 y end list  separation s    LI m  p    y start new list item  mark m  prefix p  mark only     MLm i  s  s 0 y start marked list  mark m  indentation i  separation s  0 1     MT x y memo title  title x   ND x n no date in page footer  x is date on   cover    NE B y end block text    NS   y start block text    OF x   n odd footer appears at the bottom of  odd numbered pages  x  l  c  r   I left  c center  r right    OF x   n odd header appears at the top of  odd numbered pages  x  l  c  r   I left  c center  r right    OP   y skip to the top of an odd number  page    P t  t 0 yy begin paragraph  t  0 1              O justified  1 indented       Standards  Environments  and Macros 253    mm 5                                                                             Break    Macro Name Initial Value Reset  Explanation    PF Xx   n page footer appears at the bottom of  every page  x  l  c    r  I left   c center  r right    PHx   n page header appears at the top of  every page  x  l  c t  I left   c center  r right    R on n
37.   NS   3 2  1 1234 56 789   3 2 177   32 12 34 56 789   3 2    1 123456789    177              In these examples  the octal value of  CHAR MAX  is  177     A string used to indicate a non negative valued  formatted monetary quantity     A string used to indicate a negative valued formatted  monetary quantity     An integer representing the number of fractional digits   those to the right of the decimal delimiter  to be  written in a formatted monetary quantity using   int curr symbol     An integer representing the number of fractional digits   those to the right of the decimal delimiter  to be  written in a formatted monetary quantity using  currency symbol     An integer set to 1 if the currency symbol or   int curr symbol precedes the value for a monetary  quantity with a non negative value  and set to 0 if the  symbol succeeds the value     An integer set to 0 if no space separates the  currency symbolorint curr symbol from the  value for a monetary quantity with a non negative  value  set to 1 if a space separates the symbol from the  value  and set to 2 if a space separates the symbol and  the sign string  if adjacent     An integer set to 1 if the currency symbol or   int curr symbol precedes the value for a monetary  quantity with a negative value  and set to 0 if the  symbol succeeds the value     An integer set to 0 if no space separates the  currency symbolorint curr symbol from the  value for a monetary quantity with a negative value     Standards  Environments  a
38.   The  account management module reads this file to determine the previous time the user  logged in  The following options may be passed in to the UNIX service module     debug syslog 3C  debugging information at LOG  DEBUG level   nowarn Turn off warning messages  pam close session is a null  function     The UNIX password management component provides a function to change  passwords pam sm chauthtok   in the UNIX password database  This module  must be required in pam  conf  It cannot be optional or sufficient  The following options  may be passed in to the UNIX service module     debug syslog 3C  Debugging information at LOG  DEBUG  level    nowarn Turn off warning messages    use first pass It compares the password in the password database    with the user s old password  entered to the first  password module in the stack   If the passwords do not  match  or if no password has been entered  it quits and  does not prompt the user for the old password  It also  attempts to use the new password  entered to the first    294 manpages section 5  Standards  Environments  and Macros   Last Revised 11 Dec 2001    ATTRIBUTES    SEE ALSO    NOTES       pam unix 5     password module in the stack  as the new password  for this module  If the new password fails  it quits and  does not prompt the user for a new password     try first pass It compares the password in the password database  with the user s old password  entered to the first  password module in the stack   If the password
39.   The following is a description of some of the elements from the SolBook  DTD which are used for reference pages     The first line in an SGML file that identifies the location of the DTD that is used to  define the document  The      DOCTYPE string is what the SGML  aware man 1   command uses to identify that a file is formatted in SGML rather than nroff 1      The top layer element that contains a reference page is  lt refentry gt   All of the text  and other tags must be contained within this tag     The next tag in a reference page is  lt refmeta gt   which is a container for several other  tags  They are      lt refentrytitle gt  This is the title of the reference page  It is equivalent to the name of  the reference page   s file name  without the section number  extension     lt manvolnum gt  This is the section number that the reference page resides in  The    contents may be a text entity reference     322 man pages section 5  Standards  Environments  and Macros   Last Revised 7 Jan 1997    RefNameDiv       sgml 5       refmiscinfo   There are one or more  lt refmiscinfo gt  tags which contain meta  information  Meta information is information about the reference  page  The  lt refmiscinfo gt  tag has the class attribute  There are  four classes that are routinely used     date This is the date that the file was last modified   By consensus this date is changed only when  the technical information on the page changes  and not simply for an editorial change     sectde
40.   and  etc d_passwd files exist  The user s terminal line is checked against entries in  the  etc dialups file  If there is a match  the user s shell is compared against entries  in the  etc d_passwd file  If there is a matching entry  the user is prompted for a  password which is validated against the entry in the  etc d_passwd file  If the  passwords match  the user is authenticated  The following option may be passed in to  this service module     debug syslog 3C  debugging information at LOG  DEBUG level     See attributes 5 for description of the following attributes        ATTRIBUTE TYPE ATTRIBUTE VALUE             MT Level MT Safe with exceptions       pam 3PAM   pam authenticate 3PAM  d passwa 4   dialups 4   libpam 3LIB    pam  conf 4   attributes 5  pam authtok check 5  pam authtok get 5    pam authtok store 5   pam dhkeys 5  pam passwd auth 5   pam unix 5    pam unix account 5  pam unix auth 5  pam unix session 5     The interfaces in 1ibpam 3LIB  are MT Safe only if each thread within the  multi threaded application uses its own PAM handle     The pam unix 5  module might not be supported in a future release  Similar  functionality is provided by pam authtok check 5  pam authtok get 5    pam authtok store 5  pam dhkeys 5   pam passwd auth 5     pam unix account 5  pam unix auth 5  and pam unix session 5      272 manpages section 5  Standards  Environments  and Macros   Last Revised 11 Dec 2001    NAME    SYNOPSIS    DESCRIPTION    Kerberos  Authentication  Module 
41.   and other FNS commands  Changes to NIS  related properties   including default access control rights  could be effected using NIS  administration  tools and interfaces after the context has been created  The NIS  object name that  corresponds to an FNS composite name can be obtained using fnlookup 1  and  fnlist 1      fnlist 1   fnlookup 1   nis  1   nischgrp 1   nischmod 1   nischown 1    nisdefaults 1   nisls 1   fncreate 1M   xfn 3XFN     ns 5   fns_dns 5    fns files 5  fns initial context 5   fns nis 5  fns policies 5    fns references 5  fns x500 5     78 manpages section 5  Standards  Environments  and Macros   Last Revised 22 Nov 1996    NAME    DESCRIPTION    FNS Policies and  NIS    Federating NIS  with DNS or X 500    Security  Considerations       fns nis 5   fns nis     overview of ENS over NIS  YP  implementation    Federated Naming Service  FNS  provides a method for federating multiple naming  services under a single  simple interface for the basic naming operations  One of the  naming services supported by FNS is NIS  YP   the enterprise wide information  services in Solaris  see ypcat 1   ypmatch 1   ypfiles 4    FNS provides the XFN  interface for performing naming and attribute operations on FNS enterprise objects   organization  site  user  host and service objects  using NIS  FNS stores bindings for  these objects in NIS and uses them in conjunction with existing NIS objects     FNS defines policies for naming objects in the federated namespace  see  
42.   corresponding to this category is stored in a database created by the  localedef    command  The default C locale corresponds to       as the  decimal delimiter and no thousands delimiter  This environment variable is used  by localeconv 3C   print    3C   and strtod 3C      LC_TIME  This category specifies date and time formats  The information corresponding to  this category is stored in a database specified in localedef     The default C  locale corresponds to U S  date and time formats  This environment variable is  used by many commands and functions  for example  at 1   calendar 1    date 1   strftime 3C   and getdate 3C      MSGVERB    Controls which standard format message components   mtmsg selects when  messages are displayed to stderr  see   mtmsg 1  and fmtmsg 3C      NETPATH    A colon separated list of network identifiers  A network identifier is a character  string used by the Network Selection component of the system to provide  application specific default network search paths  A network identifier must consist  of non null characters and must have a length of at least 1  No maximum length is  specified  Network identifiers are normally chosen by the system administrator  A  network identifier is also the first field in any  etc netconfig file entry   NETPATH thus provides a link into the  etc netconfig file and the information    38 manpages section 5  Standards  Environments  and Macros    Last Revised 25 Oct 2001       environ 5     about a network conta
43.   file system layout  44  filesystem     file system organization  44  Root File System  44   usr File System  53  fnmatch     file name pattern matching  63  fns     overview of FNS  67  Composite Names  67  FNS and Naming Systems  68  ENS  overview     fns  67  overview of ENS References      fns references  85  overview over DNS implementation      fns dns  69  overview over files implementation      fns files  71  overview over NIS  implementation      fns_nis   77  overview over NIS  YP  implementation      fns nis  79  overview over X 500 implementation      fns x500  88  fns     overview of FNS  Why ENS   67  XEN  67  fns dns     overview of FNS over DNS  implementation  69    346 man pages section 5  Standards  Environments  and Macros    September 2004    fns files     overview of FNS over files  implementation  71   fns files     overview of FNS over  etc files  implementation  FNS Policies and  etc  Files  71   fns initial context     overview of the FNS  Initial Context  73   fns nis     overview of FNS over NIS  YP   implementation  79  Federating NIS with DNS or X 500  79  FNS Policies and NIS  79  NIS Security  79   fns nis     overview of FNS over NIS   implementation  77  FNS Policies and NIS   77   fns_policies     overview of the FNS Policies  81   fns_references     overview of FNS  References  85  Address Types  85  Reference Types  85   fns_x500     overview of FNS over X 500  implementation  88   formats     file format notation  91   fsattr     extende
44.   instructions in the SPARC V9 instruction set  as defined  in The SPARC Architecture Manual  Version 9   Prentice Hall  1994  that can be used according to The  V8  Technical Specification  This corresponds to code  produced with the  xarch v8plus option of Sun s C 4 0  compiler     Like sparcv8plus  with the addition of those  UItraSPARC I Visualization Instructions that can be  used according to The V8  Technical Specification  This  corresponds to code produced with the    arch v8plusa  option of Sun s C 4 0 compiler     Like sparcv8plus  with the addition of the Hal  SPARC64 floating multiply add and multiply subtract  instructions     man pages section 5  Standards  Environments  and Macros    Last Revised 18 Feb 1997    x86 Platforms    SEE ALSO       isalist 5     6  sparcv9 Indicates the SPARC V9 instruction set  as defined in  The SPARC Architecture Manual  Version 9   Prentice Hall  1994     7a  sparcv9 vis Like sparcv9  with the addition of the UltraSPARC I  Visualization Instructions    7b  sparcv9 fmuladd Like sparcv9  with the addition of the Hal SPARC64  floating multiply add and multiply subtract  instructions    1  i386 The Intel 80386 instruction set  as described in The i386  Microprocessor Programmer   s Reference Manual    2  1486 The Intel 80486 instruction set  as described in The i486    Microprocessor Programmer s Reference Manual   This  is effectively i386  plus the CMPXCHG  BSWAP  and  XADD instructions      3  pentium The Intel Pentium instructio
45.   nfssec 5     nfssec     overview of NFS security modes    The mount_nfs 1M  and share_nfs 1M  commands each provide a way to specify  the security mode to be used on an NFS file system through the sec mode option   mode can be either sys  dh  krb5  krb5i  krb5p  or none  These security modes may  also be added to the automount maps  Note that mount_nfs 1M  and  automount 1M  do not support sec none at this time     The sec mode option on the share_nfs 1M  command line establishes the security  mode of NFS servers  If the NFS connection uses the NFS Version 3 protocol  the NFS  clients must query the server for the appropriate mode to use  If the NFS connection  uses the NFS Version 2 protocol  then the NFS client will use the default security  mode  which is currently sys  NFS clients may force the use of a specific security  mode by specifying the sec mode option on the command line  However  if the file  system on the server is not shared with that security mode  the client may be denied  access     If the NFS client wants to authenticate the NFS server using a particular  stronger   security mode  the client will want to specify the security mode to be used  even if the  connection uses the NFS Version 3 protocol  This guarantees that an attacker  masquerading as the server does not compromise the client     The NFS security modes are described below  Of these  the krb5  krb5i  krb5p  modes use the Kerberos V5 protocol for authenticating and protecting the shared  filesy
46.   pam acct mgmt 3PAM   pam  conf 4   project 4   attributes 5         pam authtok check 5  pam authtok get 5  pam authtok store 5    pam dhkeys 5   pam passwd auth 5  pam unix 5  pam unix account 5    pam unix auth 5  pam unix session 5     The interfaces in 1ibpam 3LIB  are MT Safe only if each thread within the  multi threaded application uses its own PAM handle     The pam unix 5  module might not be supported in a future release  Similar  functionality is provided by pam authtok check 5  pam authtok get 5    pam authtok store 5   pam dhkeys 5   pam passwd auth 5     pam unix account 5  pam unix auth 5   and pam unix session 5      Standards  Environments  and Macros 285    pam rhosts auth 5   NAME  SYNOPSIS    DESCRIPTION    ATTRIBUTES    SEE ALSO    NOTES       pam  rhosts auth     authentication management PAM module using ruserok       usr lib security pam rhosts auth so 1    The rhosts PAM module   usr lib security pam rhosts auth so 1   authenticates a user via the rlogin authentication protocol  Only   pam sm authenticate   isimplemented within this module    pam sm authenticate   uses the ruserok 3SOCKET  library function to  authenticate the rlogin or rsh user pam sm setcred   isanull function      usr lib security pam rhosts auth so 1 is designed to be stacked on top of  the  usr lib security pam unix so 1 module for both the rlogin and rsh  services  This module is normally configured as sufficient so that subsequent  authentication is performed only on failure 
47.   sparc    1b  sparcv7    2  sparcv8 fsmuld    3  sparcv8    4  sparcv8plus    5a  sparcv8plus vis    5b  sparcv8plus fmuladd       command of sysinfo 2  are listed here     The list is ordered within an instruction set family in the sense that later names are  generally faster then earlier names  note that this is in the reverse order than listed by  isalist 1  and sysinfo 2   In the following list of values  numbered entries  generally represent increasing performance  lettered entries are either mutually  exclusive or cannot be ordered     Where appropriate  correspondence with a given value of the    arch option of Sun s C  4 0 compiler is indicated  Other compilers may have similar options     Indicates the SPARC V8 instruction set  as defined in  The SPARC Architecture Manual  Version 8   Prentice Hall  Inc   1992  Some instructions  such as  integer multiply and divide  FSMULD  and all floating  point operations on quad operands  may be emulated  by the kernel on certain systems     Same as sparc  This corresponds to code produced with  the    arch v7 option of Sun s C 4 0 compiler     Like sparc  except that integer multiply and divide  must be executed in hardware  This corresponds to  code produced with the    arch v8a option of Sun s C  4 0 compiler     Like sparcv8 fsmuld  except that FFMULD must also  be executed in hardware  This corresponds to code  produced with the  xarch v8 option of Sun s C 4 0  compiler     Indicates the SPARC V8 instruction set plus those
48.   struct directe4              ey     man pages section 5  Standards  Environments  and Macros    Last Revised 1 Aug 2001       int getdents      dirent       lt sys mman h gt     void mmap     off t      lt sys resource h gt     int getrlimit       struct rlimit      int setrlimit         const struct rlimit         lt sys stat h gt     int fstat       struct stat       int fstatat       struct stat    int    intlstat       struct stat        int stat            struct stat         lt sys statvfs h gt     int statvfs       struct statvfs      int fstatvfs         struct statvfs         lt unistd h gt     1f64 5     int getdents64         dirent64      void mmape4     off64 t      int getrlimit  4       struct rlimit  4      int setrlimit  4         const struct rlimit64        int   stat64       struct stat64      int fstatat64         struct stat64    int         int 1state64       struct stat64        int stat64            struct stat64        int statvfs64       struct statvfs64      int   statvfs64         struct statvfs64        Standards  Environments  and Macros 201    1f64 5     int lockf      of   _t   int lockf64       of   64 t     off t lseek     off t  off64 t lseeke4       ea  of   64 t         int ftruncate     off t  int ftruncatee4       off64 t    ssize t pread      off t  ssize t pread64       off64 t    ssize t pwrite      off t   ssize t pwrite64       off64 t    inttruncate     off t  int truncate64       off64 t        SEE ALSO   1  compile 5  lfcompil
49.   to tell pam passwd auth so 1 to ignore the LDAP users   passwd auth binding pam passwd auth so 1 server policy  passwd auth required pam ldap so 1    4 Password management  updates     This stack is limited to updating password stored in the    Standards  Environments  and Macros 281    pam ldap 5     FILES    ATTRIBUTES    SEE ALSO    NOTES       EXAMPLE 4 Using pam 1dap With Password Management if There are no Local  Accounts  Continued       LDAP directory  The preferred method is shown in Example 3     other password required pam ldap so 1     var ldap ldap client file    var ldap ldap client cred The LDAP configuration files of the client   Do not manually modify these files  as these  files may not be human readable  Use  ldapclient 1M  to update these files      etc pam conf PAM configuration file     See attributes 5 for descriptions of the following attributes        ATTRIBUTE TYPE ATTRIBUTE VALUE    MT Level MT Safe with exceptions          Stability Level Evolving          ldap 1   idsconfig 1M   1dap cachemgr 1M   1dapclient 1M   1ibpam 3LIB    pam 3PAM   pam sm authenticate 3PAM   pam sm chauthtok 3PAM     pam sm setcred 3PAM    syslog 3C   pam  conf   4   attributes 5     pam authtok check 5  pam authtok get 5  pam authtok store 5     pam passwd auth 5  pam unix account 5  pam unix auth 5     The interfaces in 1ibpam 3LIB  are MT Safe only if each thread within the  multi threaded application uses its own PAM handle     For information on how to configure the 
50.  200 300 256 201  201 301 257 203  202 302 260 263 40  203 303 264 263  204 304 266 264  205 305 267 243  206 306 270 252  207 307 271 272  210 310 272 257  211 311 273 277  212 312 274 212  213 313 275 232  214 314 276 214  215 315 277 234  216 316 300 274                      172 man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    iconv mac cyr 5        Conversions Performed             Mac Cyrillic MS 1251 Mac Cyrillic MS 1251  217 317 301 275  220 320 302 254  221 321 303 306 40  222 322 307 253  223 323 310 273  224 324 311 205  225 325 312 240  226 326 313 200  227 327 314 220  230 330 315 215  231 331 316 235  232 332 317 276  233 333 320 226  234 334 321 227  235 335 322 223  236 336 323 224  237 337 324 221  240 206 325 222  241 260 326 40  242 245 327 204  243 40 330 241  244 247 331 242  245 267 332 217  246 266 333 237  247 262 334 271  250 256 335 250  252 231 336 270  253 200 337 377                      Standards  Environments  and Macros    173    iconv mac cyr 5        Conversions Performed       Mac Cyrillic    MS 1251    Mac Cyrillic MS 1251       254          220    362 324             FILES    usr lib iconv   so     usr lib iconv   t     usr lib iconv iconv data    SEE ALSO   iconv 1   iconv 3C   iconv 5        conversion modules  conversion tables    list of conversions supported by conversion  tables    174 manpages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    NAME    DESCRIPTION    CO
51.  234 235 236 237  240 241 242 244 245 246  250 251 252 253 254 255 256 257  261 262 263 264 265 266 267  270 271 272 273 274 275 276 277  300 301 302 303 304 305 306 307  310 311 312 313 314 315 316 317  320 321 322 323 324 325 326 327  330 331  332 333 334 335 336 337  341 342 343 344 345 346  352  353 354  355 356  357  360 361 362 363 364 365 366 367  370 372 373 374 375 376 377          138 man pages section 5  Standards  Environments  and Macros    Last Revised 28 Apr 1997    ISO 8859 1 to ISO  646es  SPANISH     ISO 8859 1 to ISO  646sv  SWEDISH        iconv  8859 1 5     For the conversion of ISO 8859 1 to ISO 646es  all characters not in the following tables  are mapped unchanged                             Conversions Performed  ISO 8859 1 ISO 646es ISO 8859 1 ISO 646es  241 133 321 134  247 100 347 175  260 173 361 174  277 135  Converted to Underscore      137   100 133 134 135 173 174 175       200 201 202 203 204 205 206 207  210 211 212 213 214 215 216 217  220 221 222 223 224 225 226 227  230 231 232 233 234 235 236 237  240 242 243 244 245 246  250 251 252 253 254 255 256 257  261 262 263 264 265 266 267  270 271 272 273 274 275 276  300 301 302 303 304 305 306 307  310 311 312 313 314 315 316 317  320 322 323 324 325 326 327  330 331 232 333 33234 335  336 337  340 341 342 343 344 345 346  350 351 352 353 354 355 356 357  360 362 363 364 365 366 367  370 371 372 373 374 375 376 377       For the conversion of ISO 8859 1 to ISO 646sv  all characters not in the
52.  243  244  245  246    311  312  313  314  315  316  317  320  321  322  323  324  325  326             Standards  Environments  and Macros    179    iconv  pc cyr 5              Conversions Performed  PC Cyrillic ISO 8859 5 PC Cyrillic ISO 8859 5  215 275 247 327  216 276 250 330  217 277 251 331  220 300 252 332  221 301 253 333  222 302 254 334  223 303 255 335  224 304 256 336  225 305 257 337  226 306 260 337 255  227 307 360 241  230 310 362 376 255                   PC Cyrillic to   For the conversion of PC Cyrillic to KOI8 R  all characters not in the following table  KOI8 R   are mapped unchanged              Conversions Performed  PC Cyrillic KOI8 R PC Cyrillic KOI8 R  24 4 242 327  200 341 243 307  201 342 244 304  202 367 245 305  203 347 246 326  204 344 247 332  205 345 250 311  206 366 251 312  207 372 252 313  210 351 253 314  211 352 254 315                      180 man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    iconv  pc cyr 5                                Conversions Performed  PC Cyrillic KOI8 R PC Cyrillic KOI8 R  212 353 255 316  213 354 256 317  214 355 257 320  215 356 260 337 255  216 357 340 322  217 360 341 323  220 362 342 324  221 363 343 325  222 364 344 306  223 365 345 310  224 346 346 303  225 350 347 336  226 343 350 333  227 376 351 335  230 373 352 337  231 375 353 331  232 377 354 330  233 371 355 334  234 370 356 300  235 374 357 321  236 340 360 263  237 361 361 243  240 301 362 376 255  241 302 
53.  277  257  260  263  243  321  301  302  327  307  304  305  326  332  311  312  313  314  315  316  317  320  322  323  324  325  306          man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    Mac Cyrillic to PC  Cyrillic    iconv mac cyr 5        Conversions Performed                   Mac Cyrillic KOI8 R Mac Cyrillic KOI8 R  260 263 40 365 310  264 246 366 303  265 266 40 367 336  267 270 370 333  270 264 371 335  271 244 372 337  272 267 373 331  273 247 374 330  274 271 375 334  275 251 376 300  375 370             For the conversion of Mac Cyrillic to PC Cyrillic  all characters not in the following  table are mapped unchanged        Conversions Performed                   Mac Cyrillic PC Cyrillic Mac Cyrillic PC Cyrillic  24 4 355 255  240 334 40 356 256  335 360 357 257  336 361 360 340  337 357 361 341  340 240 362 342  341 241 363 343  342 242 364 344  343 243 365 345  344 244 366 346  345 245 367 347  346 246 370 350                Standards  Environments  and Macros 171    iconv mac cyr 5              Conversions Performed   Mac Cyrillic PC Cyrillic Mac Cyrillic PC Cyrillic  347 247 371 351  350 250 372 352  351 251 373 353  352 252 374 354  353 253 375 355  354 254 376 356  303 366                   Mac Cyrillic to MS   For the conversion of Mac Cyrillic to MS 1251  all characters not in the following table  1251   are mapped unchanged              Conversions Performed  Mac Cyrillic MS 1251 Mac Cyrillic MS 1251  24 4 255 40 
54.  315  220 311 327 316  221 305 330 354  222 345 331 334 40  223 364 335 336  224 366 336 331  225 274 337 40  226 276 340 323  227 214 341 337  230 234 342 324  231 326 343 321  232 334 344 361  233 215 345 362  234 235 346 212  235 243 347 232  236 327 350 300  237 350 351 332  240 341 352 340  241 355 353 333  242 363 354 375  243 372 355 335  244 245 356 376  245 271 357 264  246 216 360 255  247 236 361 275  250 312 362 262          man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    MS 852 to Mazovia    iconv_852 5        Conversions Performed       MS 852    MS 1250    MS 852    MS 1250       251  252  253  254  255  256  257  260 264  265  266  267          352  254  237  310  272  253  273  40   301  302  314       363  364  365  366  367  370  371  372  374  375  376       241  242  247  367  270  260  250  377  330  370  40          For the conversion of MS 852 to Mazovia  all characters not in the following table are             mapped unchanged   Conversions Performed  MS 852 Mazovia MS 852 Mazovia  205 40 246 247 40  206 215 250 220  210 222 251 221  212 213 40 253 246  215 240 254 270 40  217 225 275 241  220 226 40 276 247  227 230 306 336 40  230 236 340 243  233 234 40 342 40  235 234 343 245  236 243 40 344 244                         Standards  Environments  and Macros 133    iconv_852 5     MS 852 to DHN    FILES    SEE ALSO       Conversions Performed       MS 852    Mazovia    MS 852    Mazovia       244 217    245 206
55.  346 212  257 210 347 351 40  260 370 352 213  261 361 353 354 40  262 40 355 241  263 214 356 360 40  264 40 361 215  265 346 362 40  266 40 363 216  267 372 364 223  270 40 365 40  271 211 366 224  272 40 367 366  273 257 370 371 40  274 276 40 372 243  277 221 373 376 40  300 305 40                    usr lib iconv   so     usr lib iconv   t     usr lib iconv iconv data    iconv 1   iconv 3C   iconv 5     conversion modules  conversion tables    list of conversions supported by conversion  tables    man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    NAME    DESCRIPTION    CONVERSIONS    MS 1251 to ISO  8859 5       iconv_1251 5     iconv_1251   code set conversion tables for MS 1251  Windows Cyrillic     The following code set conversions are supported                          The conversions are performed according to the following tables  All values in the  tables are given in octal              Code Set Conversions Supported  Code Symbol Target Code Symbol Target Output  MS 1251 wind ISO 8859 5 iso5 ISO 8859 5 Cyrillic  MS 1251 win5 KOI8 R koi8 KOI8 R  MS 1251 win5 PC Cyrillic alt Alternative PC Cyrillic  MS 1251 win5 Mac Cyrillic mac Macintosh Cyrillic          For the conversion of MS 1251 to ISO 8859 5  all characters not in the following table  are mapped unchanged                       Conversions Performed  MS 1251 ISO 8859 5 MS 1251 ISO 8859 5  24 4 310 270  200 242 311 271  201 243 312 272  202 40 313 273  203 363 314 274  20
56.  363 322 340  243 361 323 341  244 364 324 342  245 365 325 343  246 366 327 322  247 367 330 354  250 370 331 353  251 371 332 327  252 372 333 350  253 373 334 355  254 374 335 351  256 376 336 347                      Standards  Environments  and Macros 159    iconv_koi8 r 5     160       Conversions Performed       KOI8 R    ISO 8859 5    KOI8 R    ISO 8859 5       257  260  261  262  263  264  265  266  267  270  271  272  273  274  275  276  277  300  301  302  303  304  305  306  307  310  311  312          377  360  242  243  241  244  245  246  247  250  251  252  253  254  255  256  257  356  320  321  346  324  325  344  323  345  330  331       337  340  341  342  343  344  345  346  347  350  351  352  353  354  355  356  357  360  361  362  363  364  365  366  367  370  371  372       352  316  260  261  306  264  265  304  263  305  270  271  272  273  274  275  276  277  317  300  301  302  303  266  262  314  313  267          man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    KOIS R to PC  Cyrillic    iconv_koi8 r 5        Conversions Performed       KOI8 R    ISO 8859 5    KOI8 R    ISO 8859 5       313  314  315  316  317          332  333  334  335  336       373  374  375  376       310  315  311  307          For the conversion of KOI8 R to PC Cyrillic  all characters not in the following table  are mapped unchanged        Conversions Performed       KOI8 R    PC Cyrillic    KOI8 R    PC Cyrillic       24  200 242  2
57.  8    UTF 8  UTF 8  UTF 8    UTF 8    In the conversion library   usr 1lib iconv  see iconv 3C    the library module  filename is composed of two symbolic elements separated by the percent sign      The  first symbol specifies the code set that is being converted  the second symbol specifies  the target code  that is  the code set to which the first one is being converted     FILES    SEE ALSO       iconv_unicode 5     EXAMPLE 1 The library module filename  Continued     In the conversion table above  the first symbol is termed the  FROM Filename  Element   The second symbol  representing the target code set  is the  TO Filename  Element        For example  the library module filename to convert from the Korean EUC code set to  the Korean UTF 8 code set is    ko KR euc ko KR UTF 8     usr lib iconv   so conversion modules  iconv 1   iconv 3C   iconv 5     Chernov  A   Registration of a Cyrillic Character Set  RFC 1489  RELCOM Development  Team  July 1993     Chon  K   H  Je Park  and U  Choi  Korean Character Encoding for Internet Messages  RFC  1557  Solvit Chosun Media  December 1993     Goldsmith  D   and M  Davis  UTF 7     A Mail Safe Transformation Format of Unicode   RFC 1642  Taligent  Inc   July 1994     Lee  F   HZ     A Data Format for Exchanging Files of Arbitrarily Mixed Chinese and ASCII  characters  RFC 1843  Stanford University  August 1995     Murai  J   M  Crispin  and E  van der Poel  Japanese Character Encoding for Internet  Messages  RFC 1468  Keio Univer
58.  852  DHN Mazovia  ISO 8859 5 KOI8 R iconv_8859 5  5   ISO 8859 5 PC Cyrillic  ISO 8859 5 MS 1251  ISO 8859 5 Mac Cyrillic  KOI8 R ISO 8859 5 iconv_koi8 r  5   KOI8 R PC Cyrillic  KOI8 R MS 1251  KOI8 R Mac Cyrillic  PC Cyrillic ISO 8859 5 iconv_pc_cyr  5   PC Cyrillic KOI8 R          man pages section 5  Standards  Environments  and Macros    Last Revised 5 Dec 2001       iconv 5                                         Index of Conversion Code Tables   PC Cyrillic MS 1251   PC Cyrillic Mac Cyrillic   MS 1251 ISO 8859 5 iconv 1251  5   MS 1251 KOI8 R   MS 1251 PC Cyrillic   MS 1251 Mac Cyrillic   Mac Cyrillic ISO 8859 5 iconv_mac_cyr  5   Mac Cyrillic KOI8 R   Mac Cyrillic PC Cyrillic   Mac Cyrillic MS 1251                      FILES    usr lib iconv   so  conversion modules     usr lib iconv   t  Conversion tables      usr lib iconv geniconvtbl binarytables   bt  Conversion binary tables         usr lib iconv iconv data  List of conversions supported by conversion tables     SEE ALSO   iconv 1   iconv 3C   iconv 1250 5   iconv 1251 5   iconv 646 5    iconv_852 5   iconv_8859 1 5   iconv_8859 2 5   iconv_8859 5 5    iconv_dhn 5   iconv koi8 r 5  iconv_mac_cyr 5   iconv_maz 5    iconv pc cyr 5  iconv_unicode 5        Standards  Environments  and Macros 125    iconv_646 5   NAME    DESCRIPTION    CONVERSIONS    ISO 646  US  ASCII  to ISO  8859 1    ISO 646de   GERMAN  to ISO  8859 1    ISO 646da   DANISH  to ISO  8859 1       iconv_646     code set conversion tables for ISO 646
59.  9899  C Standard  Amendment 1       man pages section 5  Standards  Environments  and Macros    Last Revised 29 Aug 2001    Utilities    Feature Test  Macros       standards 5        X Open CAE  Specification Description Release       XNS5 superset and LP64 clean derivative of Solaris 7  XNS4        The XNS4 specification is safe for use only in ILP32  32 bit  environments and should  not be used for LP64  64 bit  application environments  Use XNS5  which has  LP64 clean interfaces that are portable across ILP32 and LP64 environments  Solaris  releases 7 through 9 support both the ILP32 and ILP64 enviornments     Solaris releases 7 through 9 have been branded to conform to The Open Group   s UNIX  98 Product Standard     Solaris releases 2 0 through 9 support the interfaces specified by the System V  Interface Definition  Third Edition  Volumes 1 through 4  SVID3   Note  however  that  since the developers of this specification  UNIX Systems Laboratories  are no longer in  business and since this specification defers to POSIX and X Open CAE specifications   there is some disagreement about what is currently required for conformance to this  specification     When Sun WorkShop Compiler    C 4 2 is installed  Solaris releases 2 0 through 9  support the ANSI X3 159 1989 Programming Language   C and ISO IEC 9899 1990  Programming Language   C  C  interfaces     When Sun WorkShop Compiler    C 5 0 is installed  Solaris releases 7 through 9  also support ISO IEC 9899 Amendment 1  
60.  Aug 2001    NAME    DESCRIPTION    FILES  SEE ALSO    BUGS       sticky 5   sticky     mark files for special treatment    The sticky bit  file mode bit 01000  see chmod 2   is used to indicate special treatment  of certain files and directories  A directory for which the sticky bit is set restricts  deletion of files it contains  A file in a sticky directory may only be removed or  renamed by a user who has write permission on the directory  and either owns the file   owns the directory  or is the super user  This is useful for directories such as  tmp   which must be publicly writable  but should deny users permission to arbitrarily  delete or rename the files of others     If the sticky bit is set on a regular file and no execute bits are set  the system s page  cache will not be used to hold the file s data  This bit is normally set on swap files of  diskless clients so that accesses to these files do not flush more valuable data from the  system s cache  Moreover  by default such files are treated as swap files  whose inode  modification times may not necessarily be correctly recorded on permanent storage     Any user may create a sticky directory  See chmod for details about modifying file  modes       tmp  chmod 1   chmod 2   chown 2   mkdir 2     mkdir 2  will not create a directory with the sticky bit set     Standards  Environments  and Macros 333    term 5     334    NAME    DESCRIPTION       term     conventional names for terminals    Terminal names are maintain
61.  Level     attributes of interfaces  18    N   native instruction sets known to Solaris      isalist  190   NFS and sticky bits     sticky  333   nfssec     overview of NFS security modes  263    O  overview of FNS     fns  67    overview of FNS over DNS implementation      fns_dns  69   overview of FNS over files implementation      fns_files  71   overview of FNS over NIS  implementation      fns_nis   77   overview of FNS over NIS  YP  implementation     fns_nis  79   overview of FNS over X 500 implementation      fns_x500  88   overview of FNS References      fns_references  85   overview of NFS security modes     nfssec  263   overview of the FNS Initial Context      fns_initial_context  73   overview of the FNS Policies     fns_policies  81          P    PAM account management module for UNIX      pam unix account  296   pam authtok check     authentication and  password management module  265   pam authtok get     authentication and  password management module  267   pam authtok store     password management  module  269   pam dial auth     authentication management  for dialups  272   pam krb5     authentication  account  session  and password management for Kerberos  V5  273   pam krb5     authentication  account  session   and password management PAM modules  for Kerberos V5  273   pam passwd auth     authentication module  for password  283   pam  projects     account management PAM  module for projects  285   pam rhosts auth     authentication  management using ru
62.  OU IMPLICITE  N EST ACCORDEE  Y COMPRIS DES  GARANTIES CONCERNANT LA VALEUR MARCHANDE  L APTITUDE DE LA PUBLICATION A REPONDRE A UNE UTILISATION  PARTICULIERE  OU LE FAIT QU ELLE NE SOIT PAS CONTREFAISANTE DE PRODUIT DE TIERS  CE DENI DE GARANTIE NE  S APPLIQUERAIT PAS  DANS LA MESURE OU IL SERAIT TENU JURIDIQUEMENT NUL ET NON AVENU     O      a e    Adobe PostScript    tr    04071499061    Contents       Preface 7    Introduction 13  Intro 5  14    Standards  Environments  and Macros 15  ascii 5  16  attributes 5  18  charmap 5  26   crypt bsdbf 5  29  crypt bsdmd5 5  30  crypt sunmd5 5  31  crypt_unix 5  32  dhep 5  33   dhcp modules 5  35  environ 5  37  eqnchar 5  42  extensions 5  43  filesystem 5  44  fnmatch 5  63   fns 5  67   fns_dns 5  69  fns_files 5  71   fns initial context b  73  fns_nis  5  77    fns_nis 5  79   fns policies 5  81  fns_references 5  85  fns x500 5  88  formats 5  91  fsattr 5  96   iconv 1250 5  107  iconv 1251 5  113  iconv 5  122  iconv_646 5  126  iconv_852 5  129  iconv_8859 1 5  135  iconv_8859 2 5  141  iconv_8859 5 5    147  iconv_dhn 5  155  iconv_koi8 r 5  159  iconv mac cyr 5  167  iconv maz 5  175  iconv_pc_cyr 5  179  iconv unicode 5  185  isalist 5  190  largefile 5  192  1f64 5  196  Ifcompile 5  203  Ifcompile64 5  206  live upgrade 5  208  locale 5  212  man 5  238  mansun 5  242  me 5  246   mm 5  251   ms 5  258  nfssec 5  263  pam_authtok_check 5  265  pam_authtok_get 5  267  pam authtok store 5  269  pam dhkeys 5  270  pam 
63.  PC Cyrillic to MS   For the conversion of PC Cyrillic to MS 1251  all characters not in the following table  1251   are mapped unchanged        Standards  Environments  and Macros 181    iconv  pc cyr 5     182                         Conversions Performed  PC Cyrillic MS 1251 PC Cyrillic MS 1251  24 4 242 342  200 300 243 343  201 301 244 344  202 302 245 345  203 303 246 346  204 304 247 347  205 305 250 350  206 306 251 351  207 307 252 352  210 310 253 353  211 311 254 354  212 312 255 355  213 313 256 356  214 314 257 357  215 315 260 337 210  216 316 340 360  217 317 341 361  220 320 342 362  221 321 343 363  222 322 344 364  223 323 345 365  224 324 346 366  225 325 347 367  226 326 350 370  227 327 351 371  230 330 352 372  231 331 353 373  232 332 354 374          man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    PC Cyrillic to Mac  Cyrillic    iconv  pc cyr 5        Conversions Performed                      PC Cyrillic MS 1251 PC Cyrillic MS 1251   233 333 355 375  234 334 356 376  235 335 357 377  236 336 360 250  237 337 361 270  240 340 362 376 210  241 341          For the conversion of PC Cyrillic to Mac Cyrillic  all characters not in the following  table are mapped unchanged        Conversions Performed       PC Cyrillic    Mac Cyrillic    PC Cyrillic    Mac Cyrillic       24   240  241  242  243  244  245  246  247  250  251  252  253  254  255  256          340  341  342  343  344  345  346  347  350  351  352  353  3
64.  TXfp    Cause    Break    no    yes    yes    no    yes  yes    no    no    yes    no    yes    no    yes  yes    yes    no    If no  Argument    t n t l     t n t l     i p i     t n t l     t n t l     i p i     mansun 5     Explanation    Index macro  for SunSoft internal use     Begin left aligned paragraph  Set  prevailing indent to  5i     Same as   LP     Set vertical distance between  paragraphs     Same as   LP     End of relative indent  Restores  prevailing indent     Join words  alternating Roman and bold   Join words  alternating Roman and italic     Start relative indent  increase indent by i   Sets prevailing indent to  5i for nested  indents     Reduce size of text by 1 point  make text  bold     Section Heading   Reduce size of text by 1 point   Section Subheading     Begin reference page n  of of section s  d  is the date of the most recent change  If  present  f is the left page footer  m is the  main page  center  header  Sets  prevailing indent and tabs to  5i     Begin indented paragraph  with the tag  given on the next text line  Set prevailing  indent to i     Resolve the title abbreviation t  join to  punctuation mark  or text  p     When formatting a manual page  mansun examines the first line to determine whether  it requires special processing  For example a first line consisting of     ENU t    indicates that the manual page must be run through the tb1 1  preprocessor     Standards  Environments  and Macros 243    mansun 5   A typical manual page
65.  Unix module  Because the   try first pass option is designated  if the initial password entered for the Unix  module authenticates Kerberos V5 successfully  the old Kerberos V5 password is not  requested from the user  only the new Kerberos V5 password is requested     See attributes 5  for description of the following attributes        ATTRIBUTE TYPE ATTRIBUTE VALUE       MT Level MT Safe with exceptions             Interface Stability Evolving          keylogin 1   ktutil 1   pam 3PAM   pam authenticate 3PAM   syslog 3C    libpam 3LIB   pam  conf 4   attributes 5   SEAM 5   pam authtok check 5    pam authtok get 5  pam authtok store 5   pam dhkeys 5     pam passwd auth 5  pam unix 5  pam unix account 5  pam unix auth 5    pam unix session 5     The interfaces in 1ibpam 3LIB  are MT Safe only if each thread within the  multi threaded application uses its own PAM handle     man pages section 5  Standards  Environments  and Macros    Last Revised 21 Jan 2003       pam  krb5 5     The pam unix 5  module might not be supported in a future release  Similar  functionality is provided by pam authtok check 5  pam authtok get 5    pam authtok store 5  pam dhkeys 5   pam passwd auth 5     pam unix account 5  pam unix auth 5   and pam unix session 5      Standards  Environments  and Macros 277    pam ldap 5     278    NAME    SYNOPSIS    DESCRIPTION    LDAP  Authentication  Module       pam ldap   authentication  account  and password management PAM module for  LDAP     usr lib securi
66.  administrative utilities required for boot  Semantics are  equivalent to   sbin  An approved installation location for bundled Solaris  software and for add on system software      proc  Root of a subtree for the process file system      sbin  Essential executables used in the booting process and in manual system recovery   The full complement of utilities is available only after  usr is mounted   sbin is  an approved installation location for bundled Solaris software      tmp  Temporary files  cleared during the boot operation      usr  Mount point for the  usr file system  See description of  usr file system  below      var  Root of a subtree for varying files  Varying files are files that are unique to a  machine but that can grow to an arbitrary  that is  variable  size  An example is a  log file  An approved installation location for bundled Solaris software  The  analogous location for add on system software or for applications is    var opt  packagename      var adm  System logging and accounting files      var apache  Scripts  icons  logs  and cache pages for Apache web server      var audit  Basic Security Module  BSM  audit files      var crash  Default depository for kernel crash dumps      var cron  Log files for cron 1M       var dmi  Solstice Enterprise Agents  SEA  Desktop Management Interface  DMI  run time  components      var dt  dtlogin configuration files     50 manpages section 5  Standards  Environments  and Macros    Last Revised 15 Nov 2001       file
67.  an  ANSI X3 159 1989  ANSI C Language  standard conforming compilation system and  the cc and c89 utilities  Solaris 7 through 9 were tested with the cc and c89 utilities  and the compilation system provided by Sun WorkShop Compiler  C 5 0 in the  SPARC and x86 environments  When cc is used to link applications    usr ccs lib values xpg4 o must be specified on any link load command line   but the preferred way to build applications is described below     An XNS4  or XNS5 conforming application must include  1 XNS on any link load  command line in addition to defining the feature test macros specified for SUS or  SUSv2  respectively     If the compiler suppports the redefine_extname pragma feature  the Sun  WorkShop Compiler  C 4 2 and Sun WorkShop Compiler  C 5 0 compilers  define the macro PRAGMA REDEFINE EXTNAME to indicate that it supports this  feature   then the standard headers use  pragma redefine extname directives to  properly map function names onto library entry point names  This mapping provides  full support for ISO C  POSIX  and X Open namespace reservations  The Sun  WorkShop Compiler  C 5 0 compiler was used for all branding and certification  tests for Solaris releases 7 through 9     If this pragma feature is not supported by the compiler  the headers use the  define  directive to map internal function names onto appropriate library entry point names   In this instance  applications should avoid using the explicit 64 bit file offset symbols  listed on the 1
68.  another naming system  Resolution of a composite name  proceeds from contexts within one naming system to those in the next  until the name  is resolved     XEN is X Open Federated Naming  The programming interface and policies that FNS  supports are specified by XFN  See x  n 3XEN  and fns_policies 5      A composite name is a name that spans multiple naming systems  It consists of an  ordered list of components  Each component is a name from the namespace of a single  naming system  FNS defines the syntax for constructing a composite name using  names from component naming systems  Individual naming systems are responsible  for the syntax of each component     The syntax for composite names is that components are composed left to right using   the slash character           as the component separator  For example  the composite name   Wiz Com site Oceanview East consists of four components            Wiz COM  site  and Oceanview East See fns policies 5 and   fns initial context 5 for more examples of composite names     ENS is useful for the following reasons     m A single uniform naming interface is provided to clients for accessing naming  services  Consequently  the addition of new naming services does not require  changes to applications or existing naming services  Furthermore  applications that  use FNS will be portable across platforms because the interface exported by FNS is  XEN  a public  open interface endorsed by other vendors and by the X Open  Company     Sta
69.  attr database are shown below     Solaris jobs    Cron and At Jobs  help JobHeader html  solaris jobs grant   Delegate Cron  amp  At Administration  help JobsGrant html  Solaris jobs admin   Manage All Jobs  help AuthJobsAdmin html  Solaris jobs user   Cron  amp  At User  help JobsUser html    Authorization name strings ending with the grant suffix are special authorizations  that give a user the ability to delegate authorizations with the same prefix and  functional area to other users     To check authorizations  use the chkauthattr 3SECDB  library function  which  verifies whether or not a user has a given authorization  The synopsis is     int chkauthattr const char  authname  const char  username       The chkauthattr    function checks the policy conf 4   user_attr 4   and  prof attr 4  databases in order for a match to the given authorization     If you are modifying existing code that tests for root UID  you should find the test in  the code and replace it with the chkauthattr    function  A typical root UID check is  shown in the first code segment below  An authorization check replacing it is shown in  the second code segment  it uses the solaris jobs admin authorization and a  variable called real login representing the user     EXAMPLE 1 Standard root check    ruid   getuid       Standards  Environments  and Macros 301    rbac 5     302       EXAMPLE 1 Standard root check  Continued     if   eflag    lflag    rflag   amp  amp  argc    1     if   pwp   getpwnam  a
70.  buffer error   PAM IGNORE Ignore module  not participating in result  PAM SUCCESS Successfully obtains authentication token  PAM SYSTEM ERR System error    See attributes 5 for descriptions of the following attributes        ATTRIBUTE TYPE ATTRIBUTE VALUE       Interface Stability Evolving                MT Level MT Safe with exceptions       passwd 1   pam 3PAM   pam authenticate 8PAM   pam start 3PAM     pam set item 3PAM   syslog 3C   libpam 3LIB   pam  conf   4   attributes 5    pam authtok check 5  pam authtok get 5  pam authtok store 5     pam dhkeys 5   pam unix 5  pam unix account 5  pam unix auth 5     pam unix session 5     The interfaces in 1ibpam 3LIB  are MT Safe only if each thread within the  multi threaded application uses its own PAM handle     Standards  Environments  and Macros 283    pam passwd auth 5     This module relies on the value of the current real UID  this module is only safe for  MT applications that don t change UIDs during the call to  pam authenticate 3PAM      The pam unix 5  module might not be supported in a future release  Similar  functionality is provided by pam authtok check 5  pam authtok get 5    pam authtok store 5  pam dhkeys 5   pam passwd auth 5     pam unix account 5  pam unix auth 5  and pam unix session 5         284 manpages section 5  Standards  Environments  and Macros    Last Revised 21 Jan 2003    NAME  SYNOPSIS    DESCRIPTION    Projects Account  Management  Module    ATTRIBUTES    SEE ALSO    NOTES       pam projects 5
71.  character if it is a colon      Otherwise  TZ has the form     stdoffset  dst  offset      start   time    end   time       std and dst    offset    Three or more bytes that are the designation for the  standard  std  and daylight savings time  dst   timezones  Only std is required  If dst is missing   then daylight savings time does not apply in this  locale  Upper  and lower case letters from the  portable character set are explicitly allowed  Any  graphic characters from the portable character set  except a leading colon     or digits  the comma        the minus      the plus      and the null character are  permitted to appear in these fields  but their  meaning is unspecified     Indicates the value one must add to the local time to  arrive at Coordinated Universal Time  The offset has  the form     hh   mm  5ss      The minutes  mm  and seconds  ss  are optional  The  hour  hh  is required and may be a single digit  The  offset following std is required  If no offset follows dst    daylight savings time is assumed to be one hour  ahead of standard time  One or more digits may be  used  The value is always interpreted as a decimal  number  The hour must be between 0 and 24  and the  minutes  and seconds   if present  must be between 0  and 59  Out of range values may cause unpredictable  behavior  If preceded by a            the timezone is east of  the Prime Meridian  Otherwise  it is west of the  Prime Meridian  which may be indicated by an    uam    optional precedin
72.  chown 2   Link 2   open 2   pathconf 2   rename 2   stat 2   unlink 2    utimes 2   attropen 3C   standards 5     106 man pages section 5  Standards  Environments  and Macros    Last Revised 1 Aug 2001    NAME    DESCRIPTION    CONVERSIONS    MS 1250 to ISO  8859 2    MS 1250 to MS 852    iconv_1250 5     iconv_1250   code set conversion tables for MS 1250  Windows Latin 2     The following code set conversions are supported                                   Code Set Conversions Supported  Code Symbol Target Code Symbol Target Output  MS 1250 win2 ISO 8859 2 iso2 ISO Latin 2  MS 1250 win2 MS 852 dos2 MS DOS Latin 2  MS 1250 win2 Mazovia maz Mazovia  MS 1250 win2 DHN dhn Dom Handlowy Nauki       The conversions are performed according to the following tables  All values in the  tables are given in octal     For the conversion of MS 1250 to ISO 8859 2  all characters not in the following table  are mapped unchanged                       Conversions Performed  MS 1250 ISO 8859 2 MS 1250 ISO 8859 2   24 211 40 235 273  212 251 236 276  213 40 237 274  214 246 241 267  215 253 245 241  216 256 246 267 40   217 254 271 261  221 231 40 273 40   232 271 274 245  233 40 276 265  234 266 247 365                For the conversion of MS 1250 to MS 852  all characters not in the following table are    mapped unchanged     Standards  Environments  and Macros    107    iconv_1250 5     108       Conversions Performed       MS 1250    MS 852    MS 1250    MS 852       200 211  212  213  214
73.  circumflex character     in its role in a  non matching list in the regular expression notation  A bracket expression starting with  an unquoted circumflex character produces unspecified results     The restriction on a circumflex in a bracket expression is to allow implementations that  support pattern matching using the circumflex as the negation character in addition to  the exclamation mark  A portable application must use something like  A     to match  either character     When pattern matching is used where shell quote removal is not performed  such as  in the argument to the   ind  name primary when   ind is being called using one of  the exec functions  or in the pattern argument to the   nmatch 3C  function  special  characters can be escaped to remove their special meaning by preceding them with a  backslash character  This escaping backslash will be discarded  The sequence     represents one literal backslash  All of the requirements and effects of quoting on  ordinary  shell special and special pattern characters will apply to escaping in this  context     Standards  Environments  and Macros 63    fnmatch 5     Patterns Matching    64    Multiple  Characters       Both quoting and escaping are described here because pattern matching must work in  three separate circumstances       Calling directly upon the shell  such as in pathname expansion or in a case  statement  All of the following will match the string or file abc              abc  abc  a b c a be alble  
74.  column 1  and preceding a  trailer line containing the string END CHARMAP starting in column 1  Empty lines and  lines containing a  lt comment_char gt  in the first column will be ignored  Each  non comment line of the character set mapping definition  that is  between the  CHARMAP and END CHARMAP lines of the file  must be in either of two forms      Ss  s  sWn    symbolic name     encoding      comments       Ss      8 Ss  sWn    symbolic name     symbolic name     lt encoding gt   lt comments gt     In the first format  the line in the character set mapping definition defines a single  symbolic name and a corresponding encoding  A character following an escape  character is interpreted as itself  for example  the sequence   Vi V   represents the  symbolic name   enclosed between angle brackets     In the second format  the line in the character set mapping definition defines a range  of one or more symbolic names  In this form  the symbolic names must consist of zero  or more non numeric characters  followed by an integer formed by one or more  decimal digits  The characters preceding the integer must be identical in the two  symbolic names  and the integer formed by the digits in the second symbolic name  must be equal to or greater than the integer formed by the digits in the first name  This  is interpreted as a series of symbolic names formed from the common part and each of  the integers between the first and the second integer  inclusive  As an example    lt j0101 
75.  comparing strings using the first  primary  weight  the second when comparing  strings using the second weight  and so on  Operands are separated by semicolons           Standards  Environments  and Macros 221    locale 5     222    Collation Order       Each operand consists of one or more collation directives  separated by commas       If  the number of operands exceeds the  COLL  WEIGHTS MAX  limit  the utility will  issue a warning message  The following directives will be supported     forward Specifies that comparison operations for the weight  level proceed from start of string towards the end of  string     backward Specifies that comparison operations for the weight  level proceed from end of string towards the beginning  of string     position Specifies that comparison operations for the weight  level will consider the relative position of elements in  the strings not subject to IGNORE  The string  containing an element not subject to IGNORE after the  fewest collating elements subject to IGNORE from the  start of the compare will collate first  If both strings  contain a character not subject to IGNORE in the same  relative position  the collating values assigned to the  elements will determine the ordering  In case of  equality  subsequent characters not subject to IGNORE  are considered in the same manner     The directives forward and backward are mutually exclusive     For example     order start forward backward    If no operands are specified  a single forwa
76.  configuration information      var spool  Contains directories for files used in printer spooling  mail delivery  cron 1M    at 1   and so forth      var spool clientmqueue  sendmail 1M  client files      var spool cron  cron 1M  and at 1  spooling files      var spool locks  Spooling lock files      var spool lp  Line printer spool files  See 1p 1       var spool mqueue  Mail queued for delivery      var spool pkg  Spooled packages      var spool print  LP print service client side request staging area      var spool samba  Samba print queue      var spool uucp  Queued uucp 1C  jobs         var spool uucppublic  Files deposited by uucp 1C       var statmon  Network status monitor files      var tmp  Files that vary in size or presence during normal system operations  This directory  is not cleared during the boot operation  An approved installation location for  bundled Solaris software and for add on system software and applications      var uucp  uucp 1C  log and status files     52 manpages section 5  Standards  Environments  and Macros    Last Revised 15 Nov 2001     usr File System       filesystem 5      var yp  Databases needed for backwards compatibility with NIS and ypbind 1M    unnecessary after full transition to NIS      Because it is desirable to keep the root file system small and not volatile  on disk based  systems larger file systems are often mounted on  home   opt   usr  and  var     The file system mounted on  usr contains platform dependent and  platfor
77.  controlled by Sun   intrarelease incompatibilities  are common           20 manpages section 5  Standards  Environments  and Macros   Last Revised 15 Aug 2001    attributes 5           Stability Release Comments   Obsolete Minor  x y  Deprecated interface  likely to  be removed in a future minor  release        The interface stability levels described in this manual page apply to both source and  binary interfaces unless otherwise stated  The stability level of each interface is  unknown unless explicitly stated     Standard    organization name   standard name  version     The documented interface complies with the standard listed  If a standard is not  specified the interface is defined by several standards  This is usually the hierarchy  built up from the C Language  defined by ISO IEC or K amp R   SVID 3 and associated  ABIs  defined by AT amp T   the POSIX standards  defined by IEEE and ISO IEC   and  the Single UNIX Specifications  defined by The Open Group   See standards 5   for a complete list of these standards     Most of these interfaces are defined by a formal standard  and controlled by a  standards development organization  Changes will usually be made in accordance  with approved changes to that standard  This stability level can also apply to  interfaces that have been adopted  without a formal standard  by an  industry  convention      Support is provided for only the specified version s  of a standard  support for later  versions is not guaranteed  If the 
78.  currently  where attributes  such as  owner and mode  are not copied unless the  p option  is specified  With the   e  or   p  option  cp attempts to  copy all attributes along with the file data     cpio The   e option informs cpio to archive attributes  but  by default cpio ignores extended attributes  See  Extended Archive Formats below for a description  of the new archive records     du File sizes computed include the space allocated for any  extended attributes present     find By default    ind ignores attributes  The  xattr  expression provides support for searches involving  attribute space  It returns true if extended attributes are  present on the current file     fsck The fsck utility manages extended attribute data on  the disk  A file system with extended attributes can be  mounted on versions of Solaris that are not  attribute aware  versions prior to Solaris 9   but the  attributes will not be accessible and   sck will strip  them from the files and place them in lost   found   Once the attributes have been stripped the file system  is completely stable on Solaris versions that are not  attribute aware  but would now be considered    Standards  Environments  and Macros 97    fsattr 5     98    fsdb    ls    mv    pax    tar       corrupted on attribute aware versions of Solaris  The  attribute aware   sck utility should be run to stabilize  the file system before using it in an attribute aware  environment     This   sdb utility is able to find the inode for 
79.  dependent libraries  various databases  commands and daemons  that are associated with subsystem and that are not invoked directly by a human  user  An approved installation location for bundled Solaris software  The analogous  location for add on system software or for applications is  opt  packagename 1ib      usr lib subsystem ia64  x86 64   bit  platform amp hyphen dependent libraries  various databases  commands  and daemons that are associated with subsystem and that are not invoked directly  by a human user  Note that ia64 is an example name  the actual name might be  different  An approved installation location for bundled Solaris software  The  analogous location for add on system software or for applications is    opt  packagename 1ib iae4      usr lib subsystem sparcv9  SPARC 64 bit  platform amp hyphen dependent libraries  various databases  commands  and daemons that are associated with subsystem and that are not invoked directly  by a human user  An approved installation location for bundled Solaris software   The analogous location for add on system software or for applications is    opt  packagename   1ib sparcv9      usr subsystem 1ib  Platform amp hyphen dependent libraries  various databases  commands and daemons  not invoked directly by a human user  An approved installation location for  bundled Solaris software  The analogous location for add on system software or for  applications is  opt  packagename 1ib     Standards  Environments  and Macros 57    f
80.  described in Locale Definition above    lt collating symbol gt s   lt collating element gt s  an ellipsis  or the special symbol IGNORE  A  single character  a   collating symbol   or a  lt collating   element gt  represent the relative    Standards  Environments  and Macros 223    locale 5        position in the character collating sequence of the character or symbol  rather than the  character or characters themselves  Thus  rather than assigning absolute values to  weights  a particular weight is expressed using the relative order value assigned to a  collating element based on its order in the character collation sequence     One to many mapping is indicated by specifying two or more concatenated characters  or symbolic names  For example  if the character  lt eszet gt  is given the string     s    s    as a weight  comparisons are performed as if all occurrences of the character   lt eszet gt  are replaced by  lt s gt  lt s gt   assuming that   s   has the collating weight  lt s gt     If it is necessary to define  lt eszet gt  and  lt s gt  lt s gt  as an equivalence class  then a  collating element must be defined for the string ss     All characters specified via an ellipsis will by default be assigned unique weights   equal to the relative order of characters  Characters specified via an explicit or implicit  UNDEFINED special symbol will by default be assigned the same primary weight  that  is  belong to the same equivalence class   An ellipsis symbol as a weight i
81.  discuss OPTIONS or  cite EXAMPLES  Interactive commands   subcommands  requests  macros  and functions are  described under USAGE     This section appears on pages in Section 7 only   Only the device class that supplies appropriate  parameters to the ioct1 2  system call is called  ioctl and generates its own heading  ioct1 calls  for a specific device are listed alphabetically  on the  man page for that specific device   ioct1 calls are  used for a particular class of devices all of which  have an io ending  such as mt io 7I      This secton lists the command options with a  concise summary of what each option does  The  options are listed literally and in the order they  appear in the SYNOPSIS section  Possible  arguments to options are discussed under the  option  and where appropriate  default values are  supplied     This section lists the command operands and  describes how they affect the actions of the  command     This section describes the output     standard output   standard error  or output files   generated by the  command     If the man page documents functions that return  values  this section lists these values and describes  the conditions under which they are returned  If a  function can return only constant values  such as 0  or  1  these values are listed in tagged paragraphs   Otherwise  a single paragraph describes the return  values of each function  Functions declared void do  not return values  so they are not discussed in  RETURN VALUES     On fail
82.  element except for the expressions represented  in the list after the leading circumflex  For example   abc  is an RE that matches  any character or collating element except the characters a  b  or c  The circumflex  will have this special meaning only when it occurs first in the list  immediately  following the left bracket     Standards  Environments  and Macros 305    regex 5        4  Acollating symbol is a collating element enclosed within bracket period           delimiters  Multi character collating elements must be represented as collating  symbols when it is necessary to distinguish them from a list of the individual  characters that make up the multi character collating element  For example  if the  string ch is a collating element in the current collation sequence with the  associated collating symbol  lt ch gt   the expression    ch    will be treated as an RE  matching the character sequence ch  while  ch  will be treated as an RE matching c  or h  Collating symbols will be recognized only inside bracket expressions  This  implies that the RE    ch     c matches the first to fifth character in the string  chchch  If the string is not a collating element in the current collating sequence  definition  or if the collating element has no characters associated with it  the  symbol will be treated as an invalid expression       An equivalence class expression represents the set of collating elements belonging to    an equivalence class  Only primary equivalence classe
83.  file that is not a directory     Conceptually  the attribute model is fully general  Extended attributes can be any type  of file  doors  links  directories  and so forth  and can even have their own attributes   fully recursive   As a result  the attributes associated with a file could be an arbitrarily  deep directory hierarchy where each attribute could have an equally complex attribute  tree associated with it  Not all implementations are able to  or want to  support the full  model  Implementation are therefore permitted to reject operations that are not  supported  For example  the implementation for the UFS file system allows only  regular files as attributes  for example  no sub directories  and rejects attempts to place  attributes on attributes     The following list details the operations that are rejected in the current  implementation     link Any attempt to create links between attribute and  non attribute space is rejected to prevent  security related or otherwise sensitive attributes from  being exposed  and therefore manipulable  as regular  files     rename Any attempt to rename between attribute and  non attribute space is rejected to prevent an already  linked file from being renamed and thereby  circumventing the link restriction above     mkdir  symlink  mknod Any attempt to create a  non regular  file in attribute  space is rejected to reduce the functionality  and  therefore exposure and risk  of the initial  implementation        96 manpages section 
84.  filter the  output through co1 1   All external  mm macros are defined below     Note  this  mm macro package is an extended version written at Berkeley and is a  superset of the standard  mm macro packages as supplied by Bell Labs  Some of the  Bell Labs macros have been removed  for instance  it is assumed that the user has little  interest in producing headers stating that the memo was generated at Whippany Labs     Many nroff and troff requests are unsafe in conjunction with this package   However  the first four requests below may be used with impunity after initialization   and the last two may be used even before initialization      bp begin new page    br break output line    Spn insert n spacing lines    cen center next n lines    lsn line spacing  1 1 single  122 double space   na no alignment of right margin    Font and point size changes with  f and Vs are also allowed  for example    fIword fR will italicize word  Output of the tb1 1   eqn 1  and refer 1   preprocessors for equations  tables  and references is acceptable as input     Here is a table of macros                    Break   Macro Name Initial Value Reset  Explanation  SEG on yy one column format on a new page  x2   1    yy two column format l line length   AE   y end abstract   AL t  il  s  t 1 i  Li s 0 y Start automatic list type    t  1 A a I i  1 arabic numbers   A uppercase letters a lowercase  letters  I uppercase Roman  numerals  i lowercase Roman  numerals indentation i  separation s         
85.  fns policies 5   At the enterprise level  FNS policies specify naming for  organizations  hosts  users  sites  and services  The enterprise level naming service  provides contexts to allow other objects to be named relative to these objects     The FNS organizational unit namespace provides a hierarchical namespace for naming  subunits of an enterprise  However  NIS does not support a hierarchical organizational  structure  Therefore  a NIS domain maps to a single organizational unit in the FNS  namespace     Users in an FNS organizational unit correspond to the users in the passwd  byname  map of the corresponding NIS domain  FNS provides a context for each user in the  passwd  byname map     Hosts in an FNS organizational unit correspond to the hosts in the hosts   byname  map of the corresponding NIS domain  FNS provides a context for each host in the  hosts  byname map     Federating NIS with the global naming systems DNS or X 500 makes NIS contexts  accessible outside of an NIS domain  To enable the federation  the administrator must  first add address information in either DNS or X 500  see fns_dns 5  and  fns_x500 5    After this administrative step has been taken  clients outside of the NIS  domain can access contexts and perform operations     Changes to the FNS information  using the commands   ncreate 1M    fncreate_fs 1M   fncreate_printer 1M   fnbind 1   fndestroy 1M    fncheck 1M   and fnunbind 1   can be performed only by the privileged users on  the NIS maste
86.  following tables  are mapped unchanged                             Conversions Performed  ISO 8859 1 ISO 646sv ISO 8859 1 ISO 646sv  304 133 344 173  305 135 345 175  311 100 351 140  326 134 366 174  334 136 374 176  Converted to Underscore      137   100 133 134 135 136 M40       173 174 175 176    Standards  Environments  and Macros 139    iconv  8859 1 5     200 201 202 203 204 205 206 207  210 211 212 213 214 215 216 217  220 221 222 223 224 225 226 227  230 231 232 233 234 235 236 237  240 241 242 243 244 245 246 247  250 251 252 253 254 255 256 257  260 261 262 263 264 265 266 267  270 271 272 273 274 275 276 277       300 301 302 303 306 307   310 312 313 314 315 316 317   320 321 322 323 324 325 327   330 331 332 333 335 336 337   340 341 342 343 346 347   350 352 353 354 355 356 357   360 361 362 363 364 365 367   370 371 372 373 375 376 377   FILES    usr lib iconv   so conversion modules    usr lib iconv   t conversion tables   usr lib iconv iconv data list of conversions supported by conversion    tables    SEE ALSO   iconv 1   iconv 3C   iconv 5        140 man pages section 5  Standards  Environments  and Macros    Last Revised 28 Apr 1997    NAME    DESCRIPTION    CONVERSIONS    ISO 8859 2 to MS  1250    ISO 8859 2 to MS  852       iconv_8859 2 5   iconv_8859 2     code set conversion tables for ISO 8859 2  Latin 2     The following code set conversions are supported                       Code Set Conversions Supported  Code Symbol Target Code Symbol Target Ou
87.  for  organizations  hosts  users  sites  and services  The enterprise level naming service  provides contexts to allow other objects to be named relative to these objects     The organizational unit namespace provides a hierarchical namespace for naming  subunits of an enterprise  In  etc files  there is no concept of an organization  Hence   with respect to  etc files as the naming service  there is a single organizational unit  context that represents the entire system  Users in an FNS organizational unit  correspond to the users in the  etc passwd file  FNS provides a context for each user  in the  etc passwd file     Hosts in an FNS organizational unit correspond to the hosts in the  etc hosts file   FNS provides a context for each host in the  etc hosts file     Changes to the FNS information  using the commands   ncreate 1M     fncreate fs 1M   fnbind 1   fndestroy 1M  and fnunbind 1   can be  performed only by the privileged users on the system that exports the  var fn  directory  Also  based on the UNIX user IDs  users are allowed to modify their own  contexts  bindings  and attributes  from any machine that mounts the  var fn  directory     For example  the command   ncreate 1M  creates FNS related files and directories in  the system on which the command is executed  Hence  the invoker of the  fncreate 1M  command must have super user privileges in order to create the user   host  site  and service contexts  However  a user could use the fnunbind 1  command  to cre
88.  for a command or function is laid out as follows      TH title  1 8  The name of the command or function  which serves as  the title of the manual page  This is followed by the  number of the section in which it appears     SH NAME The name  or list of names  by which the command is  called  followed by a dash and then a one line  summary of the action performed  All in Roman font   this section contains no trof   1  commands or  escapes  and no macro requests  It is used to generate  the windex database  which is used by the whatis 1   command      SH SYNOPSIS    Commands   The syntax of the command and its arguments  as  typed on the command line  When in boldface  a  word must be typed exactly as printed  When in  italics  a word can be replaced with an argument  that you supply  References to bold or italicized  items are not capitalized in other sections  even  when they begin a sentence     Syntactic symbols appear in Roman face        An argument  when surrounded by  brackets is optional     l Arguments separated by a vertical bar  are exclusive  You can supply only one  item from such a list     Arguments followed by an ellipsis can be  repeated  When an ellipsis follows a  bracketed set  the expression within the  brackets can be repeated     Functions   If required  the data declaration  or  include  directive  is shown first  followed by the function  declaration  Otherwise  the function declaration is  shown      SH DESCRIPTION A narrative overview of the command
89.  for domain names  For NIS   the fully qualified  domain name is case insensitive and terminated by a dot character            For NIS  the  fully qualified domain name is case sensitive and not terminated by a dot character   For both NIS  and NIS    server address gt  is optional  If it is not supplied  a host name  lookup will be performed to get the machine s address     For example  if the machine wiz nisplus server with address 133 33 33 33  serves the NIS  domain wiz   com   the reference would look like this     wiz com  wiz nisplus server 133 33 33 33   For another example  if the machine woz nis server serves the NIS domain  Woz   COM  the reference would look like this    Woz COMwoz nis server   Before the next naming system reference can be added to X 500  the X 500 schema    must be altered to include the following object class and associated attributes  defined  in ASN 1 notation      88 manpages section 5  Standards  Environments  and Macros    Last Revised 29 Jan 1998       fns x500 5     xFNSupplement OBJECT CLASS         SUBCLASS OF   top     KIND auxiliary   MAY CONTAIN   objectReferenceString    nNSReference   String     ID id oc xFNSupplement    id oc xFNSupplement OBJECT IDENTIFIER          iso member body 2  ansi 840  sun 113536  25      objectReferenceString ATTRIBUTE        WITH SYNTAX OCTET STRING  EQUALITY MATCHING RULE octetStringMatch  SINGLE VALUE TRUE  ID id at objectReferenceString      id at objectReferenceString OBJECT IDENTIFIER        iso m
90.  g   par un copyright et licenci   par des fournisseurs de Sun     Certaines parties de ce produit pourront   tre d  riv  es du syst  me Berkeley BSD licenci  s par l Universit   de Californie  UNIX est une marque d  pos  e  aux Etats Unis et dans d autres pays et licenci  e exclusivement par X Open Company  Ltd     Sun  Sun Microsystems  le logo Sun  docs sun com  AnswerBook  AnswerBook2  et Solaris sont des marques de fabrique ou des marques d  pos  es de   Sun Microsystems  Inc  aux Etats Unis et dans d autres pays  Toutes les marques SPARC sont utilis  es sous licence et sont des marques de fabrique ou  des marques d  pos  es de SPARC International  Inc  aux Etats Unis et dans d autres pays  Les produits portant les marques SPARC sont bas  s sur une  architecture d  velopp  e par Sun Microsystems  Inc     L interface d utilisation graphique OPEN LOOK et Sun   a   t   d  velopp  e par Sun Microsystems  Inc  pour ses utilisateurs et licenci  s  Sun reconnait  les efforts de pionniers de Xerox pour la recherche et le d  veloppement du concept des interfaces d utilisation visuelle ou graphique pour l industrie  de l informatique  Sun d  tient une licence non exclusive de Xerox sur l interface d utilisation graphique Xerox  cette licence couvrant   galement les  licenci  s de Sun qui mettent en place l interface d utilisation graphique OPEN LOOK et qui en outre se conforment aux licences   crites de Sun     CETTE PUBLICATION EST FOURNIE  EN L ETAT  ET AUCUNE GARANTIE  EXPRESSE
91.  gt j  lt a acute gt     lt a grave gt   lt a gt j  lt a grave gt     lt A gt   lt a gt   lt A gt     lt A acute gt   lt a gt    lt A acute gt     lt A grave gt   lt a gt    lt A grave gt     lt ch gt   lt ch gt   lt ch gt     lt Ch gt   lt ch gt   lt Ch gt     lt S gt   lt S gt    lt S gt     lt eszet gt    lt S gt  lt S gt     lt eszet gt  lt eszet gt      order_end    This example is interpreted as follows     1  The UNDEFINED means that all characters not specified in this definition  explicitly  or via the ellipsis  are ignored for collation purposes  for regular expression  purposes they are ordered first     2  All characters between   space   and  lt a gt  have the same primary equivalence class  and individual secondary weights based on their ordinal encoded values     3  All characters based on the upper  or lower case character a belong to the same  primary equivalence class     4  The multi character collating element   ch   is represented by the collating symbol    ch   and belongs to the same primary equivalence class as the multi character  collating element   Ch       The collating order entries must be terminated with an order end keyword     The LC MONETARY category defines the rules and symbols that are used to format  monetary numeric information  This information is available through the  localeconv 3C  function    The following items are defined in this category of the locale  The item names are the  keywords recognized by the 1ocaledef 1  utility when d
92.  in page footer  x is date on cover          Standards  Environments  and Macros 259    ms 5     260                                                                                                    Break   Macro Name Initial Value Reset  Explanation   NHxy   yy numbered header  x level  x 0 resets  x S sets to y   NL 10p n set point size back to normal   OF x   n odd page footer x  3 part as for   t1    OH x   n odd page header x  3 part as for   t1    P1 if TM n print header on first page    PP   yy paragraph with first line indented   PT   Yo   n page title  printed at head of page   PXx   y print index  table of contents   x no suppresses title   QP   yy quote paragraph  indented and shorter    R on n return to Roman font   RE 5n yy retreat  end level of relative indentation   RP x   n released paper format  x no stops title on first page   RS 5n yy right shift  start level of relative indentation   SH   yy section header  in boldface   SM B n smaller  decrease point size by 2   TA 8n 5n n set TAB characters to 8n 16n     nrof    or 5n 10n      troff   TCX B y print table of contents at end  x no suppresses title    TE   y end of table processed by tbl   TH   y end multi page header of table   TL   y title in boldface and two points larger   TM off n UC Berkeley thesis mode   TS x   yy begin table  if x H table has multi page header   ULx   n underline x  even in troff   UXx   n UNIX  trademark message first time  x appended   XAxy   y another index entry  x page or no f
93.  is  Wiz COM   and   sales  is a subdomain of that  Then  the names org sales Wiz COM  and  org sales both refer to the organizational unit corresponding to the same NIS   domain sales Wiz COM     User names correspond to names in the corresponding NIS  passwd org dir table  The  file system context associated with a user is obtained from his entry in the NIS   passwd org dir table     Host names correspond to names in the corresponding NIS  hosts org_dir table  The  file system context associated with a host corresponds to the files systems exported by  the host     EXAMPLE 1 The types of objects that may be named relative to an organizational unit name   are  user  host  service  file  and site  Here are some examples of names name objects   relative to organizational unit names    org accounts payable finance site videoconference northwing  names a conference room videoconference located in the north wing of the site  associated with the organizational unit accounts payable finance     org finance user mjones  names a user mjones in the organizational unit finance     org finance host inmail  names a machine inmail belonging to the organizational unit finance     org accounts payable finance fs pub blue and whites FY92 124  names a file pub blue and whites FY92 124 belonging to the organizational  unit accounts payable finance     org accounts payable finance service calendar  names the calendar service of the organizational unit  accounts payable finance  This might manag
94.  locale  at a minimum  the 26 upper case  characters     ABCDEFGHIJKLMNOPORSTUVWXYZ    are mapped to the corresponding 26 lower case  characters     abcdefghijkimnopqrstuvwxwyz    In a locale definition file  the operand consists of  character pairs  separated by semicolons  The  characters in each character pair are separated by a  comma and the pair enclosed by parentheses  The first  character in each pair is the upper case letter  the  second the corresponding lower case letter  Only  characters specified for the keywords lower and  upper can be specified  If the tolower keyword is  omitted from the locale definition  the mapping will be  the reverse mapping of the one specified for toupper     The LC COLLATE category provides a collation sequence definition for numerous  utilities  such as sort 1   uniq 1   and so forth   regular expression matching  see  regex 5    and the st rco11 3C   strxfrm 3C   wcsco11 3C   and wesxfrm 3C   functions     Standards  Environments  and Macros 219    locale 5     collating element    keyword       A collation sequence definition defines the relative order between collating elements   characters and multi character collating elements  in the locale  This order is  expressed in terms of collation values  that is  by assigning each element one or more  collation values  also known as collation weights   At least the following capabilities  are provided     1  Multi character collating elements  Specification of multi character    collatin
95.  locale 5     p sign posn 4 1 25    1 25    1 25 4    The monetary formatting definitions for the POSIX locale follow  the code listing  depicting the localedef 1  input  the table representing the same information with  the addition of 1ocaleconv 3C  and n1 langinfo 3C  formats  AII values are  unspecified in the POSIX locale     LC MONETARY    This is the POSIX locale definition for    the LC MONETARY category          int_curr_symbol wn  currency symbol  n  mon decimal point  n  mon thousands sep  n  mon grouping      positive_sign  n    negative sign n     int frac digits  a   p cs precedes cm  p sep by space  I  n cs precedes eu  n sep by space  1  p sign posn  1  n_sign_posn  i       END LC MONETARY    The entry n a indicates that the value is not available in the POSIX locale     LC NUMERIC   The LC NUMERIC category defines the rules and symbols that will be used to format  non monetary numeric information  This information is available through the  localeconv 3C  function     The following items are defined in this category of the locale  The item names are the  keywords recognized by the localedef utility when defining a locale  They are also  similar to the member names of the  conv structure defined in  lt locale h gt   The  localeconv    function returns  CHAR MAX  for unspecified integer items and the  empty string       for unspecified or size zero string items        Standards  Environments  and Macros 229    locale 5        In a locale definition file the oper
96.  login account require pam_sample so 1 allow larry  dtlogin account require pam_sample so 1 allow larry  rlogin account require pam sample so 1 allow don    allow larry    su account require pam sample so 1 allow sam eric       The debug and nowarn options are also supported     The SAMPLE Password Management Component function    pam sm chauthtok 3PAM    always returns PAM SUCCESS     The SAMPLE Session Management Component functions    pam sm open session 3PAM  pam sm close session 3PAM   always return  PAM SUCCESS     See attributes 5  for description of the following attributes     ATTRIBUTE TYPE ATTRIBUTE VALUE       MT Level MT Safe with exceptions                pam 3PAM   pam sm authenticate 3PAM   pam sm chauthtok 3PAM    pam sm close session 3PAM   pam sm open session 3PAM    pam sm setcred 3PAM   libpam 3LIB   pam  conf 4   att ributes 5     The interfaces in 1libpam   are MT Safe only if each thread within the multi threaded  application uses its own PAM handle     290 manpages section 5  Standards  Environments  and Macros   Last Revised 28 Oct 1996    NAME  SYNOPSIS    DESCRIPTION    Smart Card  Authentication  Module    Smart Card  Module  Configuration    SEE ALSO       pam  smartcard 5   pam smartcard   PAM authentication module for Smart Card     usr lib security pam smartcard so    The Smart Card service module for PAM     usr lib security pam smartcard so  provides functionality to obtain a  user s information  such as user name and password  for a smart c
97.  of the shell that invokes su  A user needs the appropriate entry in the roles list  inuser attr 4 to be able to su to another user     Standards  Environments  and Macros 287    pam roles 5     288    SEE ALSO    NOTES       In the example above  the rlogin program invokes the pam roles so 1 module   The module checks for PAM RUSER and determines whether the role being assumed   PAM RUSER  is in the roles list of the userattr entry for PAM RUSER  If it is in the roles  list  the module returns PAM SUCCESS  otherwise it returns PAM PERM DENIED     keylogin 1   libpam 3LIB   pam 3PAM   pam acct mgmt 3PAM     pam setcred 3PAM   pam set item 3PAM   syslog 3C   pam  conf 4     user attr 4  attributes 5  pam authtok check 5  pam authtok get 5    pam authtok store 5   pam dhkeys 5  pam passwd auth 5   pam unix 5    pam unix account 5  pam unix auth 5  pam unix session 5     The interfaces in 1ibpam 3LIB  are MT Safe only if each thread within the  multi threaded application uses its own PAM handle     The pam unix 5  module might not be supported in a future release  Similar  functionality is provided by pam authtok check 5  pam authtok get 5    pam authtok store 5   pam dhkeys 5   pam passwd auth 5     pam unix account 5  pam unix auth 5  and pam unix session 5      man pages section 5  Standards  Environments  and Macros    Last Revised 11 Dec 2001    NAME  SYNOPSIS    DESCRIPTION    SAMPLE  Authentication  Component       pam sample 5   pam  sample   a sample PAM module     usr 
98.  openat  2  function  Once a file descriptor has been obtained for an attribute file  by an openat    call  all normal file system semantics apply  There is no attempt to  place special semantics on read 2   write 2   ftruncate 3C   or other functions  when applied to attribute file descriptors relative to  normal  file descriptors     The set of existing attributes can be browsed by calling openat    with     as the file  name and the O XATTR flag set  resulting in a file descriptor for the attribute directory   The list of attributes is obtained by calls to getdents 2  on the returned file  descriptor  If the target file did not previously have any attributes associated with it   an empty top level attribute directory is created for the file and subsequent   getdents    calls will return only     and        While the owner of the parent file  owns the extended attribute directory  it is not charged against its quota if the  directory is empty  Attribute files themselves  however  are charged against the user  quota as any other regular file     Additional system calls have been provided as convenience functions  These include  the   chownat 2     statat 2   futimesat 2   renameat  2   unlinkat 2   These  new functions  along with openat      provide a mechanism to access files relative to  an arbitrary point in the file system  rather than only the current working directory   This mechanism is particularly useful in situations when a file descriptor is available  with no pa
99.  or  X Open specification conforming interfaces should use the following compilation  methods and set whichever feature test macros are appropriate to obtain the desired  environment  see standards 5       m Setthe compile time flag LARGEFILE64 SOURCE to 1 before including any  headers     m Use the getconf 1  command with one or more of the following arguments        argument purpose    LFS64 CFLAGS obtain compilation flags necessary to enable the transitional  compilation environment                man pages section 5  Standards  Environments  and Macros   Last Revised 26 Jan 1998    EXAMPLES    SEE ALSO       Ifcompile64 5                                   argument purpose  1FS64_LDFLAGS obtain link editor options   FS64 LIBS obtain link library names   FS64_LINTFLAGS obtain lint options       In the following examples  the transitional compilation environment is accessed by  invoking the get conf utility with one of the arguments listed in the table above  The  additional large file interfaces are accessed either by specifying    D LARGEFILE64 SOURCE or by invoking the get conf utility with the arguments  listed above     The example that uses the form of command substitution specifying the command  within parentheses preceded by a dollar sign can be executed only ina  POSIX conforming shell such as the Korn Shell  see ksh 1    In a shell that is not  POSIX conforming  such as the Bourne Shell  see sh 1   and the C Shell  see csh 1     the command must be enclosed within 
100.  or an X 500 name can appear after the        Support for federating global   naming services is planned for a future release of FNS     Standards  Environments  and Macros 81    fns policies 5     Within an enterprise  there are namespaces for organizational units  sites  hosts  users   files and services  referred to by the names orgunit  site  host  user    s  and  service  In addition  these namespaces can be named using these names with an  added underscore     _     prefix  for example  host and  host have the same binding    The following table summarizes the FNS policies                 Context Subordinate Parent  Type Context Context  org unit site enterprise root  user  host  file system  service  site user enterprise root  host org unit  file system  service  user service enterprise root  file system org unit  host service enterprise root  file system org unit  service not specified enterprise root    org unit  site  user    host          file system       none       enterprise root  org unit   site   user    host          82 man pages section 5     Standards  Environments  and Macros    Last Revised 4 Nov 1994       EXAMPLES       fns policies 5     In Solaris  an organizational unit name corresponds to an NIS  domain name and is  identified using either the fully qualified form of its NIS  domain name  or its NIS   domain name relative to the NIS  root  Fully qualified NIS  domain names have a  terminal dot            For example  assume that the NIS  root domain
101.  or function s  external behavior  This includes how it interacts with  files or data  and how it handles the standard input   standard output and standard error  Internals and  implementation details are normally omitted  This  section attempts to provide a succinct overview in  answer to the question   what does it do         244 manpages section 5  Standards  Environments  and Macros   Last Revised 11 Jun 1992    FILES    SEE ALSO        SH OPTIONS     SH FILES  SSH SEE ALSO    SH DIAGNOSTICS    SH BUGS    mansun 5     Literal text from the synopsis appears in constant  width  as do literal filenames and references to items  that appear elsewhere in the reference manuals   Arguments are italicized     If a command interprets either subcommands or an  input grammar  its command interface or input  grammar is normally described in a USAGE section   which follows the OPTIONS section  The  DESCRIPTION section only describes the behavior of  the command itself  not that of subcommands     The list of options along with a description of how each  affects the command s operation     A list of files associated with the command or function     A comma separated list of related manual pages   followed by references to other published materials     A list of diagnostic messages and an explanation of  each     A description of limitations  known defects  and  possible problems associated with the command or  function      usr share lib tmac ansun     usr share man windex    man 1   nr
102.  pattern that will  match the concatenation of the single characters or collating elements matched by  each of the concatenated patterns     m The concatenation of one or more patterns matching a single character with one or  more asterisks is a valid pattern  In such patterns  each asterisk will match a string  of zero or more characters  matching the greatest possible number of characters  that still allows the remainder of the pattern to match the string     man pages section 5  Standards  Environments  and Macros    Last Revised 28 Mar 1995    Patterns Used for  Filename  Expansion       fnmatch 5     Since each asterisk matches zero or more occurrences  the patterns a b and a  b have  identical functionality     Examples    a  bc  matches the strings ab and ac    a d matches the strings ad  abd and abcd  but not the string abc   a d  matches the strings ad  abcd  abcdef  aaaad and adddd    a d matches the strings ad  abcd  efabcd  aaaad and adddd     The rules described so far in Patterns Matching Multiple Characters and  Patterns Matching a Single Character are qualified by the following rules that  apply when pattern matching notation is used for filename expansion     1  The slash character in a pathname must be explicitly matched by using one or  more slashes in the pattern  it cannot be matched by the asterisk or question mark  special characters or by a bracket expression  Slashes in the pattern are identified  before bracket expressions  thus  a slash cannot be in
103.  return to Roman font    RBxy   n use Roman on x and embolden y    RIXy   n use Roman on x and underline y    RP x   yy released paper format   x no stops  title on first    RS 5n yy right shift  start level of relative  indentation    Smn   n set character point size  amp  vertical  space character point size m   vertical space n    SAx x 1 n justification  x  0 1     SKx   y skip x pages    SM   n smaller  decrease point size by 2    SP x    y leave x blank lines    TBx n  n i y table title  table x  number n   DG   y print table of contents  put at end of  input file     TE i y end of table processed by tbl    TH   y end multi page header of table    TL   n title in boldface and two points  larger     TM    n UC Berkeley thesis mode    TPi y y i p i  Begin indented paragraph   with the tag given on the next text  line  Set prevailing indent to i    PSU   yy begin table  if x H table has  multi page header   JTY   y display centered title CONTENTS          254 manpages section 5  Standards  Environments  and Macros   Last Revised 1 Jan 1997    REGISTERS       mm 5           Break   Macro Name Initial Value Reset  Explanation   vLi m  s  m 0 s 0 y start variable item list  indentation i  mark indentation m  separation s                Formatting distances can be controlled in  mm by means of built in number registers   For example  this sets the line length to 6 5 inches      nr LL 6 51    Here is a table of number registers and their default values                          
104.  should have a         in their name  as in 4415 n1     Here are some of the known terminal names   For a complete list  enter the command  ls  C  usr share lib terminfo            2621 hp2621   2631   2631 c   2631 e  2640 hp2640  2645 hp2645   3270   33 tty33   35 tty35   37 tty37   4000a  4014 tek4014  40 tty40   43 tty43   4410 5410  4410 nfk 5410 nfk  4410 nsl 5410 nsl  4410   w 5410 w  4410v1 5410v1  4410v1   w 5410v1 w  4415 5420  4415 n1 5420 nl    Hewlett Packard 2621 series   Hewlett Packard 2631 line printer  Hewlett Packard 2631 line printer  compressed mode  Hewlett Packard 2631 line printer  expanded mode  Hewlett Packard 2640 series   Hewlett Packard 2645 series   IBM Model 3270   AT amp T Teletype Model 33 KSR   AT amp T Teletype Model 35 KSR   AT amp T Teletype Model 37 KSR   Trendata 4000a   TEKTRONIX 4014   AT amp T Teletype Dataspeed 40 2   AT amp T Teletype Model 43 KSR   AT amp T 4410 5410 in 80 column mode  version 2  AT amp T 4410 5410 without function keys  version 1  AT amp T 4410 5410 without pln defined   AT amp T 4410 5410 in 132 column mode   AT amp T 4410 5410 in 80 column mode  version 1  AT amp T 4410 5410 in 132 column mode  version 1  AT amp T 4415 5420 in 80 column mode   AT amp T 4415 5420 without changing labels       Standards  Environments  and Macros 335    term 5        4415 rv 5420 rv  4415 rv   nl 5420 rv   nl  4415 w 5420   w  4415   w nl 5420   w nl    4415   w rv 5420   w rv  4418 5418  4418 w 5418   w   4420   4424   4424 2   44
105.  that begin with host names  explicitly via host or  implicitly via thishost   and name objects relative to hosts when resolved in the  Initial Context     host mailhop service mailbox  names the mailbox service associated with the machine mailhop     host mailhop fs pub saf archives 91  names the directory pub saf archives 91 found under the root directory of the  machine mailhop     thishost service printer  names the printer service of H     SEE ALSO   nis  1   geteuid 2  fn ctx handle from initial 3XFEN   xfn 3XFEN     ns 5    fns policies 5        76 manpages section 5  Standards  Environments  and Macros    Last Revised 1 Nov 1994    NAME    DESCRIPTION    FNS Policies and  NIS        fns_nis  5     fns_nis      overview of FNS over NIS  implementation    Federated Naming Service  FNS  provides a method for federating multiple naming  services under a single  simple interface for the basic naming operations  One of the  naming services supported by FNS is NIS   the enterprise wide information service in  Solaris  see nis  1    FNS provides the XFN interface for performing naming and  attribute operations on FNS enterprise objects  organization  site  user  host  and  service objects  using NIS   FNS stores bindings for these objects in NIS  and uses  them in conjunction with existing NIS  objects     FNS defines policies for naming objects in the federated namespace  see   fns policies 5   At the enterprise level  FNS policies specify naming for  organizations  hosts  u
106.  that for every process     1  There is a user associated with the process when  fn ctx handle from initial    is invoked  This association is based on the  effective uid of the process  In the following discussion this user is denoted by U   The association of user to process may change during the life of a process but does  not affect the context handle originally returned by  fn ctx handle from initial             2  The process is running on a host when   n ctx handle from initial   is  invoked  In the following discussion this host is denoted by H     The following atomic names can appear in the Initial Context           thishost thisorgunit  thisens myself myorgunit  myens orgunit site  user host  Except for       these names with an added underscore       prefix are also in the    Initial Context and have the same binding as their counterpart  for example   thishost and thishost have the same binding   In addition  org has the same  binding as orgunit  and thisuser has the same binding as myself  The bindings  for these names are summarized in the following table     Some of these names may not necessarily appear in all Initial Contexts  For example  a  process owned by the super user of a machine does not have any of the user related  bindings  Or  for another example  an installation that has not set up a site namespace  will not have the site related bindings     global context for resolving DNS or X 500 names     Synonym       thishost H s host context  Synonym  th
107.  to many mappings  see 1ocale 5   will not be performed  For example   assuming that the character eszet is placed in the collation sequence after r and s   but before t  and that it maps to the sequence ss for collation purposes  then the  expression  r s  matches only r and s  but the expression  s t  matches s  beta  or  t     The interpretation of range expressions where the ending range point is also the  starting range point of a subsequent range expression  for instance  a m o   is  undefined     The hyphen character will be treated as itself if it occurs first  after an initial    if  any  or last in the list  or as an ending range point in a range expression  As  examples  the expressions   ac  and  ac   are equivalent and match any of the  characters a  c  or         ac  and   ac   are equivalent and match any characters  except a  c  or      the expression          matches any of the characters between 96  and     inclusive  the expression          matches any of the characters between     and    inclusive  and the expression  a        is invalid  because the letter a follows the  symbol   in the POSIX locale  To use a hyphen as the starting range point  it must  either come first in the bracket expression or be specified as a collating symbol  for  example            0   which matches either a right bracket or any character or  collating element that collates between hyphen and 0  inclusive     If a bracket expression must specify both     and    the   must be pla
108.  to the end of the buffer and continues up to and including the  current line     7  An address followed by a plus sign     or a minus sign     followed by a decimal  number specifies that address plus  respectively minus  the indicated number of  lines  A shorthand for   5 is  5     8  If an address begins with   or    the addition or subtraction is taken with respect to  the current line  for example   5 is understood to mean    5     9  If an address ends with   or    then 1 is added to or subtracted from the address   respectively  As a consequence of this rule and of Rule 8  immediately above  the  address   refers to the line preceding the current line   To maintain compatibility  with earlier versions of the editor  the character   in addresses is entirely  equivalent to     Moreover  trailing   and   characters have a cumulative effect  so       refers to the current line less 2     10  For convenience  a comma      stands for the address pair 1     while a semicolon      stands for the pair           Characters that have special meaning except when they appear within square brackets     1  or are preceded by   are            V   Other special characters  such as   have  special meaning in more restricted contexts     The character   at the beginning of an expression permits a successful match only  immediately after a newline  and the character   at the end of an expression requires a  trailing newline     Two characters have special meaning only when used within squ
109.  using   nlookup 1  to see if the information has been  added properly  For example  the following command looks up the next naming  system reference of the Wiz organization     example  fnlookup  v     c us o wiz   Note the mandatory trailing slash     After this administrative step has been taken  clients outside of the NIS  hierarchy or  NIS domain can access and perform operations on the contexts in the NIS  hierarchy  or NIS domain  Foreign NIS  clients access the hierarchy as unauthenticated NIS   clients  Continuing the example above  and assuming that NIS  is federated  underneath the Wiz organization  the root of the NIS  enterprise may be listed using  the command     example  fnlist     c us o wiz    Note the mandatory trailing slash    The next naming system reference may be removed using the command   example    fnunbind     c us o wiz    Note the mandatory trailing slash     fnattr 1   fnbind 1   fnlist 1   fnlookup 1   nis  1   ypserv 1M   x  n 3XEN    fns 5   fns_dns 5   fns nis 5  fns nis  5  fns references 5     Solstice X 500    In a 64 bit XFN application  retrieval and modification of information stored in the  X 500 directory service is not supported     man pages section 5  Standards  Environments  and Macros   Last Revised 29 Jan 1998    NAME    DESCRIPTION    Format    Escape Sequences       formats 5     formats   file format notation    Utility descriptions use a syntax to describe the data organization within files   stdin   stdout  stderr  input f
110.  usr sadm bin  Binaries for the Form and Menu Language Interpreter  FMLI  scripts  See   m1i 1       usr sadm install  Executables and scripts for package management      usr sbin  Platform amp hyphen dependent executables for system administration  expected to be  run only by system administrators  An approved installation location for bundled  Solaris software  The analogous location for add on system software or for  applications is  opt  packagename sbin      usr sbin install d  Custom Jumpstart scripts and executables      usr sbin static  Statically linked version of selected programs from  usr bin and  usr sbin   These are used to recover from broken dynamic linking and before all pieces  necessary for dynamic linking are present      usr sbin sparc7 and sparc9  32 bit and 64 bit versions of commands      usr sfw  GNU and open source executables  libraries  and documentation      usr sbin subsystem  Platform amp hyphen dependent executables for system administration  expected to be  run only by system administrators  and associated with subsystem  An approved  installation location for bundled Solaris software  The analogous location for  add on system software or for applications is  opt  packagename  sbin      usr subsystem sbin  Platform amp hyphen dependent executables for system administration  expected to be  run only by system administrators  and associated with subsystem  An approved  installation location for bundled Solaris software  The analogous location fo
111.  vi 1   exec 2   addseverity 3C    catopen 3C   ctime 3C   ctype 3C   fmtmsg 3C   getdate 3C    getnetpath 3NSL   gettext 3C   gettxt 3C   localeconv 3C   mblen 3C    mktime 3C   print    3C   setlocale 3C   st rco11 3C   strftime 3C    strtod 3C   strxfrm 3C   TIMEZONE 4   netcon   ig 4   passwd 4   profile 4     Standards  Environments  and Macros 41    eqnchar 5   NAME   eqnchar   special character definitions for eqn  SYNOPSIS   eqn  usr share lib pub eqnchar filename   troff options    neqn  usr share lib pub eqnchar filename   troff options    DESCRIPTION   The eqnchar command contains nrof    1  and trof   1  character definitions for  constructing characters that are not available on the Graphic Systems typesetter  These  definitions are primarily intended for use with eqn 1  and neqn 1   It contains  definitions for the following characters                    ciplus e    I square  citimes Q langle   circle O  wig   rangle P blot o   wig   hbar it bullet      gt wig  gt  ppd L prop ox    wig  lt   lt   gt  o empty      wig    lt   gt   lt   member      star           nomem g  bigstar     gt    cup U   dot   ang tes cap N  orsign Y rang L incl L  andsign  X 3dot   subset c   del A thf 2  supset 2  oppA Y quarter    Isubset c  oppE dl 3quarter     A Isupset 5  angstrom A degree     FILES    usr share lib pub eqnchar  ATTRIBUTES   See attributes 5  for descriptions of the following attributes   ATTRIBUTE TYPE ATTRIBUTE VALUE             Availability SUNWdoc          SEE 
112.  xfn pass Requests Kerberos V5 authentication with a mapped  password that has been stored under XEN  If Kerberos  V5 authentication fails  or if no password has been  entered  it quits and does not prompt the user for a  password  This option should only be used if the  authentication service is designated as optional in    the pam  con   configuration file     try xfn Pass Requests Kerberos V5 authentication with a mapped  password that has been stored under XFN  If Kerberos  V5 authentication fails  or if no password has been  stored  the user is prompted for a password with the    prompt  Kerberos Password       The Kerberos account management component provides a function to perform  account management  pam sm acct mgmt     This function checks to see if the   pam krb5 authentication module has noted that the user s password has not expired   The following options may be passed in to the Kerberos V5 service module     debug Provides syslog 3C  debugging information at  LOG DEBUG level  nowarn Turn off warning messages     The Kerberos V5 session management component provides functions to initiate   pam sm open session   and terminate pam sm close session   Kerberos V5  sessions  For Kerberos V5  pam sm open session is a null function    pam close session destroys a principal s credential cache as well as the kernel  Kerberos credentials if the session being closed is the last open session on this server  for the calling principal     The Kerberos V5 password management c
113. 11 236 217  207 214 40 240 207  215 212 241 210  216 40 242 216  217 200 243 205  220 202 244 215  221 214 246 220  225 201 247 221  230 206                    usr lib iconv   so     usr lib iconv   t     usr lib iconv iconv data    iconv 1   iconv 3C   iconv 5     conversion modules    conversion tables    list of conversions supported by conversion    tables    178 man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    NAME    DESCRIPTION    CONVERSIONS    PC Cyrillic to ISO  8859 5       iconv  pc cyr 5     iconv pc cyr   code set conversion tables for Alternative PC Cyrillic    The following code set conversions are supported                          The conversions are performed according to the following tables  All values in the  tables are given in octal              Code Set Conversions Supported  Code Symbol Target Code Symbol Target Output  PC Cyrillic alt ISO 8859 5 iso5 ISO 8859 5 Cyrillic  PC Cyrillic alt KOI8 R koi8 KOI8 R  PC Cyrillic alt MS 1251 win5 Windows Cyrillic  PC Cyrillic alt Mac Cyrillic mac Macintosh Cyrillic          For the conversion of PC Cyrillic to ISO 8859 5  all characters not in the following table  are mapped unchanged        Conversions Performed       PC Cyrillic    ISO 8859 5    PC Cyrillic    ISO 8859 5       24   200  201  202  203  204  205  206  207  210  211  212  213  214       260  261  262  263  264  265  266  267  270  271  272  273  274          231  232  233  234  235  236  237  240  241  242 
114. 11 VT 12 NP 13 CR 14 SO 15 SI  16 DLE 17 DC1 18 DC2 19 DC3 20 DCA 21 NAK 22 SYN 23 ETB  24 CAN 25 EM 26 SUB 27 ESC 28 FS 29 GS 30 RS 31 US  32 SP 33   34   35 d 36   37     38  amp  39    40   41   42   43   44   45     46   47    48 0 49 1 50 2 5I 3 52 4 53  5 54 6 55 7  56 8 57 9 58   59   60    61   62  gt  63     64   65 A 66 B 67 C 68 D 69 E 70 F 71 G   72 H 73 I 74 J 75 K 76 G 77 M 78 N 79 0       16 manpages section 5  Standards  Environments  and Macros    Last Revised 19 Apr 2002    FILES       80 P 81 Q 82  88 X 89 Y 90  96   97 a 98   104 h 105i 106   112p  113q 114   120x 121 y 122    usr pub ascii    N KOU ON DW    83  91  99  107  115  123          mwarcu    84  92  100  108  116  124        trara    85  93  101  109  les lg  125    U      e  m  u         86  94  102  110  118  126     gt      lt  Br    87  95  103  LIL  119  127             otl    DEL    ascii 5     On line chart of octal and hexadecimal values for the  ASCII character set     Standards  Environments  and Macros 17    attributes 5   NAME    DESCRIPTION    Architecture    Availability    Code Set  Independence   CSI     attributes  architecture  availability  CSI  stability  MT Level     attributes of interfaces    The ATTRIBUTES section of a manual page contains a table  see below  defining  attribute types and their corresponding values                       ATTRIBUTE TYPE ATTRIBUTE VALUE  Architecture SPARC  Availability SUNWcsu  CSI Enabled  Interface Stability Unstable  MT Level Safe       
115. 230 312 220  215 216 40 313 320 40  217 240 321 245  220 233 40 322 40  234 236 323 243  235 236 40 324 325 40  237 246 326 231  240 377 327 333 40  241 242 40 334 232  243 234 335 336 40  244 40 337 341  245 217 340 341 40  246 252 40 342 203  253 256 343 40  254 252 344 204  255 256 40 345 40  257 241 346 215  260 370 347 207  261 361 350 40  262 40 351 202  263 222 352 221  264 40 353 211  265 346 354 355 40  266 40 356 214  267 372 357 360 40  270 40 361 244  271 206 362 40          man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    MS 1250 to DHN       iconv_1250 5                          Conversions Performed  MS 1250 Mazovia MS 1250 Mazovia   272 40 363 242  273 257 364 223  274 276 40 365 40  277 247 366 224  300 303 40 367 366  304 216 370 373 40  305 40 374 201  306 225 375 376 40  307 200          For the conversion of MS 1250 to DHN  all characters not in the following table are             mapped unchanged   Conversions Performed  MS 1250 DHN MS 1250 DHN  200 213 40 306 201  214 206 307 311 40  215 216 40 312 202  217 207 313 320 40  220 233 40 321 204  234 217 322 40  235 236 40 323 205  237 220 324 325 40  240 377 326 231  241 242 40 327 333 40  243 203 334 232  244 40 335 336 40  245 200 337 341  246 252 40 340 40                      Standards  Environments  and Macros 111    iconv_1250 5     FILES    SEE ALSO       Conversions Performed             MS 1250 DHN MS 1250 DHN   253 256 341 240  254 252 342 345 40  255 256 40
116. 25 365 40  307 200 366 224  310 311 40 367 366  312 220 370 373 40  313 320 40 374 201                   144 man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    ISO 8859 2 to  DHN       iconv  8859 2 5        Conversions Performed       ISO 8859 2    Mazovia    ISO 8859 2    Mazovia       321  322          245  40    375 376          40          For the conversion of ISO 8859 2 to DHN  all characters not in the following table are             mapped unchanged   Conversions Performed  ISO 8859 2 DHN ISO 8859 2 DHN  24 4 322 40  177 237 40 323 205  240 377 324 325 40  241 200 326 231  242 40 327 333 40  243 203 334 232  244 245 40 335 336 40  246 206 337 341  247 253 40 340 40  254 207 341 240  255 256 40 342 345 40  257 210 346 212  260 370 347 351 40  261 211 352 213  262 40 353 354 40  263 214 355 241  264 265 40 356 360 40  266 217 361 215  267 273 40 362 40  274 220 363 216  275 276 40 364 223                      Standards  Environments  and Macros 145    iconv_8859 2 5              Conversions Performed  ISO 8859 2 DHN ISO 8859 2 DHN   277 221 365 40   300 305 40 366 224   306 201 367 366   307 311 40 370 371 40   312 202 372 243   313 320 40 373 376 40   321 204                   FILES    usr lib iconv   so conversion modules     usr lib iconv   t conversion tables     usr lib iconv iconv data list of conversions supported by conversion    tables    SEE ALSO   iconv 1   iconv 3C   iconv 5        146 manpages section 5  Standards  Envi
117. 25 5425  4425 fk 5425 fk    4425 n1 5425 nl    4425   w 5425 w  4425 w fk 5425 w fk    4425 nl w 5425 nl w    4426   450   450 12  500 att500  510 510a  513bct att513  5320   5420_2  5420_2   w  5620 dmd  5620 24 dmd    24  5620 34 dmd 34    AT amp T 4415 5420 80 columns in reverse video  AT amp T 4415 5420 reverse video without changing labels  AT amp T 4415 5420 in 132 column mode    AT amp T 4415 5420 in 132 column mode without changing  labels    AT amp T 4415 5420 132 columns in reverse video   AT amp T 5418 in 80 column mode   AT amp T 5418 in 132 column mode   AT amp T Teletype Model 4420   AT amp T Teletype Model 4424   AT amp T Teletype Model 4424 in display function group ii  AT amp T 4425 5425   AT amp T 4425 5425 without function keys    AT amp T 4425 5425 without changing labels in 80 column  mode    AT amp T 4425 5425 in 132 column mode    AT amp T 4425 5425 without function keys in 132 column  mode    AT amp T 4425 5425 without changing labels in 132 column  mode    AT amp T Teletype Model 44265   DASI 450  same as Diablo 1620    DASI 450 in 12 pitch mode   AT amp T IS 500 terminal   AT amp T 510 510a in 80 column mode  AT amp T 513 bct terminal   AT amp T 5320 hardcopy terminal   AT amp T 5420 model 2 in 80 column mode  AT amp T 5420 model 2 in 132 column mode  AT amp T 5620 terminal 88 columns   AT amp T Teletype Model DMD 5620 in a 24x80 layer    AT amp T Teletype Model DMD 5620 in a 34x80 layer          336 manpages section 5  Standards  Environments  and M
118. 251  Mac Cyrillic  ISO 8859 5  PC Cyrillic  MS 1251  Mac Cyrillic  ISO 8859 5  KOI8 R  MS 1251                   Supported    Symbol    8859  8859  8859  8859  8859  8859  8859  8859  646  646de  646da  646en  646es  646fr  646it  646sv  iso2  isol6  ibm850  ibm870  win2  dos2  maz  isol6  isol6  dhn  So2  in2       Target Output    US ASCII  German  Danish  English ASCII  Spanish  French  Italian  Swedish  7 bit ASCII  German  Danish  English ASCII  Spanish  French  Italian    Swedis  ISO La  ISO La    h  tin 2  tin 10       IBM 850 code page  IBM 870 code page  Windows Latin 2  MS DOS Latin 2  Mazovia   ISO Latin 10   ISO Latin 10   Dom Handlowy Nauki  ISO Latin 2  Windows Latin 2  Mazovia  Dom Handlowy Nauki  ISO Latin 2  Windows Latin 2  MS DOS Latin 2  Dom Handlowy Nauki  ISO Latin 2  Windows Latin 2  MS DOS Latin 2  Mazovia  KOI8 R  Alternative                PC Cyrillic  Windows Cyrillic  Macintosh Cyrillic   ISO 8859 5 Cyrillic  Alternative PC Cyrillic  Windows Cyrillic  Macintosh Cyrillic   ISO 8859 5 Cyrillic  KOI8 R  Windows Cyrillic       man pages section 5  Standards  Environments  and Macros    Last Revised 5 Dec 2001    CONVERSIONS       PC Cyrillic  MS 1251  MS 1251  MS 1251  MS 1251    Mac Cyrillic  Mac Cyrillic  Mac Cyrillic  Mac Cyrillic    alt  wind  wind  wind  wind  mac  mac  mac    mac    Mac Cyrillic mac  ISO 8859 5 iso5  KOI8 R koi8  PC Cyrillic alt  Mac Cyrillic mac  ISO 8859 5 iso5  KOI8 R koi8  PC Cyrillic alt  MS 1251 wind    iconv 5     Macintos
119. 273  274  275  276  277       271  317  264  273  300  275  277  40   316  40   331  333  334  253  256  335  270  301  247  272  267  274  276  40   315  40   330  332       325  326  327  330  331  332  333  334  335  336  337  340  341  342  343  344  345  346  347  350  351  352  353  354  355  356  357  360       363  346  342  374  373  347  370  375  371  367  372  236  200  201  226  204  205  224  203  225  210  211  212  213  214  215  216  217             Standards  Environments  and Macros    165    iconv_koi8 r 5                    Conversions Performed   KOI8 R Mac Cyrillic KOI8 R Mac Cyrillic  300 376 361 237  301 340 362 220  302 341 363 221  303 366 364 222  304 344 365 223  305 345 366 206  306 364 367 202  307 343 370 234  310 365 371 233  311 350 372 207  312 351 373 230  313 352 374 235  314 353 375 231  315 354 376 227  316 355             FILES    usr lib iconv   so     usr lib iconv   t     usr lib iconv iconv data    SEE ALSO   iconv 1   iconv 3C   iconv 5        conversion modules  conversion tables    list of conversions supported by conversion  tables    166 man pages section 5  Standards  Environments  and Macros   Last Revised 18 Apr 1997    NAME    DESCRIPTION    CONVERSIONS    Mac Cyrillic to  ISO 8859 5       iconv mac cyr 5     iconv  mac  cyr     code set conversion tables for Macintosh Cyrillic    The following code set conversions are supported                       Code Set Conversions Supported  Code Symbol Target Code Symbol Target Outp
120. 277  274  232  234  236  235  210  242  237  271  200  201  250  252  275  262  257  243  212  214  216  215  210  241       323  324  325  326  327  330  331  332  333  334  335  336  337  340  341  342  343  344  345  346  347  350  351  352  353  354  355  356       361  362  363  346  342  374  373  347  370  375  371  367  372  336  300  301  326  304  305  324  303  325  310  311  312  313  314  315             Standards  Environments  and Macros    163    iconv_koi8 r 5              Conversions Performed   KOI8 R MS 1251 KOI8 R MS 1251  277 217 357 316  300 376 360 317  301 340 361 337  302 341 362 320  303 366 363 321  304 344 364 322  305 345 365 323  306 364 366 306  307 343 367 302  310 365 370 334  311 350 371 333  312 351 372 307  313 352 373 330  314 353 374 335  315 354 375 331  316 355 376 327  376 227                   KOIS8 R to Mac   For the conversion of KOI8 R to Mac Cyrillic  all characters not in the following table  Cyrillic   are mapped unchanged              Conversions Performed  KOI8 R Mac Cyrillic KOI8 R Mac Cyrillic  24 4 317 356  200 237 40 320 357  240 312 321 337  241 254 322 360  242 257 323 361  243 336 324 362                      164 man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    iconv_koi8 r 5        Conversions Performed       KOI8 R    Mac Cyrillic    KOI8 R    Mac Cyrillic          244  245  246  247  250  251  252  253  254  255  256  257  260  261  262  263  264  265  266  267  270  271  272  
121. 305 175 345             For the conversion of ISO 646en to ISO 8859 1  all characters not in the following table    are mapped unchanged     Conversions Performed       ISO 646en    ISO 8859 1       043 243                For the conversion of ISO 646es to ISO 8859 1  all characters not in the following table    are mapped unchanged        Conversions Performed                   ISO 646es ISO 8859 1 ISO 646es ISO 8859 1  100 247 173 260  133 241 174 361  134 321 175 347  135 277             For the conversion of ISO 646fr to ISO 8859 1  all characters not in the following table    are mapped unchanged        Conversions Performed                   ISO 646fr ISO 8859 1 ISO 646fr ISO 8859 1  043 243 173 351  100 340 174 371  133 260 175 350  134 347 176 250  135 247             Standards  Environments  and Macros 127    iconv_646 5   ISO 646it     ITALIAN  to ISO  8859 1    ISO 646sv   SWEDISH  to ISO  8859 1    FILES    SEE ALSO       For the conversion of ISO 646it to ISO 8859 1  all characters not in the following table    are mapped unchanged                    Conversions Performed  ISO 646it ISO 8859 1 ISO 646it ISO 8859 1  043 243 140 371  100 247 173 340  133 260 174 362  134 347 175 350  135 351 176 354             For the conversion of ISO 646sv to ISO 8859 1  all characters not in the following table    are mapped unchanged                    Conversions Performed  ISO 646sv ISO 8859 1 ISO 646sv ISO 8859 1  100 311 140 351  133 304 173 344  134 326 174 366  135 305 1
122. 334  335  336  337  340  341  342  343  344  345          man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    Mac Cyrillic to  KOIS R       iconv mac cyr 5                    Conversions Performed   Mac Cyrillic ISO 8859 5 Mac Cyrillic ISO 8859 5  264 366 366 346  265 266 40 367 347  267 250 370 350  270 244 371 351  271 364 372 352  272 247 373 353  273 367 374 354  274 251 375 355  275 371 376 356  375 370                For the conversion of Mac Cyrillic to KOI8 R  all characters not in the following table  are mapped unchanged                    Conversions Performed  Mac Cyrillic KOI8 R Mac Cyrillic KOI8 R  24 4 276 272  200 341 277 252  201 342 300 250  202 367 301 265  203 347 302 311 40  204 344 312 240  205 345 313 261  206 366 314 241  207 372 315 274  210 351 316 254  211 352 317 245  212 353 320 327 40  213 354 330 276                Standards  Environments  and Macros 169    iconv mac cyr 5     170       Conversions Performed       Mac Cyrillic    KOI8 R    Mac Cyrillic    KOI8 R       214  215  216  217  220  221  222  223  224  225  226  227  230  231  232  233  234  235  236  237  240 246  247  250 252  253  254  255  256  257          355  356  357  360  362  363  364  365  346  350  343  376  373  375  377  371  370  374  340  361  40   266  40   261  241  40   262  242       331  332  333  334  335  336  337  340  341  342  343  344  345  346  347  350  351  352  353  354  355  356  357  360  361  362  363  364       256 
123. 370 174  Converted to Underscore      137   133 134  135 173 174  175  200 201 202 203 204 205 206 207  210 211 212 213 214 215 216 217  220 221 222 223 224 225 226 227  230 231 232 233 234 235 236 237  240 241 242 243 244 245 246 247  250 251 252 253 254 255 256 257  260 261 262 263 264 265 266 267  270 271 272 273 274 275 276 277  300 301 302 303 304 307       man pages section 5  Standards  Environments  and Macros    Last Revised 28 Apr 1997    ISO 8859 1 to ISO  646en  ENGLISH  ASCII     ISO 8859 1 to ISO  646fr  FRENCH     310  320    340  350  360  371    31lT 312  321 322  331 332  341 342  351 352  361 362  372 373    313  323  333  343  353  363  374    314  324  334  344  354  364    315  325  335    355  365    316  326  336    356  366  376    317  327  337  347  357  367  377    iconv_8859 1 5     For the conversion of ISO 8859 1 to ISO 646en  all characters not in the following  tables are mapped unchanged     Conversions Performed       ISO 8859 1    ISO 646en       243          043          Converted to Underscore    201  211  221  231  241  251  261  271  301  311  321  331  341  35   361  371    202  212  222  232  242  252  262  272  302  312  322  332  342  352  362  372       203  213  223  233    253  263  273  303  313  323  333  343  353  363  373    204  214  224  234  244  254  264  274  304  314  324  334  344  354  364  374    205  2 15   225  235  245  255  265  275  305  315  325  335  345  355  365  375    206  216  226  236  246  256  266  276
124. 3C  function returns a file descriptor for the named attribute  attrpath   of the file indicated by path  The oflag and mode arguments are identical to the open 2   arguments and are applied to the open operation on the attribute file  for example   using the O_CREAT flag creates a new attribute   Once opened  all normal file system  operations can be used on the attribute file descriptor  The attropen    function is a  convenience function and is equivalent to the following sequence of operations     fd   open  path  O RDONLY    attrfd   openat fd  attrpath  oflag O XATTR  mode    close fd      The set of existing attributes can be browsed by calling attropen   with     as the  attribute name  The list of attributes is obtained by calling getdents 2   or    dopendir 3C  followed by readdir 3C   see below  on the returned file descriptor     Convert an open file descriptor for a directory into a directory descriptor  DIR   fdopendir  const int fd     The   dopendir 3C  function promotes a file descriptor for a directory to a directory  pointer suitable for use with the readdir 3C  function  The originating file descriptor  should not be used again following the call to fdopendir     The directory pointer  should be closed with a call to closedir 3C   If the provided file descriptor does not  reference a directory  the function returns ENOTDIR  This function is useful in  circumstances where the only available handle on a directory is a file descriptor  See  attropen 3C  and o
125. 4 207 40 315 275  210 255 316 276  211 40 317 277  212 251 320 300  213 40 321 301  214 252 322 302  215 254 323 303  216 253 324 304  217 257 325 305             Standards  Environments  and Macros    113    iconv_1251 5     114       Conversions Performed       MS 1251    ISO 8859 5    MS 1251    ISO 8859 5       220  221 227  230  231  232  233  234  235  236  237  241  242  243  244 247  250  251  252  253 254  255  256  257  260 261  262  263  264 267  270  271  272          362  40  255  40  371  40  372  374  373  377  256  376  250  40  241  40  244  40  55  40  247  40  246  366  40  361  360  364       326  327  330  331  332  333  334  335  336  337  340  341  342  343  344  345  346  347  350  351  352  353  354  355  356  357  360  361       306  307  310  311  312  313  314  315  316  317  320  321  322  323  324  325  326  327  330  331  332  333  334  335  336  337  340  341          man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    MS 1251 to  KOI8 R    iconv_1251 5        Conversions Performed       MS 1251    ISO 8859 5    MS 1251    ISO 8859 5       273  274  275  276  277  300  301  302  303  304  305  306  307          40   370  245  365  367  260  261  262  263  264  265  266  267       362  363  364  365  366  367  370  371  372  373  374  375  376       342  343  344  345  346  347  350  351  352  353  354  355  356          For the conversion of MS 1251 to KOI8 R   all characters not in the following table are   
126. 4 40  304 224 375 260  305 225 376 40  306 226 365 40                   ISO 8859 5 to MS   For the conversion of ISO 8859 5 to MS 1251  all characters not in the following table  1251   are mapped unchanged              Conversions Performed  ISO 8859 5 MS 1251 ISO 8859 5 MS 1251  24 4 317 337  200 237 40 320 340  241 250 321 341  242 200 322 342  243 201 323 343  244 252 324 344  245 275 325 345  246 262 326 346  247 257 327 347  250 243 330 350  251 212 331 351  252 214 332 352                      150 man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    iconv  8859 5 5        Conversions Performed             ISO 8859 5 MS 1251 ISO 8859 5 MS 1251  253 216 333 353  254 215 334 354  255 210 335 355  256 241 336 356  257 217 337 357  260 300 340 360  261 301 341 361  262 302 342 362  263 303 343 363  264 304 344 364  265 305 345 365  266 306 346 366  267 307 347 367  270 310 350 370  271 311 351 371  272 312 352 372  273 313 353 373  274 314 354 374  275 315 355 375  276 316 356 376  277 317 357 377  300 320 360 271  301 321 361 270  302 322 362 220  303 323 363 203  304 324 364 272  305 325 365 276  306 326 366 263                      Standards  Environments  and Macros 151    iconv_8859 5 5              Conversions Performed   ISO 8859 5 MS 1251 ISO 8859 5 MS 1251  307 327 367 277  310 330 370 274  311 331 371 232  312 332 372 234  313 333 373 236  314 334 374 235  315 335 375 210  316 336 376 242  376 331                   ISO 8859 5 to 
127. 40  315 235 376 331  316 236             FILES    usr lib iconv   so     usr lib iconv   t     usr lib iconv iconv data    SEE ALSO   iconv 1   iconv 3C   iconv 5        conversion modules  conversion tables    list of conversions supported by conversion  tables    154 manpages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    NAME    DESCRIPTION    CONVERSIONS    DHN to ISO  8859 2       The following code set conversions are supported     iconv_dhn 5     iconv_dhn   code set conversion tables for DHN  Dom Handlowy Nauki        Code Set Conversions Supported                      The conversions are performed according to the following tables  All values in the  tables are given in octal              Code Symbol Target Code Symbol Target Output  DHN dhn ISO 8859 2 iso2 ISO Latin 2  DHN dhn MS 1250 win2 Windows Latin 2  DHN dhn MS 852 dos2 MS DOS Latin 2  DHN dhn Mazovia maz Mazovia          For the conversion of DHN to ISO 8859 2  all characters not in the following table are             mapped unchanged   Conversions Performed  DHN ISO 8859 2 DHN ISO 8859 2  24 177 40 222 40  200 241 223 364  201 306 224 366  202 312 225 230 40  203 243 231 326  204 321 232 334  205 323 233 237 40  206 246 240 341  207 254 241 355  210 257 242 363  211 261 243 372  212 346 244 340 40  213 352 341 337  214 263 342 365 40                      Standards  Environments  and Macros    155    iconv_dhn 5     DHN to MS 1250    156 man pages section 5  Standards  Environme
128. 43  244 254  255  256 262  263  264 274  275  276 277  300   301   302   303   304   305   306   307          40   361  40   260  40   360  40   260  40   356  240  241  346  244  245  344  243       333  334  335  336  337  340  341  342  343  344  345  346  347  350  351  352  353  354       350  355  351  347  352  236  200  201  226  204  205  224  203  225  210  211  212    213             Standards  Environments  and Macros 161    iconv_koi8 r 5     162                                     Conversions Performed  KOI8 R PC Cyrillic KOI8 R PC Cyrillic  310 345 355 214  311 250 356 215  312 251 357 216  313 252 360 217  314 253 361 237  315 254 362 220  316 255 363 221  317 256 364 222  320 257 365 223  321 357 366 206  322 340 367 202  323 341 370 234  324 342 371 233  325 343 372 207  326 246 373 230  327 242 374 235  330 354 375 231  331 353 376 227  332 247  KOI8 R to MS   For the conversion of KOI8 R to MS 1251  all characters not in the following table are  1251   mapped unchanged   Conversions Performed  KOI8 R MS 1251 KOI8 R MS 1251   24 4 317 356  200 237 40 320 357  241 220 321 377  242 203 322 360                      man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    iconv_koi8 r 5        Conversions Performed       KOI8 R    MS 1251    KOI8 R    MS 1251          243  244  245  246  247  250  251  252  253  254  255  256  257  260  261  262  263  264  265  266  267  270  271  272  273  274  275  276       270  272  276  263  
129. 5     Standards  Environments  and Macros 237    man 5   NAME   man   macros to format Reference Manual pages  SYNOPSIS   nroff  man filename       troff  man filename       DESCRIPTION   These macros are used to lay out the reference pages in this manual  Note  if filename  contains format input for a preprocessor  the commands shown above must be piped  through the appropriate preprocessor  This is handled automatically by the man 1   command  See the    Conventions    section     Any text argument t may be zero to six words  Quotes may be used to include SPACE  characters in a    word     If text is empty  the special treatment is applied to the next  input line with text to be printed  In this way   I may be used to italicize a whole line   or  SB may be used to make small bold letters     A prevailing indent distance is remembered between successive indented paragraphs   and is reset to default value upon reaching a non indented paragraph  Default units  for indents i are ens     Type font and size are reset to default values before each paragraph  and after  processing font and size setting macros     These strings are predefined by  man     R   amp        Reg     in nroff   NS Change to default type size     Requests     n t l    next text line  p i    prevailing indent    Request Cause If no Explanation   Break Argument   B t no t n t L  Text is in bold font    BI f   no t n t    Join words  alternating bold and italic    BR f   no t n t l  Join words  alternating bol
130. 5  Standards  Environments  and Macros    Last Revised 1 Aug 2001    Shell level API       fsattr 5     The entire available name space has been allocated to  general use  to bring the  implementation in line with the NFSv4 draft standard  NFSv4   That standard defines   named attributes   equivalent to Solaris Extended Attributes  with no naming  restrictions  All Sun applications making use of opaque extended attributes will use  the prefix  SUNW      The command interface for extended attributes is the set of applications provided by  Solaris for the manipulation of attributes from the command line  This interface  consists of a set of existing utilities that have been extended to be  attribute aware    plus the runat utility designed to  expose  the extended attribute space so that  extended attributes can be manipulated as regular files     The    option enable utilities to manipulate extended attributes  As a rule  this option  enables the utility to enter into attribute space when the utility is performing a  recursive traversal of file system space  This is a fully recursive concept  If the  underlying file system supports recursive attributes and directory structures  the   e  option opens these spaces to the file tree walking algorithms     The following utilities accommodate extended attributes  see the individual manual  pages for details      cp By default  cp ignores attributes and copies only file  data  This is intended to maintain the semantics  implied by cp
131. 5  pam authtok check 5     pam authtok get 5  pam authtok store 5   pam dhkeys 5     pam passwd auth 5  pam unix 5  pam unix auth 5  pam unix session 5     The interfaces in 1ibpam 3LIB  are MT Safe only if each thread within the  multi threaded application uses its own PAM handle     The pam unix 5  module might not be supported in a future release  Similar  functionality is provided by pam authtok check 5  pam authtok get 5    pam authtok store 5   pam dhkeys 5   pam passwd auth 5     pam unix account 5  pam unix auth 5  and pam unix session 5      296 manpages section 5  Standards  Environments  and Macros    Last Revised 9 Aug 2002    NAME  SYNOPSIS    DESCRIPTION    ERRORS    ATTRIBUTES    SEE ALSO    NOTES       pam unix auth 5   pam unix auth   PAM authentication module for UNIX    pam unix auth so 1    The pam unix auth module implements pam sm authenticate    which  provides functionality to the PAM authentication stack  It provides functions to verify  that the password contained in the PAM item PAM AUTHTOK is the correct password  for the user specified in the item PAM USER  If PAM REPOSITORY is specified  then  user s passwd is fetched from that repository  Otherwise the default  nsswitch conf 4 repository is searched for that user     The following options can be passed to the module     server policy Ifthe account authority for the user  as specified by PAM  USER  is  a server  do not apply the Unix policy from the passwd entry in  the name service switch     Th
132. 54  355  356       341  342  343  344  345  346  347  350  351  352  353  354  355  356  357  360       361  362  363  364  365  366  367  370  371  372  373  374  375  376  337  335             Standards  Environments  and Macros 183    iconv  pc cyr 5                    Conversions Performed  PC Cyrillic Mac Cyrillic PC Cyrillic Mac Cyrillic  257 357 361 336  260 337 40 362 376 40  340 360             FILES    usr lib iconv   so   usr lib iconv   t     usr lib iconv iconv data    SEE ALSO   iconv 1   iconv 3C   iconv 5        conversion modules  conversion tables    list of conversions supported by conversion  tables    184 manpages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    NAME    DESCRIPTION       iconv_unicode   code set conversion tables for Unicode    The following code set conversions are supported     CODE SET CONVERSIONS SUPPORTED    FROM Code Set    Code     SO   SO   SO   SO   SO   SO   SO   SO   SO   SO    8859 1  8859 2  8859 3  8859 4  8859 5  8859 6  8859 7  8859 8  8859 9  8859 10        SO 2022  Korean EUC        S0 2022 KR    Latin 1   2   3     4     Latin  Latin  Latin    Hebrew   Latin 5    Latin 6        Japanese EUC  Chinese PRC EUC   GB 2312 1980     Korean Johap   KS C 5601 1987   Korean Johap    KS C 5601 1992   Korean UTF 8  Korean UTF 8    Korean UTF 8    KOI8 R  Cyrillic   KOI8 R  Cyrillic   PC Kanji  SJIS   PC Kanji  SJIS   UCS 2   UCS 2    CODE SET CONVERSIONS S    FROM  Filename  Element    8859 1  8859 2  8
133. 60  362  363  364  365  346  350  343  376  373  375  377       337  340  341  342  343  344  345  346  347  350  351  352  353  354  355  356  357  360  361  362  363  364  365  366  367  370  371  372       320  322  323  324  325  306  310  303  336  333  335  337  331  330  334  300  321  260  243  241  242  244  245  246  247  250  251  252          man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    ISO 8859 5 to PC  Cyrillic       iconv  8859 5 5        Conversions Performed       ISO 8859 5    KOI8 R    ISO 8859 5    KOI8 R       313  314  315  316  317          371  370  374  340  361    373  374  375  376          253  254  255  256          For the conversion of ISO 8859 5 to PC Cyrillic  all characters not in the following table  are mapped unchanged        Conversions Performed                      ISO 8859 5 PC Cyrillic ISO 8859 5 PC Cyrillic  24 4 307 227  200 240 40 310 230  241 360 311 231  242 254 40 312 232  255 260 313 233  256 257 40 314 234  260 200 315 235  261 201 316 236  262 202 317 237  263 203 320 240  264 204 321 241  265 205 322 242  266 206 323 243  267 207 324 244  270 210 325 245  271 211 326 246  272 212 327 247  273 213 330 250          Standards  Environments  and Macros 149    iconv_8859 5 5              Conversions Performed  ISO 8859 5 PC Cyrillic ISO 8859 5 PC Cyrillic  274 214 331 251  275 215 332 252  276 216 333 253  277 217 334 254  300 220 335 255  301 221 336 256  302 222 337 257  303 223 360 37
134. 7  202          man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    ISO 8859 2 to  Mazovia       iconv  8859 2 5        Conversions Performed       ISO 8859 2    MS 852    ISO 8859 2    MS 852       272  273  274  275  276  277  300  301  302  303  304  305  306  307  310  311  312  313  314  315       366       255  234  253  361  247  276  350  265  266  306  216  221  217  200  254  220  250  323  267  326  367       352  353  354  355  356  357  360  361  362  363  364  365  366  367  370  371  372  374  375  376       251  211  330  241  214  324  320  344  345  242  223  213  224  366  375  205  243  201  354  356          For the conversion of ISO 8859 2 to Mazovia  all characters not in the following table  are mapped unchanged     Conversions Performed       ISO 8859 2    Mazovia    ISO 8859 2    Mazovia       24    177 237          40       323    324 325       243  40          Standards  Environments  and Macros 143    iconv_8859 2 5        Conversions Performed             ISO 8859 2 Mazovia ISO 8859 2 Mazovia  240 377 326 231  241 217 327 333 40  242 40 334 232  243 234 335 336 40  244 245 40 337 341  246 230 340 341 40  247 253 40 342 203  254 240 343 40  255 256 40 344 204  257 241 345 40  260 370 346 215  261 206 347 207  262 40 350 40  263 222 351 202  264 265 40 352 221  266 236 353 211  267 273 40 354 355 40  274 246 356 214  275 276 40 357 360 40  277 247 361 244  300 303 40 362 40  304 216 363 242  305 40 364 223  306 2
135. 75 345  136 334 176 374              usr lib iconv   so     usr lib iconv   t     usr lib iconv iconv data    iconv 1   iconv 3C   iconv 5     conversion modules  conversion tables    list of conversions supported by conversion  tables    128 man pages section 5  Standards  Environments  and Macros    Last Revised 28 Apr 1997    NAME    DESCRIPTION    CONVERSIONS    MS 852 to ISO  8859 2       iconv_852 5     iconv_852     code set conversion tables for MS 852  MS DOS Latin 2     The following code set conversions are supported                          The conversions are performed according to the following tables  All values in the  tables are given in octal              Code Set Conversions Supported  Code Symbol Target Code Symbol Target Output  MS 852 dos2 ISO 8859 2 iso2 ISO Latin 2  MS 852 dos2 MS 1250 win2 Windows Latin 2  MS 852 dos2 Mazovia maz Mazovia  MS 852 dos2 DHN dhn Dom Handlowy Nauki          For the conversion of MS 852 to ISO 8859 2  all characters not in the following table are             mapped unchanged   Conversions Performed  MS 852 ISO 8859 2 MS 852 ISO 8859 2   24 177 40 271 274 40  200 307 275 257  201 374 276 277  202 351 277 305 40  203 342 306 303  204 344 307 343  205 371 310 316 40  206 346 317 244  207 347 320 360  210 263 321 320  211 353 322 317  212 325 323 313  213 365 324 357  214 356 325 322                      Standards  Environments  and Macros    129    iconv_852 5     130                         Conversions Performed  MS 852 ISO 8
136. 76 300          For the conversion of MS 1251 to PC Cyrillic  all characters not in the following table  are mapped unchanged        Conversions Performed                      MS 1251 PC Cyrillic MS 1251 PC Cyrillic  24 4 332 232  200 207 40 333 233  210 260 334 234  211 227 40 335 235  230 260 336 236  231 247 40 337 237          Standards  Environments  and Macros 117    iconv_1251 5     118       Conversions Performed       MS 1251    PC Cyrillic    MS 1251    PC Cyrillic       250  251 254  255  256 267  270  271 277  300  301  302  303  304  305  306  307  310  311  312  313  314  315  316  317  320  321  322  323  324  325          360  40   55   40   361  40   200  201  202  203  204  205  206  207  210  211  212  213  214  215  216  217  220  221  222  223  224    225       340  341  342  343  344  345  346  347  350  351  352  353  354  355  356  357  360  361  362  363  364  365  366  367  370  371  372  373       240  241  242  243  244  245  246  247  250  251  252  253  254  255  256  257  340  341  342  343  344  345  346  347  350  351  352  353          man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    MS 1251 to Mac  Cyrillic    iconv_1251 5        Conversions Performed       MS 1251    PC Cyrillic    MS 1251    PC Cyrillic       326  327  330  331          226  227  230  231       374  375  376       354  355  356          For the conversion of MS 1251 to Mac Cyrillic  all characters not in the following table  are mappe
137. 859 2 MS 852 ISO 8859 2  215 254 326 315  216 304 327 316  217 306 330 354  220 311 331 334 40  221 305 335 336  222 345 336 331  223 364 337 40  224 366 340 323  225 245 341 337  226 265 342 324  227 246 343 321  230 266 344 361  231 326 345 362  232 334 346 251  233 253 347 271  234 273 350 300  235 243 351 332  236 327 352 340  237 350 353 333  240 341 354 375  241 355 355 335  242 363 356 376  243 372 357 264  244 241 360 255  245 261 361 275  246 256 362 262  247 276 363 267  250 312 364 242          man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    iconv_852 5              Conversions Performed   MS 852 ISO 8859 2 MS 852 ISO 8859 2  251 352 365 247  252 40 366 367  253 274 367 270  254 310 370 260  255 272 371 250  256 264 40 372 377  265 301 374 330  266 302 375 370  267 314 376 40  270 252                      MS 852 to MS 1250   For the conversion of MS 852 to MS 1250  all characters not in the following table are             mapped unchanged   Conversions Performed  MS 852 MS 1250 MS 852 MS 1250   200 307 270 252  201 374 271 274 40  202 351 275 257  203 342 276 277  204 344 277 305 40  205 371 306 303  206 346 307 343  207 347 310 316 40  210 263 317 244  211 353 320 360  212 325 321 320  213 365 322 317  214 356 323 313                         Standards  Environments  and Macros 131    iconv_852 5     132                         Conversions Performed  MS 852 MS 1250 MS 852 MS 1250  215 217 324 357  216 304 325 322  217 306 326
138. 859 3  8859 4  8859 5  8859 6  8859 7  8859 8  8859 9  8859 10  eucJP    gb2312  iso2022   ko KR euc  ko KR iso20    ko KR johap    ko KR johap  ko KR UTF 8  ko KR UTF 8    ko KR UTF 8    KOI8 R  KOI8 R  PCK  SJIS  UCS 2  UCS 2       TO  Code    1j    1j    1j    1j    1j    1j    1j    1j    1j    1j    c  4  i  1j  1     0                      OO OO    TF 8  T    UTF 8  Korean                22 7 Korean    Korean  92 Korean  Korean  Korean   KS C5  Korean   KS C 5  UCS 2  UTF 8  UTF 8  UTF 8  KOI8 R  UCS 4       UPPORTE    Code Set    UT  UT    UT    UT  EUC  Johap  601 1987   Johap  601 1992         Cyrillic     D    FROM Code Set    Code    UCS 2  UCS 2  UCS 4  UCS 4  UCS 4  UCS 4  UTF 16    UCS 2  UCS 2  UCS 4  UCS 4  UCS 4  UCS 4  UTF 1    FROM  Filename  Element    6    TO  Target Code    UTF 7  UTF 8  UCS 2  UTF 16  UTF 7  UTF 8  UCS 4    Standards  Environments  and Macros    Code Set    UTF  UTF    iconv_unicode 5     TO  Fi  El    lename  ement    UTF 8  UTF 8  UTF 8  UTF 8  UTF 8  UTF 8  UTF 8  UTF 8    UTF 8    UTF 8  UTF 8  ko_KR UTF 8    ko KR UTF 8             ko KR UTF 8    ko KR UTF 8  ko KR euc  ko KR johap    ko KR johap92    UCS 2  UTF 8  UTF 8  UTF 8  KOI8 R  UCS 4       TO  Filename  Element       185    iconv_unicode 5     186    UTF 16 UT  UTF 7 UT  UTF 7 UT  DEOS UT  UTEE UT  UTF 8 UT  UTF 8 UT  UTF 8 UT  UTECS on  UTE 8 oT  UTF 8 UT  UTF 8 UT  UTF 8 UT  UTF 8 UT  UTF 8 UT  UTF 8 UT  UTF 8 UT  UTF 8 UT  UTF 8 UT  UTF 8 Ut  UTF 8 UT  UTF 8 UT  UTESS D
139. ALSO        lt informaltable gt      lt example gt      lt informalexample gt     sgml 5     This tag is the same as the   table   tag except the    title   is not required     This tag contains examples of source code or usage of  commands  It contains a required   titles     This tag is the same as the   example   tag except the    title   is not required     The inline elements are used for tagging text       command        function      literal        parameter       lt inlineequation gt      lt link gt      lt olink gt      lt xref gt     man 1   nroff   1   man 5     An executable program or the entry a user makes to  execute a command     A subroutine in a program or external library   Contains any literal string     An argument passed to a computer program by a  function or routine     An untitled mathematical equation occurring in line     A hypertext link to text within a book  in the case of the  reference manual it is used to cross reference to another  reference page     A hypertext link used to create cross references to  books other than the reference manual     A cross reference to another part of the same reference  page     Standards  Environments  and Macros 325    smartcard 5     326    NAME    DESCRIPTION       smartcard     overview of smart card features on Solaris    The smart card framework provides a mechanism to abstract the details of interacting  with smart cards and smart cardreaders  called card terminals   The framework is  based on the OpenCar
140. ALSO   eqn 1   nroff 1   troff 1   attributes 5        42 manpages section 5  Standards  Environments  and Macros    Last Revised 12 Jul 2002    extensions 5   NAME   extensions   localedef extensions description file  DESCRIPTION   A localedef extensions description file or extensions file defines various extensions for  the localedef 1  command   The localedef extensions description file provides     m EUC code set width information via the cswidth keyword  cswidth  bel   swl bc2   sw2 bc3   sw3where bc1  bc2  and bc3 indicate the  number of bytes  byte count  per character for EUC codesets 1  2  and 3   respectively  sw1  sw2  and sw3 indicate screen width for EUC codesets 1  2  and  3  respectively     m Other extensions which will be documented in a future release     SEE ALSO   locale 1   localedef 1   environ 5   locale 5        Standards  Environments  and Macros 43    filesystem 5   NAME  SYNOPSIS    DESCRIPTION    Root File System       filesystem     file system organization          usr    The file system tree is organized for administrative convenience  Distinct areas within  the file system tree are provided for files that are private to one machine  files that can  be shared by multiple machines of a common platform  files that can be shared by all  machines  and home directories  This organization allows sharable files to be stored on  one machine but accessed by many machines using a remote file access mechanism  such as NFS  Grouping together similar files m
141. AM REINITIALIZE CRED and PAM REFRESH CRED are not supported and return  PAM IGNORE     The pam sm chauthtok   implementation checks whether the old login password  decrypts the users secret keys  If it doesn t this module prompts the user for an old  Secure RPC password and stores it in a pam data item called SUNW OLDRPCPASS   This data item can be used by the store module to effectively update the users secret  keys     The authentication service returns the following error codes     PAM SUCCESS Credentials set successfully    PAM IGNORE Credentials not needed to access the password  repository    PAM USER UNKNOWN PAM USER is not set  or the user is unknown    PAM AUTH ERR No secret keys were set  PAM AUTHTOK is not set  no  credentials are present or there is a wrong password    PAM  BUF ERR Module ran out of memory    PAM  SYSTEM  ERR NIS  subsystem failed      270 man pages section 5  Standards  Environments  and Macros   Last Revised 21 Jan 2003    ATTRIBUTES    SEE ALSO    NOTES       pam  dhkeys 5     The authentication token management returns the following error codes     PAM SUCCESS Old rpc password is set in SUNW_OLDRPCPASS  PAM USER UNKNOWN User in PAM USER is unknown   PAM AUTHTOK ERR User did not provide a password that decrypts the    secret keys     PAM BUF ERR Module ran out of memory     See attributes 5  for descriptions of the following attributes        ATTRIBUTE TYPE ATTRIBUTE VALUE    Interface Stability Evolving             MT Level MT Safe with except
142. AME  SYNOPSIS    DESCRIPTION    ATTRIBUTES    SEE ALSO       crypt_sunmd5 5   crypt_sunmd5   password hashing module using MD5 message hash algorithm     usr lib security  ISA crypt sunmd5 so    The crypt_sunmd5 module is a one way password hashing module for use with  crypt 3C  that uses the MD5 message hash algorithm  The algorithm identifier for  crypt conf 4  and policy conf 4 is md5     This module is designed to make it difficult to crack passwords that use brute force  attacks based on high speed MD5 implementations that use code inlining  unrolled  loops  and table lookup     See attributes 5 for descriptions of the following attributes        ATTRIBUTE TYPE ATTRIBUTE VALUE       MT Level Safe                passwd 1   crypt 3C   crypt_genhash_imp1 3C   crypt gensalt 3C    crypt_gensalt_imp1 3C   getpassphrase 3C   crypt  conf 4   passwd 4    policy conf 4   attributes 5     Standards  Environments  and Macros 31    crypt unix 5   NAME    DESCRIPTION    USAGE    ATTRIBUTES    SEE ALSO       crypt unix   traditional UNIX crypt algorithm    The crypt unix algorithm is the traditional UNIX crypt algorithm  It is not  considered sufficiently secure for current systems and is provided for backwards  compatibility  The crypt_sunmd5 5   crypt bsdmd5 5   or crypt_bsdbf 5   algorithm should be used instead     The algorithm identifier for policy conf 4 is unix  Thereis no entry in  crypt  conf 4  for this algorithm     The crypt_unix algorithm is internal to 1ibc and provides 
143. AS   amp  SUN     microsystems    man pages section 5  Standards   Environments  and Macros    Sun Microsystems  Inc   4150 Network Circle  Santa Clara  CA 95054    Part No  817 3946 10  September 2004    Copyright 2004 Sun Microsystems  Inc  4150 Network Circle  Santa Clara  CA 95054 U S A      All rights reserved     This product or document is protected by copyright and distributed under licenses restricting its use  copying  distribution  and decompilation  No  part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors  if any   Third party software  including font technology  is copyrighted and licensed from Sun suppliers     Parts of the product may be derived from Berkeley BSD systems  licensed from the University of California  UNIX is a registered trademark in the U S   and other countries  exclusively licensed through X Open Company  Ltd     Sun  Sun Microsystems  the Sun logo  docs sun com  AnswerBook  AnswerBook2  and Solaris are trademarks or registered trademarks of Sun  Microsystems  Inc  in the U S  and other countries  All SPARC trademarks are used under license and are trademarks or registered trademarks of  SPARC International  Inc  in the U S  and other countries  Products bearing SPARC trademarks are based upon an architecture developed by Sun  Microsystems  Inc     The OPEN LOOK and Sun   Graphical User Interface was developed by Sun Microsystems  Inc  for its users and license
144. C Integrity     When Sun WorkShop Compiler C   5 0 is installed  Solaris releases 2 5 1 through  9 support ISO IEC 14882 1998 Programming Languages   C    Unsupported features  of that standard are described in the compiler README file  The features of the C    standard adopted from ISO IEC 9899 Amendement 1 are not supported on Solaris  2 5 1  and are only partially supported on Solaris 2 6     If the behavior required by POSIX 2  POSIX 2a  XPG4  SUS  or SUSv2 conflicts with  historical Solaris utility behavior  the original Solaris version of the utility is  unchanged  a new version that is standard conforming has been provided in   usr xpg4 bin  For applications wishing to take advantage of POSIX 2  POSIX 2a   XPG4  SUS  or SUSv2 features  the PATH  sh or ksh  or path  csh  environment  variables should be set with  usr xpg4 bin preceding any other directories in  which utilities specified by those specifications are found  such as  bin   usr bin    usr ucb  and  usr ccs bin     Feature test macros are used by applications to indicate additional sets of features that  are desired beyond those specified by the C standard  If an application uses only those  interfaces and headers defined by a particular standard  such as POSIX or X Open  CAE   then it need only define the appropriate feature test macro specified by that  standard  If the application is using interfaces and headers not defined by that  standard  then in addition to defining the appropriate standard feature te
145. D  UTEOS orn  UTF 8 UT             FROM Code Set  Code    UTF 8  UTF 8  UTF 8    UTF 8   Chinese PRC EUC    GB 2312 1980    ISO 2022 CN  Chinese Taiwan Big5  Chinese Taiwan  EUC   CNS 11643 1992   ISO 2022 TW                F 16 UTF 8  F 7 UCS 2  F 7 UCS 4  F 7 UTF 8  F 8  ISO 8859 1 Latin 1   F 8  SO 8859 2 Latin 2   F 8  SO 8859 3 Latin 3   F 8  ISO 8859 4 Latin 4   F 8  SO 8859 5  Cyrillic   F 8  SO 8859 6  Arabic   F 8  SO 8859 7  Greek   F 8  SO 8859 8  Hebrew   F 8  SO 8859 9 Latin 5   F 8  SO 8859 10  Latin 6   F 8 Japanese EUC  F 8 Chinese PRC EUC    GB 2312 1980   F 8  50 2022  F 8 KOI8 R  Cyrillic   F 8 PC Kanji  SJIS   F 8 PC Kanji  SJIS   F 8 UCS 2  F 8 UCS 4  F 8 UTF 16  F 8 UTF 7  F 8 Chinese PRC EUC    UT  UT  UT    zh  zh  zh    zh     GB 2312 1980     CODE SET CONVERSIONS SUPPORTED    TO Code Set  FROM Target Code  Filename  Element    8 ISO 2022 CN  F 8 Chinese Taiwan Big5  8 Chinese Taiwan  EUC   CNS 11643 1992        F 8 ISO 2022 TW     CN euc UTF 8     CN i1so2022 7 UTF 8       _ TW big5 UTF 8     TW euc UTF 8    TW iso2022 7 UTF 8    EXAMPLES   EXAMPLE 1 The library module filename       man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    UTF 8  UCS 2  UCS 4  UTF 8  8859 1  8859 2  8859 3  8859 4  8859 5  8859 6  8859 7  8859 8  8859 9  8859 10  eucJP  gb2312    iso2022  KOI8 R  PCK   SJIS  UCS 2  UCS 4  UTF 16  UTF 7   zh CN euc    TO  Filename  Element    zh CN iso2022 7  zh TW big5  zh TW euc    zh TW iso2022 7  UTF
146. ETB  030 CAN 031 EM 032 SUB 033 ESC 034 FS 035 GS 036 RS 037 US  040 SP 041   042   043   044   045 5 046  amp  047    050   051   052   053   054   055     056   057    060 0 061 1 062 2 063 3 064 4 065 5 066 6 067 7  070 8 071 9 072   073   074    075   076  gt  077    100   101 A 102 B 103 C 104 D 105 E 106 F 107 G  110 H 111 I 112 J ILS K 114 L 115 M 116 N 117 O  120 P 121 Q 122 R 123 S 124 T 125 U 126 V 127 W  130 X 13i  Y 132 Z 133   134 N 135   136   137    140   141 a 142 b 143 c 144 d 145 e 146 f 147 g  150 h 151 i 152 j 153 k 154 1 155 m 156 n 157 o  160 p 161 q 162 r 163 s 164 t 165 u 166 v 167 w  170 x 171 y 172 z 173   174   175   176   177 DEL  Hexadecimal   Character  00 NUL 01 SOH 02 STX 03 ETX 04 EOT 05 ENQ 06 ACK 07 BEL  08 BS 09 HT 0A NL OB VT oc NP OD CR OE SO OF SI  10 DLE 11 DCL 12 DC2 13 DC3 14 DC4 15 NAK 16 SYN 17 ETB  18 CAN 19 EM 1A SUB 1B ESC 1C FS 1D GS 1E RS 1F US  20 SP 21   22   23 4 24   25   26  amp  2    28   29   2A   2B   2C   2D     2E   2F    30 0 31 1 32 2 33 3 34 4 35 5 36 6 37 7  38 8 39 9 3A   3B   3C    3D   3E  gt  3F    40   41 A 42 B 43 C 44 D 45 E 46 F 47 G  48 H 49 I 4A J 4B K 4C L 4D M 4EN 4F O  50 P 51 Q 52R 53 S 54 T 55  UJ  56 V 57 W  58 X 59 Y 5A Z 5B   5c   5D   5E   DEL  60   61a 62 b 63 c 64 d 65 e 66 f 67 g  68 h 69 i 6A j 6B k 6c 1 6D m 6E n 6F o  70 p 71 q 72 r 73 8 74 t 75 u 76 v 77 w  78 x 79 y 7A z 7B   7C   7D   7E   7F DEL  Decimal     Character   0 NUL 1 SOH 2 STX 3 ETX 4 EOT 5 ENQ 6 ACK 7 BEL   8 BS 9 HT 10 NL 
147. HN Mazovia DHN Mazovia  200 217 212 215  201 225 213 221                      Standards  Environments  and Macros 157    iconv_dhn 5                    Conversions Performed  DHN Mazovia DHN Mazovia   202 220 214 222   203 234 215 244   204 245 216 242   205 243 217 236   206 230 220 246   207 240 221 247   210 241 222 247 40   211 206             FILES    usr lib iconv   so     usr lib iconv   t     usr lib iconv iconv data    SEE ALSO   iconv 1   iconv 3C   iconv 5        conversion modules  conversion tables    list of conversions supported by conversion  tables    158 man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    NAME    DESCRIPTION    CONVERSIONS    KOIS R to ISO  8859 5       iconv_koi8 r 5   iconv_koi8 r     code set conversion tables for KOI8 R    The following code set conversions are supported                       Code Set Conversions Supported  Code Symbol Target Code Symbol Target Output  KOI8 R koi8 ISO 8859 5 iso5 ISO 8859 5 Cyrillic  KOI8 R koi8 PC Cyrillic alt Alternative PC Cyrillic  KOI8 R koi8 MS 1251 wind Windows Cyrillic  KOI8 R koi8 Mac Cyrillic mac Macintosh Cyrillic                      The conversions are performed according to the following tables  All values in the  tables are given in octal     For the conversion of KOI8 R to ISO 8859 5  all characters not in the following table  are mapped unchanged              Conversions Performed  KOI8 R ISO 8859 5 KOI8 R ISO 8859 5  24 4 320 337  241 362 321 357  242
148. ION    EXTENDED  DESCRIPTION  WBEM Tools and  Services    Solaris WBEM  Services 2 5       wbem 5     wbem   Web Based Enterprise Management    Web Based Enterprise Management  WBEM  is a set of management and  Internet related technologies intended to unify the management of enterprise  computing environments  Developed by the Distributed Management Task Force   DMTF   WBEM enables organizations to deliver an integrated set of standards based  management tools that support and promote World Wide Web technology  The DMTF  has developed a set of standards that make up WBEM  This set of standards includes       Common Information Model  CIM    an object oriented data model that describes  the overall management of information in an enterprise network environment   CIM consists of a CIM specification and a CIM schema     CIM Specification Consists of the language and methodology that  describes management data     CIM Schema Provides actual model descriptions of systems   applications  large area networks  and devices  The  CIM Schema enables applications from different  developers on different platforms to describe  management data in a standard format  As a result   a variety of management applications can share this  information       CIM Operations Over HyperText Transport Protocol  HTTP  1 1 is a transport  mechanism that maps CIM operations to HTTP to allow implementations of CIM  to interoperate in an open  standardized manner     CIM Operations Over HTTP 1 1 uses eXtensi
149. Instruction Set Architecture or processor type  such as is returned by uname    i  Platform amp hyphen dependent refers to a file that is installed on all platforms and  whose contents vary depending on the platform  Like a platform amp hyphen dependent  file  a platform amp hyphen independent file is installed on all platforms  However  the  contents of the latter type remains the same on all platforms  An example of a  platform amp hyphen dependent file is compiled  executable program  An example of a  platform amp hyphen independent file is a standard configuration file  such as   etc hosts  Unlike a platform amp hyphen dependent or a  platform amp hyphen independent file  the platform amp hyphen specific file is installed only on  a subset of supported platforms  Most platform specific files are gathered under   platformand  usr platform     The root file system contains files that are unique to each machine  It contains the  following directories     44 manpages section 5  Standards  Environments  and Macros    Last Revised 15 Nov 2001       filesystem 5        Root of the overall file system name space      dev  Primary location for special files  Typically  device files are built to match the kernel  and hardware configuration of the machine      dev cfg  Symbolic links to physical ap ids      dev cua  Device files for uucp      dev dsk  Block disk devices      dev fbs  Frame buffer device files      dev fd  File descriptors      dev md  Logical volume management meta 
150. MON x    The abbreviated weekday names  for example Sun    where x is a number from 1 to 7     The full weekday names  for example Sunday   where  x is a number from 1 to 7     The abbreviated month names  for example Jan   where  xis a number from 1 to 12     The full month names  for example January   where x  is a number from 1 to 12     Standards  Environments  and Macros 233    locale 5    D T FMT  D FMT  T FMT  AM STR    PM STR       T FMT AMPM    ERA       The appropriate date and time representation   The appropriate date representation   The appropriate time representation   The appropriate ante meridiem affix   The appropriate post meridiem affix     The appropriate time representation in the 12 hour  clock format with AM STR and PM STR     The era description segments  which describe how  years are counted and displayed for each era in a  locale  Each era description segment has the format     direction   offset  start date  end date era name   era_format    according to the definitions below  There will be as  many era description segments as are necessary to  describe the different eras  Era description segments are  separated by semicolons     The start of an era might not be the earliest point For  example  the Christian era B C  starts on the day before  January 1  A D  1  and increases with earlier time     direction Either a   or a   character  The    character indicates that years closer  to the start  date have lower  numbers than those closer to the  end 
151. Mac   For the conversion of ISO 8859 5 to Mac Cyrillic  all characters not in the following  Cyrillic   table are mapped unchanged              Conversions Performed  ISO 8859 5 Mac Cyrillic ISO 8859 5 Mac Cyrillic  24 4 317 237  200 237 40 320 340  240 312 321 341  241 335 322 342  242 253 323 343  243 256 324 344  244 270 325 345  245 301 326 346  246 247 327 347  247 272 330 350  250 267 331 351  251 274 332 352  252 276 333 353  253 40 334 354                      152 man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    iconv  8859 5 5        Conversions Performed       ISO 8859 5    Mac Cyrillic    ISO 8859 5    Mac Cyrillic          254  255  256  257  260  261  262  263  264  265  266  267  270  271  272  273  274  275  276  277  300  301  302  303  304  305  306  307       315  40   330  332  200  201  202  203  204  205  206  207  210  211  212  213  214  215  216  217  220  221  222  223  224  225  226  227       335  336  337  340  341  342  343  344  345  346  347  350  351  352  353  354  355  356  357  360  361  362  363  364  365  366  367  370       355  356  357  360  361  362  363  364  365  366  367  370  371  372  373  374  375  376  337  334  336  254  257  271  317  264  273  300             Standards  Environments  and Macros    153    iconv_8859 5 5                    Conversions Performed   ISO 8859 5 Mac Cyrillic ISO 8859 5 Mac Cyrillic  310 230 371 275  311 231 372 277  312 232 373 40  313 233 374 316  314 234 375 
152. NVERSIONS    Mazovia to ISO  8859 2       iconv  maz     code set conversion tables for Mazovia    The following code set conversions are supported     iconv maz 5                          The conversions are performed according to the following tables  All values in the  tables are given in octal              Code Set Conversions Supported  Code Symbol Target Code Symbol Target Output  Mazovia maz ISO 8859 2 iso2 ISO Latin 2  Mazovia maz MS 1250 win2 Windows Latin 2  Mazovia maz MS 852 dos2 MS DOS Latin 2  Mazovia maz DHN dhn Dom Hanlowy Nauki          For the conversion of Mazovia to ISO 8859 2  all characters not in the following table  are mapped unchanged                       Conversions Performed  Mazovia ISO 8859 2 Mazovia ISO 8859 2  24 177 40 230 246  200 307 231 326  201 374 232 334  202 351 233 40  203 342 234 243  204 344 235 40  205 40 236 266  206 261 237 40  207 347 240 254  210 40 241 257  211 353 242 363  212 213 40 243 323  214 356 244 361  215 346 245 321             Standards  Environments  and Macros    175    iconv maz 5     Mazovia to MS  1250                            Conversions Performed   Mazovia ISO 8859 2 Mazovia ISO 8859 2  216 304 246 274  217 241 247 277  220 312 250 340 40  221 352 341 337  222 263 342 365 40  223 364 366 367  224 366 367 40  225 306 370 260  226 227 40 371 376 40  256 201       For the conversion of Mazovia to MS 1250  all characters not in the following table are          mapped unchanged   Mazovia MS 1250 Mazovia MS 1250 
153. RE Bracket Expression  above   A vertical line  appearing first or last in an ERE  or immediately following a  vertical line or a left parenthesis  or immediately preceding a  right parenthesis  produces undefined results       The circumflex is special when used     m as an anchor  see ERE Expression Anchoring  below    m as the first character of a bracket expression  see RE Bracket  Expression  above        The dollar sign is special when used as an anchor     A period      when used outside a bracket expression  is an ERE that matches any  character in the supported character set except NUL     The rules for ERE Bracket Expressions are the same as for Basic Regular Expressions   see RE Bracket Expression  above      The following rules will be used to construct EREs matching multiple characters from  EREs matching a single character     1  A concatenation of EREs matches the concatenation of the character sequences  matched by each component of the ERE  A concatenation of EREs enclosed in  parentheses matches whatever the concatenation without the parentheses matches   For example  both the ERE cd and the ERE  cd  are matched by the third and  fourth character of the string abcdefabcdef     310 manpages section 5  Standards  Environments  and Macros   Last Revised 12 Jul 1999    ERE Alternation    ERE Precedence    regex 5       When an ERE matching a single character or an ERE enclosed in parentheses is    followed by the special character plus sign      together with th
154. RIPTION  OPTIONS  PARAMETERS  SEE ALSO  and others  The contents of the    title   may be a text entity reference     This tag is equivalent to the   SS nroff macro  It contains a   title   element that  contains the text of the sub section heading   lt refsect2 gt  tags may also be used  within a  lt refsynopsisdiv gt  as a sub section heading for the SYNOPSIS section     There are a number of block elements that are used for grouping text  This is a list of  some of these elements       para   This tag is used to contain a paragraph of text      lt variablelist gt  This tag is used to create two column lists  For example  descriptions for command options  where the first  column lists the option and the second column  describes the option      lt orderedlist gt  An list of items in a specific order      lt itemizedlist gt  A list of items that are marked with a character such as  a bullet or a dash      lt literallayout gt  Formatted program output as produced by a program  or command  This tag is a container for lines set off  from the main text in which line breaks  tabs  and  leading white space are significant      lt programlisting gt  A segment of program code  Line breaks and leading  white space are significant     lt table gt  This tag contains the layout and content for tabular  formatting of information   lt table gt  has a required   lt title gt      324 man pages section 5  Standards  Environments  and Macros   Last Revised 7 Jan 1997    Inline Elements    SEE 
155. ROG  ERROR  you must be super user to run this script    exit 1   fi   should be changed to   WHO   usr xpg4 bin id  n  u     if   4   WHO     root      then    echo   PROG  ERROR  you are not authorized to run this script    exit 1    fi    Authorizations can be explicitly checked in shell scripts by checking the output of the  auths 1  utility  For example     for auth in  auths   tr        NOTFOUND  do      auth     solaris date     amp  amp  break   authorization found  done  if    Sauth      solaris date     then  echo  gt  amp 2  SPROG  ERROR  you are not authorized to set the date   exit 1  fi    ld so 1 1  chkauthattr 3SECDB   auth attr 4  policy conf 4    prof attr 4  user attr 4     System Administration Guide  Security Services    Standards  Environments  and Macros 303    regex 5   NAME    DESCRIPTION    BASIC REGULAR  EXPRESSIONS  BREs Matching a  Single Character    BRE Ordinary  Characters    BRE Special  Characters       regex     internationalized basic and extended regular expression matching    Regular Expressions  REs  provide a mechanism to select specific strings from a set of  character strings  The Internationalized Regular Expressions described below differ  from the Simple Regular Expressions described on the regexp 5  manual page in the  following ways       both Basic and Extended Regular Expressions are supported    m the Internationalization features   character class  equivalence class  and  multi character collation   are supported     The Basi
156. September 2004    
157. a  b  c a Mo c a  No  c a c a c  The following will not     a c  aN c aN  b  c       m Calling a utility or function without going through a shell  as described for find 1   and the function   nmatch 3C     m Calling utilities such as find  cpio  tar or pax through the shell command line   In this case  shell quote removal is performed before the utility sees the argument   For example  in     find  bin  name e c  h o  print after quote removal  the backslashes are presented  to   ind and it treats them as escape characters  Both precede ordinary characters   so the c and h represent themselves and echo would be found on many historical  systems  that have it in  bin   To find a file name that contained shell special  characters or pattern characters  both quoting and escaping are required  such as     pax  r       aX      to extract a filename ending with a        Conforming applications are required to quote or escape the shell special characters   sometimes called metacharacters   If used without this protection  syntax errors can  result or implementation extensions can be triggered  For example  the KornShell  supports a series of extensions based on parentheses in patterns  see ksh 1     The following rules are used to construct patterns matching multiple characters from  patterns matching a single character     m The asterisk     is a pattern that will match any string  including the null string       The concatenation of patterns matching a single character is a valid
158. a single digit identifier  This does not imply that only nine  subexpressions are allowed in REs  The following is a valid BRE with ten  subexpressions             ab    e    d   N  e      N GBN N 2NJN GJ     N OgEN   N Gn   N  op    N  qr           When a BRE matching a single character  a subexpression or a back reference is    followed by the special character asterisk      together with that asterisk it matches  what zero or more consecutive occurrences of the BRE would match  For example    ab    and  ab   ab  are equivalent when matching the string ab       When a BRE matching a single character  a subexpression  or a back reference is    followed by an interval expression of the format   m      m    or   m n    together  with that interval expression it matches what repeated consecutive occurrences of  the BRE would match  The values of m and n will be decimal integers in the range  Oxmznz   RE DUP MAX   where m specifies the exact or minimum number of  occurrences and n specifies the maximum number of occurrences  The expression    m   matches exactly m occurrences of the preceding BRE    m    matches at least  m occurrences and   m n   matches any number of occurrences between m and n   inclusive     For example  in the string abababccccccd  the BRE c  3   is matched by  characters seven to nine  the BRE   ab    4    is not matched at all and the BRE  c  1 3  d is matched by characters ten to thirteen        The behavior of multiple adjacent duplication symbols     a
159. acros    Last Revised 3 Jul 1990    FILES    SEE ALSO       term 5        610 610bct  610   w 610bct   w  630 630MTG  7300 pc7300 unix pc  735 ti   745   dumb    hp   Ip   pt505  pt505 24    sync    AT amp T 610 bct terminal in 80 column mode  AT amp T 610 bct terminal in 132 column mode  AT amp T 630 Multi Tasking Graphics terminal  AT amp T UNIX PC Model 7300   Texas Instruments TI735 and TI725   Texas Instruments TI745    generic name for terminals that lack reverse line feed and  other special escape sequences    Hewlett Packard  same as 2645    generic name for a line printer   AT amp T Personal Terminal 505  22 lines   AT amp T Personal Terminal 505  24 line mode     generic name for synchronous Teletype Model  4540 compatible terminals       Commands whose behavior depends on the type of terminal should accept arguments  of the form   Tterm where term is one of the names given above  if no such argument is  present  such commands should obtain the terminal type from the environment  variable TERM  which  in turn  should contain term      usr share lib terminfo        compiled terminal description database    sh 1   stty 1   tabs 1   tput 1   vi 1   infocmp 1M   curses 3CURSES    profile 4   terminfo 4   environ 5     Standards  Environments  and Macros 337    vgrindefs 5   NAME  SYNOPSIS    DESCRIPTION    Capabilities       vgrindefs     vgrind s language definition data base     usr lib vgrindefs    vgrindefs contains all language definitions for vgrind 1   Capabiliti
160. acters    FNS    The POSIX  IEEE  Standards and the X Open Specifications are  described on the standards page     The user environment  environ   the subset of the user  environment that depends on language and cultural conventions   locale   the large file compilation environment  1  compile    and the transitional compilation environment  1  compile64 are  described     The macros to format Reference Manual pages  man and mansun   as well as other text format macros  me  mm  and ms  are described     Tables of character sets  ascii  charmap  eqnchar  and iconv    file format notation  formats   file name pattern matching     nmatch   and regular expressions  regex and regexp  are  presented     Topics concerning the Federated Naming Service    ns   fns initial context  fns policies  and  fns references are discussed     man pages section 5  Standards  Environments  and Macros   Last Revised 12 May 1999    Standards  Environments  and Macros       ascii 5                 NAME   ascii     map of ASCII character set  SYNOPSIS   cat  usr pub ascii  DESCRIPTION    usr pub ascii is a map of the ASCII character set  to be printed as needed  It  contains octal and hexadecimal values for each character  While not included in that  file  a chart of decimal values is also shown here   Octal   Character  000 NUL 001 SOH 002 STX 003 ETX 004 EOT 005 ENQ 006 ACK 007 BEL  010 BS 011 HT 012 NL 013 VT 014 NP 015 CR 016 SO 017 SI  020 DLE 021 DECL 022 DC2 023 DC3 024 DC4 025 NAK 026 SYN 027 
161. ains that RE to  match an initial segment of a line     A dollar sign     at the end of an entire RE constrains that RE to match a  final segment of a line     The construction  entire RE   constrains the entire RE to match the entire  line     The null RE  for example      is equivalent to the last RE encountered     Addresses are constructed as follows     1     2  3   4     on    The character     addresses the current line       The character     addresses the last line of the buffer     A decimal number n addresses the n th line of the buffer      x addresses the line marked with the mark name character x  which must be an  ASCII lower case letter  a z   Lines are marked with the k command described  below     A RE enclosed by slashes     addresses the first line found by searching forward  from the line following the current line toward the end of the buffer and stopping at  the first line containing a string matching the RE  If necessary  the search wraps  around to the beginning of the buffer and continues up to and including the  current line  so that the entire buffer is searched     A RE enclosed in question marks     addresses the first line found by searching  backward from the line preceding the current line toward the beginning of the buffer  and stopping at the first line containing a string matching the RE  If necessary  the    Standards  Environments  and Macros 315    regexp 5     Characters With    Special Meaning    316    Macros       search wraps around
162. akes the file system tree easier to  upgrade and manage     The file system tree consists of a root file system and a collection of mountable file  systems  The mount 2  program attaches mountable file systems to the file system tree  at mount points  directory entries  in the root file system or other previously mounted  file systems  Two file systems     the root  and  usr  must be mounted in order to  have a completely functional system  The root file system is mounted automatically by  the kernel at boot time  the  usr file system is mounted by the system start up script   which is run as part of the booting process     Certain locations  noted below  are approved installation locations for bundled  Foundation Solaris software  In some cases  the approved locations for bundled  software are also approved locations for add on system software or for applications   The following descriptions make clear where the two locations differ  For example    etc is the installation location for platform amp hyphen dependent configuration files  that are bundled with Solaris software  The analogous location for applications is     etc opt  packagename     In the following descriptions  subsystem is a category of application or system  software  such as a window system  dt  or a language  java1 2     The following descriptions make use of the terms platform  platform amp hyphen dependent   platform amp hyphen independent  and platform amp hyphen specific  Platform refers to a  machines 
163. ale  only    0123456789  are included     In a locale definition file  only the digits 0  1  2  3  4  5   6  7  8  and 9 can be specified  and in contiguous  ascending sequence by numerical value  The digits 0 to  9 of the portable character set are automatically  included in this class     The definition of character class digit requires that  only ten characters  the ones defining digits can be  specified  alternative digits  for example  Hindi or  Kanji  cannot be specified here     space Define characters to be classified as white space  characters     In the POSIX locale  at a minimum  the characters  SPACE  FORMFEED  NEWLINE  CARRIAGE RETURN   TAB  and VERTICAL TAB are included     In a locale definition file  no character specified for the  keywords upper  lower  alpha  digit  graph  or  xdigit can be specified  The characters SPACE   FORMFEED  NEWLINE  CARRIAGE RETURN  TAB  and  VERTICAL TAB of the portable character set  and any  characters included in the class blank are  automatically included in this class        cntrl Define characters to be classified as control characters        216 manpages section 5  Standards  Environments  and Macros   Last Revised 20 Dec 1996       punct    graph    print    xdigit    locale 5     In the POSIX locale  no characters in classes alpha or  print are included     In a locale definition file  no character specified for the  keywords upper  lower  alpha  digit  punct   graph  print  or xdigit can be specified     Define character
164. an pages section 5  Standards  Environments  and Macros    Last Revised 4 Nov 1994    NAME    DESCRIPTION    Reference Types    Address Types       fns references 5     fns references   overview of FNS References    Every composite name in ENS is bound to a reference  A reference consists of a type  and a list of addresses  The reference type is used to identify the type of object     An address is something that can be used with some communication mechanism to  invoke operations on an object or service  Multiple addresses are intended to identify  multiple communication endpoints for a single conceptual object or service  Each  address in a reference consists of an address type and an opaque buffer  The address  type determines the format and interpretation of the address data  Together  the  address s type and data specify how to reach the object  Many communication  mechanisms are possible  FNS does not place any restrictions on them     The following summarizes the reference and address types that are currently defined   New types should be registered with the Federated Naming Group at SunSoft     All reference types use the FN ID STRING identifier format unless otherwise  qualified        onc fn enterprise Enterprise root context    onc fn organization A context for naming objects related to an  organizational unit    onc fn hostname A context for naming hosts    onc fn username A context for naming users    onc fn user A context for naming objects related to a user    o
165. analogous location for add on system software or for  applications is  opt  packagename 1ib ia64      usr lib iconv  Conversion tables for iconv 1       usr lib libp  Profiled libraries      usr lib locale  Localization databases      usr lib lp  Line printer subsystem databases and back end executables      usr lib mail  Auxiliary programs for the mail 1  subsystem      usr lib netsvc  Internet network services      usr lib nfs  Auxiliary NFS related programs and daemons     56 manpages section 5  Standards  Environments  and Macros    Last Revised 15 Nov 2001       filesystem 5      usr lib pics  Position Independent Code  PIC  archives needed to rebuild the run time linker      usr lib refer  Auxiliary programs for refer 1       usr lib sa  Scripts and commands for the system activity report package  See sar 1       usr lib saf  Auxiliary programs and daemons related to the service access facility         usr lib sparcv9  SPARC 64 bit  platform amp hyphen dependent libraries  various databases  commands  and daemons not invoked directly by a human user  An approved installation  location for bundled Solaris software  The analogous location for add on system  software or for applications is  opt  packagename 1lib sparcv9      usr lib spell  Auxiliary programs and databases for spe11 1   This directory is only present  when the Binary Compatibility Package is installed      usr lib uucp  Auxiliary programs and daemons for uucp 1C       usr 1lib subsystem  Platform amp hyphen
166. ands are strings  For some keywords  the strings only  can contain integers  Keywords that are not provided  string values set to the empty  string       or integer keywords set to    1  will be used to indicate that the value is not  available in the locale  The following keywords are recognized     decimal point    thousands sep    grouping    Item    The operand is a string containing the symbol that is  used as the decimal delimiter  radix character  in  numeric  non monetary formatted quantities  This  keyword cannot be omitted and cannot be set to the  empty string  In contexts where standards limit the  decimal point to a single byte  the result of  specifying a multi byte operand is unspecified     The operand is a string containing the symbol that is  used as a separator for groups of digits to the left of the  decimal delimiter in numeric  non monetary formatted  monetary quantities  In contexts where standards limit  the thousands sep to a single byte  the result of  specifying a multi byte operand is unspecified     Define the size of each group of digits in formatted  non monetary quantities  The operand is a sequence of  integers separated by semicolons  Each integer specifies  the number of digits in each group  with the initial  integer defining the size of the group immediately  preceding the decimal delimiter  and the following  integers defining the preceding groups  If the last  integer is not    1  then the size of the previous group  if  any  will be rep
167. ar news directory      usr oasys  Commands and files related to the Form and Menu Language Interpreter  FMLI   execution environment  See face 1       usr old  Programs that are being phased out      usr openwin  Installation or mount point for the OpenWindows software      usr perl5  Perl 5 programs and documentation     usr platform  Subtree of platform amp hyphen specific objects which does not need to reside on the  root filesystem  It contains a series of directories  one per supported platform  The    58 manpages section 5  Standards  Environments  and Macros    Last Revised 15 Nov 2001       filesystem 5     semantics of the series of directories is equivalent to  platform  except for  subdirectories which do not provide utility under one or the other  for example    platform include is not needed       usr platform   uname  i  include  Symbolic link to        uname  i  include Platform amp hyphen specific system   sys  vm  header files with semantics equivalent to  usr include  An approved  installation location for bundled Solaris software and for add on system software      usr platform   uname  i  kernel  Platform amp hyphen specific modules with semantics equivalent to  usr  kernel   An approved installation location for bundled Solaris software and for add on  system software      usr platform   uname  i  lib  Platform amp hyphen specific daemon and shared objects with semantics equivalent to   usr 1ib  An approved installation location for bundled Solaris softwa
168. aracter classes need  not exist  If a class name is defined by a charclass  keyword  but no characters are subsequently assigned  to it  this is not an error  it represents a class without  any characters belonging to it  The charclass name  can be used as the property argument to the  wctype 3C  function  in regular expression and shell  pattern matching bracket expressions  and by the tr 1   command     Define the mapping of lower case letters to upper case  letters     In the POSIX locale  at a minimum  the 26 lower case  characters     218 manpages section 5  Standards  Environments  and Macros   Last Revised 20 Dec 1996    LC COLLATE       locale 5     abcdefghijkimnopqrstuvwxwyz    are mapped to the corresponding 26 upper case  characters     ABCDEFGHIJKLMNOPORSTUVWXYZ    In a locale definition file  the operand consists of  character pairs  separated by semicolons  The  characters in each character pair are separated by a  comma and the pair enclosed by parentheses  The first  character in each pair is the lower case letter  the  second the corresponding upper case letter  Only  characters specified for the keywords lower and  upper can be specified  The lower case letters a to z   and their corresponding upper case letters A to Z  of the  portable character set are automatically included in this  mapping  but only when the toupper keyword is  omitted from the locale definition     tolower Define the mapping of upper case letters to lower case  letters     In the POSIX
169. ard  The   pam smartcard so module is a shared object that can be dynamically loaded to  provide the necessary functionality upon demand  Its path is specified in the PAM  configuration file pam  conf  See pam  conf 4      The Smart Card authentication component provides the  pam sm authenticate 3PAM  function to verify the identity of a smart card user     The pam sm authenticate   function collects as user input the PIN number  It  passes this data back to its underlying layer  OCF  to perform PIN verification  If  verification is successful  the module returns PAM SUCCESS  and passes the username  and password from the smart card to PAM modules stacked below pam smartcard     The following options can be passed to the Smart Card service module     debug sysolg 3C  debugging information at LOG  DEBUG level   nowarn Turn off warning messages   verbose Turn on verbose authentication failure reporting to the user     The PAM smart card module  pam smartcard can be configured in the PAM  configuration file   etc pam  conf   For example  the following configuration on on  the desktop  Common Desktop Environment  forces a user to use a smart card for  logging in     The following are typical values set by  smartcard  c enable     if the command is  applied to the default configuration           dtlogin auth requisite pam smartcard so 1  dtlogin auth required pam authtok get so 1  dtlogin auth required pam dhkeys so 1  dtlogin auth required pam unix auth so   dtsession auth requis
170. are brackets  The  character   denotes a range    c c   unless it is just after the open bracket or before  the closing bracket     c  or   c   in which case it has no special meaning  When  used within brackets  the character   has the meaning complement of if it immediately  follows the open bracket  example    c     elsewhere between brackets  example    c    itstands for the ordinary character       The special meaning of the X operator can be escaped only by preceding it with  another     for example VN     Programs must have the following five macros declared before the include   lt regexp  h gt  statement  These macros are used by the compile    routine  The  macros GETC  PEEKC  and UNGETC operate on the regular expression given as input to  compile       GETC This macro returns the value of the next character  byte  in the  regular expression pattern  Successive calls to GETC should return  successive characters of the regular expression     PEEKC This macro returns the next character  byte  in the regular  expression  Immediately successive calls to PEEKC should return  the same character  which should also be the next character  returned by GETC     man pages section 5  Standards  Environments  and Macros    Last Revised 2 Apr 1996    compile      step    advance          regexp 5     UNGETC This macro causes the argument c to be returned by the next call  to GETC and PEEKC  No more than one character of pushback is  ever needed and this character is guaranteed to b
171. argument  is ignored  If it is a relative path  it is interpreted relative to the directory indicated by  the dirfd argument  If dirfd does not refer to a valid directory  the function returns  ENOTDIR  If the special value AT FDCWD is specified for dirfd  a relative path argument  is resolved relative to the current working directory  If the flag argument is 0  all other  semantics of this function are equivalent to unlink 2   If flag is set to AT REMOVEDIR   all other semantics of this function are equivalent to rmdir 2      Rename a file relative to directories  int renameat  int fromfd  const char  old  int tofd  const char  new     The renameat 2  function renames an entry in a directory  possibly moving the entry  into a different directory  The old argument indicates the name of the entry to rename   If this argument is a relative path  it is interpreted relative to the directory indicated by  the fd argument  If it is an absolute path  the fromfd argument is ignored  The new  argument indicates the new name for the entry  If this argument is a relative path  it is  interpreted relative to the directory indicated by the tofd argument  If it is an absolute  path  the tofd argument is ignored     In the relative path cases  if the directory file descriptor arguments do not refer to a  valid directory  the function returns ENOTDIR  All other semantics of this function are  equivalent to rename 2      If a special value AT FDCWD is specified for either the fromfd or tofd a
172. aries      usr snadm  Files related to system and network administration      usr spool  Symbolic link to the  var spool directory      usr src  Symbolic link to the  usr share src directory      usr tmp  Symbolic link to the var   tmp directory      usr ucb  Berkeley compatibility package binaries      usr ucbinclude  Berkeley compatibility package headers      usr ucblib  Berkeley compatibility package libraries     Standards  Environments  and Macros 61    filesystem 5     usr vmsys  Commands and files related to the Framed Access Command Environment  FACE   programs  See face 1       usr xpg4  Directory for POSIX compliant utilities     SEE ALSO   at 1   ex 1     ace 1   fm1i 1   iconv 1   1p 1   isainfo 1   mail 1   mailx 1    nroff 1   priocnt1 1   refer 1   sar 1   sh 1   spe11 1   trof   1   uname 1    uucp 1C   vi 1   acct 1M   cron 1M   dispadmin 1M     sck 1M   init 1M    kernel 1M   mknod 1M   mount 1M   useradd 1M   ypbind 1M   mount 2    intro 4   terminfo 4        62 man pages section 5  Standards  Environments  and Macros    Last Revised 15 Nov 2001    NAME    DESCRIPTION    Patterns Matching  a Single Character       fnmatch 5     fnmatch   file name pattern matching    The pattern matching notation described below is used to specify patterns for  matching strings in the shell  Historically  pattern matching notation is related to  but  slightly different from  the regular expression notation  For this reason  the description  of the rules for this pattern ma
173. asier for developers to write management applications that can communicate with  any WBEM enabled management device  The Solaris WBEM Software Development  Kit includes examples  documentation  and CIM Workshop  a graphical user interface  through which developers can view and create classes and instances  through the  remote method invocation  RMI  or the XML HTTP protocol     Developers can also use this kit to write providers  which are programs that  communicate with managed elements to access data     All management applications that developers create with the Solaris WBEM Software  Development Kit run on the Java platform  The Solaris 9 WBEM Software  Development Kit installs and runs in version 1 4 of the Java environment  Developers  can use the kit to write standalone applications or applications that run in conjunction  with Solaris WBEM Services     342 manpages section 5  Standards  Environments  and Macros   Last Revised 5 Nov 2001    Compatibility of  Solaris WBEM  Services with  Existing Protocols    ATTRIBUTES    SEE ALSO       wbem 5     The Solaris WBEM Software Development Kit is described in the Solaris WBEM SDK  Development Guide  Javadoc for the WBEM application programming interface is  located at  usr sadm lib wbem doc index html     Adapters and converters enable Solaris WBEM Services of Solaris to work compatibly  with existing protocols by mapping WBEM information to these protocols  One such  protocol is Simple Network Management Protocol  SNMP    
174. at  describes the acceptable negative response to a question expecting  an affirmative or negative response     yesstr The operand consists of a fixed string  not a regular expression   that can be used by an application for composition of a message  that lists an acceptable affirmative response  such as in a prompt     nostr The operand consists of a fixed string that can be used by an  application for composition of a message that lists an acceptable  negative response  The format and values for affirmative and  negative responses of the POSIX locale follow  the code listing  depicting the localedef input  the table representing the same  information with the addition of n1  1anginfo   constants   LC MESSAGES      This is the POSIX locale definition for    the LC MESSAGES category         yesexpr   lt circumflex gt  lt left square bracket gt  lt y gt  lt Y gt  lt right square bracket gt        noexpr   lt circumflex gt  lt left square bracket gt  lt n gt  lt N gt  lt right square bracket gt        yesstr  yes    nostr  no     END LC_MESSAGES          localedef Keyword langinfo Constant POSIX Locale Value  yesexpr YESEXPR    yy     noexpr NOEXPR     nN      yesstr YESSTR  yes    nostr NOSTR  no                    date 1   Locale 1   Localedef 1   sort 1   tr 1   unia 1   Localeconv 3C     nl langinfo 3C   setlocale 3C   strcol1 3C   strftime 3C   strptime 3C    strxfrm 3C   wcscoll 3C   wcsftime 3C   wcsxfrm 3C   wctype 3C    attributes 5   charmap 5   ext ensions 5   regex 
175. at 2      The function call stat  path  buf  is identical to fstatat  AT_FDCWD  path  buf   0      The function call 1stat  path  buf  is identical to fstatat  AT_FDCWD  path  buf   AT SYMLINK NOFOLLOW     The function call fstat  fildes  buf  is identical to fstatat  fildes  NULL  buf  0      Set owner and group ID  int fchownat  int fd  const char  path  uid t owner  gid t group  int flag     The   chownat 2  function sets the owner ID and group ID for a file  If the path  argument is relative  it is resolved relative to the fd argument file descriptor  otherwise  the fd argument is ignored  If the fd argument is a special value AT FDCWD the path is  resolved relative to the current working directory  If the path argument is a null  pointer  the function sets the owner and group ID of the file referenced by the fd  argument  In all other relative path cases  if the fd argument does not refer to a valid  directory  the function returns ENOTDIR  If the flag argument is set to   AT SYMLINK NOFOLLOW  the function will not automatically traverse a symbolic link  at the position of the path  The   chownat    function is a multi purpose function that  can be used in place of chown     1chown     or     chown      See chown 2      The function call chown  path  owner  group  is equivalent to   chownat   AT FDCWD  path  owner  group  O      The function call 1chown  path  owner  group  is equivalent to   chownat   AT FDCWD  path  owner  group  AT SYMLINK NOFOLLOW         Set file ac
176. at plus sign it  matches what one or more consecutive occurrences of the ERE would match  For  example  the ERE b   bc  matches the fourth to seventh characters in the string  acabbbcde   ab    and  ab   ab    are equivalent       When an ERE matching a single character or an ERE enclosed in parentheses is    followed by the special character asterisk      together with that asterisk it matches  what zero or more consecutive occurrences of the ERE would match  For example   the ERE b c matches the first character in the string cabbbcde  and the ERE  b cd matches the third to seventh characters in the string cabbbedebbbbbbcdbc   And   ab    and  ab   ab  are equivalent when matching the string ab       When an ERE matching a single character or an ERE enclosed in parentheses is    followed by the special character question mark      together with that  question mark it matches what zero or one consecutive occurrences of the ERE  would match  For example  the ERE b c matches the second character in the string  acabbbcde       When an ERE matching a single character or an ERE enclosed in parentheses is    followed by an interval expression of the format  m    m   or  m n   together with that  interval expression it matches what repeated consecutive occurrences of the ERE  would match  The values of m and n will be decimal integers in the range 0  lt  m  lt  n       RE DUP MAX   where m specifies the exact or minimum number of occurrences  and n specifies the maximum number of oc
177. atabase     The following options may be passed to the LDAP service module     debug syslog 3C  debugging information at LOG  DEBUG  level   nowarn Turn off warning messages     These options are case sensitive   and the options must be used exactly as presented  here     The authentication service returns the following error codes     PAM SUCCESS Authentication successful   PAM MAXTRIES Maximum number of authentication attempts exceeded  PAM AUTH ERR Authentication failure   PAM USER UNKNOWN No account present for user    Standards  Environments  and Macros 279    pam ldap 5     280    EXAMPLES       PAM BUF ERR Memory buffer error  PAM SYSTEM ERR System error  The account management service returns the following error codes     PAM SUCCESS User allowed access to account    PAM NEW AUTHTOK REQD New authentication token required       PAM ACCT EXPIRED User account has expired   PAM PERM DENIED User denied access to account at this time  PAM USER UNKNOWN No account present for user   PAM BUF ERROR Memory buffer error   PAM SYSTEM ERR System error    The password management service returns the following values              PAM SUCCESS Successfully updates authentication token  PAM PERM DENIED No permission to update authentication token  PAM AUTHTOK ERR Authentication token manipulation error   PAM USER UNKNOWN No account present for user   PAM BUF ERR Memory buffer error   PAM SYSTEM ERR System error    EXAMPLE 1 Using pam 1dap With Authentication    The following is a configu
178. ate calendar bindings in the user s own context  as in this example     fnbind  r thisuser service calendar onc calendar onc cal str  jsmith beatrix    The files object name that corresponds to an FNS composite name can be obtained  using   nlookup 1  and fnlist 1      The files used for storing FNS information are placed in the directory  var fn  The  machine on which  var    n is located has access to the FNS file  The FNS information  can be made accessible to other machines by exporting  var fn  Client machines that  NFS mount the  var   n directory would then be able to access the FNS information     Standards  Environments  and Macros 71    fns files 5     SEE ALSO   fnbind 1   fnlist 1   fnlookup 1   fnunbind 1   fncreate 1M    fncreate fs 1M   fndestroy 1M   x  n 3XEN     ns 5     fns initial context 5  fns nis 5  fns nis  5  fns policies 5    fns references 5        72 manpages section 5  Standards  Environments  and Macros    Last Revised 13 Dec 1996    NAME    DESCRIPTION       fns initial context 5     fns initial context   overview of the FNS Initial Context    Every FNS name is interpreted relative to some context  and every FNS naming  operation is performed on a context object  The FNS programming interface  XFN   provides a function that allows the client to obtain an Initial Context object  The Initial  Context provides the initial pathway to other FNS contexts  FNS defines a set of  bindings that the client can expect to find in this context     ENS assumes
179. ating multiple naming  services under a single  simple interface for the basic naming operations  One of the  naming services supported by FNS is the X 500 Directory Service  see ITU T X 500 or  ISO IEC 9594   X 500 is a global directory service  Its components cooperate to  manage information about a hierarchy of objects on a worldwide scope  Such objects  include countries  organizations  people  services  and machines  FNS uses X 500 to  name entities globally     FNS provides the XFN interface for retrieval and modification of information stored in  X 500  In addition  enterprise namespaces such as those served by NIS  and NIS can  be federated with X 500 by adding reference information to X 500 describing how to  reach the desired next naming service  To federate a NIS  or NIS namespace under  X 500  perform the following steps     1  Obtain the root reference for the NIS  hierarchy or NIS domain    2  Enhance the X 500 schema to support the addition of XFN references   3  Create an X 500 entry to store the XFN reference    4  Add the XFN reference     The root reference is referred to as the next naming system reference because it refers to  the next naming system beneath X 500  This reference contains information about how  to communicate with the NIS  or NIS servers and has the following format       domainname     server name       server address gt       where   domainname is the fully qualified domain name  Notice that NIS  and NIS  have slightly different syntaxes
180. ation for add on system software or for  applications is  opt  packagename bin ia64      usr subsystem  bin sparcv9    SPARC 64 bit  plattorm amp hyphen dependent  user invoked executables  This  directory should not be part of a user s  PATH  A wrapper in  usr bin should  invoke the executable in this directory  See isaexec 3C   An approved installation  location for bundled Solaris software  The analogous location for add on system  software or for applications is  opt  packagename bin sparcv9     54 manpages section 5  Standards  Environments  and Macros    Last Revised 15 Nov 2001       filesystem 5      usr ccs  C compilation system      usr ccs bin  C compilation commands and system utilities      usr ccs lib  Symbolic link to  usr 1ib      usr demo  Demo programs and data      usr dict  Symbolic link to the  usr share 1lib dict directory  which contains the  dictionary file used by the UNIX spell program      usr dt  root of a subtree for CDE software      usr dt bin  Primary location for CDE system utilities      usr dt include  Header files for CDE software      usr dt lib  Libraries for CDE software         usr dt share man  On line reference manual pages for CDE software      usr games  An empty directory  a remnant of the SunOS 4 0 4 1 software      usr include  Include headers  for C programs       usr iplanet  Directory server executables  loadable modules  and documentation      usr j2se  Java 2 SDK executables  loadable modules  and documentation      usr java
181. ble Markup Language  XML   which is  a markup language that represents management information in textual form   In addition to the XML representation  CIM information is also represented    textually by the managed object format  MOF   These MOF representations are  typically stored as text files that developers compile into a CIM Object Manager     Tools and services that enable developers to create and Services management  applications and instrumentation that manage heterogeneous computer environments  include     m Solaris WBEM Services 2 5    Solaris WBEM Software Development Kit 2 5    These services consist of a set of value added Services 2 5 components  These services  make it easier for developers to create management applications that run in the Solaris  operating environment  They also make the Solaris operating environment easier to  manage  Solaris WBEM Services 2 5 consists of     m CIM Object Manager  CIM Repository  and MOF Compiler    Standards  Environments  and Macros 341    wbem 5     Solaris WBEM  Software  Development Kit  2 5       m CIM and Solaris Schema  which is an extension schema of CIM  CIM and Solaris  Schema is a collection of CIM classes that describe managed elements in the Solaris  operating environment  These classes are available from the CIM Object Manager  at start up     wm Solaris Providers  which are programs that communicate information between the  Solaris operating environment and the CIM Object Manager  providers get and set   dy
182. c Regular Expression  BRE  notation and construction rules described in the  BASIC REGULAR EXPRESSIONS section apply to most utilities supporting regular  expressions  Some utilities  instead  support the Extended Regular Expressions  ERE   described in the EXTENDED REGULAR EXPRESSIONS section  any exceptions for both  cases are noted in the descriptions of the specific utilities using regular expressions   Both BREs and EREs are supported by the Regular Expression Matching interfaces  regcomp 3C  and regexec 3C      A BRE ordinary character  a special character preceded by a backslash  or a period  matches a single character  A bracket expression matches a single character or a single  collating element  See RE Bracket Expression  below     An ordinary character is a BRE that matches itself  any character in the supported  character set  except for the BRE special characters listed in BRE Special  Characters  below     The interpretation of an ordinary character preceded by a backslash     is undefined   except for     1  the characters          and    2  the digits 1 to 9 inclusive  see BREs Matching Multiple Characters  below   3  acharacter inside a bracket expression     A BRE special character has special properties in certain contexts  Outside those  contexts  or when preceded by a backslash  such a character will be a BRE that  matches the special character itself  The BRE special characters and the contexts in  which they have their special meaning are     LIA The pe
183. ce Stability  19  MT Level  22  authentication  account  session  and password  management PAM modules for Kerberos V5      pam  krb5  273  authentication and password management  module     pam authtok check  265  authentication and password management  module     pam authtok get  267  authentication module for password      pam passwd auth  283  availability     attributes of interfaces  18    C  C     standards and specifications supported by   Solaris  328  C       standards and specifications supported   by Solaris  328  character set description file     charmap  26  charmap     character set description file  26   Decimal Constants  28   Declarations  26   Format  27   Ranges of Symbolic Names  28   Symbolic Names  26  code set conversion tables     iconv  122  code set conversion tables     iconv  1250  107  code set conversion tables     iconv  1251  113  code set conversion tables     iconv  646  126  code set conversion tables     iconv  852  129  code set conversion tables     iconv  8859 1  135  code set conversion tables     iconv  8859 2  141  code set conversion tables     iconv  8859 5  147  code set conversion tables     iconv_dhn  155  code set conversion tables     iconv_koi8 r  159  code set conversion tables       iconv  mac cyr  167  code set conversion tables     iconv_maz  175  code set conversion tables     iconv  pc cyr  179  code set conversion tables       iconv_unicode  185  code set conversion tables      iconv_1250  107      iconv_1251  113    
184. ced first  after  the    if any  and the   last within the bracket expression     Note  Latin 1 characters such as   or   are not printable in some locales  for example   the ja locale     The following rules can be used to construct BREs matching multiple characters from  BREs matching a single character     1     2     The concatenation of BREs matches the concatenation of the strings matched by  each component of the BRE     A subexpression can be defined within a BRE by enclosing it between the character  pairs    and      Such a subexpression matches whatever it would have matched  without the    and V   except that anchoring within subexpressions is optional  behavior  see BRE Expression Anchoring  below  Subexpressions can be  arbitrarily nested     Standards  Environments  and Macros 307    regex 5     308    BRE Precedence    3  The back reference expression  n matches the same  possibly empty  string of    characters as was matched by a subexpression enclosed between    and     preceding the  n  The character n must be a digit from 1 to 9 inclusive  nth  subexpression  the one that begins with the nth    and ends with the  corresponding paired       The expression is invalid if less than n subexpressions  precede the Vr  For example  the expression           1  matches a line consisting  of two adjacent appearances of the same string  and the expression   a    1 fails to  match a  The limit of nine back references to subexpressions in the RE is based on  the use of 
185. cess and modification times  int futimesat  int fd  const char  path  const struct timeval times 2      The futimesat 2  function sets the access and modification times for a file  If the path  argument is relative  it is resolved relative to the fd argument file descriptor  otherwise  the fd argument is ignored  If the fd argument is the special value AT FDCWD  the path  is resolved relative to the current working directory  If the path argument is a null  pointer  the function sets the access and modification times of the file referenced by the  fd argument  In all other relative path cases  if the fd argument does not refer to a valid  directory  the function returns ENOTDIR  The futimesat    function can be used in  place of utimes 2      The function call utimes  path  times  is equivalent to futimesat  AT FDCWD   path  times      Standards  Environments  and Macros 101    fsattr 5        New pathconf   functionality  long int pathconf const char  path  int name     Two variables have been added to pathcon   2  to provide enhanced support for  extended attribute manipulation  The XATTR ENABLED variable allows an application  to determine if attribute support is currently enabled for the file in question  The  XATTR EXISTS variable allows an application to determine whether there are any  extended attributes associated with the supplied path     Open Create an attribute file  int attropen  const char  path  const char  attrpath  int oflag    mode t model     The attropen 
186. ch procedure definitions occur as subexpressions of defuns    sb str Regular expression for the start of a string   se str Regular expression for the end of a string   te str Use the named entry as a continuation of this one   tl bool Present means procedures are only defined at the top lexical level       338 man pages section 5  Standards  Environments  and Macros   Last Revised 10 Aug 1994       Regular  Expressions    Keyword List    EXAMPLES       vgrindefs 5     vgrindefs uses regular expressions similar to those of ex 1  and 1ex 1   The  characters                     and    V are reserved characters and must be    quoted    with a  preceding   if they are to be included as normal characters  The metasymbols and    their meanings are     The end of a line         The beginning of a line     d A delimiter  space  tab  newline  start of line    a Matches any string of symbols  like          in lex    p Matches any identifier  In a procedure definition  the    pb       capability  the string that matches this symbol is used as the  procedure name     0 Grouping     Alternation     Last item is optional   Ve Preceding any string means that the string will not match an input    string if the input string is preceded by an escape character       This is typically used for languages  like C  that can include the  string delimiter in a string by escaping it     Unlike other regular expressions in the system  these match words and not characters   Hence something like     tramp
187. cluded in a pattern bracket  expression used for filename expansion  For example  the pattern a  b c  d will  not match such pathnames as abd or a d  It will only match a pathname of  literally a  b c  d     2  Ifa filename begins with a period      the period must be explicitly matched by  using a period as the first character of the pattern or immediately following a slash  character  The leading period will not be matched by       the asterisk or question mark special characters      a bracket expression containing a non matching list  such as      1a a range expression  such as        0  or a character class expression  such as        punct     It is unspecified whether an explicit period in a bracket expression  matching list  such as       abc  can match a leading period in a filename     3  Specified patterns are matched against existing filenames and pathnames  as    appropriate  Each component that contains a pattern character requires read  permission in the directory containing that component  Any component  except the  last  that does not contain a pattern character requires search permission  For  example  given the pattern        00 bar x   bamsearch permission is needed for directories   and foo  search  and read permissions are needed for directory bar  and search permission is    Standards  Environments  and Macros 65    fnmatch 5     needed for each x  directory  If the pattern matches any existing filenames or  pathnames  the pattern will be replaced with t
188. cter      The comment character defaults to the number sign  4t   Blank lines and lines  containing the   comment character   in the first position are ignored     The first category header in the file can be preceded by a line modifying the escape  character to be used in the file  It has the following format  starting in column 1      escape char  c n     escape character    The escape character defaults to backslash     A line can be continued by placing an escape character as the last character on the line   this continuation character will be discarded from the input  Although the  implementation need not accept any one portion of a continued line with a length  exceeding  LINE MAX  bytes  it places no limits on the accumulated length of the  continued line  Comment lines cannot be continued on a subsequent line using an  escaped newline character     Individual characters  characters in strings  and collating elements must be  represented using symbolic names  as defined below  In addition  characters can be  represented using the characters themselves or as octal  hexadecimal or decimal  constants  When non symbolic notation is used  the resultant locale definitions will in  many cases not be portable between systems  The left angle bracket      is a reserved  symbol  denoting the start of a symbolic name  when used to represent itself it must be  preceded by the escape character  The following rules apply to character  representation     1  A character can be represen
189. ction 3 describes functions found in various libraries  other than those functions  that directly invoke UNIX system primitives  which are described in Section 2     Section 4 outlines the formats of various files  The C structure declarations for the  file formats are given where applicable     Section 5 contains miscellaneous documentation such as character set tables   Section 6 contains available games and demos     Section 7 describes various special files that refer to specific hardware peripherals  and device drivers  STREAMS software drivers  modules and the  STREAMS  generic set of system calls are also described     m Section 9 provides reference information needed to write device drivers in the  kernel environment  It describes two device driver interface specifications  the  Device Driver Interface  DDI  and the DriverKernel Interface  DKI      m Section 9E describes the DDI DKI  DDI only  and DKI only entry point routines a  developer can include in a device driver     m Section 9F describes the kernel functions available for use by device drivers     m Section 9S describes the data structures used by drivers to share information  between the driver and the kernel     Below is a generic format for man pages  The man pages of each manual section  generally follow this order  but include only needed headings  For example  if there  are no bugs to report  there is no BUGS section  See the intro pages for more  information and detail about each section  and man 1  fo
190. cur     1  The option try first pass is specified and the  password entered for the first module in the stack  fails for the UNIX module     Standards  Environments  and Macros 293    pam unix 5     UNIX Account  Management  Module    UNIX Session  Management  Module    UNIX Password  Management  Module       2  The option try first pass is not specified  and  the earlier authentication modules listed in the  pam conf file have prompted the user for the  password     In these two cases  the UNIX authentication module  will use the prompt  SYSTEM password    The   pam sm setcred   function sets user specific  credentials  If the user had secure RPC credentials  but  the secure RPC password was not the same as the  UNIX password  then a warning message is printed  If  the user wants to get secure RPC credentials  then  keylogin 1  needs to be run     The UNIX account management component provides a function to perform account  management  pam sm acct mgmt     The function retrieves the user s password  entry from the UNIX password database and verifies that the user s account and  password have not expired  The following options may be passed in to the UNIX  service module     debug syslog 3C  debugging information at LOG  DEBUG level     nowarn Turn off warning messages     The UNIX session management component provides functions to initiate   pam sm open session   and terminate pam sm close session   UNIX  sessions  For UNIX  pam open session updates the  var adm lastlog file
191. currences  The expression  m  matches  exactly m occurrences of the preceding ERE   m   matches at least m occurrences  and  m n  matches any number of occurrences between m and n  inclusive     For example  in the string abababccccccd the ERE c 3  is matched by characters       seven to nine and the ERE  ab  2   is matched by characters one to six     The behavior of multiple adjacent duplication symbols          and intervals   produces undefined results     Two EREs separated by the special character vertical line  1  match a string that is  matched by either  For example  the ERE a  bc   d  matches the string abc and the  string ad  Single characters  or expressions matching single characters  separated by  the vertical bar and enclosed in parentheses  will be treated as an ERE matching a    single character     The order of precedence will be as shown in the following table           ERE Precedence  from high to low        escaped characters    bracket expression       collation related bracket symbols  2 3 E dL          lt special character                    Standards  Environments  and Macros 311    regex 5     312    ERE Expression  Anchoring    SEE ALSO             grouping    single character ERE duplication   2  m n   concatenation   anchoring A   alternation            For example  the ERE abba   cde matches either the string abba or the string cde   rather than the string abbade or abbcde  because concatenation has a higher order  of precedence than alternation 
192. d Framework V1 1  OCF  with Sun extensions to allow OCF to  operate in a multi user environment  The core OCF software protocol stack is  implemented as a system service daemon  This implementation allows smart cards  and card terminals to be shared cooperatively among many different clients on the  system while providing access control to the smart card and card terminal resources  on a per UID basis     An event dispatcher is provided to inform clients of events occuring on the card and at  the card terminal  such as card insertion and card removal     A high level authentication mechanism is provided to allow clients to perform smart  card based authentications without requiring knowledge of specific card or reader  authentication features     A set of applet administration tools is provided for JavaCards that support  downloading Java applets  although applet build tools are not provided      Administration of the smart card framework is provided with the smart card 1M   command line administration utility and the smartcardguiadmin 1  GUI  administration tool     Support for several card terminals is provided     m Sun External Smart Card Reader I  see oc    escr1 7D      Sun Internal Smart Card Reader I  see oc    iscr1 7D      Dallas iButton Serial Reader  see oc    ibutton 7D      Additional card terminals can be supported by implementing smart card terminal  interfaces in a shared library     Support for several smart cards is provided     m Schlumberger Cyberflex Acc
193. d and roman    DT no Oi 1i    Restore default tabs    HP i yes i p i   Begin paragraph with hanging indent    Set prevailing indent to i    rd no t n t l  Text is italic    IB t no t n t l  Join words  alternating italic and bold    IPxi yes x   Same as   TP with tag x      IR   t no t n t l  Join words  alternating italic and roman        238 man pages section 5  Standards  Environments  and Macros   Last Revised 30 Jan 1995    Conventions       Request     IX t     LP        RB t   RI t     RS i     SB t     SH t   SM t   SS t     THnsdfm     TP i     TXfp    Cause    Break    no    yes    yes    no    yes  yes    no    no    yes    no    yes    no    yes  yes    yes    no    If no  Argument    t n t l     t n t l     i p i     t n t l     t n t l     i p i     man 5     Explanation    Index macro  for SunSoft internal use     Begin left aligned paragraph  Set  prevailing indent to  5i     Same as   LP     Set vertical distance between  paragraphs     Same as   LP     End of relative indent  Restores  prevailing indent     Join words  alternating roman and bold   Join words  alternating roman and italic     Start relative indent  increase indent by i   Sets prevailing indent to  5i for nested  indents     Reduce size of text by 1 point  make text  bold     Section Heading   Reduce size of text by 1 point   Section Subheading     Begin reference page n  of of section s  d  is the date of the most recent change  If  present  f is the left page footer  m is the  main page  cen
194. d file attributes  96    l   iconv     code set conversion tables  122   iconv_1250     code set conversion tables for MS  1250  Windows Latin 2   107   iconv_1251     code set conversion tables for MS  1251  Windows Cyrillic   113   iconv_646     code set conversion tables for ISO  646  126   iconv_852     code set conversion tables for MS  852  MS DOS Latin 2   129   iconv_8859 1     code set conversion tables for  ISO 8859 1  Latin 1   135   iconv_8859 2     code set conversion tables for  ISO 8859 2  Latin 2   141   iconv_8859 5     code set conversion tables for  ISO 8859 5  Cyrillic   147   iconv_dhn     code set conversion tables for  DHN  Dom Handlowy Nauki   155   iconv_koi8 r     code set conversion tables for  KOI8 R  159    iconv_mac_cyr     code set conversion tables for  Macintosh Cyrillic  167   iconv maz     code set conversion tables for  Mazovia  175   iconv  pc  cyr     code set conversion tables for  Alternative PC Cyrillic  179   iconv unicode     code set conversion tables for  Unicode  185   internationalized basic and extended regular  expression matching     regex  304   isalist     the native instruction sets known to  Solaris  190   ISO     standards and specifications supported  by Solaris  328    L  large file status of utilities     largefile  192  largefile     large file status of utilities  192  Large file aware utilities  192  Large file safe utilities  194  1f64     transitional interfaces for 64 bit file  offsets  196  Data Types  196  Syst
195. d for  network services for which it is entitled  for example  a user with a valid SEAM ticket  may rlogin into another machine running SEAM without having to identify itself   Because each client has a unique ticket  its identity is guaranteed     To obtain tickets  a client must first initialize the SEAM session  either by using the  kinit 1  command or a PAM module   See pam krb5 5    kinit prompts for a  password  and then communicates with a Key Distribution Center  KDC   The KDC  returns a Ticket Granting Ticket  TGT  and prompts for a confirmation password  If the  client confirms the password  it can use the Ticket Granting Ticket to obtain tickets for  specific network services  Because tickets are granted transparently  the user need not  worry about their management  Current tickets may be viewed by using the klist 1   command     Tickets are valid according to the system policy set up at installation time  For example   tickets have a default lifetime for which they are valid  A policy may further dictate  that privileged tickets  such as those belonging to root  have very short lifetimes   Policies may allow some defaults to be overruled  for example  a client may request a  ticket with a lifetime greater or less than the default     Tickets can be renewed using kinit  Tickets are also forwardable  allowing you to use  a ticket granted on one machine on a different host  Tickets can be destroyed by using  kdestroy 1   It is a good idea to include a call to kdestr
196. d in detail in the following sections     Define a collating element symbol representing a multi character collating element   This keyword is optional     Define a collating symbol for use in collation order statements  This keyword is  optional     Define collation rules  This statement is followed by one or more collation order  statements  assigning character collation values and collation weights to collating  elements     10  Specify the end of the collation order statements     In addition to the collating elements in the character set  the collating element  keyword is used to define multi character collating elements  The syntax is      collating element  s from    s   n     collating symbol      lt string gt     220 man pages section 5  Standards  Environments  and Macros   Last Revised 20 Dec 1996    collating symbol  keyword    order start keyword       locale 5     The  lt collating symbol gt  operand is a symbolic name  enclosed between angle brackets    lt  and  gt    and must not duplicate any symbolic name in the current charmap file  if  any   or any other symbolic name defined in this collation definition  The string  operand is a string of two or more characters that collates as an entity  A   lt collating element gt  defined via this keyword is only recognized with the LC COLLATE  category     For example     collating element   ch   from    c    h     collating element   e acute   from   lt acute gt  lt e gt    collating element   11   from  11     This 
197. d unchanged        Conversions Performed                   MS 1251 Mac Cyrillic MS 1251 Mac Cyrillic  24 4 260 241  200 253 262 247  201 256 263 264  202 40 264 266  203 257 266 246  204 327 267 245  205 311 270 336  206 240 271 334  207 211 40 272 271  212 274 273 310  213 40 274 300  214 276 275 301  215 315 276 317  216 40 277 273  217 332 300 200  220 254 301 201  221 324 302 202  222 325 303 203  223 322 304 204                Standards  Environments  and Macros 119    iconv_1251 5     120       Conversions Performed       MS 1251    Mac Cyrillic    MS 1251    Mac Cyrillic       224  225  226  227  230  231  232  233  234  235  236  237  240  241  242  243  244  245  246  247  250  252  253  254  255  256  257  355          323  40   320  321  40   252  275  40   277  316  40   333  312  330  331  267  377  242  40   244  335  270  307  302  55   250  272    316       305  306  307  310  311  312  313  314  315  316  317  320  321  322  323  324  325  326  327  330  331  332  333  334  335  336  337       205  206  207  210  211  212  213  214  215  216  217  220  221  222  223  224  225  226  227  230  231  232  233  234  235  236  237          man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997    FILES    SEE ALSO        usr lib iconv   so   usr lib iconv   t     usr lib iconv iconv data    iconv 1   iconv 3C   iconv 5     iconv_1251 5   conversion modules  conversion tables    list of conversions supported by conversion  tables    Sta
198. date  The     character indicates  that years closer to the start date  have higher numbers than those  closer to the end  date     offset The number of the year closest to  the start date in the era     start  date A date in the form yyyy   mm   dd   where yyyy  mm  and dd are the  year  month and day numbers  respectively of the start of the era   Years prior to AD 1 are represented  as negative numbers     end_date The ending date of the era  in the  same format as the start_date  or one  of the two special values      or      The value      indicates that the  ending date is the beginning of    234 man pages section 5  Standards  Environments  and Macros   Last Revised 20 Dec 1996       ERA D FMT    ERA T FMT    ERA D T FMT       locale 5     time  The value    indicates that the  ending date is the end of time     era name The era  corresponding to the  EC  conversion specification     era format The format of the year in the era   corresponding to the  EY and  EY  conversion specifications     The era date format     The locale s appropriate alternative time format   corresponding to the EX field descriptor     The locale s appropriate alternative date and time  format  corresponding to the  Ec field descriptor              ALT DIGITS The alternative symbols for digits  corresponding to the   O conversion specification modifier  The value  consists of semicolon separated symbols  The first is  the alternative symbol corresponding to zero  the  second is the symbol corre
199. des functions to verify the identity of a  user   pam sm authenticate     and to set user specific credentials   pam sm setcred    pam sm authenticate   compares the user entered  password with the password from the UNIX password database  If the passwords  match  the user is authenticated  If the user also has secure RPC credentials and the  secure RPC password is the same as the UNIX password  then the secure RPC  credentials are also obtained     The following options may be passed to the UNIX service module     debug syslog 3C  debugging information at LOG  DEBUG  level    nowarn Turn off warning messages    use first pass It compares the password in the password database    with the user s initial password  entered when the user  authenticated to the first authentication module in the  stack   If the passwords do not match  or if no  password has been entered  it quits and does not  prompt the user for a password  This option should  only be used if the authentication service is designated  as optional in the pam  conf configuration file     try first pass It compares the password in the password database  with the user s initial password  entered when the user  authenticated to the first authentication module in the  stack   If the passwords do not match  or if no  password has been entered  prompt the user for a  password  When prompting for the current password   the UNIX authentication module will use the prompt    password   unless one of the following scenarios  oc
200. dial auth 5  272    4 man pages section 5  Standards  Environments  and Macros    September 2004    pam krb5 5 273   pam ldap 5  278   pam passwd auth 5  283  pam projects 5  285  pam rhosts auth 5  286  pam roles 5  287  pam  sample 5  289  pam smartcard 5  291  pam unix 5  293   pam unix account 5  296  pam unix auth 5    297  pam unix session b  299  prof 5 300   rbac 5  301   regex 5  304   regexp 5  313  SEAM 5  320   sgml 5  322  smartcard 5    326  standards 5  328  sticky 5    333   term 5  334  vgrindefs 5  338  wbem 5  341    Index 345    6 manpages section 5  Standards  Environments  and Macros    September 2004    Preface       Both novice users and those familar with the SunOS operating system can use online  man pages to obtain information about the system and its features  A man page is  intended to answer concisely the question  What does it do   The man pages in  general comprise a reference manual  They are not intended to be a tutorial        Overview    The following contains a brief description of each man page section and the  information it references     Section 1 describes  in alphabetical order  commands available with the operating  system     Section 1M describes  in alphabetical order  commands that are used chiefly for  system maintenance and administration purposes     Section 2 describes all of the system calls  Most of these calls have one or more  error returns  An error condition is indicated by an otherwise impossible returned  value     Se
201. diff  diff3 diffmk ed lp mail  mailcompat mailstats mailx pack pcat  red rmail sdiff unpack vi  view    The following  usr xpg4 bin utilities are large file safe     ed vi view    The following  usr sbin utilities are large file safe     Ipfilter Ipforms       The following  usr ucb utilities are large file safe     194 manpages section 5  Standards  Environments  and Macros    Last Revised 16 Jul 2003    largefile 5     Mail lpr  The following  usr lib utility is large file safe     sendmail    SEE ALSO   1  64 5   1  compile 5   l1  compile64 5        Standards  Environments  and Macros 195    1f64 5   NAME    DESCRIPTION    Data Types       1f64     transitional interfaces for 64 bit file offsets    The data types  interfaces  and macros described on this page provide explicit access  to 64 bit file offsets  They are accessible through the transitional compilation  environment described on the 1  compile64 5  manual page  The function prototype  and semantics of a transitional interface are equivalent to those of the standard version  of the call  except that relevant data types are 64 bit entities     The following tables list the standard data or struct types in the left hand column and  their corresponding explicit 64 bit file offset types in the right hand column  grouped  by header  The absence of an entry in the left hand column indicates that there is no  existing explicit 32 bit type that corresponds to the 64 bit type listed in the  right   hand column  Note that 
202. digit  lower  upper  and space have a set of  automatically included characters  These only need to be specified if the character  values  that is  encoding  differ from the implementation default values     cswidth Moved to extensions file  see extensions 5       upper Define characters to be classified as upper case letters     In the POSIX locale  the 26 upper case letters are  included     ABCDEFGHIJKLMNOPORSTUVWXYZ    In a locale definition file  no character specified for the  keywords cntrl  digit  punct  or space can be  specified  The upper case letters A to Z are  automatically included in this class     lower Define characters to be classified as lower case letters   In the POSIX locale  the 26 lower case letters are  included     abcdefghijkimnopqrstuvwxwyz    Standards  Environments  and Macros 215    locale 5     In a locale definition file  no character specified for the  keywords cntr1  digit  punct  or space can be  specified  The lower case letters a to z of the portable  character set are automatically included in this class     alpha Define characters to be classified as letters     In the POSIX locale  all characters in the classes upper  and lower are included     In a locale definition file  no character specified for the  keywords cntrl  digit  punct  or space can be  specified  Characters classified as either upper or  lower are automatically included in this class     digit Define the characters to be classified as numeric digits     In the POSIX loc
203. disk devices      dev printers  USB printer device files      dev pts  Pseudo terminal devices      dev rdsk  Raw disk devices      dev rmt  Raw tape devices      dev sad  Entry points for the STREAMS Administrative driver      dev sound  Audio device and audio device control files      dev swap  Default swap device      dev term  Terminal devices      devices  Physical device files      etc  Platform amp hyphen dependent administrative and configuration files and databases  that are not shared among systems   etc may be viewed as the directory that    Standards  Environments  and Macros 45    filesystem 5     46       man pages section 5      e     e     e     e     e     e     e     e     e     e     e     e     e     e     e     e     e    defines the machine s identity  An approved installation location for bundled  Solaris software  The analogous location for add on system software or for  applications is  etc opt  packagename     tc acct  Accounting system configuration information     tc apache  Apache configuration files     tc cron d  Configuration information for cron 1M      tc default  Defaults information for various programs     tc dfs  Configuration information for shared file systems     tc dhcp  Dynamic Host Configuration Protocol  DHCP  configuration files     tc dmi  Solstice Enterprise Agents configuration files     tc fn  Federated Naming Service and X 500 support files        tc fs  Binaries organized by file system types for operations required before  
204. dule for UNIX    pam unix session so 1    pam unix session provides functions to initiate pam sm open session 3PAM   and to terminate pam sm close session 3PAM      pam open session updates the  var adm lastlog file  The account management  module reads this file to determine the previous time the user logged in   pam sm close session is a null function     The following options can be passed to the module   debug syslog 3C  debugging information at the LOG  DEBUG level    nowarn Turn off warning messages    The following values are returned     PAM SUCCESS Successful completiton   PAM SESSION ERR Can not make or remove the entry for the specified  session   PAM USER UNKNOWN No account is present for user    See attributes 5  for descriptions of the following attributes        ATTRIBUTE TYPE ATTRIBUTE VALUE       Interface Stability Evolving       MT Level MT Safe with exceptions                pam 3PAM   pam authenticate 3PAM   syslog 3C   1ibpam 3LIB   pam  con   4    nsswitch conf 4   attributes 5  pam authtok check 5     pam authtok get 5  pam authtok store 5   pam dhkeys 5     pam passwd auth 5  pam unix 5  pam unix account 5 pam unix auth 5      The interfaces in 1ibpam 3LIB  are MT Safe only if each thread within the  multi threaded application uses its own PAM handle     The pam unix 5  module might not be supported in a future release  Similar  functionality is provided by pam authtok check 5  pam authtok get 5    pam authtok store 5  pam dhkeys 5  pam passwd auth 5 
205. e     c beta char  May     A character can be represented as an octal constant  An octal constant is specified  as the escape character followed by two or more octal digits  Each constant  represents a byte value  Multi byte values can be represented by concatenated  constants specified in byte order with the last constant specifying the least  significant byte of the character     For example    143  347  143 150   115 141 171     A character can be represented as a hexadecimal constant  A hexadecimal constant  is specified as the escape character followed by an x followed by two or more  hexadecimal digits  Each constant represents a byte value  Multi byte values can be  represented by concatenated constants specified in byte order with the last constant  specifying the least significant byte of the character     For example     x63    xe7   x63 x68   x4d x61 x79     A character can be represented as a decimal constant  A decimal constant is  specified as the escape character followed by a d followed by two or more decimal  digits  Each constant represents a byte value  Multi byte values can be represented  by concatenated constants specified in byte order with the last constant specifying  the least significant byte of the character     For example      d99  d231  d99 d104   d77 d97 d121     214 man pages section 5  Standards  Environments  and Macros   Last Revised 20 Dec 1996    LC CTYPE       locale 5     Only characters existing in the character set for which the local
206. e SPACE  characters in a    word     If text is empty  the special treatment is applied to the next  input line with text to be printed  In this way   I may be used to italicize a whole line   or  SB may be used to make small bold letters     A prevailing indent distance is remembered between successive indented paragraphs   and is reset to default value upon reaching a non indented paragraph  Default units  for indents i are ens     Type font and size are reset to default values before each paragraph  and after  processing font and size setting macros     These strings are predefined by  mansun   VER   amp        Reg     in nroff   NS Change to default type size     Requests     n t l    next text line  p i    prevailing indent    Request Cause If no Explanation   Break Argument   B t no t n t L  Text is in bold font    BI f   no t n t    Join words  alternating bold and italic    BR f   no t n t l  Join words  alternating bold and Roman    DT no Oi 1i    Restore default tabs    HP i yes i p i   Begin paragraph with hanging indent    Set prevailing indent to i    rd no t n t l  Text is italic    IB t no t n t l  Join words  alternating italic and bold    IPxi yes x   Same as   TP with tag x      IR   t no t n t l  Join words  alternating italic and Roman        242 man pages section 5  Standards  Environments  and Macros   Last Revised 11 Jun 1992    Conventions       Request     IX t     LP        RB t   RI t     RS i     SB t     SH t   SM t   SS t     THnsdfm     TP i    
207. e a BE other than the current BE  as the source for a new BE  Also  you can create an empty BE onto which you can  later install a flash archive     2  Using luupgrade 1M   you upgrade the OS version on your new BE  or on yet  another BE you created with lucreate   The luupgrade enables you to upgrade  an OS  from any valid Solaris installation medium  including a flash archive   add  or remove packages  OS or application   and add or remove patches     3  You use luactivate 1M  to make the new BE bootable  The next time you reboot  your system  you will come up in the new BE     Standards  Environments  and Macros 209    live upgrade 5        4  Using lucompare 1M   you compare the system files on two different BEs  This  utility gives you a comprehensive list of the files that have differences     5  Using lumount 1M   you mount the filesystems of a BE that is not active  enabling  you to make changes  When you are finished with the changes  use 1uumount  1M   to unmount the BE s file systems     6  Upon booting a new BE  you discover a failure or some other undesirable behavior   Using the procedure specified in luactivate  you can fall back to the previous  BE     7  Using ludelete then lucreate  you reassign file systems on the now deleted BE  to different disk slices  You separate  opt and  var from   on the new BE  Also   you specify that swap be spread over slices on multiple disks     The following is a summary of Live Upgrade commands  All commands require root  pri
208. e definition is  created can be specified  whether using symbolic names  the characters themselves   or octal  decimal or hexadecimal constants  If a charmap file is present  only  characters defined in the charmap can be specified using octal  decimal or  hexadecimal constants  Symbolic names not present in the charmap file can be  specified and will be ignored  as specified under item 1 above     The LC CTYPE category defines character classification  case conversion and other  character attributes  In addition  a series of characters can be represented by three  adjacent periods representing an ellipsis symbol          The ellipsis specification is  interpreted as meaning that all values between the values preceding and following it  represent valid characters  The ellipsis specification is valid only within a single  encoded character set  that is  within a group of characters of the same size  An ellipsis  is interpreted as including in the list all characters with an encoded value higher than  the encoded value of the character preceding the ellipsis and lower than the encoded  value of the character following the ellipsis     For example     NX30        x39     includes in the character class all characters with encoded values between the  endpoints     The following keywords are recognized  In the descriptions  the term  automatically  included  means that it is not an error either to include or omit any of the referenced  characters     The character classes digit  x
209. e file  Coded  character set character values are defined using symbolic character names followed by  character encoding values     The character set description file provides       The capability to describe character set attributes  such as collation order or  character classes  independent of character set encoding  and using only the  characters in the portable character set  This makes it possible to create generic  localedef 1  source files for all codesets that share the portable character set     m Standardized symbolic names for all characters in the portable character set   making it possible to refer to any such character regardless of encoding     Each symbolic name is included in the file and is mapped to a unique encoding value   except for those symbolic names that are shown with identical glyphs   If the control  characters commonly associated with the symbolic names in the following table are  supported by the implementation  the symbolic names and their corresponding  encoding values are included in the file  Some of the encodings associated with the  symbolic names in this table may be the same as characters in the portable character  set table         lt ACK gt   lt DC2 gt   lt ENQ gt   lt FS gt   lt IS4 gt   lt SOH gt    lt BEL gt   lt DC3 gt   lt EOT gt   lt GS gt   lt LF gt   lt STX gt    lt BS gt   lt DC4 gt   lt ESC gt   lt HT gt   lt NAK gt   lt SUB gt    lt CAN gt   lt DEL gt   lt ETB gt   lt IS1 gt   lt RS gt   lt SYN gt    lt CR gt   lt DLE gt   l
210. e following values are returned           PAM AUTH ERR Authentication failure   PAM BUF ERR Memory buffer error   PAM IGNORE Ignore module  not participating in result  PAM PERM DENIED Permission denied   PAM SUCCESS Successfully obtains authentication token  PAM SYSTEM ERR System error   PAM USER UNKNOWN No account present for user    See attributes 5 for descriptions of the following attributes        ATTRIBUTE TYPE ATTRIBUTE VALUE       Interface Stability Evolving       MT Level MT Safe with exceptions                pam 3PAM   pam authenticate 3PAM   syslog 3C   1ibpam 3LIB   pam  con   4    nsswitch conf 4   attributes 5  pam authtok check 5     pam authtok get 5  pam authtok store 5   pam dhkeys 5     pam passwd auth 5  pam unix 5  pam unix account 5     pam unix session 5     The interfaces in 1ibpam 3LIB  are MT Safe only if each thread within the  multi threaded application uses its own PAM handle     Standards  Environments  and Macros 297    pam unix auth 5     The pam unix 5  module might not be supported in a future release  Similar  functionality is provided by pam authtok check 5  pam authtok get 5    pam authtok store 5   pam dhkeys 5   pam passwd auth 5     pam unix account 5  pam unix auth 5  and pam unix session 5         298 man pages section 5  Standards  Environments  and Macros   Last Revised 21 Jan 2003    NAME  SYNOPSIS    DESCRIPTION    ERRORS    ATTRIBUTES    SEE ALSO    NOTES       pam  unix session 5   pam unix session   session management PAM mo
211. e initial substring of string matches the  regular expression in expbuf  If there is a match  an external character pointer  10c2  is  set as a side effect  The variable 1oc2 points to the next character in string after the last  character that matched     When advance    encounters a   or       sequence in the regular expression  it will  advance its pointer to the string to be matched as far as possible and will recursively  call itself trying to match the rest of the string to the rest of the regular expression  As  long as there is no match  advance    will back up along the string until it finds a  match or reaches the point in the string that initially matched the   or V       It is  sometimes desirable to stop this backing up before the initial point in the string is  reached  If the external character pointer locs is equal to the point in the string at  sometime during the backing up process  advance    will break out of the loop that  backs up and will return zero     The external variables circf  sed  and nbra are reserved     EXAMPLE 1 The following is an example of how the regular expression macros and calls  might be defined by an application program      define INIT register char  sp   instring    define GETC   sp       define PEEKC   sp     define UNGETC c     sp    define RETURN   c  return     define ERROR  c  regerr     include  lt regexp h gt      void  compile  argv  expbuf   amp expbuf  ESIZE      0         if  step linebuf  expbuf    succeed     The func
212. e is an extended version written at Berkeley and is a  superset of the standard  ms macro packages as supplied by Bell Labs  Some of the  Bell Labs macros have been removed  for instance  it is assumed that the user has little  interest in producing headers stating that the memo was generated at Whippany Labs     Many nroff and troff requests are unsafe in conjunction with this package   However  the first four requests below may be used with impunity after initialization   and the last two may be used even before initialization      bp begin new page    br break output line    Spn insert n spacing lines    cen center next n lines    lsn line spacing  1 1 single  n 2 double space   na no alignment of right margin    Font and point size changes with  f and Vs are also allowed  for example      Iword fR will italicize word  Output of the tb1 1   eqn 1  and refer 1   preprocessors for equations  tables  and references is acceptable as input                                            Break    Macro Name Initial Value Reset  Explanation   ABX   y begin abstract  if x no do not label abstract   AE   y end abstract   AI   y author   s institution   AM   n better accent mark definitions   AU   y author   s name   Bx   n embolden x  if no x  switch to boldface   B1   y begin text to be enclosed in a box   B2   y end boxed text and print it       man pages section 5  Standards  Environments  and Macros    Last Revised 25 Feb 1992    ms 5                                                 
213. e the last  character read by GETC  The return value of the macro UNGETC  c   is always ignored     RETURN  ptr  This macro is used on normal exit of the compile    routine  The  value of the argument ptr is a pointer to the character after the last  character of the compiled regular expression  This is useful to  programs which have memory allocation to manage     ERROR  val  This macro is the abnormal return from the compile    routine   The argument val is an error number  see ERRORS below for  meanings   This call should never return     The syntax of the compile    routine is as follows     compile  instring  expbuf  endbuf  eof     The first parameter  instring  is never used explicitly by the compile    routine but is  useful for programs that pass down different pointers to input characters  It is  sometimes used in the INIT declaration  see below   Programs which call functions to  input characters or have characters in an external array can pass down a value of   char    0 for this parameter     The next parameter  expbuf  is a character pointer  It points to the place where the  compiled regular expression will be placed     The parameter endbuf is one more than the highest address where the compiled  regular expression may be placed  If the compiled expression cannot fit in   endbuf expbuf  bytes  a call to ERROR  50  is made     The parameter eof is the character which marks the end of the regular expression  This  character is usually a       Each program that i
214. e the meeting schedules of the  organizational unit     EXAMPLE 2 The types of objects that may be named relative to a site name are services and  files  Here are some examples of names that name objects relative to sites     Site b5 mtv service printer speedy  names a printer speedy in the b5   mtv site     site admin fs usr dist  names a file directory usr dist available in the site admin     EXAMPLE 3 The types of objects that may be named relative to a user name are services and  files  Here are some examples of names that name objects relative to users     user jsmith service calendar  names the calendar service of the user j smith     Standards  Environments  and Macros 83    fns policies 5     84    SEE ALSO       EXAMPLE 3 The types of objects that may be named relative to a user name are services and  files  Here are some examples of names that name objects relative to users   Continued     user jsmith fs bin games riddles  names the file bin games riddles of the user j smith     EXAMPLE 4 The types of objects that may be named relative to a host name are services and  files  Here are some examples of names that name objects relative to hosts   host  mailhop service mailbox   names the mailbox service associated with the machine mailhop     host mailhop fs pub saf archives 91  names the directory pub saf archives  91 found under the root directory of the  machine mailhop       ncreate 1M   nis  1   x  n 3XEN     ns 5     ns initial context 5    fns references 5     m
215. e user ID of root  Typically  this  means that the file modes for the file would be  rwsr xr x with root ownership     man pages section 5  Standards  Environments  and Macros    Last Revised 15 Jul 2003    SEE ALSO       rbac 5     Use caution  though  when making programs setuid to root  For example  the  effective UID should be set to the real UID as early as possible in the program s  initialization function  The effective UID can then be set back to root after the  authorization check is performed and before the system call is made  On return from  the system call  the effective UID should be set back to the real UID again to adhere to  the principle of least privilege     Another consideration is that LD LIBRARY path is ignored for setuid programs  see  SECURITY section in 1d so 1 1   and that shell scripts must be modified to work  properly when the effective and real UIDs are different  For example  the  p flag in  Bourne shell is required to avoid resetting the effective UID back to the real UID     Using an effective UID of root instead of the real UID requires extra care when writing  shell scripts  For example  many shell scripts check to see if the user is root before  executing their functionality  With RBAC  these shell scripts may be running with the  effective UID of root and with a real UID of a user or role  Thus  the shell script should  check euid instead of uid  For example     WHO  id   cut  f1  d        if       WHO     uid 0  root       then  echo   P
216. e with them as soon as possible  Unfortunately  new technologies  are prone to changes and standardization often results in interface incompatibility  from previous versions     To make reasonable risk assessments  developers need to know how likely an interface  is to change in future releases  To aid developers in making these assessments   interface stability information is included on some manual pages for commands   entry points  and file formats     The more stable interfaces can safely be used by nearly all applications  because Sun  will endeavor to ensure that these continue to work in future minor releases   Applications that depend only on Standard and Stable interfaces should reliably  continue to function correctly on future minor releases  but not necessarily on earlier  major releases      The less stable interfaces allow experimentation and prototyping  but should be used  only with the understanding that they might change incompatibly or even be dropped  or replaced with alternatives in future minor releases      Interfaces  that Sun does not document  for example  most kernel data structures and  some symbols in system header files  may be implementation artifacts  Such internal  interfaces are not only subject to incompatible change or removal  but we are unlikely  to mention such a change in release notes     Products are given release levels  as well as names  to aid compatibility discussions   Each release level may also include changes suitable for lowe
217. e64 5        202 manpages section 5  Standards  Environments  and Macros   Last Revised 1 Aug 2001    Ifcompile 5   NAME   lfcompile   large file compilation environment for 32 bit applications    DESCRIPTION   All 64 bit applications can manipulate large files by default  The methods described on  this page allow 32 bit applications to manipulate large files     In the large file compilation environment  source interfaces are bound to appropriate  64 bit functions  structures  and types  Compiling in this environment allows 32 bit  applications to access files whose size is greater than or equal to 2 Gbyte   2   bytes      Each interface named xxx    that needs to access 64 bit entities to access large files  maps to a xxx64    call in the resulting binary  All relevant data types are defined to  be of correct size  for example  off t has a typedef definition for a 64 bit entity      An application compiled in this environment is able to use the xxx    source interfaces  to access both large and small files  rather than having to explicitly utilize the  transitional xxx64    interface calls to access large files  See the 1  compile64 5   manual page for information regarding the transitional compilation environment     Applications can be compiled in the large file compilation environment by using the  following methods     m Use the getconf 1  utility with one or more of the arguments listed in the table  below  This method is recommended for portable applications          
218. eatedly used for the remainder of the  digits  If the last integer is    1  then no further grouping  will be performed  The non monetary numeric  formatting definitions for the POSIX locale follow  the  code listing depicting the 1ocaledef input  the table  representing the same information with the addition of  localeconv values and n1 langinfo constants     LC NUMERIC     This is the POSIX locale definition for    the LC NUMERIC category        decimal_point   lt period gt     thousands sep mai   grouping  1       END LC_NUMERIC    POSIX locale langinfo localeconv   localedef    Constant Value Value    230 man pages section 5  Standards  Environments  and Macros   Last Revised 20 Dec 1996    LC TIME       locale 5     decimal point  mM RADIXCHAR  mun  thousands sep n a THOUSEP rn TM  grouping n a   wi  1    The entry n a indicates that the value is not available in the POSIX locale     The LC TIME category defines the interpretation of the field descriptors supported by  date 1  and affects the behavior of the strftime 3C   wcsftime 3C    strptime 3C   and nl langinfo 3C  functions  Because the interfaces for  C language access and locale definition differ significantly  they are described  separately  For locale definition  the following mandatory keywords are recognized     abday Define the abbreviated weekday names  corresponding to the  a  field descriptor  conversion specification in the strftime     wcsftime   and strptime    functions   The operand consists  of seve
219. ect with an Internet address  The  address contains an internet IP address in  dotted string form  for example    192 144 2 3      x500 For an X 500 object  The address contains an  X 500 Distinguished Name  in the syntax  specified in the X Open DCE  Directory  Services     osi paddr For an object with an OSI presentation  address  The address contains the string  encoding of an OSI Presentation Address as  defined in A string encoding of Presentation  Address  RFC 1278      onc printers bsaddr For a printer that understands the BSD print  protocol  The address contains the machine  name and printer name used by the  protocol     onc printers use For a printer alias  The address contains a  printer name     onc printers all For a list of printers that are enumerated  using the  all  option  The address contains  a list of printer names     onc printers location For a printer s location  The address format  is unspecified     onc printers type For a printer s type  The address format is  unspecified    onc printers speed For a printer s speed  The address format is  unspecified     mount 1M   fn ctx handle from ref 3XEN   xfn 3XEN     ns 5    fns policies 5     Hardcastle Kille  S E   A string encoding of Presentation Address  RFC 1278  University  College London  November 1991     Standards  Environments  and Macros 87    fns x500 5   NAME    DESCRIPTION       fns x500     overview of ENS over X 500 implementation    Federated Naming Service  FNS  provides a method for feder
220. ed as part of the shell environment in the environment  variable TERM  See sh 1   profile 4   and environ 5   These names are used by  certain commands  for example  tabs  tput  and vi  and certain functions  for  example  see curses 3CURSES       Files under  usr share lib terminfo are used to name terminals and describe  their capabilities  These files are in the format described in terminfo 4   Entries in  terminfo source files consist of a number of comma separated fields  To print a  description of a terminal term  use the command in  ocmp  I term  See infocmp 1M    White space after each comma is ignored  The first line of each terminal description in  the terminfo database gives the names by which terminfo knows the terminal   separated by bar     characters  The first name given is the most common abbreviation  for the terminal  this is the one to use to set the environment variable TERMINFO in   HOME   profile see profile 4    the last name given should be a long name fully  identifying the terminal  and all others are understood as synonyms for the terminal  name  All names but the last should contain no blanks and must be unique in the first  14 characters  the last name may contain blanks for readability     Terminal names  except for the last  verbose entry  should be chosen using the  following conventions  The particular piece of hardware making up the terminal  should have a root name chosen  for example  for the AT amp T 4425 terminal  att4425   This name sho
221. ed to construct a package of configuration  information to send to each DHCP client  There exists  only one dheptab for the DHCP service  The  dheptab 4  can be viewed and modified using the  dhtadm 1M  command or dhcpmgr 1M  graphical  utility  See dhcptab 4  for more information about the  syntax of dhcptab records  See dhcp inittab 4 for  more information about the DHCP options and  symbols     DHCP network tables DHCP network tables  which contain mappings of  client IDs to IP addresses and parameters associated  with those addresses  Network tables are named with  the IP address of the network  and can be created   viewed  and modified using the pntadm command or  dhepmgr graphical utility  See dhcp network 4  for  more information about network tables     Standards  Environments  and Macros 33    dhep 5     SEE ALSO       dhepinfo 1   dhcpagent 1M   dhcpconfig 1M   dhcpmgr 1M   dhtadm 1M    ifconfig 1M   in dhcpa 1M   netstat 1M   pntadm 1M   syslog 3C    dhcp network 4  dhcptab 4   dhcpsvc  conf   4   dhcp inittab 4     dhcp modules 5     Solaris DHCP Service Developer s Guide    Alexander  S   and R  Droms  RFC 2132  DHCP Options and BOOTP Vendor Extensions   Silicon Graphics  Inc  Bucknell University  March 1997     Droms  R  RFC 1534  Interoperation Between DHCP and BOOTP  Bucknell University   October 1993     Droms  R  RFC 2131  Dynamic Host Configuration Protocol  Bucknell University  March  1997     Wimer  W RFC 1542  Clarifications and Extensions for the Bootst
222. efining a locale  They are  also similar to the member names of the 1conv structure defined in  lt locale h gt   The  localeconv function returns  CHAR  MAX  for unspecified integer items and the  empty string       for unspecified or size zero string items     Standards  Environments  and Macros 225    locale 5     available in the locale     int curr symbol    currency symbol    mon decimal point    mon thousands sep    mon grouping       In a locale definition file the operands are strings  For some keywords  the strings can  contain only integers  Keywords that are not provided  string values set to the empty  string       or integer keywords set to  1  are used to indicate that the value is not    The international currency symbol  The operand is a  four character string  with the first three characters  containing the alphabetic international currency  symbol in accordance with those specified in the ISO  4217 1987 standard  The fourth character is the  character used to separate the international currency  symbol from the monetary quantity     The string used as the local currency symbol     The operand is a string containing the symbol that is  used as the decimal delimiter  radix character  in  monetary formatted quantities  In contexts where  standards  such as the ISO C standard  limit the  mon decimal point to a single byte  the result of  specifying a multi byte operand is unspecified     The operand is a string containing the symbol that is  used as a separator 
223. em Interfaces  198  Ifcompile     large file compilation environment   Access to Additional Large File  Interfaces  203  Ifcompile64     transitional compilation  environment  206  Access to Additional Large File  Interfaces  206  live upgrade  208  locale     subset of a user s environment that  depends on language and cultural  conventions  212  collating element keyword  220  collating symbol keyword  221  Collation Order  222  LC COLLATE  219  LC CTYPE  215  LC MESSAGES  236  LC MONETARY  225  LC NUMERIC  229  LC TIME  231  LC TIME C language Access  233  LC  TIME General Information  236    347    locale     subset of a user s environment that  depends on language and cultural conventions   Continued   Locale Definition  212  order end keyword  225  order  start keyword  221  localedef extensions description file      extensions  43    M  macros  to format articles  theses and books      mm  251  to format articles  theses and books      ms  258  to format Manual pages     man  238  to format Manual pages     mansun  242  to format technical papers     me  246  man     macros to format manual pages  238  mansun     macros to format manual  pages  242  manual pages  macros to format manual pages     man  238  Sun macros to format manual pages      mansun  242  mark files for special treatment     sticky  333  me     macros to format technical papers  246  mm     macros to format articles  theses and  books  251  ms     macros to format articles  theses and  books  258  MT
224. ember body 2  ansi 840  sun 113536  30      nNSReferenceString ATTRIBUTE        WITH SYNTAX OCTET STRING  EQUALITY MATCHING RULE octetStringMatch  SINGLE VALUE TRUE  ID id at nNSReferenceString      id at nNSReferenceString OBJECT IDENTIFIER    so member body 2  ansi 840  sun 113536  31           The procedures for altering the X 500 schema will vary from implementation to  implementation  Consult Solstice X 500 or the schema administration guide for your  X 500 product     Once X 500 supports XFN references  the next naming system reference can be added  by first creating an X 500 object and then adding the new reference to it  For example   the following commands create entries for the Wiz and Woz organizations in the  U S A  and add the reference information shown in the examples above to them    For NIS      example  fnattr     c us o wiz  a objectclass      top organization xfnsupplement    example  fnbind  r     c us o wiz  onc fn enterprise      onc fn nisplus root  wiz com  wiz nisplus server     For NIS     example  fnattr     c us o woz  a objectclass      top organization xfnsupplement    examples fnbind  r     c us o woz  onc fn enterprise      onc fn nis root  Woz COM woz nis server     Notice the mandatory trailing slash           in the name argument to   nbina 1      Standards  Environments  and Macros 89    fns x500 5     90    SEE ALSO    NOTES       This modification effectively adds the next naming system reference to X 500  The  reference may be retrieved
225. en locales       Not every object in Solaris 2 and Solaris 7can have names composed of arbitrary  characters  The names of the following objects must be composed of ASCII  characters       User names  group name  and passwords    System name    Names of printers and special devices    18 manpages section 5  Standards  Environments  and Macros   Last Revised 15 Aug 2001    Interface Stability    Release Levels       attributes 5         Names of terminals    dev tty          Process ID numbers     Message queues  semaphores  and shared memory labels      The following may be composed of ISO Latin 1 or EUC characters         File names       Directory names       Command names       Shell variables and environmental variable names    Mount points for file systems     NIS key names and domain names    m The names of NFS shared files should be composed of ASCII characters  Although  files and directories may have names and contents composed of characters from  non ASCII code sets  using only the ASCII codeset allows NFS mounting across  any machine  regardless of localization  For the commands and utilities that are CSI  enabled  all can handle single byte and multi byte locales released in 2 6  For  applications to get full support of internationalization services  dynamic binding  has to be applied  Statically bound programs will only get support for C and  POSIX locales     Sun often provides developers with early access to new technologies  which allows  developers to evaluat
226. en resetting these values  make sure to specify the appropriate units  Setting the  line length to 7  for example  will result in output with one character per line  Setting  FF to 1 suppresses footnote superscripting  setting it to 2 also suppresses indentation  of the first line  and setting it to 3 produces an   1P like footnote paragraph     Standards  Environments  and Macros 261    ms 5     262    Here is a list of string registers available in  ms  they may be used anywhere in the                                           text   Name String s Function    Q quote    innroff     introff      U unquote   innroff      introff        dash     innroff     introff        MO month  month of the year       DY day  current date   xx automatically numbered footnote  Nord acute accent  before letter   yes grave accent  before letter       circumflex  before letter       cedilla  before letter       umlaut  before letter       tilde  before letter           When using the extended accent mark definitions available with   AM  these strings  should come after  rather than before  the letter to be accented     FILES    usr share lib tmac s   usr share lib tmac ms        SEE ALSO   co1 1   eqn 1   nro     1   refer 1   tb1 1   trof   1     BUGS   Floating keeps and regular keeps are diverted to the same space  so they cannot be  mixed together with predictable results        man pages section 5  Standards  Environments  and Macros    Last Revised 25 Feb 1992    NAME    DESCRIPTION     
227. ent authentication token in the   PAM OLDAUTHTOK item  the new  to be checked  password in the PAM AUTHTOK item   and the login name in the PAM USER item  The checks performed by this module are     length The password length should not be less that the minimum  specified in  etc default passwd    circular shift The password should not be a circular shift of the login name    complexity The password should contain at least two alpha characters and one    numeric or special character     variation The old and new passwords must differ by at least three positions     The following option may be passed to the module     debug syslog 3C  debugging information at the LOG  DEBUG level    If the password in PAM AUTHTOK passes all tests  PAM_SUCCESS is returned  If any of  the tests fail  PAM AUTHTOK ERR is returned      etc default passwd Contains the value for PASSLENGTH  the default  minimal password length     See attributes 5  for descriptions of the following attributes        ATTRIBUTE TYPE ATTRIBUTE VALUE       Interface Stability Evolving                MT Level MT Safe with exceptions    passwd 1   pam 3PAM   pam chauthtok 3PAM   syslog 3C   1ibpam 3LIB    pam  conf 4   attributes 5  pam authtok get 5  pam authtok store 5    pam dhkeys 5   pam passwd auth 5   pam unix 5  pam unix account 5    pam unix auth 5  pam unix session 5     The interfaces in 1ibpam 3LIB  are MT Safe only if each thread within the  multi threaded application uses its own PAM handle     Standards  Env
228. enterprise     myens user hdiffie  names the user hdiffie in U   s enterprise     myens service teletax  names the teletax service of U   s enterprise     EXAMPLE 2 Names beginning with organizational unit names    The types of objects that may be named relative to an organizational unit name are   user  host  service  file  and site  Here are some examples of names that begin with  organizational unit names  either explicitly via org  or implicitly via thisorgunit or  myorgunit   and name objects relative to organizational unit names when resolved in  the Initial Context     org accounts payable finance site videoconference northwing  names a conference room videoconference located in the north wing of the site  associated with the organizational unit accounts payable finance        74 manpages section 5  Standards  Environments  and Macros    Last Revised 1 Nov 1994       fns initial context 5     EXAMPLE 2 Names beginning with organizational unit names  Continued     org finance user mjones  names a user mjones in the organizational unit finance     org finance host inmail  names a machine inmail belonging to the organizational unit finance     org accounts payable finance fs pub blue and whites FY92 124  names a file pub blue and whites FY92 124 belonging to the organizational  unit accounts payable finance     org accounts payable finance service calendar  names the calendar service of the organizational unit  accounts payable finance  This might manage the meeting sched
229. entions  The set locale 3C  function checks the  LANG environment variable when it is called with    as the locale argument   LANG is used as the default locale if the corresponding environment variable for a  particular category is unset or null  If  however  LC_ALL is set to a valid  non empty  value  its contents are used to override both the LANG and the other LC   variables   For example  when invoked as setlocale LC_CTYPE      setlocale   will  query the LC CTYPE environment variable first to see if it is set and non null  If  LC CTYPE is not set or null  then set1ocale   will check the LANG environment  variable to see if it is set and non null  If both LANG and LC CTYPE are unset or    NULL  the default  C  locale will be used to set the LC CTYPE category        Most commands will invoke set1ocale LC ALL      prior to any other  processing  This allows the command to be used with different national  conventions by setting the appropriate environment variables     The following environment variables correspond to each category of  setlocale 3C      LC ALL  If set to a valid  non empty string value  override the values of LANG and all the  other LC  variables        LC COLLATE  This category specifies the character collation sequence being used  The  information corresponding to this category is stored in a database created by the  localedef 1  command  This environment variable affects strcol1 3C  and  strxfrm 3C      Standards  Environments  and Macros 37    environ 5
230. er a plus or minus sign    where there is one digit before the radix character  shown here as a  decimal point  and the number of digits after it is equal to the  precision  The LC NUMERIC locale category determines the radix  character to use in this format  When the precision is missing  six  digits are written after the radix character  if the precision is 0  no  radix character appears  The E conversion character produces a  number with E instead of e introducing the exponent  The  exponent always contains at least two digits  However  if the value  to be written requires an exponent greater than two digits   additional exponent digits are written as necessary     The floating point number argument is written in style f or e  or in  style E in the case of a G conversion character   with the precision  specifying the number of significant digits  The style used depends  on the value converted  style g is used only if the exponent  resulting from the conversion is less than    4 or greater than or  equal to the precision  Trailing zeros are removed from the result   A radix character appears only if it is followed by a digit     The integer argument is converted to an unsigned char and the  resulting byte is written     The argument is taken to be a string and bytes from the string are  written until the end of the string or the number of bytes indicated  by the precision specification of the argument is reached  If the  precision is omitted from the argument  it is taken t
231. er describing the content  The following table describes  the format of this data file     Standards  Environments  and Macros 105    fsattr 5     SEE ALSO             Field Name Length  in Octets  Description   h version 7 Name file version   h size 10 Length of data file   h component len 10 Total length of all path segments  h link comp len 10 Total length of all link segments  path h component len Complex path   link path h link comp len Complex link path       As demonstrated above  the header is followed by a record describing the  path  to the  attribute file  This path is composed of two or more path segments separated by a null  character  Each segment describes a path rooted at the hidden extended attribute  directory of the leaf file of the previous segment  making it possible to name attributes  on attributes  The first segment is always the path to the parent file that roots the  entire sequence in the normal name space  The following table describes the format of  each segment           Field Name Length  in Octets  Description   h namesz 7 Length of segment path   h typeflag 1 Actual file type of attribute file  h names h namesz Parent path segment path       If the attribute file is linked to another file  the path record is followed by a second  record describing the location of the referencing file  The structure of this record is  identical to the record described above     cp 1   cpio 1     ina 1   1s 1   mv 1   pax 1   runat 1   tar 1   du 1     sck 1M   
232. ers must check the corresponding standards for other macros that can  be queried to determine if desired options are supported by the implementation        POSIX Standard Feature Test Macros       POSIX 1 1990 _ POSIX SOURCE          POSIX 1 1990 and POSIX 2 1992 C Language   POSIX SOURCE and POSIX C SOURCE 2  Bindings Option                   POSIX 1b 1993   POSIX C SOURCE 199309L  POSIX 1c 1996   POSIX C SOURCE 1995061L  SVID3    The SVID3 specification does not specify any feature test macros to indicate that an  application is written to meet SVID3 requirements  The SVID3 specification was  written before the C standard was completed     X Open CAE    330 man pages section 5  Standards  Environments  and Macros   Last Revised 29 Aug 2001    Compilation       standards 5     To build or compile an application that conforms to one of the X Open CAE  specifications  use the following guidelines  Applications need not set the POSIX  feature test macros if they require both CAE and POSIX functionality     XPG3 The application must define XOPEN SOURCE with a value other  than 500  preferably 1    XPG4 The application must define XOPEN SOURCE with a value other    than 500  preferably 1  and set  XOPEN VERSION 4     SUS  XPG4v2  The application must define XOPEN SOURCE with a value other  than 500  preferably 1  and set XOPEN SOURCE EXTENDED 1           SUSv2 The application must define XOPEN SOURCE 500     A POSIX 2   XPG4   SUS   or SUSv2 conforming implementation must include
233. erted can be represented in fewer digits than the  specified minimum  it is expanded with leading zeros  The default  precision is 1  The result of converting a zero value with a  precision of 0 is no characters  If both the field width and precision  are omitted  the implementation may precede  follow or precede  and follow numeric arguments of types d  i and u with blank  characters  arguments of type o  octal  may be preceded with  leading zeros     The treatment of integers and spaces is different from the  print    3C  function in that they can be surrounded with blank  characters  This was done so that  given a format such as      SdNn     foo      the implementation could use a printf    call such as     Standards  Environments  and Macros 93    formats 5     94    e  E    gG    76       printf    6d n   foo      and still conform  This notation is thus somewhat like scanf    in  addition to printf         The floating point number argument is written in decimal notation  in the style     ddd ddd  where the number of digits after the radix  character  shown here as a decimal point  is equal to the precision  specification  The LC NUMERZIC locale category determines the  radix character to use in this format  If the precision is omitted from  the argument  six digits are written after the radix character  if the  precision is explicitly 0  no radix character appears     The floating point number argument is written in the style    1d dddexdd  the symbol   indicates eith
234. es    Authentication  Token  Management    ERRORS       pam  dhkeys   authentication Diffie Hellman keys management module    pam dhkeys so 1    The pam dhkeys so 1 service module provides functionality to two PAM services   Secure RPC authentication and Secure RPC authentication token management     Secure RPC authentication differs from regular unix authentication because NIS  and  other ONC RPCs use Secure RPC as the underlying security mechanism     The following options may be passed to the module   debug syslog 3C debugging information at LOG  DEBUG level    nowarn Turn off warning messages    If the user has Diffie Hellman keys  pam sm authenticate   establishes secret  keys for the user specified by the PAM USER  equivalent to running keylogin 1     using the authentication token found in the PAM AUTHTOK item  Not being able to  establish the secret keys results in an authentication error if the NIS  repository is  used to authenticate the user and the NIS  table permissions require secure RPC  credentials to access the password field  If pam sm setcred   is called with   PAM ESTABLISH CRED and the user s secure RPC credentials need to be established   these credentials are set  This is equivalent to running keylogin l      If the credentials could not be set and PAM SILENT is not specified  a diagnostic  message is displayed  If pam setcred   is called with PAM DELETE CRED  the  user s secure RPC credentials are unset  This is equivalent to running keylogout 1      P
235. es  Sun acknowledges the  pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry  Sun holds a  non exclusive license from Xerox to the Xerox Graphical User Interface  which license also covers Sun s licensees who implement OPEN LOOK GUIs  and otherwise comply with Sun s written license agreements     U S  Government Rights   Commercial software  Government users are subject to the Sun Microsystems  Inc  standard license agreement and  applicable provisions of the FAR and its supplements     DOCUMENTATION IS PROVIDED    AS IS  AND ALL EXPRESS OR IMPLIED CONDITIONS  REPRESENTATIONS AND WARRANTIES   INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY  FITNESS FOR A PARTICULAR PURPOSE OR NON INFRINGEMENT  ARE  DISCLAIMED  EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID        Copyright 2004 Sun Microsystems  Inc      4150 Network Circle  Santa Clara  CA 95054 U S A  Tous droits r  serv  s     Ce produit ou document est prot  g   par un copyright et distribu   avec des licences qui en restreignent l utilisation  la copie  la distribution  et la  d  compilation  Aucune partie de ce produit ou document ne peut   tre reproduite sous aucune forme  par quelque moyen que ce soit  sans  l autorisation pr  alable et   crite de Sun et de ses bailleurs de licence  s il y en a  Le logiciel d  tenu par des tiers  et qui comprend la technologie relative  aux polices de caract  res  est prot 
236. es are user principals  In the first two cases  it is assumed that the user  joe is in the same realm as the client  so no realm is specified  Note that joeand  joe admin are different principals  even if the same user uses them  joe admin has  different privileges from joe  The fifth case is a service principal  while the final case is  a host principal  The word host is required for host principals  With host principals   the instance is the fully qualified hostname  Note that the words admin and host are  reserved keywords     kdestroy 1   kinit 1   klist 1   kpasswa 1   krb5 cont 5   Sun Enterprise Authentication Mechanism Guide    If you enter your username and kinit responds with this message     Principal unknown  kerberos  yOu haven   t been registered as a SEAM user  See your  system administrator or the Sun Enterprise Authentication Mechanism Guide     Standards  Environments  and Macros 321    sgml 5   NAME    DESCRIPTION    SolBook Elements    DOCTYPE    RefEntry    RefMeta       sgml  solbook   Standard Generalized Markup Language    Standard Generalized Markup Language  SGML  is the ISO standard 8879 1986 that  describes a syntax for marking up documents with tags that describe the purpose of  the text rather than the appearance on the page  This form of markup facilitates  document interchange between different platforms and applications  SGML allows the  management of information as data objects rather than text on a page     In an SGML document the main struc
237. es in  vgrindefs are of two types  Boolean capabilities which indicate that the language  has some particular feature and string capabilities which give a regular expression or  keyword list  Entries may continue onto multiple lines by giving a   as the last  character of a line  Lines starting with   are comments     The following table names and describes each capability                                                                    Name Type Description   ab str Regular expression for the start of an alternate form comment   ae str Regular expression for the end of an alternate form comment   bb str Regular expression for the start of a block   be str Regular expression for the end of a lexical block   cb str Regular expression for the start of a comment   ce str Regular expression for the end of a comment   id str String giving characters other than letters and digits that may legally  occur in identifiers  default    _       kw str A list of keywords separated by spaces   1b str Regular expression for the start of a character constant   le str Regular expression for the end of a character constant   oc bool Present means upper and lower case are equivalent   pb str Regular expression for start of a procedure   pl bool Procedure definitions are constrained to the lexical level matched by the     px    capability   px str A match for this regular expression indicates that procedure definitions  may occur at the next lexical level  Useful for lisp like languages in  whi
238. ess JavaCard  m Schlumberger MicroPayflex  m Dallas Semiconductor Java iButton JavaCard    Each of the supported cards has a complete set of OCF card services that implement  the necessary functionality for authentication and secure storage of data  For the two  supported JavaCards  an authentication and secure data storage applet is provided  that can be loaded into these cards with the supplied applet administration tools  See  smartcard 1M      A PAM smart card module is provided to allow PAM clients to use smart card based  authentication  See pam smartcard 5     man pages section 5  Standards  Environments  and Macros    Last Revised 16 Oct 2002    SEE ALSO       smartcard 5     CDE is able to use the PAM smart card module for dt login and dtsession  authentication  CDE also uses the smart card framework event dispatcher to listen for  events on the card terminal and provide corresponding visual feedback to the user     ocfserv 1M   smartcard 1M   libsmartcard 3LIB   pam_start 3PAM      pam_smartcard 5   ocf_escri 7D   ocf_ibutton 7D   ocf iscri 7D    scmi2c 7D     Standards  Environments  and Macros 327    standards 5     328    NAME    DESCRIPTION       standards  ANSI  C  C    ISO  POSIX  POSIX 1  POSIX 2  SUS  SUSv2  SVID  SVID3   XNS  XNS4  XNS5  XPG  XPG3  XPG4  XPG4v2   standards and specifications  supported by Solaris    Solaris 9supports IEEE Std 1003 1 and IEEE Std 1008 2  commonly known as POSIX 1  and POSIX 2  respectively  The following table lists each ver
239. for groups of digits to the left of the  decimal delimiter in formatted monetary quantities  In  contexts where standards limit the   mon thousands sep toa single byte  the result of  specifying a multi byte operand is unspecified     Define the size of each group of digits in formatted  monetary quantities  The operand is a sequence of  integers separated by semicolons  Each integer specifies  the number of digits in each group  with the initial  integer defining the size of the group immediately  preceding the decimal delimiter  and the following  integers defining the preceding groups  If the last  integer is not    1  then the size of the previous group  if  any  will be repeatedly used for the remainder of the  digits  If the last integer is  1  then no further grouping  will be performed     The following is an example of the interpretation of the  mon grouping keyword  Assuming that the value to  be formatted is 123456789 and the   mon thousands sepis   then the following table  shows the result  The third column shows the  equivalent string in the ISO C standard that would be  used by the 1ocaleconv function to accommodate  this grouping     226 man pages section 5  Standards  Environments  and Macros   Last Revised 20 Dec 1996       positive sign    negative sign    int frac digits    frac digits    p cs precedes    p sep by space    n cs precedes    n sep by space    locale 5           mon grouping Formatted ISO C String  Value  3  1 123456 789   3 177   3 123456789
240. formation Technology  Standardization Technical Committee  CITS   Institute for Information Industry  III    University of Washington  March 1996     ISO 8859 character sets using Latin alphabetic characters are distinguished as follows     ISO 8859 1  Latin 1   For most West European languages  including     Albanian Finnish Italian  Catalan French Norwegian  Danish German Portuguese  Dutch Galician Spanish  English Irish Swedish  Faeroese Icelandic    ISO 8859 2  Latin 2   For most Latin written Slavic and Central European languages     Czech Polish Slovak  German Rumanian Slovene  Hungarian Croatian    ISO 8859 3  Latin 3   Popularly used for Esperanto  Galician  Maltese  and Turkish     ISO 8859 4  Latin 4   Introduces letters for Estonian  Latvian  and Lithuanian  It is an incomplete  predecessor of ISO 8859 10  Latin 6      man pages section 5  Standards  Environments  and Macros    Last Revised 18 Apr 1997       iconv_unicode 5     ISO 8859 9  Latin 5   Replaces the rarely needed Icelandic letters in ISO 8859 1  Latin 1  with the Turkish  ones     ISO 8859 10  Latin 6   Adds the last Inuit  Greenlandic  and Sami  Lappish  letters that were not included  in ISO 8859 4  Latin 4  to complete coverage of the Nordic area     Standards  Environments  and Macros 189    isalist 5     SPARC Platforms    190    NAME   isalist   the native instruction sets known to Solaris software    DESCRIPTION   The possible instruction set names returned by isalist 1  and the SI ISALIST    la
241. ftware or for  applications is  opt  packagename bin      usr bin ia64  x86 64 bit  platform amp hyphen dependent  user invoked executables  Note that ia64  is an example name  the actual name might be different  This directory should not  be part of a user s  PATH  A wrapper in  usr bin should invoke the executable in  this directory  See isaexec 3C   An approved installation location for bundled  Solaris software  The analogous location for add on system software or for  applications is  opt  packagename bin ia64     Standards  Environments  and Macros 53    filesystem 5         usr bin sparcv9    SPARC 64 bit  plattorm amp hyphen dependent  user invoked executables  This  directory should not be part of a user s  PATH  A wrapper in  usr bin should  invoke the executable in this directory  See isaexec 3C   An approved installation  location for bundled Solaris software  The analogous location for add on system  software or for applications is  opt  packagename bin sparcv9      usr bin subsystem    Platform amp hyphen dependent user invoked executables that are associated with  subsystem  These are commands users expect to be run as part of their normal   PATH  An approved installation location for bundled Solaris software  The  analogous location for add on system software or for applications is     opt  packagename   bin      usr bin subsystem ia64    x86 64 bit  platform amp hyphen dependent  user invoked executables  Note that 1a64  is an example name  the actual name mi
242. g         sign      40 manpages section 5  Standards  Environments  and Macros    Last Revised 25 Oct 2001    SEE ALSO       environ 5     start   time  end   time Indicate when to change to and back from daylight  savings time  where start time describes when the  change from standard time to daylight savings time  occurs  and end time describes when the change back  happens  Each time field describes when  in current  local time  the change is made     The formats of start and end are one of the following     Jn The Julian day n  1     n x 365   Leap days  are not counted  That is  in all years   February 28 is day 59 and March 1 is day  60  It is impossible to refer to the  occasional February 29     n The zero based Julian day  0  lt  n x 365    Leap days are counted  and it is possible  to refer to February 29     Mm n d The d    day   0  lt  d     6  of week n of  month m of the year  1    n x 5 1     m  amp   12   where week 5 means  the last d day  in month m    which may occur in either  the fourth or the fifth week   Week 1 is  the first week in which the d   day occurs   Day zero is Sunday     Implementation specific defaults are used for start  and end if these optional fields are not given     The time has the same format as offset except that no  leading sign            or         is allowed  The default  if  time is not given is 02 00 00     cat 1   date 1   ed 1   fmtmsg 1   1ocaledef 1   1ogin 1   1s 1   mkmsgs 1    nice 1   nohup 1   sh 1   sort 1   time 1  
243. g elements  that is  sequences of two or more characters to be collated as an  entity      User defined ordering of collating elements  Each collating element is  assigned a collation value defining its order in the character  or basic  collation  sequence  This ordering is used by regular expressions and pattern matching and   unless collation weights are explicity specified  also as the collation weight to be  used in sorting     Multiple weights and equivalence classes  Collating elements can be  assigned one or more  up to the limit  COLL  WEIGHTS MAX    collating weights  for use in sorting  The first weight is hereafter referred to as the primary weight     One to Many mapping  A single character is mapped into a string of collating  elements     Equivalence class definition  Two or more collating elements have the  same collation value  primary weight      Ordering by weights  When two strings are compared to determine their  relative order  the two strings are first broken up into a series of collating elements   the elements in each successive pair of elements are then compared according to  the relative primary weights for the elements  If equal  and more than one weight  has been assigned  then the pairs of collating elements are recompared according to  the relative subsequent weights  until either a pair of collating elements compare  unequal or the weights are exhausted  The following keywords are recognized in a  collation sequence definition  They are describe
244. g or following lines do not specify characters in the current  coded character set     The symbol UNDEFINED is interpreted as including all coded character set values not  specified explicitly or via the ellipsis symbol  Such characters are inserted in the  character collation order at the point indicated by the symbol  and in ascending order  according to their coded character set values  If no UNDEFINED symbol is specified   and the current coded character set contains characters not specified in this section  the  utility will issue a warning message and place such characters at the end of the  character collation order     The optional operands for each collation element are used to define the primary   secondary  or subsequent weights for the collating element  The first operand specifies  the relative primary weight  the second the relative secondary weight  and so on  Two  or more collation elements can be assigned the same weight  they belong to the same  equivalence class if they have the same primary weight  Collation behaves as if  for each  weight level  elements subject to IGNORE are removed  unless the position collation  directive is specified for the corresponding level with the order start keyword   Then each successive pair of elements is compared according to the relative weights  for the elements  If the two strings compare equal  the process is repeated for the next  weight level  up to the limit  COLL  WEIGHTS MAX      Weights are expressed as characters
245. g with a description of how each    A list of the values the library routine will return to the    A list of files associated with the command or function      SH OPTIONS  affects the command s operation     SH RETURN VALUES  calling program and the conditions that cause these  values to be returned     SH EXIT STATUS A list of the values the utility will return to the calling  program or shell  and the conditions that cause these  values to be returned     SH FILES    SH SEE ALSO A comma separated list of related manual pages   followed by references to other published materials     SH DIAGNOSTICS A list of diagnostic messages and an explanation of  each     SH BUGS    A description of limitations  known defects  and  possible problems associated with the command or  function         usr share lib tmac an     usr share man windex  man 1   nroff 1   t ro     1   whatis 1     Dale Dougherty and Tim O Reilly  Unix Text Processing    Standards  Environments  and Macros    241    mansun 5   NAME   mansun   macros to format Reference Manual pages  SYNOPSIS   nroff  mansun filename       troff  mansun filename       DESCRIPTION   These macros are used to lay out the reference pages in this manual  Note  if filename  contains format input for a preprocessor  the commands shown above must be piped  through the appropriate preprocessor  This is handled automatically by man 1   See the   Conventions  section     Any text argument t may be zero to six words  Quotes may be used to includ
246. generated text       refpurpose   The text after the dash on the NAME line is contained in this tag   This is a short summary of what the object or objects described on  the reference page do or are used for  The dash is also  auto generated and should not be typed in      lt refdiscriptor gt  In some cases the  lt refentrytitle gt  is a general topic descriptor  of a group of related objects that are discussed on the same page     Standards  Environments  and Macros 323    sgml 5     RefSynopsisDiv    RefSect1    RefSect2    Block Elements       In this case the first tag after the  lt refnamedivs gt  is a   lt refdiscriptor gt   The   refname  tags follow  Only one    refdiscriptor   is allowed  and it should match the   lt refentrytitle gt s     The SYNOPSTS line of the reference page is contained by this tag  There is a  lt title gt   that usually contains an entity reference  The text is the word SYNOPSIS  There are  several tags within  lt refsynopsisdiv gt  that are designed specifically for the type of  synopsis that is used in the different reference page sections  The three types are      lt cmdsynopsis gt  Used for commands and utilities pages    lt funcsynopsis gt  Used for programming interface pages       synopsis   Used for pages that do not fall into the other two categories     This tag is equivalent to the   SH nroff macro  It contains a  lt title gt  element that is the  title of the reference page section  Section names are the standard names such as  DESC
247. ght be different  This directory should not  be part of a user s  PATH  A wrapper in  usr bin should invoke the executable in  this directory  See isaexec 3C   An approved installation location for bundled  Solaris software  The analogous location for add on system software or for  applications is  opt  packagename bin ia64      usr bin subsystem   sparcv9    SPARC 64 bit  platform amp hyphen dependent  user invoked executables  This  directory should not be part of a user   s  PATH  A wrapper in  usr bin should  invoke the executable in this directory  See isaexec 3C   An approved installation  location for bundled Solaris software  The analogous location for add on system  software or for applications is  opt  packagename bin sparcv9      usr subsystem  bin    Platform amp hyphen dependent user invoked executables that are associated with  subsystem  These are commands users expect to be run as part of their normal   PATH  An approved installation location for bundled Solaris software  The  analogous location for add on system software or for applications is     opt  packagename   bin      usr subsystem bin ia64    x86 64 bit  platform amp hyphen dependent  user invoked executables  Note that ia64  is an example name  the actual name might be different  This directory should not  be part of a user s  PATH  A wrapper in  usr bin should invoke the executable in  this directory  See isaexec 3C   An approved installation location for bundled  Solaris software  The analogous loc
248. grave accent marks     EXAMPLE 1 An example of compiling a program using transitional interfaces such as  lseek64    and fopene4          c89  D LARGEFILE64 SOURCE N    getconf LFS64 CFLAGS  a c       getconf LFS64 LDFLAGS  N    getconf LFS64 LIBS     EXAMPLE 2 An example of running lint on a program using transitional interfaces       lint  D LARGEFILE64 SOURCE N   getconf LFS64 LINTFLAGS          getconf LFS64 LIBS     getconf 1   lseek 2     open 3C   1  64 5   standards 5     Standards  Environments  and Macros 207    live upgrade 5     208    NAME    DESCRIPTION       live upgrade   overview of Live Upgrade feature    The Live Upgrade feature of the Solaris operating environment enables you to  maintain multiple operating system images on a single system  An image   called a  boot environment  or BE   represents a set of operating system and application  software packages  The BEs might contain different operating system and or  application versions     On a system with the Solaris Live Upgrade software  your currently booted OS  environment is referred to as your active  or current BE  You have one active  or  current BE  all others are inactive  You can perform any number of modifications to  inactive BEs on the same system  then boot from one of those BEs  If there is a failure  or some undesired behavior in the newly booted BE  Live Upgrade software makes it  easy for you to fall back to the previously running BE     Live Upgrade software includes a full suite of com
249. gt        j0104  is interpreted as the symbolic names  lt j0101 gt    lt j0102s    lt j0103 gt   and   j0104    in that order     A character set mapping definition line must exist for all symbolic names and must  define the coded character value that corresponds to the character glyph indicated in  the table  or the coded character value that corresponds with the control character  symbolic name  If the control characters commonly associated with the symbolic    Standards  Environments  and Macros 27    charmap 5     Decimal Constants    Ranges of  Symbolic Names    SEE ALSO       names are supported by the implementation  the symbolic name and the  corresponding encoding value must be included in the file  Additional unique  symbolic names may be included  A coded character value can be represented by more  than one symbolic name     The encoding part is expressed as one  for single byte character values  or more  concatenated decimal  octal or hexadecimal constants in the following formats       cd d     escape char     decimal byte value      ox x    escape char     hexadecimal byte value      c o      escape char     octal byte value      Decimal constants must be represented by two or three decimal digits  preceded by  the escape character and the lower case letter d  for example   d05   d97  or  d143   Hexadecimal constants must be represented by two hexadecimal digits  preceded by  the escape character and the lower case letter x  for example   x05   x61  or  x8f   Oc
250. h Cyrillic    ISO 8859 5 Cyrillic  KOI8 R    Alternative PC Cyrillic  Macintosh Cyrillic    ISO 8859 5 Cyrillic  KOI8 R    Alternative PC Cyrillic    Windows Cyrillic    The conversions are performed according to the tables contained in the manual pages  cross referenced in the Index of Conversion Code Tables below                                                                             Index of Conversion Code Tables   Code Target Code See Manual Page  ISO 646 ISO 8859 1 iconv_646  5   ISO 646de ISO 8859 1  ISO 646da ISO 8859 1  ISO 646en ISO 8859 1  ISO 646es ISO 8859 1  ISO 646fr ISO 8859 1  ISO 646it ISO 8859 1  ISO 646sv ISO 8859 1  ISO 8859 1 ISO 646 iconv_8859 1  5   ISO 8859 1 ISO 646de  ISO 8859 1 ISO 646da  ISO 8859 1 ISO 646en  ISO 8859 1 ISO 646es  ISO 8859 1 ISO 646fr  ISO 8859 1 ISO 646it  ISO 8859 1 ISO 646sv  ISO 8859 2 MS 1250 iconv_8859 2  5   ISO 8859 2 MS 852  ISO 8859 2 Mazovia  ISO 8859 2 DHN             Standards  Environments  and Macros    123    iconv 5     124                                                                                                          Index of Conversion Code Tables  MS 1250 ISO 8859 2 iconv  1250  5   MS 1250 MS 852  MS 1250 Mazovia  MS 1250 DHN  MS 852 ISO 8859 2 iconv  852  5   MS 852 MS 1250  MS 852 Mazovia  MS 852 DHN  Mazovia ISO 8859 2 iconv maz  5   Mazovia MS 1250  Mazovia MS 852  Mazovia DHN  Index of Conversion Code Tables  Code Target Code See Manual Page  DHN ISO 8859 2 iconv  dhn  5   DHN MS 1250  DHN MS
251. he ending date of the era  in the same format  as the start  date  or one of the two special  values    or     The value    indicates that the  ending date is the beginning of time  The value     indicates that the ending date is the end of  time     era name A string representing the name of the era   corresponding to the  EC field descriptor     era format A string for formatting the year in the era   corresponding to the  EG and  EY field  descriptors     Define the format of the date in alternative era notation   corresponding to the  Ex field descriptor     Define the locale s appropriate alternative time format   corresponding to the EX field descriptor     Define the locale s appropriate alternative date and time format   corresponding to the  Ec field descriptor     Define alternative symbols for digits  corresponding to the  0 field  descriptor modifier  The operand consists of semicolon separated  strings  each surrounded by double quotes  The first string is the  alternative symbol corresponding with zero  the second string the  symbol corresponding with one  and so on  Up to 100 alternative  symbol strings can be specified  The  0 modifier indicates that the  string corresponding to the value specified by means of the field  descriptor will be used instead of the value     The following information can be accessed  These correspond to constants defined in   lt langinfo h gt  and used as arguments to the n1  1anginfo 3C  function     ABDAY x    DAY x    ABMON x    
252. hose filenames and pathnames   sorted according to the collating sequence in effect in the current locale  If the  pattern contains an invalid bracket expression or does not match any existing  filenames or pathnames  the pattern string is left unchanged     SEE ALSO   find 1   ksh 1     nmatch 3C   regex 5        66 manpages section 5  Standards  Environments  and Macros    Last Revised 28 Mar 1995    NAME    DESCRIPTION    XFN    Composite Names    Why FNS        fns 5   fns   overview of FNS    Federated Naming Service  FNS  provides a method for federating multiple naming  services under a single  simple interface for the basic naming operations  The service  supports resolution of composite names  names that span multiple naming systems   through the naming interface  In addition to the naming interface  FNS also specifies  policies for composing names in the enterprise namespace  See fns_policies 5  and  fns_initial_context 5      Fundamental to the FNS model are the notions of composite names and contexts  A  context provides operations for     m associating  binding  names to objects  m resolving names to objects  m removing bindings  listing names  renaming and so on     A context contains a set of names to reference bindings  A reference contains a list of  communication end points  Every naming operation in the FNS interface is performed  on a context object     The federated naming system is formed by contexts from one naming system being  bound in the contexts of
253. ilar to the way ACLs records were  defined  See Extended Archive Formats below for  a description of the new archive records     There is a class of utilities  chmod  chown  chgrp  that one might expect to be  modified in a manner similar to those listed above  For example  one might expect that  performing chmod on a file would not only affect the file itself but would also affect at  least the extended attribute directory if not any existing extended attribute files  This is  not the case  The model chosen for extended attributes implies that the attribute  directory and the attributes themselves are all file objects in their own right  and can  therefore have independent file status attributes associated with them  a given    man pages section 5  Standards  Environments  and Macros    Last Revised 1 Aug 2001    Application level  API       fsattr 5     implementation cannot support this  for example  for intrinsic attributes   The  relationship is left undefined and a fine grained control mechanism  runat 1   is  provided to allow manipulation of extended attribute status attributes as necessary     The runat utility has the following syntax     runat filename  command     The runat utility executes the supplied command in the context of the  attribute  space  associated with the indicated file  If no command argument is supplied  a shell  is invoked  See runat 1  for details     The primary interface required to access extended attributes at the programmatic level  is the
254. iles  and output files   when that organization is not otherwise  obvious  The syntax is similar to that used by the printf 3C  function  When used  for stdin or input file descriptions  this syntax describes the format that could have  been used to write the text to be read  not a format that could be used by the  scanf 3C  function to read the input file     The description of an individual record is as follows       lt format gt      lt argl gt    lt arg2 gt           lt argn gt      The format is a character string that contains three types of objects defined below     characters Characters that are not escape sequences or conversion  specifications  as described below  are copied to the  output    escape sequences Represent non graphic characters    conversion specifications Specifies the output format of each argument   See  below      The following characters have the following special meaning in the format string     P  An empty character position   One or more blank  characters     Exactly one space character     The notation for spaces allows some flexibility for application output  Note that an  empty character position in format represents one or more blank characters on the  output  not white space  which can include newline characters   Therefore  another  utility that reads that output as its input must be prepared to parse the data using  scanf 3C   awk 1   and so forth  The character is used when exactly one space  character is output     The following table 
255. ilesystem 5         usr subsystem 1ib ia64  x86 64   bit  platform amp hyphen dependent libraries  various databases  commands  and daemons that are associated with subsystem and that are not invoked directly  by a human user  Note that ia64 is an example name  the actual name might be  different  An approved installation location for bundled Solaris software  The  analogous location for add on system software or for applications is    opt  packagename 1ib iae4      usr subsystem 1ib sparcv9  SPARC 64 bit  platform amp hyphen dependent libraries  various databases  commands  and daemons that are associated with subsystem and that are not invoked directly  by a human user  An approved installation location for bundled Solaris software   The analogous location for add on system software or for applications is    opt  packagename 1ib sparcv9      usr local  Not part of the SVR4 based Solaris distribution  The  usr directory is exclusively  for software bundled with the Solaris operating system  If needed for storing  machine local add on software  create the directory  opt  local and make   usr local a symbolic link to  opt local  The  opt directory or filesystem is  for storing add on software to the system      usr mail  Symbolic link to the  var mail directory      usr man  Symbolic link to the  usr share man directory      usr net servers  Entry points for foreign name service requests relayed using the network listener   See listen 1M       usr news  Symbolic link to the  v
256. in a 64 bit application  the standard definition is  equivalent to the 64 bit file offset definition       aio h    struct aiocb struct aiocb64  off t aio offset  off64 t aio offset      lt sys dirent h gt                                                           struct dirent struct dirent64  ino_t d_ino  ino64 td ino   off td off  off64 td off     sys fcntl h     struct flock struct   1ock64  off tl start  off64 tl start   off tl len  off64 tl len   F SETLK F SETLK64   F SETLKW F SETLKW64   F GETLK F GETLK64   F FREESP F FREESP64       O LARGEFILE     lt sys stdio h gt     196 man pages section 5  Standards  Environments  and Macros Last Revised 1 Aug 2001       fpos t      sys resource h      rlim t    struct rlimit    rlim t rlim cur     rlim t rlim max     RLIM INFINITY          RLIM SAVED MAX       RLIM SAVED CUR         sys stat     h gt     struct stat    ino_t st_ino     off tst size     blkent t st blocks      lt sys statvfs h gt     struct statvfs       fsblkcnt_t f blocks   fsblkent t f bfree   fsblkcent t f bavial   fsfilcnt t f files   fsfilcnt tf ffree   fsfilcnt t f favail    lt sys types h gt   off t     fpos64 t    rlim64 t    1  64 5     struct rlimit64    rlim64 t rlim cur     rlim64 t rim max           RLIM64 INFINITY    RLIM64 SAVED MAX       RLIM64 SAVED CUR    struct stat64    ino64 tst ino     off64 tst size     blkent64 t st blocks     struct statvfs64    fsblkcnt64    fsblkcnt64    fsblkcnt64    fsfilcnt64    fsfilcnt64       fsfilcnt64    off64 t  
257. ined in that network s entry   etc netconfig is  maintained by the system administrator  The library routines described in  getnetpath 3NSL  access the NETPATH environment variable     NLSPATH  Contains a sequence of templates which catopen 3C  and gettext 3C  use when  attempting to locate message catalogs  Each template consists of an optional prefix   one or more substitution fields  a filename and an optional suffix  For example     NLSPATH   system nlslib  N cat     defines that catopen   should look for all message catalogs in the directory   System nlslib  where the catalog name should be constructed from the name  parameter passed to catopen      N  with the suffix   cat     Substitution fields consist of a   symbol  followed by a single letter keyword  The  following keywords are currently defined     YN The value of the name parameter passed to catopen       L The value of LANG or LC_MESSAGES     l The language element from LANG or LC_MESSAGES     t The territory element from LANG or LC_MESSAGES     c The codeset element from LANG or LC_MESSAGES    AW  A single   character     An empty string is substituted if the specified value is not currently defined  The  separators     and         are not included in  t and  c substitutions     Templates defined in NLSPATH are separated by colons      A leading colon or two  adjacent colons       is equivalent to specifying  N  For example     NLSPATH    N cat  nlslib  L  N cat     indicates to catopen    that it should look f
258. ing  If  however   the first character of the string is a circumflex      the one character RE  matches any character except new line and the remaining characters in the  string  The   has this special meaning only if it occurs first in the string  The  minus     may be used to indicate a range of consecutive characters  for  example   0 9  is equivalent to  0123456789   The   loses this special  meaning if it occurs first  after an initial    if any  or last in the string  The  right square bracket  1  does not terminate such a string when it is the first  character within it  after an initial    if any   for example    1a      matches either a right square bracket  1  or one of the ASCII letters a  through    inclusive  The four characters listed in 1 2 a above stand for  themselves within such a string of characters     The following rules may be used to construct REs from one character REs     21    22    23    2 4    A one character RE is a RE that matches whatever the one character RE  matches     A one character RE followed by an asterisk     is a RE that matches 0 or  more occurrences of the one character RE  If there is any choice  the longest  leftmost string that permits a match is chosen     A one character RE followed by    m     N  m      or    m n    is a RE that  matches a range of occurrences of the one character RE  The values of m  and n must be non negative integers less than 256     m   matches exactly  m occurrences     m    matches at least m occurrence
259. ing extended attributes  This section describes  the specifics of the archive format extensions     Extended tar format    The tar archive is made up of a series of 512 byte blocks  Each archived file is  represented by a header block and zero or more data blocks containing the file  contents  The header block is structured as shown in the following table           Field Name Length  in Octets  Description  Name 100 File name string  Mode 8 12 file mode bits       Standards  Environments  and Macros 103    fsattr 5           Field Name Length  in Octets  Description   Uid 8 User ID of file owner   Gid 8 Group ID of file owner   Size 12 Size of file   Mtime 12 File modification time  Chksum 8 File contents checksum  Typeflag 1 File type flag   Linkname 100 Link target name if file linked  Magic 6  ustar    Version 2  00    Uname 32 User name of file owner  Gname 32 Group name of file owner  Devmajor 8 Major device ID if special file  Devminor 8 Minor device ID if special file  Prefix 155 Path prefix string for file       The extended attribute project extends the above header format by defining a new  header type  for the Type  1ag field   The type  E  is defined to be used for all  extended attribute files  Attribute files are stored in the tar archive as a sequence of  two  lt header   data gt  pairs  The first file contains the data necessary to locate and  name the extended attribute in the file system  The second file contains the actual  attribute file data  Both files u
260. ion and strftime 3C   the field  descriptors corresponding to the optional keywords consist of a modifier followed by  a traditional field descriptor  for instance  Ex   If the optional keywords are not  supported by the implementation or are unspecified for the current locale  these field  descriptors are treated as the traditional field descriptor  For instance  assume the  following keywords     alt digits  Oth     1st     2nd     3rd     4th     5th        6th     7th  H  gth     9th     10th   d fmt  The  Od day of  B in  Y     On 7 4 1776  the  x field descriptor would result in  The 4th day of July in 1776   while 7 14 1789 would come out as  The 14 day of July in 1789  It can be noted that  the above example is for illustrative purposes only  the  O modifier is primarily  intended to provide for Kanji or Hindi digits in date formats     The LC MESSAGES category defines the format and values for affirmative and  negative responses     The following keywords are recognized as part of the locale definition file  The  nl langinfo 3C  function accepts upper case versions of the first four keywords     The operand consists of an extended regular expression  see  regex 5   that describes the acceptable affirmative response to a  question expecting an affirmative or negative response     yesexpr    man pages section 5  Standards  Environments  and Macros    Last Revised 20 Dec 1996    SEE ALSO       locale 5     noexpr The operand consists of an extended regular expression th
261. ions          keylogin l   keylogout 1   pam 3PAM   pam authenticate 3PAM     pam chauthtok 3PAM   pam setcred 3PAM   pam get item 3PAM     pam set data 3PAM   pam get data 3PAM   syslog 3C   libpam 3LIB    pam  conf 4   attributes 5  pam authtok check 5  pam authtok get 5    pam authtok store 5  pam passwd auth 5   pam unix 5     pam unix account 5  pam unix auth 5  pam unix session 5     The interfaces in 1ibpam 3LIB  are MT Safe only if each thread within the  multi threaded application uses its own PAM handle     The pam unix 5  module might not be supported in a future release  Similar  functionality is provided by pam authtok check 5  pam authtok get 5    pam authtok store 5  pam dhkeys 5  pam passwd auth 5     pam unix account 5  pam unix auth 5   and pam unix session 5      Standards  Environments  and Macros 271    pam dial auth 5   NAME  SYNOPSIS    DESCRIPTION    ATTRIBUTES    SEE ALSO    NOTES       pam dial auth   authentication management PAM module for dialups     usr lib security pam dial auth so 1    The dialup PAM module   usr lib security pam dial auth so 1   authenticates a user according to the  etc dialups and  etc d_passwd files  Only  pam sm authenticate   isimplemented within this module    pam sm setcred   isanull function     usr lib security pam dial auth so 1 is designed to be stacked  immediately below the  usr lib security pam unix so 1 module for the login  service     pam sm authenticate    performs authentication only if both the  etc dialups
262. ior is dependent on the collating sequence  Ranges will be treated according  to the current collating sequence  and include such characters that fall within the  range based on that collating sequence  regardless of character values  This   however  means that the interpretation will differ depending on collating sequence   If  for instance  one collating sequence defines as a variant of a  while another    306 manpages section 5  Standards  Environments  and Macros    Last Revised 12 Jul 1999    BREs Matching  Multiple  Characters       regex 5     defines it as a letter following z  then the expression   z  is valid in the first  language and invalid in the second     In the following  all examples assume the collation sequence specified for the  POSIX locale  unless another collation sequence is specifically defined     The starting range point and the ending range point must be a collating element or  collating symbol  An equivalence class expression used as a starting or ending  point of a range expression produces unspecified results  An equivalence class can  be used portably within a bracket expression  but only outside the range  For  example  the unspecified expression   2e   f  should be given as    e  e   f   The  ending range point must collate equal to or higher than the starting range point   otherwise  the expression will be treated as invalid  The order used is the order in  which the collating elements are specified in the current collation definition   One
263. ironments  and Macros 265    pam authtok check 5     The pam unix 5  module might not be supported in a future release  Similar  functionality is provided by pam authtok check 5  pam authtok get 5    pam authtok store 5   pam dhkeys 5  pam passwd auth 5     pam unix account 5  pam unix auth 5  and pam unix session 5         266 man pages section 5  Standards  Environments  and Macros e   Last Revised 21 Jan 2003    NAME  SYNOPSIS    DESCRIPTION    Authentication  Service    Password  Management  Service    ERRORS       pam authtok get 5   pam  authtok get     authentication and password management module    pam authtok get so 1    The pam authtok get service module provides password prompting funtionality to  the PAM stack  It implements pam sm authenticate   and pam sm chauthtok      providing functionality to both the Authentication Stack and the Password  Management Stack     The implementation of pam sm authenticate 3PAM  prompts the user name if not  set and then tries to get the authentication token from the pam handle  If the token is  not set  it then prompts the user for a password and stores it in the PAM item   PAM AUTHTOK  This module is meant to be the first module on an authentication stack  where users are to authenticate using a keyboard     Due to the nature of the PAM Password Management stack traversal mechanism  the  pam sm chauthtok 3PAM  function is called twice  Once with the  PAM PRELIM CHECK flag  and one with the PAM UPDATE AUTHTOK flag     In the fi
264. is to be updated  If PAM REPOSITORY is unset  it follows the  nsswitch conf 4      The following option can be passed to the module   debug syslog 3C  debugging information at the LOG  DEBUG level    server policy Ifthe account authority for the user  as specified by PAM USER  is a  server  do not encrypt the authentication token before updating     PAM SUCCESS Successfully obtains authentication token   PAM SYSTEM ERR Fails to get username  service name  old password or  new password  user name null or empty  or password  null     See attributes 5 for descriptions of the following attributes        ATTRIBUTE TYPE ATTRIBUTE VALUE       Interface Stability Evolving                MT Level MT Safe with exceptions    pam 3PAM   pam authenticate 3PAM   pam chauthtok 3PAM   syslog 3C    libpam 3LIB   pam  conf 4   attributes 5   pam authtok check 5     pam authtok get 5  pam dhkeys 5  pam passwd auth 5   pam unix 5    pam unix account 5  pam unix auth 5  pam unix session 5     The interfaces in 1ibpam 3LIB  are MT Safe only if each thread within the  multi threaded application uses its own PAM handle     The pam unix 5  module might not be supported in a future release  Similar  functionality is provided by pam authtok check 5  pam authtok get 5    pam authtok store 5  pam dhkeys 5  pam passwd auth 5     pam unix account 5  pam unix auth 5   and pam unix session 5      Standards  Environments  and Macros 269    pam dhkeys 5   NAME  SYNOPSIS    DESCRIPTION    Authentication  Servic
265. ishost   thisens the enterprise root of H  Synonym  thisens   thisorgunit H s distinguished organizational unit context  In  Solaris  this is H s NIS  home domain  Synonym    thisorgunit    Standards  Environments  and Macros 73    fns initial context 5     myself U   s user context  Synonyms  myself thisuser   myens the enterprise root of LI  Synonym  myens   myorgunit U s distinguished organizational unit context  In  Solaris  this is U   s NIS  home domain  Synonym   _myorgunit   user the context in which users in the same organizational    unit as H are named  Synonym  user    host the context in which hosts in the same organizational  unit as H are named  Synonym  host    org the root context of the organizational unit namespace  in H s enterprise  In Solaris  this corresponds to the  NIS  root domain  Synonyms  orgunit  orgunit    site the root context of the site namespace in H s enterprise   if the site namespace has been configured  Synonym   site    EXAMPLES   EXAMPLE 1 Names beginning with the enterprise root    The types of objects that may be named relative to the enterprise root are user  host   service  organizational unit  file  and site  Here are some examples of names that begin  with the enterprise root     thisens orgunit multimedia servers engineering  names an organizational unit multimedia servers engineering in H s  enterprise     thisens site northwing floor3 admin  names the north wing site  on the third floor of the administrations building in H s  
266. ite pam smartcard so   dtsession auth required pam authtok get so 1  dtsession auth required pam dhkeys so 1  dtsession auth required pam unix auth so 1    smartcard 1M   libpam 3LIB   pam 3PAM   pam authenticate 3PAM     pam start 3PAM   pam  conf 4   pam authtok check 5   pam authtok get 5    pam authtok store 5   pam dhkeys 5  pam passwd auth 5   pam unix 5    pam unix account 5  pam unix auth 5  pam unix session 5     Standards  Environments  and Macros 291    pam  smartcard 5     NOTES   The pam unix 5  module might not be supported in a future release  Similar  functionality is provided by pam authtok check 5  pam authtok get 5    pam authtok store 5   pam dhkeys 5   pam passwd auth 5     pam unix account 5  pam unix auth 5  and pam unix session 5         292 manpages section 5  Standards  Environments  and Macros   Last Revised 17 Dec 2001    NAME    SYNOPSIS    DESCRIPTION    UNIX  Authentication  Module       pam unix 5     pam  unix     authentication  account  session  and password management PAM  modules for UNIX     usr lib security pam unix so 1    The UNIX service module for PAM   usr lib security pam unix so 1   provides functionality for all four PAM modules  authentication  account  management  session management and password management  The pam unix so 1  module is a shared object that can be dynamically loaded to provide the necessary  functionality upon demand  Its path is specified in the PAM configuration file     The UNIX authentication component provi
267. ith Exceptions  See the NOTES or USAGE sections of these pages for a description of the exceptions     Forkl Safe  A Fork1 Safe library releases the locks it had held whenever   ork1 2  is called in a  Solaris thread program  or   ork 2  in a POSIX  see standards 5   thread  program  Calling   fork 2  in a POSIX thread program has the same semantic as  calling   ork1 2  in a Solaris thread program  All system calls  1ibpthread  and  libthread are Fork1 Safe  Otherwise  you should handle the locking clean up  yourself  see pthread_atfork 3C       Cancel Safety  If a multi threaded application uses pthread cancel 3THR  to cancel  that is   kill  a thread  it is possible that the target thread is killed while holding a resource   such as a lock or allocated memory  If the thread has not installed the appropriate  cancellation cleanup handlers to release the resources appropriately  see  pthread_cance1 3THR    the application is  cancel unsafe   that is  it is not safe  with respect to cancellation  This unsafety could result in deadlocks due to locks  not released by a thread that gets cancelled  or resource leaks  for example  memory  not being freed on thread cancellation  All applications that use  pthread cancel 3THR  should ensure that they operate in a Cancel Safe  environment  Libraries that have cancellation points and which acquire resources  such as locks or allocate memory dynamically  also contribute to the  cancel unsafety of applications that are linked with these 
268. ized network applications  If the host entry is not found  in the keytab file  the authentication fails     The following options can be passed to the Kerberos V5 authentication module     acceptor Prevents the PAM module from performing the  authentication service exchange used to obtain the  initial ticket granting ticket  This should be used on  Kerberos application servers since the initial ticket is    not needed    debug Provides syslog 3C  debugging information at  LOG DEBUG level    nowarn Turns off warning messages    use first pass Requests Kerberos V5 authentication with the user s    initial password  entered when the user authenticated  to the first authentication module in the stack   If  Kerberos V5 authentication fails  or if no password has  been entered  it quits and does not prompt the user for  a password  This option should only be used if the  authentication service is designated as optional in  the pam  conf configuration file     try first pass Requests Kerberos V5 authentication with the user s  initial password  entered when the user authenticated  to the first authentication module in the stack   If    Standards  Environments  and Macros 273    pam krb5 5     Kerberos V5  Account  Management  Module    Kerberos V5  Session  Management  Module    Kerberos V5  Password  Management  Module    274       Kerberos V5 authentication fails  or if no password has  been entered  the user is prompted for a password with  the prompt  Kerberos Password       use
269. keyword will be used to define symbols for use in collation sequence statements   that is  between the order start and the order end keywords  The syntax is      collating symbol  s n    lt collating symbol gt     The  lt collating symbol gt  is a symbolic name  enclosed between angle brackets   lt  and  gt     and must not duplicate any symbolic name in the current charmap file  if any   or any  other symbolic name defined in this collation definition     A collating symbol defined via this keyword is only recognized with the  LC_COLLATE category     For example     collating symbol  lt UPPER_CASE gt   collating symbol  lt HIGH gt     The collating symbol keyword defines a symbolic name that can be associated  with a relative position in the character order sequence  While such a symbolic name  does not represent any collating element  it can be used as a weight     The order_start keyword must precede collation order entries and also defines the  number of weights for this collation sequence definition and other collation rules     The syntax of the order_start keyword is      order start  s  s        s n   lt sort rules gt    lt sort rules gt     The operands to the order_start keyword are optional  If present  the operands  define rules to be applied when strings are compared  The number of operands define  how many weights each element is assigned  if no operands are present  one forward  operand is assumed  If present  the first operand defines rules to be applied when 
270. l characters listed in  ERE Special Characters below  The interpretation of an ordinary character  preceded by a backslash  X  is undefined     Standards  Environments  and Macros 309    regex 5     ERE Special  Characters    Periods in EREs    ERE Bracket  Expression    EREs Matching  Multiple  Characters       An ERE special character has special properties in certain contexts  Outside those  contexts  or when preceded by a backslash  such a character is an ERE that matches  the special character itself  The extended regular expression special characters and the  contexts in which they have their special meaning are     EA The period  left bracket  backslash  and left parenthesis are special  except when used in a bracket expression  see RE Bracket  Expression  above   Outside a bracket expression  a  left parenthesis immediately followed by a right parenthesis  produces undefined results       The right parenthesis is special when matched with a preceding  left parenthesis  both outside a bracket expression     fuc  The asterisk  plus sign  question mark  and left brace are special  except when used in a bracket expression  see RE Bracket  Expression  above   Any of the following uses produce  undefined results     m if these characters appear first in an ERE  or immediately  following a vertical line  circumflex or left parenthesis  m if a left brace is not part of a valid interval expression     The vertical line is special except when used in a bracket  expression  see 
271. ld for an attribute file are set to 0xB000  As with the tar  archive format  extended attributes are stored in cpio archives as two consecutive file  entries  The first file describes the location name for the extended attribute  The  second file contains the actual attribute file content  The c name field in extended  attribute headers is ignored  though it should be set to a meaningful value for the  benefit of archivers that do not process these headers  Solaris archivers start the  pathname with   dev null   to prevent archivers that do not understand the type   E  header from trying to restore extended attribute files in inappropriate places     Attribute identification data format    Both the tar and cpio archive formats can contain the special files described above   always paired with the extended attribute data record  for identifying the precise  location of the extended attribute  These special data files are necessary because there  is no simple naming mechanism for extended attribute files  Extended attributes are  not visible in the file system name space  The extended attribute name space must be   tunneled into  using the openat    function  The attribute identification data must  support not only the flat naming structure for extended attributes  but also the  possibility of future extensions allowing for attribute directory hierarchies and  recursive attributes  The data file is therefore composed of a sequence of records  It  begins with a fixed length head
272. le definition file  only the characters defined for  the class digit can be specified  in contiguous  ascending sequence by numerical value  followed by  one or more sets of six characters representing the  hexadecimal digits 10 to 15 inclusive  with each set in  ascending order  for example A  B  C  D  E  F      b  c  d   e       The digits 0 to 9  the upper case letters A to F and  the lower case letters a to    of the portable character set  are automatically included in this class     The definition of character class xdigit requires that  the characters included in character class digit be  included here also     Define characters to be classified as blank characters     In the POSIX locale  only the space and tab characters  are included     In a locale definition file  the characters space and tab  are automatically included in this class     Define one or more locale specific character class  names as strings separated by semi colons  Each  named character class can then be defined  subsequently in the LC  CTYPE definition  A character  class name consists of at least one and at most   CHARCLASS NAME MAX  bytes of alphanumeric  characters from the portable filename character set  The  first character of a character class name cannot be a  digit  The name cannot match any of the LC CTYPE  keywords defined in this document     Define characters to be classified as belonging to the  named locale specific character class  In the POSIX  locale  the locale specific named ch
273. le whose size exceeds 8 Gbyte     1 byte     The  usr bin truss utilities has been modified to read a dump file and display  information relevant to large files  such as offsets     The following  usr bin utilities are large file aware for cachefs file systems     cachefspack cachefsstat    The following  usr sbin utilities are large file aware for cachefs file systems     cachefslog cachefswssize cfsadmin fsck    mount umount    The following utilities are large file aware for nfs file systems      usr lib autofs automountd  usr sbin mount     usr lib nfs rquotad  The following  usr bin utility is large file aware for u  s file systems     df    Standards  Environments  and Macros 193    largefile 5     The following  usr lib nfs utility is large file aware for ufs file systems     rquotad    The following  usr xpg4 bin utility is large file aware for u  s file systems     df    The following  usr sbin utilities are large file aware for u  s file systems     clri dcopy edquota ff fsck  fsdb fsirand fstyp labelit lockfs  mkfs mount ncheck newfs quot  quota quotacheck quotaoff quotaon repquota  tunefs ufsdump ufsrestore umount    Large file safe   A utility is called large file safe if it causes no data loss or corruption when it encounters  utilities   a large file  A utility that is large file safe is unable to process properly a large file  but  returns an appropriate error     The following  usr bin utilities are large file safe     audioconvert audioplay audiorecord comm 
274. lib security pam sample so 1    The SAMPLE service module for PAM is divided into four components   authentication  account management  password management  and session  management  The sample module is a shared object that is dynamically loaded to  provide the necessary functionality     The SAMPLE authentication module  typically    usr lib security pam sample so 1  provides functions to test the PAM  framework functionality using the pam sm authenticate 3PAM  call  The  SAMPLE module implementation of the pam sm authenticate 3PAM  function  compares the user entered password with the password set in the pam  conf  A  file  or  the string  test  if a default test password has not been set  The following options may  be passed in to the SAMPLE Authentication module     debug Syslog debugging information at the LOG DEBUG level    passwd newone Sets the password to be  newone     first pass good The first password is always good when used with the  use first pass or try  first  pass option    first pass bad The first password is always bad when used with the  use first pass or try  first pass option    always fail Always returns PAM AUTH ERR    always_succeed Always returns PAM_SUCCESS    always_ignore Always returns PAM IGNORE    use first pass Use the user s initial password  entered when the user    is authenticated to the first authentication module in  the stack  to authenticate with the SAMPLE module  If  the passwords do not match  or if this is the first  authenticatio
275. libraries  This introduces  another level of safety for libraries in a multi threaded program  Cancel Safety   There are two sub categories of Cancel Safety  Deferred Cancel Safety  and  Asynchronous Cancel Safety  An application is considered to be  Deferred Cancel Safe when it is Cancel Safe for threads whose cancellation type is  PTHREAD CANCEL DEFERRED  An application is considered to be  Asynchronous Cancel Safe when it is Cancel Safe for threads whose cancellation  typeis PTHREAD CANCEL ASYNCHRONOUS  Deferred Cancel Safety is easier to  achieve than Asynchronous Cancel Safety  since a thread with the deferred  cancellation type can be cancelled only at well defined cancellation points  whereas  a thread with the asynchronous cancellation type can be cancelled anywhere  Since  all threads are created by default to have the deferred cancellation type  it may  never be necessary to worry about asynchronous cancel safety  Indeed  most  applications and libraries are expected to always be Asynchronous Cancel Unsafe   An application which is Asynchronous Cancel Safe is also  by definition   Deferred Cancel Safe     uname 1   pkgada 1M   Intro 3   standards 5     Standards  Environments  and Macros 25    charmap 5   NAME    DESCRIPTION    Symbolic Names    Declarations       charmap   character set description file    A character set description file or charmap defines characteristics for a coded character  set  Other information about the coded character set may also be in th
276. lists escape sequences and associated actions on display devices  capable of the action        Sequence Character Terminal Action  NN backslash None    a alert Attempts to alert the user through audible or visible  notification    b backspace Moves the printing position to one column before the    current position  unless the current position is the  start of a line        Standards  Environments  and Macros 91    formats 5              Sequence Character Terminal Action   ys form feed Moves the printing position to the initial printing  position of the next logical page    Mn newline Moves the printing position to the start of the next  line    Nr carriage return Moves the printing position to the start of the current  line    Nt Moves the printing position to the next tab position  on the current line  If there are no more tab positions  left on the line  the behavior is undefined     v Moves the printing position to the start of the next    vertical tab position  If there are no more vertical tab  positions left on the page  the behavior is undefined        Conversion   Each conversion specification is introduced by the percent sign character      After the  Specifications   character    the following appear in sequence     flags    field width    precision    conversion characters    Zero or more flags  in any order  that modify the  meaning of the conversion specification     An optional string of decimal digits to specify a  minimum field width  For an output field  if 
277. m independent sharable files  The subtree rooted at  usr   share contains  platform independent sharable files  the rest of the  usr tree contains  platform dependent files  By mounting a common remote file system  a group of  machines with a common platform may share a single  usr file system  A single   usr share file system can be shared by machines of any platform  A machine  acting as a file server can share many different  usr file systems to support several  different architectures and operating system releases  Clients usually mount  usr  read only so that they do not accidentally change any shared files     The  usr file system contains the following subdirectories      usr 4lib  a out libraries for the Binary Compatibility Package      usr 5bin  Symbolic link to the  usr bin directory      usr X  Symbolic link to the  usr openwin directory      usr adm  Symbolic link to the  var adm directory      usr apache  Apache executables  loadable modules  and documentation      usr aset  Directory for Automated Security Enhancement Tools  ASET  programs and files      usr bin  Platform amp hyphen dependent  user invoked executables  These are commands users  expect to be run as part of their normal  PATH  For executables that are different on  a 64   bit system than on a 32 bit system  a wrapper that selects the appropriate  executable is placed here  See isaexec 3C   An approved installation location for  bundled Solaris software  The analogous location for add on system so
278. m ldap so 1    EXAMPLE 3 Using pam authtok store With Password Management For Both Local and  LDAP Accounts    The following is a configuration for password management when using   pam authtok store instead of pam 1dap  This configuration works because   pam authtok store updates password in all the repositories configured by  nsswitch conf 4   Lines that begin with the   symbol are comments   and the lines  are ignored     4 Password management  authentication   passwd auth binding pam passwd auth so 1 server policy  passwd auth required pam ldap so 1      Password management  updates      This is the preferred stack  since it updates     passwords stored both in the local  etc files and    in the LDAP directory  The  server policy                 option is used to tell pam authtok store to  follow the LDAP server s policy when updating  passwords stored in the LDAP directory    other password required pam dhkeys so 1  other password requisite pam authtok get so 1  other password requisite pam authtok check so 1    other password required pam authtok store so 1 server policy    EXAMPLE 4 Using pam 1dap With Password Management if There are no Local Accounts    Use the following configuration for password management when using pam 1dap   Lines that begin with the   symbol are comments  and athe comments are ignored     4 Password management  authentication      The control flag  binding  provides a local overriding     remote  LDAP  control  The server policy option is used  
279. mands  listed below and described  in individual man pages  which implement all of the Live Upgrade features and  functions  The software also includes a Forms and Menu Language Interpreter based  user interface named 1u 1M    See   m1i 1  for a description of the Forms and Menu  Language Interpreter   The FMLI interface implements a subset of Live Upgrade   functions  Unlike the command line interfaces  output from the FMLI interface is not  internationalizable     The following are some of the tasks you can perform with Live Upgrade software     m You can make one or more copies of the currently running system     m You can upgrade to a new OS version on a second boot environment  then boot  from that environment  If you choose  you can then fall back to your original boot  environment or boot from yet another environment     m You can install application or OS packages to a boot environment  then boot from  that environment     m You can install OS patches to a boot environment  then boot from that  environment     m From a flash archive  you can install an OS to a boot environment  then boot from  that environment  See   1ar 1M  for information on administering flash archives       You can split and rejoin file systems in a new BE  For example  you can separate   usr    var  and  opt from    putting them on their own partitions  Conversely   you could join these file systems on a single partition under       m You can mount any or all of the filesystems of a BE that is no
280. me  Default root of a subtree for user directories      kernel  Subtree of platform amp hyphen dependent loadable kernel modules required as part  of the boot process  It includes the generic part of the core kernel that is  platform amp hyphen  independent   kernel genunix See kerne1 1M  An  approved installation location for bundled Solaris software and for add on system  software      kernel drv  32 bit device drivers        48 manpages section 5  Standards  Environments  and Macros    Last Revised 15 Nov 2001       filesystem 5      kernel drv sparcv9  64 bit SPARC device drivers      kernel genunix  Platform amp hyphen independent kernel       kernel subsystem  1a64  64 bit x86 platform amp hyphen dependent modules required for boot  An approved  installation location for bundled Solaris software and for add on system software   Note that 1a64 is an example name  the actual name might be different       kernel subsystem   sparcv9  64 bit SPARC platform amp hyphen dependent modules required for boot  An  approved installation location for bundled Solaris software and for add on system  software      mnt  Default temporary mount point for file systems  This is an empty directory on  which file systems can be temporarily mounted      opt  Root of a subtree for add on application packages      platform  Subtree of plattorm amp hyphen specific objects which need to reside on the root  filesystem  It contains a series of directories  one per supported platform  The  semantics 
281. me  of the object  The only intended use of this  reference is that it be passed to   fn ctx handle from ref 3XEN      For an FNS enterprise level object  implemented on top of  etc files  The  address contains the context type and  version number of the reference  and the  location of the object in the  etc file  system  The only intended use of this  reference is that it be passed to   fn ctx handle from ref 3XEN      For a user s home directory  The address  contains the user s name and the name of  the naming service password table where  the user s home directory is stored     For a user s home directory  The address  contains the user s name and the name of  the NIS  password table where the user s  home directory is stored     For all file systems exported by a host  The  address contains the host s name     For a single mount point  The address  contains the mount options  the name of the  servers and the exported path  See  mount 1M      For a printer s address in the files naming  service     For a printer s address in the NIS naming  service     For a printer s address in the NIS  naming  service     86 manpages section 5  Standards  Environments  and Macros   Last Revised 13 Dec 1996    SEE ALSO       fns references 5     fn link addr For an XEN link address  The contents is the  string form of the composite name     inet domain For an Internet domain  The address  contains the fully qualified domain name   for example   Wiz COM       inet ipaddr string For an obj
282. ms  A BE  is made up of a unique copy of one or more non shareable file systems and zero or  more copies of shareable file systems     Live Upgrade commands support an option   X  that enables XML output   Characteristics of the XML are specified in a DTD shipped with the product  XML  output enables programmatic parsing of portions of the command output     Live Upgrade supports the notion of a BE description  an optional attribute of a BE  A  BE description can be of any length and format  It might be a text string or a binary  file  See Ludesc 1M  for details     Below is an example set of steps that you might follow in the use of Live Upgrade  software  These steps specify the use of commands rather than 1u 1M   the FMLI  interface  Many Live Upgrade functions are accessible through 1u  Except where lu  does not support a function  the choice between 1u and Live Upgrade commands is a  matter of your requirements and preferences  The following example is by no means  exhaustive of the possibilities of the use of the Live Upgrade software     1  You create a new BE  using lucreate 1M   The first time you create a BE on a  given system  you must designate the current Solaris operating environment as a  BE  give it a name   You then specify a name and a set of device  disk  slices you  want to use for the new BE  The lucreate command copies the contents of the  current Solaris operating environment  now a BE  to the new BE     After you have created additional BEs  you can us
283. n module in the stack  quit and do not  prompt the user for a password  It is recommended  that this option only be used if the SAMPLE  authentication module is designated as optional in the  pam  conf configuration file     try first pass Use the user s initial password  entered when the user  is authenticated to the first authentication module in  the stack  to authenticate with the SAMPLE module  If  the passwords do not match  or if this is the first  authentication module in the stack  prompt the user for  a password  The SAMPLE module  pam sm setcred 3PAM  function always returns  PAM SUCCESS     Standards  Environments  and Macros 289    pam sample 5     SAMPLE Account  Management  Component    SAMPLE  Password  Management    SAMS RH    Management  Component    ATTRIBUTES    SEE ALSO    NOTES       The SAMPLE Account Management Component  typically pam_sample so 1   implements a simple access control scheme that limits machine access to a list of  authorized users  The list of authorized users is supplied as option arguments to the  entry for the SAMPLE account management PAM module in the pam  conf file  Note  that the module always permits access to the root super user     The option field syntax to limit access is shown below  allow  name  name  allow   name  allow name     The example pam  conf show below permits only larry to login directly  rlogin is  allowed only for don and larry  Once a user is logged in  the user can use su if the  user are sam or eric       
284. n name resolution  FNS uses DNS to name  entities globally  Names can be constructed for any enterprise that is accessible on the  Internet  consequently  names can also be constructed for objects exported by these  enterprises     FNS provides the XFN interface for performing naming resolution on DNS domains  and hosts  In addition  enterprise namespaces such as those served by NIS  and NIS  can be federated with DNS by adding TXT records to DNS  To federate an NIS  or  NIS namespace under DNS  you first obtain the root reference for the NIS  hierarchy  or NIS domain  This reference is referred to as the next naming system reference because  it refers to the next naming system beneath the DNS domain  This reference contains  information about how to communicate with the NIS  or NIS servers and has the  following format      lt domainname gt    server name       server address gt      where   domainname   is the fully qualified domain name  Notice that NIS  and NIS  have slightly different syntaxes for domain names  For NIS   the fully qualified  domain name is case insensitive and terminated by a dot character          For NIS  the  fully qualified domain name is case sensitive and is not terminated by a dot character     For both NIS  and NIS    server address gt  is optional  If it is not supplied  a host name  lookup will be performed to get the machine s address     For example  if the machine wiz nisplus server with address 133 33 33 33  serves the NIS  domain wiz   com
285. n semicolon separated strings  each surrounded by  double quotes  The first string is the abbreviated name of the day  corresponding to Sunday  the second the abbreviated name of the  day corresponding to Monday  and so on     day Define the full weekday names  corresponding to the  A field  descriptor  The operand consists of seven semicolon separated  strings  each surrounded by double quotes  The first string is the  full name of the day corresponding to Sunday  the second the full  name of the day corresponding to Monday  and so on     abmon Define the abbreviated month names  corresponding to the  b  field descriptor  The operand consists of twelve  semicolon separated strings  each surrounded by double quotes   The first string is the abbreviated name of the first month of the  year  January   the second the abbreviated name of the second  month  and so on     mon Define the full month names  corresponding to the  8 field  descriptor  The operand consists of twelve semicolon separated  strings  each surrounded by double quotes  The first string is the  full name of the first month of the year  January   the second the  full name of the second month  and so on     d t fmt Define the appropriate date and time representation   corresponding to the  c field descriptor  The operand consists of a  string  and can contain any combination of characters and field  descriptors  In addition  the string can contain the escape  sequences     Va   b   f    Nn  Nzz  NE  Ny     date fm
286. n set  as described in The  Pentium Processor User s Manual   This is effectively  i486  plus the CPU ID instruction  and any features  that the CPU ID instruction indicates are present      4  pentium  mmx Like pentium  with the MMX instructions guaranteed  present   5  pentium pro The Intel PentiumPro instruction set  as described in    The PentiumPro Family Developer s Manual   This is  effectively pentium  with the CMOVcc  FCMOVcc   FCOMI  and RDPMC instructions guaranteed present      6  pentium  pro mmx Like pentium pro  with the MMX instructions  guaranteed present     isalist 1   sysinfo 2     Standards  Environments  and Macros 191    largefile 5   NAME  DESCRIPTION    Large file aware  utilities       largefile     large file status of utilities    A large file is a regular file whose size is greater than or equal to 2 Gbyte   2   bytes   A  small file is a regular file whose size is less than 2 Gbyte     A utility is called large file aware if it can process large files in the same manner as it  does small files  A utility that is large file aware is able to handle large files as input  and generate as output large files that are being processed  The exception is where  additional files are used as system configuration files or support files that can augment  the processing  For example  the file utility supports the  m option for an alternative   magic  file and the    f option for a support file that can contain a list of file names  It  is unspecified whether a 
287. n wiz   com has an NIS   principal name  jsmith wiz com     A user s NIS  home domain corresponds to the user s FNS organizational unit and  determines the binding for myens and myorgunit     A host s NIS  home domain corresponds to the host   s FNS organizational unit and  determines the binding for thisens  thisorgunit  user  and host     Standards  Environments  and Macros 77    fns_nis  5     Federating NIS   with DNS or X 500    NIS  Security    SEE ALSO       Federating NIS  with the global naming systems DNS or X 500 makes NIS  contexts  accessible outside of an NIS  hierarchy  To enable the federation  the administrator  must first add address information in either DNS or X 500  see   ns_dns 5  and  fns_x500 5    After this administrative step has been taken  clients outside of the  NIS  hierarchy can access contexts and perform operations from outside the hierarchy  as an unauthenticated NIS  client     The command fncreate 1M  creates NIS  tables and directories in the NIS   hierarchy associated with the domain of the host on which it executes  The invoker of  fncreate 1M  and other FNS commands is expected to have the necessary NIS   credentials   See nis  1  and nisdefaults 1    The environment variable   NIS GROUP of the process specifies the group owner for the NIS  objects thus created   In order to facilitate administration of the NIS  objects  NIS GROUP should be set to  the name of the NIS  administration group for the domain prior to executing    ncreate 1M
288. namic  information about managed elements  acting as an intermediary  between the CIM Object Manager and the managed elements      Solaris software providers have been developed for a variety of areas  users  roles   file systems  and network configuration  for example  A remote provider is also  available to distribute agents away from the CIM Object Manager when required   Because of the incremental development capabilities of the WBEM instrumentation  framework  developers can progressively and consistently add more providers for  additional Solaris software services       SNMP Adapter for WBEM  which enables Simple Network Management Protocol   SNMP  management applications to access system management information that  is provided by Solaris WBEM Services  Used with the Solstice Enterprise Agent   SEA  Master Agent snmpdx 1M   the SNMP Adapter for WBEM maps SNMP  requests into equivalent WBEM Common Information Model  CIM  properties or  instances     The SNMP Adapter for WBEM also remaps the response from the CIM Object  Manager into an SNMP response  which is returned to the management  application     A mapping file contains the corresponding Object Identifier  OID   class name   property name  and Abstract Syntax Notation One  ASN 1  type for each object   Developers can create their own mapping files     m SNMP Provider  which enables WBEM services to deliver SNMP information     This kit consists of a set of key application Software development tools that make it  e
289. nc fn host A context for naming objects related to a computer    onc fn site A context for naming sites    onc fn service A context for naming services    onc fn nsid A context for naming namespace identifiers    onc fn generic A context for naming application specific objects    onc fn fs A context for naming files  directories  and file systems    onc fn printername A context for naming printers    onc printers A printer object  When implemented on top of NIS    this could also be a context for naming printers    fn link ref An XEN link    inet domain An Internet domain     All address types use the FN ID STRING identifier format unless otherwise qualified   The format of address contents is determined by the corresponding address type     onc fn nisplus For an ENS enterprise level object  implemented on top of NIS   The address    Standards  Environments  and Macros 85    fns references 5        onc fn nis    onc fn files    onc fn fs user    onc fn fs user nisplus    onc fn fs host    onc fn fs mount    onc fn printer files    onc fn printer nis    onc fn printer nisplus    contains the context type  context  representation type  either normal or  merged   version number of the reference   and the NIS  name of the object  The only  intended use of this reference is that it be  passed to   fn ctx handle from ref 3XEN     For an FNS enterprise level object  implemented on top of NIS  The address  contains the context type and version  number of the reference  and the NIS na
290. ncludes the  lt regexp   h   header file must have a  define  statement for INIT  It is used for dependent declarations and initializations  Most  often it is used to set a register variable to point to the beginning of the regular  expression so that this register variable can be used in the declarations for GETC   PEEKC  and UNGETC  Otherwise it can be used to declare external variables that might  be used by GETC  PEEKC and UNGETC   See EXAMPLES below      The first parameter to the step    and advance    functions is a pointer to a string of  characters to be checked for a match  This string should be null terminated     The second parameter  expbuf  is the compiled regular expression which was obtained  by a call to the function compile        Standards  Environments  and Macros 317    regexp 5     318    EXAMPLES    DIAGNOSTICS       The function step    returns non zero if some substring of string matches the regular  expression in expbuf and 0 if there is no match  If there is a match  two external  character pointers are set as a side effect to the call to step     The variable loc1  points to the first character that matched the regular expression  the variable loc2  points to the character after the last character that matches the regular expression   Thus if the regular expression matches the entire input string  1oc1 will point to the  first character of string and 1oc2 will point to the null at the end of string     The function advance    returns non zero if th
291. nd Macros 227    locale 5     p sign posn    n sign posn    set to 1 if a space separates the symbol from the value   and set to 2 if a space separates the symbol and the  sign string  if adjacent     An integer set to a value indicating the positioning of  the positive sign fora monetary quantity with a  non negative value  The following integer values are  recognized for both p sign posnandn sign posn     0    Parentheses enclose the quantity and the  currency symbolorint curr symbol     The sign string precedes the quantity and  the currency symbol or  int curr symbol     The sign string succeeds the quantity and  the currency symbol or  int curr symbol     The sign string precedes the  currency symbol orint curr symbol     The sign string succeeds the  currency symbol orint curr symbol     An integer set to a value indicating the positioning of  the negative sign for a negative formatted       monetary quantity     The following table shows the result of various combinations     p cs precedes  1 p sign posn 0  p sign posn 1  p sign posn 2  p sign posn 3  p sign posn 4  p cs precedes  0 p sign posn 0  p sign posn 1  p sign posn 2    p sign posn 3    p sep by space    2 1 0    1 25    1 25    1 25     1 25   1 25   1 25   1 254  1 254  1 254    1 25   1 25   1 25   41 25  41 25  41 25   1 25     1 25     1 258   41 25   41 25    1 25   1 25    1 25    1 25    1 25    1 25    1 25      228 man pages section 5  Standards  Environments  and Macros   Last Revised 20 Dec 1996   
292. nd intervals  produces    undefined results     The order of precedence is as shown in the following table        BRE Precedence  from high to low        collation related bracket symbols  escaped characters   bracket expression  subexpressions  back references  single character BRE duplication    concatenation              1E 1E      lt special character              n      mn            man pages section 5  Standards  Environments  and Macros    Last Revised 12 Jul 1999    BRE Expression  Anchoring    EXTENDED  REGULAR  EXPRESSIONS    EREs Matching a  Single Character    ERE Ordinary  Characters       regex 5        anchoring                   A BRE can be limited to matching strings that begin or end a line  this is called  anchoring  The circumflex and dollar sign special characters will be considered BRE  anchors in the following contexts     1  Acircumflex       is an anchor when used as the first character of an entire BRE   The implementation may treat circumflex as an anchor when used as the first  character of a subexpression  The circumflex will anchor the expression to the  beginning of a string  only sequences starting at the first character of a string will  be matched by the BRE  For example  the BRE  ab matches ab in the string  abcdef  but fails to match in the string cdefab  A portable BRE must escape a  leading circumflex in a subexpression to match a literal circumflex     2  A dollar sign       is an anchor when used as the last character of an entire BRE
293. nd pic picture    Begin pic picture    End table    End heading section of table   Begin table  if x is H table   has repeated heading    Set up for ACM style output    A is the Author   s name s   N is the  total number of pages  Must be given  before the first initialization    Print x in boldface  if no argument  switch to boldface    Augments the base indent by n   This indent is used to set the indent  on regular text  like paragraphs    Begin new column    Print x in bold italics    nofill only     Begin bulleted paragraph    Print x in a box  nofill only     Set even footer to x y z    Set even header to x y z    Set footer to x y z    Suppress headers and footers on  next page    Set header to x y z     Draw a horizontal line     248 man pages section 5  Standards  Environments  and Macros   Last Revised 25 Feb 1992       Request     ipxy    SLP     lo     np    LA     of XYZ   oh x yz   pd    PP   on     re     Sc     shnx     Sk     Smx   Sz 4n     th    Initial  Value    no    no    yes    HI    HI    no    yes    no    no    10p    no    Cause    Break    no    yes    yes    no    yes  no  no  yes  yes  no  no    no    yes    no    no  no    no    me 5     Explanation    Italicize x  if x missing  italic   text follows    Start indented paragraph  with  hanging tag x  Indentation is   y ens  default 5     Start left blocked paragraph    Read in a file of local macros   of the form    x  Must be   given before initialization    Start numbered paragraph    Set odd f
294. nd time formats    LC NUMERIC Numeric formatting    LC MONETARY Monetary formatting    LC MESSAGES Formats of informative and diagnostic messages and    interactive responses     The standard utilities base their behavior on the current locale  as defined in the  ENVIRONMENT section for each utility  The behavior of some of the C language  functions will also be modified based on the current locale  as defined by the last call  to setlocale 3C      Locales other than those supplied by the implementation can be created by the  application via the localedef 1  utility  The value that is used to specify a locale  when using environment variables will be the string specified as the name operand to  localedef when the locale was created  The strings  C  and  POSIX  are reserved as  identifiers for the POSIX locale     Applications can select the desired locale by invoking the set1ocale   function  with the appropriate value  If the function is invoked with an empty string  such as     setlocale LC ALL          the value of the corresponding environment variable is used  If the environment  variable is unset or is set to the empty string  the set1ocale   function sets the  appropriate environment     Locales can be described with the file format accepted by the 1ocaledef utility     The locale definition file must contain one or more locale category source definitions   and must not contain more than one definition for the same locale category     A category source definition consi
295. ndards  Environments  and Macros 121    iconv 5   NAME    DESCRIPTION    122       iconv     code set conversion tables    The following code set conversions are supported     Code    ISO 646  ISO 646de  ISO 646da  ISO 646en  ISO 646es  ISO 646fr  ISO 646it  ISO 646sv  ISO 8859 1  ISO 8859 1  SO 8859 1  SO 8859 1  8859 1  SO 8859 1  ISO 8859 1  ISO 8859 1  ISO 8859 16  ISO 8859 2  ISO 8859 16  ISO 8859 16  ISO 8859 2  SO 8859 2  8859 2  BM 850   BM 870   MS 1250   MS 852   MS 852   MS 852   MS 852  Mazovia       n  o          n  o    Mazovia  Mazovia  Mazovia   DHN   DHN   DHN   DHN   ISO 8859 5  ISO 8859 5  ISO 8859 5  ISO 8859 5  KOI8 R  KOI8 R  KOI8 R  KOI8 R   PC Cyrillic  PC Cyrillic  PC Cyrillic    Code Set Conversions    Symbol    646  646de  646da  646en  646es  646fr  646it  646sv  8859  8859  8859  8859  8859  8859  8859  8859  isol6  iso2  isol6  isol6  iso2  iso2  iso2  ibm850  ibm870  win2  dos2  dos2  dos2  dos2  maz  maz  maz  maz  dhn  dhn  dhn  dhn  iso5  iso5  iso5  iso5  koi8  koi8  koi8  koi8  alt  alt  alt    Target Code    ISO 8859 1  ISO 8859 1  ISO 8859 1  ISO 8859 1  ISO 8859 1  ISO 8859 1  ISO 8859 1  ISO 8859 1  ISO 646   ISO 646de  ISO 646da  ISO 646en  ISO 646es  ISO 646fr  ISO 646it    ISO  SO  SO    646sv  8859 2  8859 16    IBM 850   IBM 870   MS 1250   MS 852  Mazovia   SO 8859 16  SO 8859 16  HN   SO 8859 2  S 1250       D   M  Mazovia  DHN   ISO 8859 2  MS 1250   MS 852   DHN  ISO 8859 2  MS 1250   MS 852  Mazovia  KOI8 R   PC Cyrillic  MS 1
296. ndards  Environments  and Macros 67    fns 5       Names can be composed in a uniform way  that is  FNS supports a model in which  composite names are constructed in a uniform syntactic way and can have any  number of components      m Coherent naming is encouraged through the use of shared contexts and shared  names     FNS and Naming   FNS has support for NIS   NIS  and files as enterprise level naming services  This   Systems   means that FNS implements the enterprise level policies using NIS   NIS  and files   FNS also supports DNS and X 500  via DAP or LDAP  as global naming services  as  well as support for federating NIS  and NIS with DNS and X 500  See the  corresponding individual man page for information about the implementation for a  specific naming service     SEE ALSO   nis    1   x  n 3XEN     ns dns 5     ns files 5  fns initial context 5    fns nis 5  fns nis  5  fns policies 5  fns references 5  fns x500 5        68 manpages section 5  Standards  Environments  and Macros    Last Revised 22 Nov 1996    NAME    DESCRIPTION       fns dns 5     fns dns     overview of FNS over DNS implementation    Federated Naming Service  FNS  provides a method for federating multiple naming  services under a single  simple interface for the basic naming operations  One of the  naming services supported by FNS is the Internet Domain Name System  or DNS  see  in named 1M    DNS is a hierarchical collection of name servers that provide the  Internet community with host and domai
297. nfiguration information for clients  and  provide that information upon a client s request  The information can include the  client s IP address and information about network services available to the client     This manual page provides a brief summary of the Solaris DHCP implementation     The Solaris DHCP client is implemented as background daemon  dhcpagent 1M    This daemon is started automatically during bootup if there exists at least one   dhop   interface file in   etc  Only interfaces with a corresponding     etc dhop   interface file are automatically configured during boot  Network  parameters needed for system configuration during bootup are extracted from the  information recieved by the daemon through the use of the dhcpinfo 1  command   The daemon s default behavior can be altered by changing the tunables in the   etc default dhcpagent file  The daemon is controlled by the ifconfig 1M   utility  Check the status of the daemon using the netstat 1M  and i  config 1M   commands     The Solaris DHCP server is implemented as a background daemon  in dhcpa 1M    This daemon can deliver network configuration information to either BOOTP or DHCP  clients  The Solaris DHCP service can be managed using the dhcpmgr 1M  GUI or the  command line utilities dhcpconfig 1M   dhtadm 1M   and pntadm 1M      The Solaris DHCP server stores client configuration information in the following two  types of tables     dheptab tables Contain macros and options  also known as symbols    us
298. nge is necessary  it will be documented in the  release notes for the affected release  and when feasible  Sun will provide migration  aids for binary compatibility and continued source development     External  An External interface is controlled by an entity other than Sun  At Sun s discretion   Sun can deliver as part of any release updated and possibly incompatible versions  of such interfaces  subject to their availability from the controlling entity  This  classification is typically applied to publicly available  freeware  and similar  objects     For External interfaces  Sun makes no claims regarding either source or binary  compatibility between any two releases  Applications based on these interfaces  might not work in future releases  including patches that contain External  interfaces     Unstable  An Unstable interface is provided to give developers early access to new or rapidly  changing technology or as an interim solution to a problem for which a more stable  solution is anticipated in the future     For Unstable interfaces  Sun no claims about either source or binary compatibility  from one minor release to another  Applications developed based on these  interfaces may not work in future minor releases     Obsolete  Scheduled for removal after event  An Obsolete interface is supported in the current release  but is scheduled to be  removed in a future  minor  release  When support of an interface is to be  discontinued  Sun will attempt to provide notificati
299. ns for eqn      eqnchar  42   stability     attributes of interfaces  18   Standard Generalized Markup Language      sgml  322      solbook  322   standards     standards and specifications  supported by Solaris  328   standards and specifications supported by  Solaris     ANSI  328   standards and specifications supported by  Solaris     C    328   standards and specifications supported by  Solaris     C  328   standards and specifications supported by  Solaris     ISO  328   standards and specifications supported by  Solaris     POSIX 1  328   standards and specifications supported by  Solaris     POSIX 2  328   standards and specifications supported by  Solaris     POSIX  328   standards and specifications supported by  Solaris     standards  328   standards and specifications supported by  Solaris     SUS  328   standards and specifications supported by  Solaris     SUSv2  328   standards and specifications supported by  Solaris     SVID3  328   standards and specifications supported by  Solaris     SVID  328   standards and specifications supported by  Solaris     XNS4  328   standards and specifications supported by  Solaris     XNS5  328   standards and specifications supported by  Solaris     XNS  328   standards and specifications supported by  Solaris     XPG3  328   standards and specifications supported by  Solaris     XPG4  328   standards and specifications supported by  Solaris     XPG4v2  328   standards and specifications supported by  Solaris     XPG  328   
300. nt 1B   sh 1     seek 3C     te11 3C   1  64 5    lfcompile64 5   standards 5     Certain system specific or non portable interfaces are not usable in the large file  compilation environment  Known cases are     Kernel data structures read from  dev kmem   Interfaces in the kernel virtual memory library   1kvm   Interfaces in the ELF access library   1e1f    Interfaces to  proc defined in  lt procfs h gt     The ustat 2  system call     Programs that use these interfaces should not be compiled in the large file compilation  environment  As a partial safeguard against making this mistake  including either of  the   libelf h   or   sys procfs h   header files will induce a compilation error  when the large file compilation environment is enabled     man pages section 5  Standards  Environments  and Macros   Last Revised 23 Jul 2001    BUGS       Ifcompile 5     In general  caution should be exercised when using any separately compiled library  whose interfaces include data items of type off t or the other redefined types either  directly or indirectly  such as with    struct stat      The redefined types are o     t   rlim t ino t blkcent t fsblkcnt t and fsfilcnt t  For the large file  compilation environment to work correctly with such a library  the library interfaces  must include the appropriate xxx64    binary entry points and must have them  mapped to the corresponding primary functions when FILE OFFSET BITS is set to  64     Care should be exercised using any of the pri
301. ntf    or scanf    routines on  variables of the types mentioned above  In the large file compilation environment   these variables should be printed or scanned using 1ong long formats     The 1int 1B  utility will generate spurious error messages when   FILE OFFSET BITS is set to 64  This is because the binary 1ibc lint library    usr lib llib lc 1n is compiled only for the standard interfaces  not with  FILE OFFSET BITS set to 64  This deficiency hampers static error checking for  programs compiled in the large file compilation environment        Symbolic formats analogous to those found in   sys int fmtio h   do not exist for  printing or scanning variables of the types that are redefined in the large file  compilation environment     Standards  Environments  and Macros 205    Ifcompile64 5     NAME    DESCRIPTION    Access to    Additional Large    206    File Interfaces       Ifcompile64     transitional compilation environment    All 64 bit applications can manipulate large files by default  The transitional interfaces  described on this page can be used by 32 bit and 64 bit applications to manipulate  large files     In the transitional compilation environment  explicit 64 bit functions  structures  and  types are added to the API  Compiling in this environment allows both 32 bit and  64 bit applications to access files whose size is greater than or equal to 2 Gbyte   2     bytes      The transitional compilation environment exports all the explicit 64 bit functions   
302. nts  and Macros    Last Revised 18 Apr 1997          Conversions Performed       DHN    ISO 8859 2    DHN    ISO 8859 2       215  216  217  220  221          361  363  266  274  277       366  367  370    371 376       367  40  260  40       For the conversion of DHN to MS 1250  all characters not in the following table are             mapped unchanged   Conversions Performed  DHN MS 1250 DHN MS 1250  200 245 233 237 40  201 306 240 341  202 312 241 355  203 243 242 363  204 321 243 372  205 323 244 251 40  206 214 252 254  207 217 253 255 40  210 257 256 253  211 271 257 273  212 346 260 340 40  213 352 341 337  214 263 342 345 40  215 361 346 265  216 363 347 360 40  217 234 361 261  220 237 362 365 40  221 277 366 367                   DHN to MS 852    DHN to Mazovia       iconv_dhn 5        Conversions Performed       DHN    MS 1250    DHN    MS 1250       222  223  224  225 230  231  232          40  364  366  40  326  334       367  370  371  372    373 376       40  260  40  267  40          For the conversion of DHN to MS 852  all characters not in the following table are             mapped unchanged   Conversions Performed  DHN MS 852 DHN MS 852   200 244 212 206  201 217 213 251  202 250 214 210  203 235 215 344  204 343 216 242  205 340 217 230  206 227 220 253  207 215 221 276  210 275 222 375 40  211 245                      For the conversion of DHN to Mazovia  all characters not in the following table are             mapped unchanged   Conversions Performed  D
303. nts outside of the NIS  hierarchy or  NIS domain can access and perform operations on the contexts in the NIS  hierarchy  or NIS domain  Foreign NIS  clients access the hierarchy as unauthenticated NIS   clients  Continuing the example above  and assuming that NIS  is federated  underneath the DNS domain Wiz   COM  you can now list the root of the NIS   enterprise using the command      finlist     Wiz COM     SEE ALSO   fnlist 1   fnlookup 1   nis  1   in named 1M   ypserv 1M   x  n 3XEN     ns 5    fns nis 5  fns nis  5  fns_ references 5   fns x500 5        70 manpages section 5  Standards  Environments  and Macros   Last Revised 22 Nov 1996    NAME    DESCRIPTION    FNS Policies and   etc Files    Security  Considerations    USAGE       fns_files 5     fns files     overview of FNS over files implementation    The Federated Naming Service  FNS  provides a method for federating multiple  naming services under a single  simple interface for the basic naming operations  One  of the naming services supported by FNS is  etc files  FNS provides the XFN  interface for performing naming and attribute operations on ENS enterprise objects   organization  site  user  host  and service objects   using files as the naming service   ENS stores bindings for these objects in files and uses them in conjunction with  existing  etc files objects     FNS defines policies for naming objects in the federated namespace  see   fns policies 5   At the enterprise level  FNS policies specify naming
304. o  f 1   troff 1   whatis 1     Dale Dougherty and Tim O Reilly  Unix Text Processing    Standards  Environments  and Macros 245    me 5     246    NAME  SYNOPSIS    DESCRIPTION    REQUESTS       me     macros for formatting papers  nroff  me  options  filename       troff  me  options  filename       This package of nroff and troff macro definitions provides a canned formatting  facility for technical papers in various formats  When producing 2 column output on a  terminal  filter the output through co1 1      The macro requests are defined below  Many nroff and troff requests are unsafe in  conjunction with this package  however  these requests may be used with impunity  after the first   pp     bp begin new page   br break output line here   spn insert n spacing lines   ls n  line spacing  n 1 single  1 2 double space  na no alignment of right margin   cen center next n lines   uln underline next n lines   Sz  n add n to point size    Output of the eqn 1   neqn 1   refer 1   and tb1 1  preprocessors for equations and  tables is acceptable as input     In the following list     initialization    refers to the first  pp    lp    ip   np   sh  or   uh macro  This list is incomplete     Request Initial Cause Explanation  Value Break     c   yes Begin centered block      d   no Begin delayed text        a no Begin footnote         yes Begin list     g   yes Begin major quote      xx   no Begin indexed item in index x     z 2 no Begin floating keep   aG   yes End centered block 
305. o be infinite  so  all bytes up to the end of the string are written     Write a  o character  no argument is converted     In no case does a non existent or insufficient field width cause truncation of a field  if  the result of a conversion is wider than the field width  the field is simply expanded to  contain the conversion result  The term field width should not be confused with the  term precision used in the description of  s     man pages section 5  Standards  Environments  and Macros    Last Revised 28 Mar 1995    EXAMPLES    SEE ALSO       formats 5     One difference from the C function printf    is that the 1 and h conversion characters  are not used  There is no differentiation between decimal values for type int  type  long  or type short  The specifications  d or  i should be interpreted as an  arbitrary length sequence of digits  Also  no distinction is made between single  precision and double precision numbers  float or double in C   These are simply  referred to as floating point numbers     Many of the output descriptions use the term line  such as    Ss    lt input line      Since the definition of 1ine includes the trailing newline character already  there is no  need to include a  n in the format  a double newline character would otherwise result     EXAMPLE 1 To represent the output of a pra that prints a date and time in the form  Sunday  July 3  10 02  where   weekday   and   month are strings      Ss    S8   d    d   2d n     weekday       month    
306. of pam sm authenticate     The  following option may be passed in to this service module     debug sys10og 3C  debugging information at LOG  DEBUG level     See attributes 5 for descriptions of the following attributes        ATTRIBUTE TYPE ATTRIBUTE VALUE                MT Level MT Safe with exceptions       pam 3PAM   pam authenticate 3PAM   ruserok 3SOCKET   syslog 3C    libpam 3LIB   pam  con   4   attributes 5     The interfaces in 1libpam   are MT Safe only if each thread within the multi threaded  application uses its own PAM handle     286 manpages section 5  Standards  Environments  and Macros   Last Revised 28 Oct 1996    NAME  SYNOPSIS    DESCRIPTION    Role Account  Management  Module       pam roles 5   pam roles   Role Account Management PAM module for Solaris     usr lib security pam roles so 1    The Role Account Management module for PAM     usr lib security pam roles so 1  provides functionality for one PAM  module  Account management  The pam_roles so 1 is a shared object that can be  dynamically loaded to provide the necessary functionality upon demand  Its path is  specified in the PAM configuration file     The Role account management component provides a function to check for  authorization to assume a role  It prevents direct logins to a role  It uses the  user attr 4  database to specify which users can assume which roles     The following options may be passed to the Role Authentication service module     debug syslog 3C  debugging information at LOG
307. of the series of directories is equivalent to    root       platform   uname  i  kernel  Platform amp hyphen specific modules required for boot  These modules have  semantics equivalent to  kerne1  It includes the file unix  the core kernel  See  kernel 1M   An approved installation location for bundled Solaris software and  for add on system software      platform   uname  m  kernel  Hardware class specific modules required for boot  An approved installation  location for bundled Solaris software and for add on system software      platform    uname  i  kernel subsystem ia64  x86 64 bit  platform amp hyphen dependent modules required for boot  Note that 1a64  is an example name  the actual name might be different  An approved installation  location for bundled Solaris software      platform  uname  i  kernel subsystem sparcv9  SPARC 64 bit platform amp hyphen specific modules required for boot  An approved  installation location for bundled Solaris software      platform    uname  i  kernel sparcv9 unix    64 bit platform amp hyphen dependent kernel      platform    uname  i  kernel unix    32 bit platform amp hyphen dependent kernel     Standards  Environments  and Macros 49    filesystem 5         platform    uname  i  lib  Platform amp hyphen specific shared objects required for boot  Semantics are  equivalent to  1ib  An approved installation location for bundled Solaris software  and for add on system software      platform   uname  i  sbin  Platform amp hyphen specific
308. ombination of  characters and field descriptors  If the string is empty  the 12 hour  format is not supported in the locale     Define how years are counted and displayed for each era in a  locale  The operand consists of semicolon separated strings  Each  string is an era description segment with the format     direction offset start date end date era  name era  format       according to the definitions below  There can be as many era  description segments as are necessary to describe the different  eras     The start of an era might not be the earliest point For example  the  Christian era B C  starts on the day before January 1  A D  1  and  increases with earlier time     direction Either a   or a   character  The   character  indicates that years closer to the start date have  lower numbers than those closer to the  end date  The     character indicates that years  closer to the start date have higher numbers  than those closer to the end  date     offset The number of the year closest to the start  date  in the era  corresponding to the  Eg and  Ey  field descriptors     232 manpages section 5  Standards  Environments  and Macros   Last Revised 20 Dec 1996    LC TIME  C language Access       era d fmt    era t fmt    era d t fmt    alt digits    locale 5     start date A date in the form yyyy mm dd  where yyyy   mm  and dd are the year  month and day  numbers respectively of the start of the era   Years prior to A D  1 are represented as  negative numbers     end date T
309. omponent provides a function to change  passwords pam sm chauthtok   in the Key Distribution Center  KDC  database   The following options can be passed in to the Kerberos V5 password module     debug Provides syslog 3C  debugging information at  LOG DEBUG level   nowarn Turns off warning messages     use first pass Requests Kerberos V5 authentication with the user s  initial password  entered when the user authenticated  to the first authentication module in the stack   If  Kerberos V5 authentication fails  or if no password has  been entered  it quits and does not prompt the user for  a password  If authentication succeeds  the user is    prompted by  New KRB5 password   for a new    man pages section 5  Standards  Environments  and Macros   Last Revised 21 Jan 2003    Sample pam conf  File       pam  krb5 5     password  The user is then prompted a second time for  the new password for verification and the KDC  database is updated with the new password if both  responses match     try first pass Requests Kerberos V5 authentication with the user s  initial password  entered when the user authenticated  to the first authentication module in the stack   If  Kerberos V5 authentication fails  or if no password has  been entered  the user is prompted for a password with  the prompt  Old KRB5 Password    If authentication  succeeds  the user is prompted by  New KRB5  password  for a new password  The user is then  prompted a second time for the new password for  verification and 
310. on  and values  other than zero for various error conditions     This section lists all file names referred to by the  man page  files of interest  and files created or  required by commands  Each is followed by a  descriptive summary or explanation     This section lists characteristics of commands   utilities  and device drivers by defining the  attribute type and its corresponding value  See  attributes 5 for more information     This section lists references to other man pages   in house documentation  and outside publications     10 manpages section 5  Standards  Environments  and Macros   September 2004    DIAGNOSTICS    WARNINGS    NOTES    BUGS    This section lists diagnostic messages with a brief  explanation of the condition causing the error     This section lists warnings about special conditions  which could seriously affect your working  conditions  This is not a list of diagnostics     This section lists additional information that does  not belong anywhere else on the page  It takes the  form of an aside to the user  covering points of  special interest  Critical information is never  covered here     This section describes known bugs and  wherever  possible  suggests workarounds     11    12 manpages section 5  Standards  Environments  and Macros   September 2004    Introduction       Intro 5     14    NAME    DESCRIPTION       Intro   introduction to miscellany    Among the topics presented in this section are     Standards    Environments    Macros    Char
311. on before discontinuing  support  Use of an Obsolete interface may produce warning messages     MT Level   Libraries are classified into four categories which define their ability to support  multiple threads  Manual pages containing routines that are of multiple or differing  levels show this within their NOTES or USAGEsection     Safe  Safe is an attribute of code that can be called from a multithreaded application  The  effect of calling into a Safe interface or a safe code segment is that the results are  valid even when called by multiple threads  Often overlooked is the fact that the  result of this Safe interface or safe code segment can have global consequences that  affect all threads  For example  the action of opening or closing a file from one  thread is visible by all the threads within a process  A multi threaded application  has the responsibility for using these interfaces in a safe manner  which is different  from whether or not the interface is Safe  For example  a multi threaded application  that closes a file that is still in use by other threads within the application is not  using the close 2  interface safely        man pages section 5  Standards  Environments  and Macros   Last Revised 15 Aug 2001    attributes 5     Unsafe    An Unsafe library contains global and static data that is not protected  It is not safe  to use unless the application arranges for only one thread at time to execute within  the library  Unsafe libraries may contain routines tha
312. ooter to x y z    Set odd header to x y z    Print delayed text    Begin paragraph  First line indented   Roman text follows    Reset tabs to default values    Read in a file of special characters  and diacritical marks  Must be  given before initialization    Section head follows  font  automatically bold  n is level   of section  x is title of section    Leave the next page blank    Only one page is remembered ahead   Set x in a smaller pointsize   Augment the point size by n points   Produce the paper in thesis format     Must be given before initialization     Standards  Environments  and Macros 249    me 5     250    Request     tp     uh     Xp xX    Initial    Value    no    Cause  Break  yes    no    yes    no    FILES    usr share lib tmac e     usr share lib tmac   me    Explanation    Begin title page    Underline argument  even in trof f     Nofill only     Like   sh but unnumbered     Print index x     SEE ALSO   co1 1   eqn 1   nro     1   refer 1   tb1 1   trof   1        man pages section 5  Standards  Environments  and Macros    Last Revised 25 Feb 1992    NAME  SYNOPSIS    DESCRIPTION    REQUESTS       mm 5   mm   text formatting  memorandum  macros  nroff  mm  options  filename       troff  mm  options  filename       This package of nrof   1  and trof   1  macro definitions provides a formatting  facility for various styles of articles  theses  and books  When producing 2 column  output on a terminal or lineprinter  or when reverse line motions are needed 
313. or none   y indent   XE   y end index entry  or series of   IX entries    XP   yy paragraph with first line indented  others indented   XS xy z y begin index entry  x page or no for none  y indent             man pages section 5  Standards  Environments  and Macros    Last Revised 25 Feb 1992    REGISTERS       ms 5                    Break   Macro Name Initial Value Reset  Explanation   1C on yy one column format  on a new page  i2     yy begin two column format         n beginning of refer reference    0   n end of unclassifiable type of reference    N   n N  1journal article  2 book  3 book article  4 report                Formatting distances can be controlled in  ms by means of built in number registers   For example  this sets the line length to 6 5 inches      nr LL 6     5i    Here is a table of number registers and their default values                                                           Name Register Controls Takes Effect Default  PS point size paragraph 10  VS vertical spacing paragraph 12  line length paragraph 6i  LT title length next page same as LL  FL footnote length next   FS 5 5i  PD paragraph distance paragraph 1v  if n    3v Gif t   DD display distance displays 1v  if n    5v  if t   PI paragraph indent paragraph 5n  QI quote indent next  QP 5n  FI footnote indent next  FS 2n  PO page offset next page 0  if n     1i  if t   HM header margin next page li  FM footer margin next page li  FF footnote format next  FS 0  1  2  3 available                 Wh
314. or the requested message catalog in  name  name   cat and  nlslib  LANG name cat  For gettext      N automatically  maps to  messages      If NLSPATH is unset or NULL  catopen    and gettext    call setlocale 3C    which checks LANG and the LC   variables to locate the message catalogs     NLSPATH will normally be set up on a system wide basis  in  etc profile and  thus makes the location and naming conventions associated with message catalogs  transparent to both programs and users     PATH  The sequence of directory prefixes that sh 1   time 1   nice 1   nohup 1   and  other utilities apply in searching for a file known by an incomplete path name  The  prefixes are separated by colons      1ogin 1  sets PATH  usr bin  For more  detail  see sh 1      Standards  Environments  and Macros 39    environ 5        SEV LEVEL    Define severity levels and associate and print strings with them in standard format  error messages  see addseverity 3C   fmtmsg 1   and   ntmsg 3C      TERM    The kind of terminal for which output is to be prepared  This information is used  by commands  such as vi 1   which may exploit special capabilities of that    terminal     TZ    Timezone information  The contents of this environment variable are used by the  functions ctime 3C   1ocaltime 3C   strftime 3C   and mkt ime 3C  to  override the default timezone  If TZ is not in the following form  it designates a  path to a timezone database file relative to  usr share lib zoneinfo    ignoring the first
315. os   Last Revised 21 Jan 2003    LDAP Account  Management  Module    LDAP Password  Management  Module    ERRORS       pam ldap 5     The following options may be passed to the LDAP service module     debug syslog 3C  debugging information at LOG  DEBUG  level   nowarn Turn off warning messages     These options are case sensitive  and the options must be used exactly as presented  here     The LDAP account management module validates the user s account  The   pam sm acct mgmt 3PAM  function authenticates to the LDAP server to verify that  the user s password has not expired  or that the user s account has not been locked   The following options may be passed to the LDAP service module     debug syslog 3C  debugging information at LOG  DEBUG  level   nowarn Turn off warning messages     These options are case sensitive  and the options must be used exactly as presented  here     The preferred way to configure password management for LDAP is by using the   pam authtok store 5  module and by specify ing the server policy option    Use the pam  authtok store function instead of pam 1dap for password change  When  password management is configured this way  both the local and LDAP accounts are  handled  pam authtok store 5  updates the passwords in all the repositories  configured by nsswitch conf 4  pam 1dap updates only the password in the  LDAP password database     The LDAP password management module provides the pam sm chauthtok     function to change passwords in the LDAP d
316. oy in your   logout file     Under SEAM  a client is referred to as a principal  A principal takes the following form     primary instance REALM    primary A user  a host  or a service     instance A qualification of the primary  If the primary is a host      indicated by the keyword host    then the instance  is the fully qualified domain name of that host  If the  primary is a user or service  then the instance is  optional  Some instances  such as admin or root  are  privileged        320 man pages section 5  Standards  Environments  and Macros   Last Revised 17 Nov 1999    EXAMPLES    SEE ALSO    NOTES       SEAM 5     realm The Kerberos equivalent of a domain  in fact  in most  cases the realm is directly mapped to a DNS domain  name  SEAM realms are given in upper case only  For  examples of principal names  see the EXAMPLES     By taking advantage of the General Security Services API  GSS API   SEAM offers   besides user authentication  two other types of security service  integrity  which  authenticates the validity of transmitted data  and privacy  which encrypts transmitted  data  Developers can take advantage of the GSS API through the use of the  RPCSEC_GSS API interface  see rpcsec_gss 3NSL       EXAMPLE 1 Examples of valid principal names    The following are examples of valid principal names   joe  joe admin  joe ENG   ACME   COM  joe admineENG ACME COM  rlogin bigmachine eng acme comeENG ACME COM  host bigmachine eng acme comQENG ACME COM    The first four cas
317. pam 1dap  module  The EXAMPLES section shows how the UNIX modules are stacked with  pam ldap  When stacked together  the UNIX modules are used to control local  accounts  such as root  pam 1dap is used for control with the network accounts  that  is  LDAP users  For the stacks to work  pam unix auth pam unix account    pam passwd auth  and pam authtok store must to configured with the  binding control flag and the server policy option  This configuration allows local  account override of a network account     The LDAP authentication module verifies the identity of a user  The  pam sm authenticate function uses the password entered by the user to attempt  to authenticate to the LDAP server  If successful  the user is authenticated     The authentication method used is either defined in the client profile   or the  authentication method is configured by using the 1dapclient 1M  command  To  determine the authentication method to use  this module first attempts to use the  authentication method that is defined  for service pam 1dap  for example   serviceAuthenticationMethod pam ldap sasl DIGEST MD5 lfno  authentication method is defined  pam ldap uses the default authentication method  If  neither are set  the authentication fails  This module skips the configured  authentication method if the authentication method is set to none     The pam sm setcred 3PAM  function does nothing  This function always returns  PAM IGNORE     man pages section 5  Standards  Environments  and Macr
318. pecial symbol UNDEFINED  The order in which collating elements are specified  determines the character order sequence  such that each collating element compares  less than the elements following it  The NUL character compares lower than any other  character     A  lt collating element gt  is used to specify multi character collating elements  and  indicates that the character sequence specified via the  lt collating element gt  is to be  collated as a unit and in the relative order specified by its place     A   collating symbol   is used to define a position in the relative order for use in  weights  No weights are specified with a  lt collating symbol gt      The ellipsis symbol specifies that a sequence of characters will collate according to  their encoded character values  It is interpreted as indicating that all characters with a  coded character set value higher than the value of the character in the preceding line   and lower than the coded character set value for the character in the following line  in  the current coded character set  will be placed in the character collation order between  the previous and the following character in ascending order according to their coded  character set values  An initial ellipsis is interpreted as if the preceding line specified  the NUL character  and a trailing ellipsis as if the following line specified the highest  coded character set value in the current coded character set  An ellipsis is treated as  invalid if the precedin
319. penat 2      Using the API    The following examples demonstrate how the API might be used to perform basic  operations on extended attributes     EXAMPLE 1 List extended attributes on a file     attrdirfd   attropen  test        O RDONLY    dirp   fdopendir  attrdirfd    while  dp   readdir dirp        102 manpages section 5  Standards  Environments  and Macros    Last Revised 1 Aug 2001    Extended Archive  Formats       fsattr 5     EXAMPLE 2 Open an extended attribute     attrfd   attropen  test   dp  gt d_name  O RDONLY      or    attrfd   openat attrdirfd  dp  gt d_name  O RDONLY      EXAMPLE 3 Read from an extended attribute     while  read attrfd  buf  512   gt  0       EXAMPLE 4 Create an extended attribute     newfd   attropen  test    attr   O CREAT O RDWR      or    newfd   openat attrdirfd   attr   O CREAT O RDWR      EXAMPLE 5 Write to an extended attribute     count   write newfd  buf  length      EXAMPLE 6 Delete an extended attribute     error   unlinkat attrdirfd   attr       Applications intending to access the interfaces defined here as well as the POSIX and  X Open specification conforming interfaces should define the macro    ATFILE SOURCE to be 1 and set whichever feature test macros are appropriate to  obtain the desired environment  See standards 5      As noted above in the description of command utilities modified to provide support  for extended attributes  the archive formats for tar 1  and cpio 1  have been  extended to provide support for archiv
320. pression specifies a set of character strings  A member of this set of strings  is said to be matched by the regular expression  Some characters have special meaning  when used in a regular expression  other characters stand for themselves     The following one character REs match a single character     14 An ordinary character   not one of those discussed in 1 2 below  is a  one character RE that matches itself     1 2 A backslash   X   followed by any special character is a one character RE  that matches the special character itself  The special characters are     Standards  Environments  and Macros     313    regexp 5        1 3    1 4    a           and    period  asterisk  left square bracket  and  backslash  respectively   which are always special  except when  they appear within square brackets    1  see 1 4 below      b     caret or circumflex   which is special at the beginning of an  entire RE  see 4 1 and 4 3 below   or when it immediately follows  the left of a pair of square brackets    1   see 1 4 below      c     dollar sign   which is special at the end of an entire RE  see  4 2 below    d  The character used to bound  that is  delimit  an entire RE     which is special for that RE  for example  see how slash     is  used in the g command  below      A period     is a one character RE that matches any character except  new line     A non empty string of characters enclosed in square brackets    1 isa  one character RE that matches any one character in that str
321. r  add on system software or for applications is  opt  packagename sbin      usr share  Platform amp hyphen independent sharable files  An approved installation location for  bundled Solaris software      usr share admserv5 1  iPlanet Console and Administration Server documentation      usr share audio  Sample audio files      usr share ds5  iPlanet Server documentation      usr share lib  Platform amp hyphen independent sharable databases  An approved installation  location for bundled Solaris software     60 manpages section 5  Standards  Environments  and Macros    Last Revised 15 Nov 2001       filesystem 5      usr share lib dict  Contains word list for spe11 1       usr share lib keytables  Keyboard layout description tables      usr share lib mailx  Help files for mailx 1       usr share lib nterm  nroff 1  terminal tables      usr share lib pub  Character set data files      usr share lib tabset  Tab setting escape sequences      usr share lib terminfo  Terminal description files for terminfo 4       usr share lib tmac  Macro packages and related files for text processing tools  for example  nro  f 1   and troff 1       usr share lib zoneinfo  Time zone information      usr share   s man  Platform amp hyphen independent sharable manual pages  An approved installation  location for bundled Solaris software  The analogous location for add on system  software or for applications is  opt  packagename   s  man      usr share src  Source code for kernel  utilities  and libr
322. r levels     Standards  Environments  and Macros 19    attributes 5        Release Version Significance       Major x 0 Likely to contain major feature  additions  adhere to different   possibly incompatible  Standard revisions  and  though unlikely  could  change  drop  or replace  Standard or Stable interfaces   Initial product releases are  usually 1 0        Minor Xy Compared to an x 0 or earlier  release  y  0   it s likely to  contain  minor feature  additions  compatible  Standard and Stable  interfaces  possibly  incompatible Evolving  interfaces  or likely  incompatible Unstable  interfaces     Micro X y z Intended to be interface  compatible with the previous  release  z  0   but likely to  add bug fixes  performance  enhancements  and support  for additional hardware        Classifications   The following table summarizes how stability level classifications relate to release  level  The first column lists the Stability Level  The second column lists the Release  Level for Incompatable Changes  and the third column lists other comments  For a  complete discussion of individual classifications  see the appropriate subsection below                 Stability Release Comments   Standard Major  x 0  Actual or de facto    Stable Major  x 0  Incompatibilities are  exceptional    Evolving Minor  x y  Migration advice might    accompany an incompatibility     Unstable Minor  x y  Experimental or transitional   incompatibilities are common           External Micro  x y z  Not
323. r more information about man  pages in general     NAME This section gives the names of the commands or  functions documented  followed by a brief  description of what they do     SYNOPSIS This section shows the syntax of commands or  functions  When a command or file does not exist  in the standard path  its full path name is shown   Options and arguments are alphabetized  with  single letter arguments first  and options with  arguments next  unless a different argument order  is required     The following special characters are used in this  section         Brackets  The option or argument  enclosed in these brackets is optional  If  the brackets are omitted  the argument  must be specified     Ellipses  Several values can be provided  for the previous argument  or the  previous argument can be specified  multiple times  for example   filename    Separator  Only one of the arguments  separated by this character can be  specified at a time     I Braces  The options and or arguments  enclosed within braces are  interdependent  such that everything  enclosed must be treated as a unit     8 manpages section 5  Standards  Environments  and Macros    September 2004    PROTOCOL    DESCRIPTION    IOCTL    OPTIONS    OPERANDS    OUTPUT    RETURN VALUES    ERRORS    This section occurs only in subsection 3R to  indicate the protocol description file     This section defines the functionality and behavior  of the service  Thus it describes concisely what the  command does  It does not
324. r server that maintains the FNS information     For example  the command fncreate 1M  creates the NIS map for the associated NIS  domain in the system on which it is executed  Hence  the command must be run by a  privileged user either on the NIS master server or on a system that will serve as a NIS  master server for FNS     The NIS object name that corresponds to an FNS composite name can be obtained  using fnlookup 1  and fnlist 1      Standards  Environments  and Macros 79    fns nis 5     SEE ALSO   fnbind 1   fnlist 1   fnlookup 1   fnunbind 1   ypcat 1   ypmat ch 1      ncheck 1M     ncreate 1M     ncreate fs 1M     ncreate printer 1M      ndestroy 1M   x  n 3XEN   ypfiles 4   fns 5   fns dns 5  fns_files 5     fns initial context 5  fns nis   5  fns policies 5  fns references 5    fns x500 5        80 manpages section 5  Standards  Environments  and Macros   Last Revised 22 Nov 1996    NAME    DESCRIPTION       fns policies 5   fns policies     overview of the ENS Policies    FNS defines policies for naming objects in the federated namespace  The goal of these  policies is to allow easy and uniform composition of names  The policies use the basic  rule that objects with narrower scopes are named relative to objects with wider scopes     FNS policies are described in terms of the following three categories  global   enterprise  and application     Global naming service A global naming service is a naming service  that has world wide scope  Internet DNS  and X 500 are e
325. rap Protocol  Carnegie  Mellon University  October 1993     34 manpages section 5  Standards  Environments  and Macros    Last Revised 13 Mar 2001    NAME    DESCRIPTION    SUNWfiles    SUNWbinfiles    SUNWnhisplus       dhcp_modules 5   dhcp  modules   data storage modules for the DHCP service    This man page describes the characteristics of data storage modules  public modules   for use by the Solaris Dynamic Host Configuration Protocol  DHCP  service     Public modules are the part of the DHCP service architecture that encapsulate the  details of storing DHCP service data in a data storage service  Examples of data  storage services are NIS   Oracle  and ufs file systems     Public modules are dynamic objects which can be shipped separately from the Solaris  DHCP service  Once installed  a public module is visible to the DHCP service  and can  be selected for use by the service through the DHCP service management interfaces   dhepmgr 1M   dhcpconfig 1M   dhtadm 1M   and pntadm 1M       Public modules may be provided by Sun Microsystems  Inc or by third parties     The Solaris DHCP service management architecture provides a mechanism for  plugging in public module specific administration functionality into the dhcpmgr 1M   and dhcpconfig 1M  utilities  This functionality is in the form of a Java Bean  which  is provided by the public module vendor  This Java Bean collects public  module specific configuration from the user  you  and provides it to the Solaris DHCP  service
326. ration for the login service when using pam 1dap  The  service name login can be substituted for any other authentication service such as  dtlogin or su  Lines that begin with the   symbol are comments  and these lines  ignored     Authentication management for login service is stacked    If pam unix auth succeeds  pam ldap is not invoked    The control flag  binding  provides a local overriding  remote  LDAP  control  The  server policy  option is used  to tell pam unix auth so 1 to ignore the LDAP users     login auth requisite pam authtok get so 1  login auth required pam dhkeys so 1  login auth binding pam unix auth so 1 server policy       login auth required pam ldap so 1    EXAMPLE 2 Using pam 1dap With Account Management    The following is a configuration for account management when using pam 1dap   Lines that begin with the   symbol are ignored     man pages section 5  Standards  Environments  and Macros    Last Revised 21 Jan 2003       pam ldap 5     EXAMPLE 2 Using pam 1dap With Account Management  Continued       Account management for all services is stacked     If pam unix account succeeds  pam ldap is not invoked      The control flag  binding  provides a local overriding     remote  LDAP  control  The  server policy  option is used    to tell pam unix account so 1 to ignore the LDAP users     other account requisite pam roles so 1   other account required pam projects so 1   other account binding pam unix account so 1 server policy  other account required pa
327. rd operand is assumed  The character   and collating element  order is defined by the order in which characters and elements  are specified between the order_start and order_end keywords  This character  order is used in range expressions in regular expressions  see regex 5    Weights  assigned to the characters and elements define the collation sequence  in the absence  of weights  the character order is also the collation sequence  The position keyword  provides the capability to consider  in a compare  the relative position of characters not  subject to IGNORE  As an example  consider the two strings    o ring    and    or ing         Assuming the hyphen is subject to IGNORE on the first pass  the two strings will  compare equal  and the position of the hyphen is immaterial  On second pass  all  characters except the hyphen are subject to IGNORE  and in the normal case the two  strings would again compare equal  By taking position into account  the first collates  before the second     The order start keyword is followed by collating identifier entries  The syntax for  the collating element entries is         oo  oe    S  s  s        s n  lt collating identifier gt     weight      lt weight gt      man pages section 5  Standards  Environments  and Macros    Last Revised 20 Dec 1996       locale 5     Each collating identifier consists of either a character described in Locale  Definition above  a  lt collating element gt   a  lt collating symbol gt   an ellipsis  or the  s
328. re and for  add on system software      usr platform   uname  i  lib ia64  x86 64   bit  platform amp hyphen specific daemon and shared objects  Note that 1a64 is  an example name  the actual name might be different  An approved installation  location for bundled Solaris software and for add on system software      usr platform   uname  i  lib sparcv9  SPARC 64 bit  plattorm amp hyphen specific daemon and shared objects  An approved  installation location for bundled Solaris software and for add on system software      usr platform   uname  i     s mannum  Where num can be one of 3x  1m  4  7d  or 9e  Platform amp hyphen specific system  manual pages for documenting platform amp hyphen specific  shared objects   administration utilities  configuration files  special files modules  and header files   An approved installation location for bundled Solaris software and for add on  system software      usr platform   uname  i  sbin  Platform specific system administration utilities with semantics equivalent to   usr sbin  An approved installation location for bundled Solaris software and for  add on system software      usr preserve  Symbolic link to the  var preserve directory      usr proc  Directory for the proc tools      usr proc bin  Contains links to SPARC Version 8 binaries in  usr bin      usr pub  Files for online man page and character processing      usr sadm  System administration files and directories     Standards  Environments  and Macros 59    filesystem 5        
329. rguments  their  associated path arguments  old and new  are interpreted relative to the current  working directory if they are not specified as absolute paths  Any attempt to use  renameat    to move a file that is not an extended attribute into an extended attribute  directory  so that it becomes an extended attribute  will fail  The same is true for an  attempt to move a file that is an extended attribute into a directory that is not an  extended attribute directory     Obtain information about a file  int fstatat  int fd  const char  path  struct stat  buf  int flag     The   statat 2  function obtains information about a file  If the path argument is  relative  it is resolved relative to the fd argument file descriptor  otherwise the fd  argument is ignored  If the fd argument is a special value AT FDCWD the path is  resolved relative to the current working directory  If the path argument is a null    100 man pages section 5  Standards  Environments  and Macros    Last Revised 1 Aug 2001       fsattr 5     pointer  the function returns information about the file referenced by the fd argument   In all other relative path cases  if the fd argument does not refer to a valid directory   the function returns ENOTDIR  If the flag argument is set to AT_SYMLINK_NOFOLLOW   the function will not automatically traverse a symbolic link at the position of the path   The fstatat    function is a multi purpose function that can be used in place of  stat     Istat    or fstat     See st
330. rgv      NULL   crabort  INVALIDUSER       if  ruid    0     if  pwp  gt pw_uid    ruid   crabort  NOTROOT     else  pp   getuser  ruid      else  pp    argv       else      EXAMPLE 2 Authorization check  ruid   getuid       if   pwp   getpwuid ruid      NULL   crabort  INVALIDUSER       strcpy real login  pwp   pw name      if   eflag    lflag    rflag   amp  amp  argc    1     if   pwp   getpwnam  argv      NULL   crabort  INVALIDUSER       if   chkauthattr  solaris jobs admin   real_login      if  pwp  gt pw_uid    ruid   crabort  NOTROOT     else  pp   getuser  ruid      else  pp    argv         else      For new applications  find an appropriate location for the test and use  chkauthattr   as shown above  Typically the authorization check makes an access  decision based on the identity of the calling user to determine if a privileged action   for example  a system call  should be taken on behalf of that user     Applications that perform a test to restrict who can perform their security relevant  functionality are generally setuid to root  Programs that were written prior to RBAC  and that are only available to the root user may not have such checks  In most cases   the kernel requires an effective user ID of root to override policy enforcement   Therefore  authorization checking is most useful in programs that are setuid to root     For instance  if you want to write a program that allows authorized users to set the  system date  the command must be run with an effectiv
331. riod  left bracket  and backslash are special except when used in a  bracket expression  see RE Bracket Expression  below   An expression  containing a   that is not preceded by a backslash and is not part of a  bracket expression produces undefined results     P The asterisk is special except when used     m ina bracket expression  m as the first character of an entire BRE  after an initial    if any     304 manpages section 5  Standards  Environments  and Macros    Last Revised 12 Jul 1999    Periods in BREs    RE Bracket  Expression       regex 5     m as the first character of a subexpression  after an initial    if any   see  BREs Matching Multiple Characters  below     A The circumflex is special when used     m asan anchor  see BRE Expression Anchoring  below    m as the first character of a bracket expression  see RE Bracket  Expression  below        The dollar sign is special when used as an anchor     A period      when used outside a bracket expression  is a BRE that matches any  character in the supported character set except NUL     A bracket expression  an expression enclosed in square brackets       is an RE that  matches a single collating element contained in the non empty set of collating  elements represented by the bracket expression     The following rules and definitions apply to bracket expressions     1  A bracket expression is either a matching list expression or a non matching list  expression  It consists of one or more expressions  collating elemen
332. ronments  and Macros    Last Revised 18 Apr 1997    NAME    DESCRIPTION    CONVERSIONS    ISO 8859 5 to  KOI8 R       iconv_8859 5 5   iconv_8859 5     code set conversion tables for ISO 8859 5  Cyrillic     The following code set conversions are supported                       Code Set Conversions Supported  Code Symbol Target Code Symbol Target Output  ISO 8859 5 iso5 KOI8 R koi8 KOI8 R  ISO 8859 5 iso5 PC Cyrillic alt Alternative PC Cyrillic  ISO 8859 5 iso5 MS 1251 win5 Windows Cyrillic  ISO 8859 5 iso5 Mac Cyrillic mac Macintosh Cyrillic                      The conversions are performed according to the following tables  All values in the  tables are given in octal     For the conversion of ISO 8859 5 to KOI8 R  all characters not in the following table  are mapped unchanged              Conversions Performed  ISO 8859 5 KOI8 R ISO 8859 5 KOI8 R  24 4 320 301  241 263 321 302  242 261 322 327  243 262 323 307  244 264 324 304  245 265 325 305  246 266 327 332  247 267 330 311  250 270 331 312  251 271 332 313  252 272 333 314  253 273 334 315  254 274 335 316  256 276 336 317                      Standards  Environments  and Macros 147    iconv_8859 5 5     148       Conversions Performed       ISO 8859 5    KOI8 R    ISO 8859 5    KOI8 R       257  260  261  262  263  264  265  266  267  270  271  272  273  274  275  276  277  300  301  302  303  304  305  306  307  310  311  312          277  341  342  367  347  344  345  366  372  351  352  353  354  355  356  357  3
333. ronments  and Macros 275    pam krb5 5     276    ATTRIBUTES    SEE ALSO    NOTES       dtlogin account required  usr lib security  ISA pam_unix so 1  dtlogin account optional   usr lib security  ISA pam krb5 so 1    Session management    other session required  usr lib security  ISA pam_unix so 1  other session optional  usr lib security  ISA pam_krb5 so 1    Password management          other password required  usr lib security  1SA pam unix so 1    other password optional  usr lib security  1SA pam krb5 so 1 try first pass    The Kerberos V5 module entries typically follow the Unix module entries  Thus  the  Kerberos V5 modules are  stacked  behind the Unix module  For the login service  the  Kerberos V5 authentication module runs after the Unix module  Its entry is  optional  so the user can still login if it fails  assuming that the previous Unix  module succeeded  If the entry designates required instead of optional  the user  cannot login if Kerberos V5 authentication fails  Because the try first pass option  is designated  it tries the user s password entered for the Unix module  If Kerberos V5  authentication fails  or no password has been entered  the user is prompted for the  Kerberos V5 password  For all session related services  the Kerberos V5 session  module runs after the Unix module  For the dtlogin service  the Kerberos V5 account  management module runs after the Unix module  For all password changing related  services  the Kerberos V5 module runs after the
334. routine will not  deadlock with itself if interrupted by a signal  Signals are only a problem for  MT Safe routines that acquire locks     Standards  Environments  and Macros 23    attributes 5     24 manpages section 5  Standards  Environments  and Macros   Last Revised 15 Aug 2001       Signals are disabled when locks are acquired in Async Signal Safe routines  This  prevents a signal handler that might acquire the same lock from being called  The  list of Async Signal Safe functions includes          exit   aio return  cfgetispeed  cfsetospeed  chown   creat  execle  fdatasync  fsync  getgid  getpid   kill   mkdir  pathconf  read   sem post  setpgid  sigaction  sigemptyset  sigpending  sigsuspend  Ssysconf  tcflush  tcsendbreak  thr kill  timer getoverrun    times    access  aio suspend  cfgetospeed  chdir   clock gettime  dup   execve   fork   getegid  getgroups  getppid   link   mkfifo   pause   rename   sema post  setsid  sigaddset  sigfillset  sigprocmask  sleep   tcdrain  tcgetattr  tcsetattr   thr sigsetmask  timer gettime    umask    aio error  alarm  cfsetispeed  chmod  close  dup2  fcntl  fstat  geteuid  getpgrp  getuid  lseek  open   pipe  rmdir  setgid  setuid  sigdelset  sigismember  sigqueue  stat  tcflow  tcgetpgrp  tcsetpgrp    time       timer settime    uname       SEE ALSO       attributes 5        unlink utime wait    waitpid write       MT Safe with Exceptions  See the NOTES or USAGE sections of these pages for a description of the exceptions     Safe w
335. rst  PRELIM  invocation  the implementation of pam sm chauthtok 3PAM   moves the contents of the PAM AUTHTOK  current authentication token  to   PAM OLDAUTHTORK  and subsequentially prompts the user for a new password  This  new password is stored in PAM AUTHTOK     If a previous module has set PAM AUTHTOK prior to the invocation of  pam authtok get  this module turns into a NO  OP and immediately returns  PAM SUCCESS     In the second  UPDATE  invocation  the user is prompted to Re enter his password   The pam sm chauthtok implementation verifies this reentered password with the  password stored in PAM AUTHTOK  If the passwords match  the module returns  PAM SUCCESS     The following option can be passed to the module   debug syslog 3C  debugging information at the LOG  DEBUG level    The authentication service returns the following error codes   PAM SUCCESS Successfully obtains authentication token    PAM SYSTEM ERR Fails to retrieve username  username is NULL or empty    The password management service returns the following error codes     PAM SUCCESS Successfully obtains authentication token       PAM AUTHTOK ERR Authentication token manipulation error    Standards  Environments  and Macros 267    pam authtok get 5   ATTRIBUTES   See attributes 5  for descriptions of the following attributes        ATTRIBUTE TYPE ATTRIBUTE VALUE       Interface Stability Evolving       MT Level MT Safe with exceptions                SEE ALSO   pam 3PAM   pam authenticate 3PAM   syslog 3C 
336. rvice operating at its highest efficiency  See nisping 1M   and crontab 1  for more information     Standards  Environments  and Macros 35    dhcp  modules 5     SEE ALSO   crontab 1   dhepconfig 1M   dhcpmgr 1M   dhtadm 1M   nisping 1M    pntadm 1M   dhcpsvec  con  f 4   dhep 5     Solaris DHCP Service Developer s Guide       36 manpages section 5  Standards  Environments  and Macros   Last Revised 24 Jan 2003    NAME    DESCRIPTION       environ 5     environ     user environment    When a process begins execution  one of the exec family of functions makes available  an array of strings called the environment  see exec 2   By convention  these strings  have the form variable value  for example  PATH  sbin   usr sbin  These  environmental variables provide a way to make information about a program   s  environment available to programs     A name may be placed in the environment by the export command and name value  arguments in sh 1   or by one of the exec functions  It is unwise to conflict with  certain shell variables such as MAIL  PS1  PS2  and IFS that are frequently exported  by  profile files  see profile 4      The following environmental variables can be used by applications and are expected  to be set in the target run time environment     HOME  The name of the user   s login directory  set by login 1  from the password file  see  passwd 4      LANG  The string used to specify internationalization information that allows users to  work with different national conv
337. s     m n    matches  any number of occurrences between m and n inclusive  Whenever a choice  exists  the RE matches as many occurrences as possible     The concatenation of REs is a RE that matches the concatenation of the  strings matched by each component of the RE     314 man pages section 5  Standards  Environments  and Macros   Last Revised 2 Apr 1996    Addressing with  REs       2 5    2 6    regexp 5     A RE enclosed between the character sequences    and V   isa RE that  matches whatever the unadorned RE matches     The expression   n matches the same string of characters as was matched  by an expression enclosed between     and X   earlier in the same RE   Here n is a digit  the sub expression specified is that beginning with the  n th occurrence of     counting from the left  For example  the expression   N      NV    1   matches a line consisting of two repeated  appearances of the same string     An RE may be constrained to match words     3 1    32       lt  constrains a RE to match the beginning of a string or to follow a  character that is not a digit  underscore  or letter  The first character  matching the RE must be a digit  underscore  or letter        gt  constrains a RE to match the end of a string or to precede a character  that is not a digit  underscore  or letter     An entire RE may be constrained to match only an initial segment or final segment of a  line  or both      4 1    4 2    4 3    A circumflex     at the beginning of an entire RE constr
338. s do not  match  or if no password has been entered  it prompts  the user for the old password  It also attempts to use  the new password  entered to the first password  module in the stack  as the new password for this  module  If the new password fails  it prompts the user  for a new password  If the user s password has expired   the UNIX account module saves this information in the  authentication handle using pam set data   witha  unique name  SUNW UNIX AUTHOK DATA  The UNIX  password module retrieves this information from the  authentication handle using pam get data   to  determine whether or not to force the user to update  the user s password     See attributes 5  for description of the following attributes        ATTRIBUTE TYPE ATTRIBUTE VALUE             MT Level MT Safe with exceptions          keylogin 1   pam 3PAM   pam authenticate 3PAM   pam_setcred 3PAM    syslog 3C   Libpam 3LIB   pam  con   4   attributes 5     pam authtok check 5  pam authtok get 5  pam authtok store 5    pam dhkeys 5   pam passwd auth 5  pam unix account 5     pam unix auth 5  pam unix session 5     The interfaces in 1ibpam 3LIB  are MT Safe only if each thread within the  multi threaded application uses its own PAM handle     The pam unix 5  module might not be supported in a future release  Similar  functionality is provided by pam authtok check 5  pam authtok get 5    pam authtok store 5  pam dhkeys 5   pam passwd auth 5     pam unix account 5  pam unix auth 5  and pam unix session 5   
339. s interpreted  to mean that each character in the sequence has unique weights  equal to the relative  order of their character in the character collation sequence  The use of the ellipsis as a  weight is treated as an error if the collating element is neither an ellipsis nor the  special symbol UNDEFINED     The special keyword IGNORE as a weight indicates that when strings are compared  using the weights at the level where IGNORE is specified  the collating element is  ignored  that is  as if the string did not contain the collating element  In regular  expressions and pattern matching  all characters that are subject to IGNORE in their  primary weight form an equivalence class     An empty operand is interpreted as the collating element itself     For example  the order statement       a    lt a gt j  lt a gt     is equal to      lt a gt     An ellipsis can be used as an operand if the collating element was an ellipsis  and is  interpreted as the value of each character defined by the ellipsis     The collation order as defined in this section defines the interpretation of bracket  expressions in regular expressions     For example     order_start forward  backward          UNDEFINED IGNORE  IGNORE          224 man pages section 5  Standards  Environments  and Macros   Last Revised 20 Dec 1996    order end keyword    LC MONETARY       locale 5         lt LOW gt     lt space gt   lt LOW gt    lt space gt    lt LOW gt       lt a gt   lt a gt   lt a gt     lt a acute gt   lt a
340. s to be classified as punctuation  characters     In the POSIX locale  neither the space character nor any  characters in classes alpha  digit  or cntr1 are  included     In a locale definition file  no character specified for the  keywords upper  lower  alpha  digit  cntrl   xdigit or as the space character can be specified     Define characters to be classified as printable  characters  not including the space character     In the POSIX locale  all characters in classes alpha   digit  and punct are included  no characters in class  cntrl are included     In a locale definition file  characters specified for the  keywords upper  lower  alpha  digit  xdigit  and  punct are automatically included in this class  No  character specified for the keyword cntr1 can be  specified     Define characters to be classified as printable  characters  including the space character     In the POSIX locale  all characters in class graph are  included  no characters in class cntr1 are included     In a locale definition file  characters specified for the  keywords upper  lower  alpha  digit  xdigit   punct  and the space character are automatically  included in this class  No character specified for the  keyword cntr1 can be specified     Define the characters to be classified as hexadecimal  digits     In the POSIX locale  only     0123456789 ABCDEFabcdef    are included     Standards  Environments  and Macros 217    locale 5     blank    charclass    charclass name    toupper       In a loca
341. s will be recognised  The  class is expressed by enclosing any one of the collating elements in the equivalence  class within bracket equal        delimiters  For example  if a  and belong to the  same equivalence class  then    a  b        b  and      b  will each be equivalent  to  ab   If the collating element does not belong to an equivalence class  the  equivalence class expression will be treated as a collating symbol       Acharacter class expression represents the set of characters belonging to a character    class  as defined in the LC_CTYPE category in the current locale  All character  classes specified in the current locale will be recognized  A character class  expression is expressed as a character class name enclosed within bracket colon         delimiters     The following character class expressions are supported in all locales          alnum     ecntr1      lower      space      alpha     digit     print     upper      blank     graph     punct     xdigit         In addition  character class expressions of the form       name    are recognized in those locales where the name keyword has been given a  charclass definition in the LC CTYPE category       A range expression represents the set of collating elements that fall between two    elements in the current collation sequence  inclusively  It is expressed as the  starting point and the ending point separated by a hyphen         Range expressions must not be used in portable applications because their  behav
342. sc This is the section title of the reference page   for example User Commands  The value of  this attribute may be a text entity reference     software This is the name of the software product that  the topic discussed on the reference page  belongs to  For example UNIX commands are  part of the SunOS x x release  The value of this  attribute may be a text entity reference     arch This is the architectural platform limitation of  the subject discussed on the reference page  If  there are no limitations the value used is  generic  Other values are sparc and x86     copyright This attribute contains the Sun Microsystems  copyright  Any other copyrights that may  pertain to the individual reference page file  should be entered as separate   lt refmiscinfo gt  entries  The value of this  attribute may be a text entity reference     This tag contains the equivalent information to the   TH macro line in an nroff 1   reference page   lt refnamediv gt  contains three tags  These tags contain the text that is  before and after the       dash  on the NAME line      lt refname gt  These are the names of the topics that are discussed in the file   There may be more than one  lt refname gt  for a page  The first   lt refname gt  must match the name of the file and the   lt refentrytitle gt   If there are more than one  lt refname gt  tags   each is separated by a      comma   The comma is generated by the  publisher of sgml files  so it should not be typed  This is referred to  as auto 
343. se an  E  type header  The prefix and name fields in  extended attribute headers are ignored  though they should be set to meaningful       values for the benefit of archivers that do not process these headers  Solaris archivers  set the prefix field to   dev  nu11  to prevent archivers that do not understand the  type  E  header from trying to restore extended attribute files in inappropriate places     Extended cpio format    The cpio archive format is octet oriented rather than block oriented  Each file entry in  the archive includes a header that describes the file  followed by the file name   followed by the contents of the file  These data are arranged as described in the  following table           Field Name Length  in Octets  Description  c magic 6 70707  c dev 6 First half of unique file ID       104 manpages section 5  Standards  Environments  and Macros    Last Revised 1 Aug 2001       fsattr 5           Field Name Length  in Octets  Description   c_ino 6 Second half of unique file ID   c_mode 6 File mode bits   c_uid 6 User ID of file owner   c gid 6 Group ID of file owner   c nlink 6 Number of links referencing  file   c rdev 6 Information for special files   c mtime 11 Modification time of file   c namesize 6 Length of file pathname   c filesize 11 Length of file content   c name c namesize File pathname   c filedata c filesize File content       The basic archive file structure is not changed for extended attributes  The file type  bits stored in the c mode fie
344. serok    286   pam sample     sample module for PAM  289   pam unix     authentication  account  session  and password management for UNIX  293   pam  unix account     PAM account  management module for UNIX  296    348 man pages section 5  Standards  Environments  and Macros    September 2004    pam  unix session     session management PAM  module for UNIX  299   password management module      pam authtok store  269   POSIX     standards and specifications  supported by Solaris  328   POSIX 1     standards and specifications  supported by Solaris  328   POSIX 2     standards and specifications  supported by Solaris  328   profiling utilities  profile within a function      prof  300    R    rbac     role based access control  301   regex     internationalized basic and extended  regular expression matching  304   regular expression compile and match routines      advance  313      compile  313      regexp  313      step  313   role based access control     rbac  301    S    ftp     authentication system  320   session management PAM module for UNIX      pam  unix session  299   sgml     Standard Generalized Markup  Language  322   sgml     Standard Generalized Markup  language  RefEntry  322   sgml     Standard Generalized Markup  Language  RefMeta  322  RefNameDiv  323  RefSectl  324  RefSect2  324  RefSynopsisDiv  324   shell environment  conventional names for  terminals     term  334   solbook     Standard Generalized Markup  Language  322    special character definitio
345. sers  sites  and services  The enterprise level naming service  provides contexts to allow other objects to be named relative to these objects     The organizational unit namespace provides a hierarchical namespace for naming  subunits of an enterprise  An organizational unit maps to an NIS  domain   Organizational unit names can be either fully qualified NIS  domain names or  relatively NIS  domain names  If a terminal dot is present in the name  it is treated as  a fully qualified name  Otherwise  the name is resolved relative to the root NIS   domain     Users in the NIS  namespace are found in the passwd org_dir table of an NIS   domain  Users in an FNS organizational unit correspond to the users in the  passwd org_dir table of the corresponding NIS  domain  FNS provides a context  for each user in the passwd org_dir table     Hosts in the NIS  namespace are found in the hosts org dir table of an NIS   domain  Hosts in an FNS organizational unit correspond to the hosts in the  hosts org_dir table of the corresponding NIS  domain  FNS provides a context for  each host in the hosts org dir table     In NIS   users and hosts have a notion of a home domain  It is the primary NIS   domain that maintains information associated with them  A user or host s home  domain can be determined directly using its NIS  principal name  which is composed  of the atomic user  login  name or the atomic host name  and the name of the NIS   home domain  For example  user j smith with home domai
346. set whichever feature test macros are appropriate  to obtain the desired environment  see standards 5       In the following examples  the large file compilation environment is accessed by  invoking the get conf utility with one of the arguments listed in the table above  The  additional large file interfaces are accessed by specifying  D LARGEFILE SOURCE     The examples that use the form of command substitution specifying the command  within parentheses preceded by a dollar sign can be executed only in a  POSIX conforming shell such as the Korn Shell  see ksh 1    In a shell that is not  POSIX conforming  such as the Bourne Shell  see sh 1   and the C Shell  see csh 1     the getconf calls must be enclosed within grave accent marks  as shown in the  second example     EXAMPLE 1 An example of compiling a program with a    large    of   _t  and that uses  fseeko    ftello   and yacc 1       c89  D LARGEFILE SOURCE   D FILE OFFSET BITS 64  o foo    getconf LFS CFLAGS  y tab c b o    getconf LFS LDFLAGS    ly   getconf LFS LIBS     a an nw    EXAMPLE 2 An example of compiling a program with a    large    o  f t that does not use  fseeko   and ftello   and has no application specific libraries       c89  D FILE OFFSET BITS 64 N   getconf LFS CFLAGS   a c     getconf LFS LDFLAGS      getconf LFS LIBS  N    EXAMPLE 3 An example of compiling a program with a  default  of   _t and that uses  fseeko   and ftello            c89  D LARGEFILE SOURCE a c    csh 1   getconf 1   ksh 1   Li
347. sion of these standards  with a brief description and the SunOS or Solaris release that first conformed to it                       POSIX Standard Description Release  POSIX 1 1988 system interfaces and headers SunOS 4 1  POSIX 1 1990 POSIX 1 1988 update Solaris 2 0  POSIX 1b 1993 realtime extensions Solaris 2 4  POSIX 1c 1996 threads extensions Solaris 2 6  POSIX 2 1992 shell and utilities Solaris 2 5  POSIX 2a 1992 interactive shell and utilities Solaris 2 5       Solaris 9also supports the X Open Common Applications Environment  CAE   Portability Guide Issue 3  XPG3  and Issue 4  XPG4   Single UNIX Specification  SUS   also known as XPG4v2   and Single UNIX Specification  Version 2  SUSv2   Both XPG4  and SUS include Networking Services Issue 4  XNS4   SUSv2 includes Networking  Services Issue 5  XNS5      The following table lists each X Open specification with a brief description and the  SunOS or Solaris release that first conformed to it                    X Open CAE  Specification Description Release   XPG3 superset of POSIX 1 1988 containing SunOS 4 1  utilities from SVID3   XPG4 superset of POSIX 1 1990  POSIX 2 1992  Solaris 2 4  and POSIX 2a 1992 containing extensions  to POSIX standards from XPG3   SUS  XPG4v2  superset of XPG4 containing historical Solaris 2 6  BSD interfaces widely used by common  application packages   XNS4 sockets and XTI interfaces Solaris 2 6   SUSv2 superset of SUS extended to support Solaris 7    POSIX 1b 1993  POSIX 1c 1996  and  ISO IEC
348. sity  Panda Programming  June 1993     Nussbacher  H   and Y  Bourvine  Hebrew Character Encoding for Internet Messages  RFC  1555  Israeli Inter University  Hebrew University  December 1993     Ohta  M   Character Sets ISO 10646 and ISO 10646 J 1  RFC 1815  Tokyo Institute of  Technology  July 1995     Ohta  M   and K  Handa  ISO 2022 JP 2  Multilingual Extension of ISO 2022 JP  RFC  1554  Tokyo Institute of Technology  December 1993     Reynolds  J   and J  Postel  ASSIGNED NUMBERS  RFC 1700  University of Southern  California  Information Sciences Institute  October 1994     Simonson  K   Character Mnemonics  amp  Character Sets  RFC 1345  Rationel Almen  Planlaegning  June 1992     Spinellis  D   Greek Character Encoding for Electronic Mail Messages  RFC 1947  SENA  S A   May 1996     Standards  Environments  and Macros 187    iconv_unicode 5     188    NOTES       The Unicode Consortium  The Unicode Standard  Version 2 0  Addison Wesley  Developers Press  July 1996     Wei  Y   Y  Zhang  J  Li  J  Ding  and Y  Jiang  ASCII Printable Characters Based Chinese  Character Encoding for Internet Messages  RFC 1842  AsiaInfo Services Inc   Harvard  University  Rice University  University of Maryland  August 1995     Yergeau  F   UTF 8  a transformation format of Unicode and ISO 10646  RFC 2044  Alis  Technologies  October 1996     Zhu  H   D  Hu  Z  Wang  T  Kao  W  Chang  and M  Crispin  Chinese Character Encoding  for Internet Messages  RFC 1922  Tsinghua University  China In
349. sponding to one  and so on   Up to 100 alternative symbols may be specified  The  following table displays the correspondence between  the items described above and the conversion specifiers  used by date 1  and the strftime 3C    wcsftime 3C   and st rptime 3C  functions    localedef langinfo Conversion   Keyword Constant Specifier  abday ABDAY x  a  day DAY x  A  abmon ABMON x sb  mon MON SB  d t fmt D T FMT  c  date fmt DATE FMT  C  d fmt D FMT x  t fmt T FMT  X  am_pm AM STR sp  am_pm PM_STR sp  t_fmt_ampm T FMT AMPM Sr                      Standards  Environments  and Macros 235    236    locale 5     LC TIME General  Information    LC MESSAGES                      localedef langinfo Conversion  Keyword Constant Specifier  era ERA SEC   Eg   SEG   Ey  SEY  era d fmt ERA D FMT SEX  era_t_fmt ERA_T_FMT SEX  era d t fmt ERA D T FMT SEC  alt digits ALT DIGITS  O                      Although certain of the field descriptors in the POSIX locale  such as the name of the  month  are shown with initial capital letters  this need not be the case in other locales   Programs using these fields may need to adjust the capitalization if the output is going  to be used at the beginning of a sentence     The LC TIME descriptions of abday  day  mon  and abmon imply a Gregorian style  calendar  7 day weeks  12 month years  leap years  and so forth   Formatting time  strings for other types of calendars is outside the scope of this document set     As specified under date in Locale Definit
350. st macro  it    Standards  Environments  and Macros 329    standards 5        must also define  EXTENSIONS  Defininpg  EXTENSIONS provides the  application with access to all interfaces and headers not in conflict with the specified  standard  The application must define _ EXTENSIONS either at compile time or  within the applicatio n source files     ANSI ISO C    No feature test macros need to be defined to indicate that an application is a  conforming C application     ANSI ISO C      ANSI ISO C   does not define any feature test macros  If the standard C    announcement macro     cplusplus is predefined to value 199711 or greater  the  compiler operates in a standard conforming mode  indicating C   standards  conformance  The value 199711 indicates conformance to ISO IEC 14882 1998  as  required by that standard   As noted above  conformance to the standard is  incomplete   A standard conforming mode is not available with compilers prior to Sun  WorkShop C   5 0     C   bindings are not defined for POSIX or X Open CAE  so specifying feature test  macros such as_POSIX SOURCE and XOPEN SOURCE can result in compilation  errors due to conflicting requirements of standard C   and those specifications     POSIX    Applications that are intended to be conforming POSIX 1 applications must define the  feature test macros specified by the standard before including any headers  For the  standards listed below  applications must define the feature test macros listed   Application writ
351. standards development organization approves a  non upward compatible change to a Standard interface that Sun decides to support   Sun will announce a compatibility and migration strategy     Programmers producing portable applications should rely on the interface  descriptions present in the standard or specification to which the application is  intended to conform  rather than the manual page descriptions of Standard  interfaces  When the standard or specification allows alternative implementation  choices  the manual page usually only describes the alternative implemented by  Sun  The manual page also describes any compatible extensions to the base  definition of Standard interfaces provided by Sun     Stable    A Stable interface is a mature interface under Sun s control  Sun will try to avoid  non upwards compatible changes to these interfaces  especially in minor or micro  releases     If support of a Stable interface must be discontinued  Sun will attempt to provide  notification and the stability level changes to Obsolete     Evolving       An Evolving interface may eventually become Standard or Stable but is still in  transition     Standards  Environments  and Macros 21    attributes 5     22    Sun will make reasonable efforts to ensure compatibility with previous releases as it  evolves  When non upwards compatible changes become necessary  they will occur  in minor and major releases  such changes will be avoided in micro releases  whenever possible  If such a cha
352. stems  Before these can be used  the system must be configured to be part of a  Kerberos realm  see SEAM 5      sys Use AUTH_SYS authentication  The user   s UNIX user id and group ids are  passed in the clear on the network  unauthenticated by the NFS server  This  is the simplest security method and requires no additional administration   It is the default used by Solaris NFS Version 2 clients and Solaris NFS  servers     dh Use a Diffie Hellman public key system   AUTH_DES  which is referred to as  AUTH_DH in the forthcoming Internet RFC      krb5 Use Kerberos V5 protocol to authenticate users before granting access to  the shared filesystem     krb5i Use Kerberos V5 authentication with integrity checking  checksums  to  verify that the data has not been tampered with        krb5p User Kerberos V5 authentication  integrity checksums  and privacy  protection  encryption  on the shared filesystem  This provides the most  secure filesystem sharing  as all traffic is encrypted  It should be noted that  performance might suffer on some systems when using krb5p  depending  on the computational intensity of the encryption algorithm and the amount  of data being transferred     none Use null authentication   AUTH  NONE   NFS clients using AUTH_NONE have  no identity and are mapped to the anonymous user nobody by NFS    Standards  Environments  and Macros 263    nfssec 5     FILES    ATTRIBUTES    SEE ALSO    NOTES       servers  A client using a security mode other than the one wi
353. sticky     mark files for special treatment  333    349    subset of a user s environment that depends on  language and cultural conventions      locale  212   SUS     standards and specifications supported  by Solaris  328   SUSv2     standards and specifications  supported by Solaris  328   SVID     standards and specifications supported  by Solaris  328   SVID3     standards and specifications  supported by Solaris  328    T  term     conventional names for terminals  334  terminals  conventional names     term  334  traditional UNIX crypt algorithm      crypt unix  32  transitional compilation environment      Ifcompile64  206  transitional interfaces for 64 bit file offsets      1f64  196    unicode  code set conversion tables      iconv_unicode  185  user environment      environ  37    V    vgrindefs     vgrind language definitions  338    Ww   wbem     Web Based Enterprise  Management  341   Web Based Enterprise Management      wbem  341    X   XNS     standards and specifications supported  by Solaris  328   XNS4     standards and specifications supported  by Solaris  328   XNS5     standards and specifications supported  by Solaris  328   XPG     standards and specifications supported  by Solaris  328   XPG3     standards and specifications supported  by Solaris  328   XPG4     standards and specifications supported  by Solaris  328   XPG4v2     standards and specifications  supported by Solaris  328    350 manpages section 5  Standards  Environments  and Macros    
354. sts of a category header  a category body and a  category trailer  A category header consists of the character string naming of the  category  beginning with the characters LC   The category trailer consists of the string  END  followed by one or more blank characters and the string used in the  corresponding category header     212 manpages section 5  Standards  Environments  and Macros   Last Revised 20 Dec 1996       locale 5     The category body consists of one or more lines of text  Each line contains an  identifier  optionally followed by one or more operands  Identifiers are either  keywords  identifying a particular locale element  or collating elements  Each keyword  within a locale must have a unique name  that is  two categories cannot have a  commonly named keyword   no keyword can start with the characters LC     Identifiers must be separated from the operands by one or more blank characters     Operands must be characters  collating elements or strings of characters  Strings must  be enclosed in double quotes  Literal double quotes within strings must be preceded  by the   escape character    described below  When a keyword is followed by more than  one operand  the operands must be separated by semicolons  blank characters are  allowed both before and after a semicolon     The first category header in the file can be preceded by a line modifying the comment  character  It has the following format  starting in column 1      comment char  c n    lt comment chara
355. system 5      var ftp  FTP server directory      var inet  IPv6 router state files       var krb5  Database and log files for Kerberos      var ld  Configuration files for runtime linker      var ldap  LDAP client configuration files      var log  System log files         var lp  Line printer subsystem logging information      var mail  Directory where users  mail is kept      var news  Community service messages  This is not the same as USENET style news      var nfs  NFS server log files      var nis  NIS  databases      var ntp  Network Time Protocol  NTP  server state directory      var opt  Root of a subtree for varying files associated with optional software packages  An  approved installation location for add on system software and applications      var preserve  Backup files for vi 1  and ex 1       var run  Temporary files which are not needed across reboots  Only root may modify the  contents of this directory      var sadm  Databases maintained by the software package management utilities      var sadm system logs  Status log files produced by software management functions and or applications   For example  log files produced for product installation  An approved installation  location for bundled Solaris software and for add on system software and  applications     Standards  Environments  and Macros 51    filesystem 5         var saf  Service access facility logging and accounting files      var samba  Log and lock files for Samba       var  snmp  SNMP status and
356. t 1M      tc rc2 d  Scripts for entering or leaving run level 2  See init 1M      tc rc3 d  Scripts for entering or leaving run level 3  See init 1M         tc rcS d  Scripts for bringing the system up in single user mode     tc rcem  Directory for reconfiguration manager  RCM  custom scripts     tc rpcsec  This directory might contain an NIS  authentication configuration file        tc saf  Service Access Facility files     Standards  Environments  and Macros 47    filesystem 5    etc security  Basic Security Module  BSM  configuration files      etc sfw  Samba configuration files      etc skel  Default profile scripts for new user accounts  See useradd 1M       etc smartcard  Solaris SmartCard configuration files      etc snmp  Solstice Enterprise Agents configuration files      etc ssh  Secure Shell configuration files  See ssh 1      etc sysevent  syseventd configuration files          etc subsystem  Platform amp hyphen dependent subsystem configuration files that are not shared  among systems  An approved installation location for bundled Solaris software   The analogous location for add on system software or for applications is    etc opt  packagename      etc tm  Trademark files  contents displayed at boot time      etc usb  USB configuration information      etc uucp  UUCP configuration information  See uucp 1C          etc wrsm  WCI Remote Shared Memory  WRSM  configuration information  See  wrsmconf 1M      export  Default root of the shared file system tree      ho
357. t Define the appropriate date and time representation   corresponding to the  C field descriptor  The operand consists of a  string  and can contain any combination of characters and field    Standards  Environments  and Macros 231    locale 5     d fmt    t fmt    am pm    t fmt ampm    era       descriptors  In addition  the string can contain the escape  sequences     Na  Nb   f  Nn   r  NC   v     Define the appropriate date representation  corresponding to the   x field descriptor  The operand consists of a string  and can  contain any combination of characters and field descriptors  In  addition  the string can contain the escape sequences NN  Na  Vb          An  Nr  NE   v     Define the appropriate time representation  corresponding to the   X field descriptor  The operand consists of a string  and can  contain any combination of characters and field descriptors  In  addition  the string can contain the escape sequences NN  Na  Vb          An  Nr   t   v     Define the appropriate representation of the ante meridiem and post  meridiem strings  corresponding to the  p field descriptor  The  operand consists of two strings  separated by a semicolon  each  surrounded by double quotes  The first string represents the ante  meridiem designation  the last string the post meridiem designation     Define the appropriate time representation in the 12 hour clock  format with am pm  corresponding to the  r field descriptor  The  operand consists of a string and can contain any c
358. t ETX gt   lt IS2 gt   lt SI gt   lt US gt    lt DC1 gt   lt EM gt   lt FF gt   lt IS3 gt   lt SO gt    VT            The following declarations can precede the character definitions  Each must consist of  the symbol shown in the following list  starting in column 1  including the  surrounding brackets  followed by one or more blank characters  followed by the  value to be assigned to the symbol       code set  name   The name of the coded character set for which the  character set description file is defined       mb cur max   The maximum number of bytes in a multi byte  character  This defaults to 1       mb cur min An unsigned positive integer value that defines the  minimum number of bytes in a character for the  encoded character set     26 manpages section 5  Standards  Environments  and Macros   Last Revised 3 May 1995    Format       charmap 5       escape  char   The escape character used to indicate that the  characters following will be interpreted in a special  way  as defined later in this section  This defaults to  backslash    thinsp    which is the character glyph  used in all the following text and examples  unless  otherwise noted      lt comment_char gt  The character that when placed in column 1 of a  charmap line  is used to indicate that the line is to be  ignored  The default character is the number sign         The character set mapping definitions will be all the lines immediately following an  identifier line containing the string CHARMAP starting in
359. t active  compare the  files in any pair of BEs  delete or rename a BE  and perform other administrative  tasks     The Live Upgrade software supports upgrade from any valid Solaris installation  medium  including a CD ROM  an NFS or UFS directory  or a flash archive   See  flash archive 4 for a description of the flash archive feature      man pages section 5  Standards  Environments  and Macros    Last Revised 14 Apr 2004       live upgrade 5     In simplest terms  a BE  for Live Upgrade  consists of the disk slice containing a root  file system and the file system  device  usually disk  slice entries specified in  v  stab 4   This set of slices is not limited to a single disk  This means that you can  have multiple BEs on a single device  or have a BE spread across slices on multiple  devices     The minimal requirement for a Live Upgrade BE is the same as for any Solaris boot  environment  you must have root     and usr filesystems  which might both reside on      All filesystems except for     usr   var  and  opt can be shared among multiple  BEs  if you choose     Each BE must have a unique copy of the file systems that contain the OS       usr      var  and  opt  For Live Upgrade purposes  these are referred to as non shareable   sometimes referred to as critical  file systems  With other file systems  such as     export or  home  you have the option of copying the files to a new BE or  the  default  sharing them among BEs  These are referred to as shareable file syste
360. t are Safe  however  most of the  library s routines are unsafe to call     The following table contains reentrant counterparts for Unsafe functions  This table  is subject to change by Sun     Reentrant functions for libc           Unsafe Function Reentrant counterpart  ctime ctime r  localtime localtime r  asctime asctime r  gmtime gmtime r  ctermid ctermid r  getlogin getlogin r  rand rand r  readdir readdir r  strtok strtok r  tmpnam tmpnam r  MT Safe    An MT Safe library is fully prepared for multithreaded access  It protects its global  and static data with locks  and can provide a reasonable amount of concurrency   Note that a library can be safe to use  but not MT Safe  For example  surrounding  an entire library with a monitor makes the library Safe  but it supports no  concurrency so it is not considered MT Safe  An MT Safe library must permit a  reasonable amount of concurrency   This definition s purpose is to give precision to  what is meant when a library is described as Safe  The definition of a Safe library  does not specify if the library supports concurrency  The MT Safe definition makes  it clear that the library is Safe  and supports some concurrency  This clarifies the  Safe definition  which can mean anything from being single threaded to being any  degree of multithreaded      Async Signal Safe       Async Signal Safe refers to particular library routines that can be safely called from  a signal handler  A thread that is executing an Async Signal Safe 
361. t of the result to bea  zero  For x or X conversion  a non zero result has Ox or OX prefixed  to it  respectively  For e  E  f  g  and G conversions  the result  always contains a radix character  even if no digits follow the radix  character  For g and G conversions  trailing zeros are not removed  from the result as they usually are     For d  i  o  u  x  X  e  E  f  g  and G conversions  leading zeros   following any indication of sign or base  are used to pad to the  field width  no space padding is performed  If the 0 and     flags  both appear  the 0 flag is ignored  For d  i  o  u  xand X  conversions  if a precision is specified  the 0 flag is ignored  For  other conversions  the behaviour is undefined     Each conversion character results in fetching zero or more arguments  The results are  undefined if there are insufficient arguments for the format  If the format is exhausted  while arguments remain  the excess arguments are ignored     The conversion characters and their meanings are     d i 0 U X X    The integer argument is written as signed decimal  d or i    unsigned octal  o   unsigned decimal  u   or unsigned hexadecimal  notation  x and X   The d and i specifiers convert to signed decimal  in the style     dddd  The x conversion uses the numbers and  letters 0123456789abcdef and the X conversion uses the numbers  and letters 0123456789 ABCDEF  The precision component of the  argument specifies the minimum number of digits to appear  If the  value being conv
362. tal constants must be represented by two or three octal digits  preceded by the  escape character  for example    05   141  or  217  In a portable charmap file  each  constant must represent an 8 bit byte  Implementations supporting other byte sizes  may allow constants to represent values larger than those that can be represented in  8 bit bytes  and to allow additional digits in constants  When constants are  concatenated for multi byte character values  they must be of the same type  and  interpreted in byte order from first to last with the least significant byte of the  multi byte character specified by the last constant     In lines defining ranges of symbolic names  the encoded value is the value for the first  symbolic name in the range  the symbolic name preceding the ellipsis   Subsequent  symbolic names defined by the range will have encoding values in increasing order   For example  the line     lt j0101 gt       lt j0104 gt   d129 d254    will be interpreted as      lt j0101 gt   d129 d254   lt j0102 gt   d129 d255   lt j0103 gt   d130 do   lt j0104 gt   d130 d1       Note that this line will be interpreted as the example even on systems with bytes  larger than 8 bits  The comment is optional     locale 1  localedef 1  nl_langinfo 3C  extensions 5   locale 5     28 man pages section 5  Standards  Environments  and Macros    Last Revised 3 May 1995    NAME  SYNOPSIS    DESCRIPTION    ATTRIBUTES    SEE ALSO       crypt bsdbf 5   crypt_bsdbf     password hashing mod
363. talling or running Live Upgrade  you are  required to install the limited set of patch revisions  Make sure you have the most  recently updated patch list by consulting http    sunsolve sun com  Search for  the infodoc 72099 on the SunSolve web site     It is possible for an operating system upgrade to remove installed patches  Prior to  such an upgrade  use analyze_patches  as described in luupgrade 1M   to  determine which  if any  patches will be removed     Live Upgrade supports the release it is distributed on and up to three marketing  releases back  For example  if you obtained Live Upgrade with Solaris 9  including a  Solaris 9 upgrade   that version of Live Upgrade supports Solaris versions 2 6  Solaris  7  and Solaris 8  in addition to Solaris 9  No version of Live Upgrade supports a Solaris  version prior to Solaris 2 6     Standards  Environments  and Macros 211    locale 5   NAME    DESCRIPTION    Locale Definition       locale     subset of a user s environment that depends on language and cultural  conventions    A locale is the definition of the subset of a user s environment that depends on  language and cultural conventions  It is made up from one or more categories  Each  category is identified by its name and controls specific aspects of the behavior of  components of the system  Category names correspond to the following environment  variable names        LC CTYPE Character classification and case conversion    LC COLLATE Collation order    LC TIME Date a
364. tching notation is based on the description of regular  expression notation described on the regex 5  manual page     The following patterns matching a single character match a single character  ordinary  characters  special pattern characters and pattern bracket expressions  The pattern bracket  expression will also match a single collating element     An ordinary character is a pattern that matches itself  It can be any character in the  supported character set except for NUL  those special shell characters that require  quoting  and the following three special pattern characters  Matching is based on the  bit pattern used for encoding the character  not on the graphic representation of the  character  If any character  ordinary  shell special  or pattern special  is quoted  that  pattern will match the character itself  The shell special characters always require  quoting     When unquoted and outside a bracket expression  the following three characters will  have special meaning in the specification of patterns       A question mark is a pattern that will match any character       An asterisk is a pattern that will match multiple characters  as described in  Patterns Matching Multiple Characters  below       The open bracket will introduce a pattern bracket expression     The description of basic regular expression bracket expressions on the regex 5   manual page also applies to the pattern bracket expression  except that the  exclamation mark character       replaces the
365. ted via a symbolic name  enclosed within angle  brackets    and     The symbolic name  including the angle brackets  must exactly  match a symbolic name defined in the charmap file specified via the localedef       option  and will be replaced by a character value determined from the value  associated with the symbolic name in the charmap file  The use of a symbolic name  not found in the charmap file constitutes an error  unless the category is LC CTYPE    Standards  Environments  and Macros 213    locale 5        or LC COLLATE  in which case it constitutes a warning condition  see  localedef 1  for a description of action resulting from errors and warnings   The  specification of a symbolic name in a collating element or  collating symbol section that duplicates a symbolic name in the charmap file   if present  is an error  Use of the escape character or a right angle bracket within a  symbolic name is invalid unless the character is preceded by the escape character     Example       c     c cedilla      M    a    y       A character can be represented by the character itself  in which case the value of the  character is implementation dependent  Within a string  the double quote  character  the escape character and the right angle bracket character must be  escaped  preceded by the escape character  to be interpreted as the character itself   Outside strings  the characters      i     gt  escape_char  must be escaped to be interpreted as the character itself     For exampl
366. ter  header  Sets  prevailing indent and tabs to  5i     Begin indented paragraph  with the tag  given on the next text line  Set prevailing  indent to i     Resolve the title abbreviation t  join to  punctuation mark  or text  p     When formatting a manual page  man examines the first line to determine whether it  requires special processing  For example a first line consisting of     ENGU t    indicates that the manual page must be run through the tb1 1  preprocessor     Standards  Environments  and Macros 239    man 5   A typical manual page for a command or function is laid out as follows      TH title  1 9  The name of the command or function  which serves as  the title of the manual page  This is followed by the  number of the section in which it appears     SH NAME The name  or list of names  by which the command is  called  followed by a dash and then a one line  summary of the action performed  All in roman font   this section contains no trof   1  commands or  escapes  and no macro requests  It is used to generate  the windex database  which is used by the whatis 1   command      SH SYNOPSIS    Commands   The syntax of the command and its arguments  as  typed on the command line  When in boldface  a  word must be typed exactly as printed  When in  italics  a word can be replaced with an argument  that you supply  References to bold or italicized  items are not capitalized in other sections  even  when they begin a sentence     Syntactic symbols appear in roman face
367. th  The openat    function  in particular  can be used in many contexts  where chdir    or fchdir   is currently required  See chdir 2      Open a file relative to a file descriptor  int openat  int fd  const char  path  int oflag    mode t model     The openat 2  function behaves exactly as open 2  except when given a relative path   Where open    resolves a relative path from the current working directory  openat     resolves the path based on the vnode indicated by the supplied file descriptor  When  oflag is O_XATTR  openat    interprets the path argument as an extended attribute  reference  The following code fragment uses openat    to examine the attributes of  some already opened file     dfd   openat fd       O RDONLY O XATTR     void  getdents dfd  buf  nbytes      Standards  Environments  and Macros 99    fsattr 5        If openat    is passed the special value AT FDCWD as its first  fd  argument  its  behavior is identical to open    and the relative path arguments are interpreted  relative to the current working directory  If the O_XATTR flag is provided to  openat    or to open     the supplied path is interpreted as a reference to an  extended attribute on the current working directory     Unlink a file relative to a directory file descriptor  int unlinkat  int dirfd  const char  pathflag  int flagflag     The unlinkat 2  function deletes an entry from a directory  The path argument  indicates the name of the entry to remove  If path an absolute path  the dirfd 
368. th which a  Solaris NFS server shares the file system will have its security mode  mapped to AUTH NONE  In this case  if the file system is shared with  sec none  users from the client will be mapped to the anonymous user   The NFS security mode none is supported by share nfs 1M   but not by  mount nfs 1M  or automount 1M       etc nfssec conf NFS security service configuration file     See attributes 5  for descriptions of the following attributes        ATTRIBUTE TYPE ATTRIBUTE VALUE          Availability SUNWnfscr             automount 1M   mount_nfs 1M   share_nfs 1M   rpc_clnt_auth 3NSL    secure rpc 3NSL   attributes 5      etc nf  ssec conf lists the NFS security services  Do not edit this file  It is not  intended to be user configurable     264 manpages section 5  Standards  Environments  and Macros   Last Revised 10 Jul 2001    NAME  SYNOPSIS    DESCRIPTION    ERRORS    FILES    ATTRIBUTES    SEE ALSO    NOTES       pam authtok check 5   pam authtok check   authentication and password management module    pam authtok check so 1    pam authtok check provides functionality to the Password Management stack  The  implementation of pam sm chauthtok      performs a number of checks on the  construction of the newly entered password  pam sm chauthtok    is invoked twice  by the PAM framework  once with flags set to PAM PRELIM CHECK  and once with  flags setto PAM UPDATE AUTHTOK  This module only performs its checks during the  first invocation  This module expects the curr
369. the   hidden  extended attribute directory     The 1s    command displays an     following the  mode information when extended attributes are  present  More precisely  the output line for a given file  contains an     character following the mode  characters if the pathconf 2  variable XATTR_EXISTS  is set to true  See the pathconf    section below  The     option uses the same general output format as the   1 option     When a file is moved  all attributes are carried along  with the file rename  When a file is moved across a file  system boundary  the copy command invoked is  similar to the cp  p variant described above and  extended attributes are  moved   If the extended file  attributes cannot be replicated  the move operation fails  and the source file is not removed     The    option informs pax to archive attributes  but by  default pax ignores extended attributes  The pax 1   utility is a generic replacement for both tar 1  and  cpio 1  and is able to produce either output format in  its archive  See Extended Archive Formats below  for a description of the new archive records     In the default case  tar does not attempt to place  attributes in the archive  If the    option is specified   however  tar traverses into the attribute space of all  files being placed in the archive and attempts to add  the attributes to the archive  A new record type has  been introduced for extended attribute entries in tar  archive files  the same is true for pax and cpio  archives  sim
370. the  converted value has fewer bytes than the field width  it  is padded on the left  or right  if the left adjustment  flag        described below  has been given to the field  width      Gives the minimum number of digits to appear for the  d  o  i  u  x or X conversions  the field is padded with  leading zeros   the number of digits to appear after the  radix character for the e and f conversions  the  maximum number of significant digits for the g  conversion  or the maximum number of bytes to be  written from a string in s conversion  The precision  takes the form of a period     followed by a decimal  digit string  a null digit string is treated as zero     A conversion character  see below  that indicates the  type of conversion to be applied     flags   The flags and their meanings are             The result of the conversion is left justified within the field     The result of a signed conversion always begins with a sign    or    92 man pages section 5  Standards  Environments  and Macros    Last Revised 28 Mar 1995    Conversion  Characters         space      formats 5     If the first character of a signed conversion is not a sign  a space  character is prefixed to the result  This means that if the space  character and   flags both appear  the space character flag is  ignored     The value is to be converted to an alternative form  For c  d  i  u   and s conversions  the behaviour is undefined  For o conversion  it  increases the precision to force the first digi
371. the KDC database is updated with the  new password if both responses match     use xfn pass Requests Kerberos V5 authentication with a mapped  password that has been stored under XEN  If Kerberos  V5 authentication fails  or if no password has been  stored  it quits and does not prompt the user for a  password  If authentication succeeds  the user is  prompted by  New KRB5 password   for a new  password  The user is then prompted a second time for  the new password for verification and the KDC  database is updated with the new password if both  responses match     try xfn pass Requests Kerberos V5 authentication with a mapped  password that has been stored under XEN  If Kerberos  V5 authentication fails  or if no password has been  stored  the user is prompted for a password with the  prompt  Old KRB5 Password    If authentication  succeeds  the user is prompted by  New KRB5  password   for a new password  The user is then  prompted a second time for the new password for  verification and the KDC database is updated with the  new password if both responses match     The following is a sample pam  conf configuration file with Kerberos V5 support   Please note that this is only intended to give the flavor of the pam  conf Kerberos V5  entries and is not complete           Authentication management       login auth required  usr lib security  1SA pam unix so 1   login auth optional  usr lib security  1ISA pam krb5 so 1 try first pass         Account management    Standards  Envi
372. the string encoding  function used by crypt 3C  when the first character of the salt is not a         This algorithm is based on a one way encryption algorithm with variations intended   among other things  to frustrate use of hardware implementations of a key search   Only the first eight characters of the key passed to crypt    are used with this  algorithm  the rest are silently ignored  The salt is a two character string chosen from  the set  a zA Z0 9     This string is used to perturb the hashing algorithm in one of  4096 different ways     The return value of the crypt_unix algorithm might not be portable among  standard conforming systems  See standards 5      See attributes 5  for descriptions of the following attributes     ATTRIBUTE TYPE ATTRIBUTE VALUE       MT Level Safe                passwd 1   crypt 3C   crypt_genhash_imp1 3C   crypt_gensalt 3C    crypt gensalt impl 3C   getpassphrase 3C   crypt   conf  4   passwd 4    policy conf 4   attributes 5   crypt_bsdbf 5   crypt_bsdmd5 5    crypt_sunmd5 5   standards 5     32 man pages section 5  Standards  Environments  and Macros    Last Revised 10 Jun 2002    NAME    DESCRIPTION    Solaris DHCP  Client    Solaris DHCP  Server    DHCP  Configuration  Tables       dhcp 5     dhcp   Dynamic Host Configuration Protocol    Dynamic Host Configuration Protocol  DHCP  enables host systems in a TCP IP  network to be configured automatically for the network as they boot  DHCP uses a  client server mechanism  servers store co
373. tion compile    uses the macro RETURN on success and the macro ERROR on  failure  see above   The functions step    and advance    return non zero on a  successful match and zero if there is no match  Errors are     11 range endpoint too large   16 bad number    25   digit out of range    36 illegal or missing delimiter     man pages section 5  Standards  Environments  and Macros    Last Revised 2 Apr 1996    regexp 5     41 no remembered search string    42 XC X  imbalance    43 too many        44 more than 2 numbers given in         45   expected after V    46 first number exceeds second in         49     imbalance    50 regular expression overflow     SEE ALSO   regex 5        Standards  Environments  and Macros 319    SEAM 5   NAME   SEAM   overview of Sun Enterprise Authentication Mechanism    DESCRIPTION   SEAM  Sun Enterprise Authentication Mechanism  authenticates clients in a network  environment  allowing for secure transactions   A client may be a user or a network  service  SEAM validates the identity of a client and the authenticity of transferred  data  SEAM is a single sign on system  meaning that a user needs to provice a  password only at the beginning of a session  SEAM is based on the Kerberos    system  developed at MIT  and is compatible with Kerberos V5 systems over heterogeneous  networks     SEAM works by granting clients tickets  which uniquely identify a client  and which  have a finite lifetime  A client possessing a ticket is automatically validate
374. tput  ISO 8859 2 iso2 MS 1250 win2 Windows Latin 2  ISO 8859 2 iso2 MS 852 dos2 MS DOS Latin 2  ISO 8859 2 iso2 Mazovia maz Mazovia  ISO 8859 2 iso2 DHN dhn Dom Handlowy Nauki                      The conversions are performed according to the following tables  All values in the  tables are given in octal     For the conversion of ISO 8859 2 to MS 1250  all characters not in the following table  are mapped unchanged              Conversions Performed  ISO 8859 2 MS 1250 ISO 8859 2 MS 1250  24 4 261 271  177 237 40 265 276  241 245 266 234  245 274 267 241  246 214 271 232  251 212 273 235  253 215 274 237  254 217 276 236  256 216 266 236                      For the conversion of ISO 8859 2 to MS 852  all characters not in the following table are  mapped unchanged     Standards  Environments  and Macros 141    iconv  8859 2 5     142       Conversions Performed       ISO 8859 2    MS 852    ISO 8859 2    MS 852       24  177 237  240  241  242  243  244  245  246  247  250  251  252  253  254  255  256  257  260  261  262  263  264  265  266  267  270  271          40   377  244  364  235  317  225  227  365  371  346  270  233  215  360  246  275  370  245  362  210  357  226  230  363  367  347       316  317  320  321  322  323  324  325  326  327  330  331  332  333  334  335  336  337  340  341  342  343  344  345  346  347  350  351       327  322  321  343  325  340  342  212  231  236  374  336  351  353  232  355  335  341  352  240  203  307  204  222  206  207  23
375. ts  collating  symbols  equivalence classes  character classes  or range expressions  see rule 7  below   Portable applications must not use range expressions  even though all  implementations support them  The right bracket     loses its special meaning and  represents itself in a bracket expression if it occurs first in the list  after an initial  circumflex      if any   Otherwise  it terminates the bracket expression  unless it  appears in a collating symbol  such as        or is the ending right bracket for a  collating symbol  equivalence class  or character class  The special characters     SER HO   period  asterisk  left bracket and backslash  respectively  lose their special  meaning within a bracket expression  The character sequences                left bracket followed by a period  equals sign  or colon  are special inside a bracket  expression and are used to delimit collating symbols  equivalence class  expressions  and character class expressions  These symbols must be followed by a  valid expression and the matching terminating sequence        or     as described in  the following items     2  A matching list expression specifies a list that matches any one of the expressions  represented in the list  The first character in the list must not be the circumflex  For  example   abc  is an RE that matches any of the characters a  b or c     3  A non matching list expression begins with a circumflex      and specifies a list that  matches any character or collating
376. tural components are called elements  The  organization and structure of a document and the meaning of elements are described  in the Document Type Definition   DTD    Elements are the tags that identify the  content  Element names may be descriptive of the content for ease of use  For example    para   for paragraphs  Elements can have attributes which are used to modify or  refine the properties or characteristics of the element  Within the DTD a valid context  for each element is defined and a framework is provided for the types of elements that  constitute a compliant document     Another component of the DTD is entities  Entities are a collection of characters  that can be referenced as a unit  Entities are similar to constants in a programming  language such as C  They can be defined and referenced  An entity can represent one  character or symbol which does not appear on a standard keyboard  a word or group  of words  or an entire separate sgml marked up file  Entities allow reuse of standard  text     There is no single standard DTD   but the de facto standard for the computer industry  is the DocBook DTD   developed and maintained by the Davenport Group  Within  Sun  the SolBook DTD   which is a proper subset of DocBook DTD   is used when  writing reference manual pages  The SolBook DTD contains a number of tags that are  designed for the unique needs of the reference pages     Elements are defined with a hierarchical structure that gives a structure to the  document
377. ty pam ldap so 1    The pam 1dap module implements pam sm authenticate pam sm setcred   pam sm acct mgmt  and pam sm chauthtok  the functions that provide  functionality for the PAM authentication  account management and password  management stacks  The pam 1dap module ties the authentication  account  management and password change functionality to the functionality of the supporting  LDAP server  For authentication  pam 1dap can authenticate the user directly to any  LDAP directory server by using any supported authentication mechanism  such as  DIGEST MD5  However  the account management and password change components  of pam 1dap will only work with the bundled Sun ONE Directory Server  The Sun  ONE Directory Server user account management  that is  password and account  lockout policy  must be properly configured on the server before it can be used by  pam 1ldap to provide the account management  password aging  and password  syntax checking controls  Refer to the Sun ONE Directory Server Administrator s  Guide that is cited in the NOTES section     pam ldap must be used in conjunction with the modules that support the UNIX  authentication  password  and account management   which are   pam authtok check 5  pam authtok get 5  pam authtok store 5     pam passwd auth 5  pam unix account 5   and pam unix auth 5  pam ldap  is designed to be stacked directly below these modules  If other modules are designed  to be stacked in this manner  the modules can be stacked below the 
378. uld not contain hyphens  except that synonyms may be chosen that do  not conflict with other names  Up to 8 characters  chosen from the set a through z and  0 through 9  make up a basic terminal name  Names should generally be based on  original vendors rather than local distributors  A terminal acquired from one vendor  should not have more than one distinct basic name  Terminal sub models  operational  modes that the hardware can be in  or user preferences should be indicated by  appending a hyphen and an indicator of the mode  Thus  an AT amp T 4425 terminal in  132 column mode is att4425 w  The following suffixes should be used where  possible           Suffix Meaning Example    w Wide mode  more than 80 att4425 w  columns     am With auto  margins  usually     vt100 am  default       nam Without automatic margins vt100 nam    n Number of lines on the screen   aaa 60    na No arrow keys  leave them in c100 na  local     np Number of pages of memory     c100 4p       man pages section 5  Standards  Environments  and Macros    Last Revised 3 Jul 1990       term 5        Reverse video att4415 rv       To avoid conflicts with the naming conventions used in describing the different modes  of a terminal  for example   w   it is recommended that a terminal s root name not  contain hyphens  Further  it is good practice to make all terminal names used in the  terminfo 4  database unique  Terminal entries that are present only for inclusion in  other entries via the use  facilities
379. ule using Blowfish cryptographic algorithm     usr lib security  ISA crypt bsdbf so    The crypt_bsdmd5 module is a one way password hashing module for use with  crypt 3C  that uses the Blowfish cryptographic algorithm  The algorithm identifier  for crypt  conf 4  and policy conf 4  is 2a     See attributes 5  for descriptions of the following attributes        ATTRIBUTE TYPE ATTRIBUTE VALUE       MT Level Safe                passwd 1   crypt 3C   crypt_genhash_imp1 3C   crypt gensalt 3C    crypt_gensalt_imp1 3C   getpassphrase 3C   crypt  conf 4   passwd 4    policy conf 4   attributes 5     Standards  Environments  and Macros 29    crypt bsdmdb 5   NAME  SYNOPSIS    DESCRIPTION    ATTRIBUTES    SEE ALSO       crypt_bsdmd5   password hashing module using MD5 message hash algorithm     usr lib security  ISA crypt bsdmd5 so  The crypt_bsdmd5 module is a one way password hashing module for use with  crypt 3C  that uses the MD5 message hash algorithm  The algorithm identifier for    crypt  conf 4  and policy conf 4 is 1  The output is compatible with md5crypt  on BSD and Linux systems     See attributes 5 for descriptions of the following attributes        ATTRIBUTE TYPE ATTRIBUTE VALUE       MT Level Safe                passwd 1   crypt 3C   crypt_genhash_imp1 3C   crypt gensalt 3C    crypt gensalt impl 3C   getpassphrase 3C   crypt  conf 4   passwd 4    policy conf 4   attributes 5     30 man pages section 5  Standards  Environments  and Macros    Last Revised 10 Jun 2002    N
380. ules of the  organizational unit     thisorgunit user cmead  names the user cmead in H s organizational unit     myorgunit fs pub project plans widget ps  names the file pub project plans widget ps exported by U s organizational  unit s file system     EXAMPLE 3 Names beginning with site names    The types of objects that may be named relative to a site name are users  hosts   services  and files  Here are some examples of names that begin with site names via  site  and name objects relative to sites when resolved in the Initial Context     Site b5 mtv service printer speedy  names a printer speedy in the b5   mtv site     site admin fs usr dist  names a file directory usr dist available in the site admin     EXAMPLE 4 Names beginning with user names    The types of objects that may be named relative to a user name are services and files   Here are some examples of names that begin with user names  explicitly via user or  implicitly via thisuser   and name objects relative to users when resolved in the  Initial Context     user jsmith service calendar  names the calendar service of the user j smith     user jsmith fs bin games riddles  names the file bin games riddles ofthe user jsmith     thisuser service printer  names the printer service of U     Standards  Environments  and Macros 75    fns initial context 5   EXAMPLE 5 Names beginning with host names    The types of objects that may be named relative to a host name are services and files   Here are some examples of names
381. ure  most functions place an error code in  the global variable errno indicating why they  failed  This section lists alphabetically all error  codes a function can generate and describes the  conditions that cause each error  When more than    USAGE    EXAMPLES    ENVIRONMENT VARIABLES    EXIT STATUS    FILES    ATTRIBUTES    SEE ALSO    one condition can cause the same error  each  condition is described in a separate paragraph  under the error code     This section lists special rules  features  and  commands that require in depth explanations  The  subsections listed here are used to explain built in  functionality     Commands  Modifiers  Variables  Expressions  Input Grammar    This section provides examples of usage or of how  to use a command or function  Wherever possible a  complete example including command line entry  and machine response is shown  Whenever an  example is given  the prompt is shown as  examples  or if the user must be superuser   example   Examples are followed by explanations   variable substitution rules  or returned values  Most  examples illustrate concepts from the SYNOPSIS   DESCRIPTION  OPTIONS  and USAGE sections     This section lists any environment variables that  the command or function affects  followed by a  brief description of the effect     This section lists the values the command returns to  the calling program or shell and the conditions that  cause these values to be returned  Usually  zero is  returned for successful completi
382. user account management  including  password and account lockout policy for the bundled Sun ONE Directory Server   please browse the html file   usr iplanet ds5 manual en slapd ag password htm     282 man pages section 5  Standards  Environments  and Macros   Last Revised 21 Jan 2003       NAME  SYNOPSIS    DESCRIPTION    ERRORS    ATTRIBUTES    SEE ALSO    NOTES       pam  passwd auth 5   pam passwd auth   authentication module for password    pam passwd auth so 1    pam passwd auth provides authentication functionality to the password service as  implemented by passwa 1   It differs from the standard PAM authentication modules  in its prompting behavior     The name of the user whose password attributes are to be updated must be present in  the PAM USER item  This can be accomplished due to a previous call to   pam start 3PAM    or explicitly set by pam set  item 3PAM   Based on the current  user id and the repository that is to by updated  the module determines whether a  password is necessary for a successful update of the password repository  and if so   which password is required     The following option can be passed to the module     debug syslog 3C  debugging information at the LOG  DEBUG  level   nowarn Turn off warning messages   server policy If the account authority for the user  as specified by    PAM USER  is a server  do not apply the Unix policy  from the passwd entry in the name service switch     The following error codes are returned     PAM BUF ERR Memory
383. usr is  mounted     tc gss  Generic Security Service  GSS  Application Program Interface configuration files     tc gtk  GNOME  GNU Network Object Model Environment  configuration files     tc inet  Configuration files for Internet services     tc init d  Shell scripts for transitioning between run levels     tc iplanet  iPlanet configuration files     tc krb5  Kerberos configuration files     tc lib  Shared libraries needed during booting        tc lp  Configuration information for the printer subsystem     Standards  Environments  and Macros    Last Revised 15 Nov 2001        e     e     e     e     e     e     e     e     e     e     e     e     e     e     e     e     e     e     e    filesystem 5     tc 11c2  Logical link control  11c2  driver configuration files     tc lp  Configuration information for the printer subsystem   tc 1lu   Solaris Live Upgrade configuration files        tc lvm  Solaris Logical Volume Manager configuration files     tc mail  Mail subsystem configuration     tc nca  Solaris Network Cache and Accelerator  NCA  configuration files     tc net  Configuration information for transport independent network services     tc nfs  NFS server logging configuration file     tc openwin   OpenWindows configuration files    tc opt   Configuration information for optional packages     tc ppp  Solaris PPP configuration files     tc rcO d  Scripts for entering or leaving run level 0  See init 1M      tc rcl d  Scripts for entering or leaving run level 1  See ini
384. ut  Mac Cyrillic mac ISO 8859 5 iso5 ISO 8859 5 Cyrillic  Mac Cyrillic mac KOI8 R koi8 KOI8 R  Mac Cyrillic mac PC Cyrillic alt Alternative PC Cyrillic  Mac Cyrillic mac MS 1251 wind Windows Cyrillic                      The conversions are performed according to the following tables  All values in the  tables are given in octal     For the conversion of Mac Cyrillic to ISO 8859 5  all characters not in the following  table are mapped unchanged              Conversions Performed  Mac Cyrillic ISO 8859 5 Mac Cyrillic ISO 8859 5  24 4 276 252  200 260 277 372  201 261 300 370  202 262 301 245  203 263 302 311 40  204 264 312 240  205 265 313 242  206 266 314 362  207 267 315 254  210 270 316 374  211 271 317 365  212 272 320 327 40  213 273 330 256  214 274 331 376                      Standards  Environments  and Macros 167    iconv mac cyr 5     168       Conversions Performed       Mac Cyrillic    ISO 8859 5    Mac Cyrillic    ISO 8859 5       215  216  217  220  221  222  223  224  225  226  227  230  231  232  233  234  235  236  237  240 246  247  250 252  253  254  255  256  257    260 263          275  276  277  300  301  302  303  304  305  306  307  310  311  312  313  314  315  316  317  40   246  40   242  362  40   243  363  40       332  333  334  335  336  337  340  341  342  343  344  345  346  347  350  351  352  353  354  355  356  357  360  361  362  363  364  365       257  377  360  241  361  357  320  321  322  323  324  325  326  327  330  331  332  333  
385. utility that is large file aware will accept configuration or  support files that are large files  If a large file aware utility does not accept  configuration or support files that are large files  it will cause no data loss or  corruption upon encountering such files and will return an appropriate error     The following  usr bin utilities are large file aware     adb awk  chmod chown  cp csh  dircmp du  find ftp  join jsh  mdb mkdir  nawk page  rcp remsh  rsh sed  sum tail  touch tr   wc zcat    bdiff  cksum  csplit  egrep  getconf  ksh  mkfifo  paste  rksh  sh   tar    uncompress    cat  cmp  cut  fgrep  grep  in  more  pathchk  rm  sort  tee    uudecode    The following  usr xpg4 bin utilities are large file aware     awk cp  grep in  rm sed    ls    sh    egrep  more    sort    192 manpages section 5  Standards  Environments  and Macros    Last Revised 16 Jul 2003    chgrp  compress  dd  file  head  ls   mv   Pg  rmdir  split  test    uuencode    fgrep    tail    cachefs file  systems    nfs file systems    ufs file systems       largefile 5     tr    The following  usr sbin utilities are large file aware     install mkfile mknod mvdir Swap    See the USAGE section of the swap 1M  manual page for limitations of swap on block  devices greater than 2 Gbyte on a 32 bit operating system     The following  usr ucb utilities are large file aware     chown from in ls sed    sum touch    The  usr bin cpio and  usr bin pax utilities are large file aware  but cannot  archive a fi
386. vileges    lu   FMLI based interface for creating and administering BEs     luactivate  Designate a BE as the BE to boot from upon the next reboot of the system     lucancel  Cancel a previously scheduled operation     lucompare  Compare the contents of two BEs     lucreate  Create a BE     lucurr  Display the name of the current BE     ludelete  Delete a BE     ludesc  Add or change BE descriptions     lufslist  List the file systems on a specified BE     lumake  Re create a BE based on the active BE     lumount  luumount  Mount  unmount file systems of a specified BE        lurename  Rename a BE     210 manpages section 5  Standards  Environments  and Macros   Last Revised 14 Apr 2004    FILES    SEE ALSO    NOTES       live upgrade 5     lustatus  For all BEs on a system  report on whether a BE is active  active upon the next  reboot  in the midst of a copy operation  and whether a copy operation is scheduled  for it     luupgrade  Upgrade an OS and install application software on a BE  Such software includes  flash archives  complete OS installations  OS and application packages  and OS  patches      etc lutab  list of BEs on the system    lu 1M   Luactivate 1M   lucancel 1M   lucompare 1M   1ucreate 1M    lucurr 1M   ludelete 1M   1udesc 1M   lufslist 1M   lumake 1M    lumount 1M   lurename 1M   lustatus 1M   luupgrade 1M   1utab 4     Correct operation of Solaris Live Upgrade requires that a limited set of patch revisions  be installed for a given OS version  Before ins
387. xamples of global naming  services  The types of objects named at this  global level are typically countries  states   provinces  cities  companies  universities   institutions  and government departments  and ministries  These entities are referred to  as enterprises     Enterprise level naming service Enterprise level naming services are used to  name objects within an enterprise  Within  an enterprise  there are naming services that  provide contexts for naming common  entities such as organizational units   physical sites  human users  and computers   Enterprise level naming services are bound  below the global naming services  Global  naming services provide contexts in which  the root contexts of enterprise level naming  services can be bound     Application level naming service Application level naming services are  incorporated in applications offering  services such as file service  mail service   print service  and so on  Application level  naming services are bound below enterprise  naming services  The enterprise level  naming services provide contexts in which  contexts of application level naming  services can be bound     FNS has policies for global and enterprise naming  Naming within applications is left  to individual applications or groups of related applications and not specified by FNS     ENS policy specifies that DNS and X 500 are global naming services that are used to  name enterprises  The global namespace is named using the name         A DNS   name
388. xxx64     and types in addition to all the regular functions  xxx      and types  Both  xxx    and xxx64    functions are available to the program source  A 32 bit application  must use the xxx64    functions in order to access large files  See the 1  64 5  manual  page for a complete listing of the 64 bit transitional interfaces     The transitional compilation environment differs from the large file compilation  environment  wherein the underlying interfaces are bound to 64 bit functions   structures  and types  An application compiled in the large file compilation  environment is able to use the xxx    source interfaces to access both large and small  files  rather than having to explicitly utilize the transitional xxx64    interface calls to  access large files  See the 1  compile 5  manual page for more information regarding  the large file compilation environment     Applications may combine objects produced in the large file compilation environment  with objects produced in the transitional compilation environment  but must be  careful with respect to interoperability between those objects  Applications should not  declare global variables of types whose sizes change between compilation  environments     For applications that do not wish to conform to the POSIX or X Open specifications   the 64 bit transitional interfaces are available by default  No compile time flags need  to be set     Applications that wish to access the transitional interfaces as well as the POSIX
389. yr      EM em dash     LE LIST OF FIGURES title     Lt LIST OF TABLES title     Lx LIST OF EXHIBITS title     Le LIST OF EQUATIONS title     Rp REFERENCES title     Tm trademark character  TM           When using the extended accent mark definitions available with   AM  these strings  should come after  rather than before  the letter to be accented     FILES    usr share lib tmac m     usr share lib tmac mm   nt  nroff and troff definitions of mm        man pages section 5  Standards  Environments  and Macros    Last Revised 1 Jan 1997    ATTRIBUTES    SEE ALSO    BUGS       mm 5     See attributes 5  for descriptions of the following attributes        ATTRIBUTE TYPE    ATTRIBUTE VALUE       Availability          SUNWdoc          col 1   eqn 1   nro  f 1   refer 1   tb1 1   troff 1   attributes 5     Floating keeps and regular keeps are diverted to the same space  so they cannot be    mixed together with predictable results     Standards  Environments  and Macros 257    ms 5     258    NAME  SYNOPSIS    DESCRIPTION    REQUESTS       ms   text formatting macros  nroff  ms  options  filename       troff  ms  options  filename       This package of nrof   1  and trof   1  macro definitions provides a formatting  facility for various styles of articles  theses  and books  When producing 2 column  output on a terminal or lineprinter  or when reverse line motions are needed  filter the  output through co1 1   All external  ms macros are defined below     Note  this  ms macro packag
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
XE510 Anleitung 014 EU.indd  報時付掛時計 取扱説明書  INFOCEL  2 • Instruction Manual • Manual de instrucciones • Mode d`emploi    USB Extender User Manual  Functions  Paul Vaterlaus, Jason Ellis, and Eli Collins  HD 10/21  Case Logic PLS-212    Copyright © All rights reserved. 
   Failed to retrieve file