AT&T UNIX™PC Unix System V Users Manual - tenox
AT&T UNIX™PC Unix System V Users Manual - tenox AT&T UNIX™PC Unix System V Users Manual - tenox
VAL (l) bit 5 = SID does not exist; bit 6 = %Y%, -y mismatch; bit 7 = %M%, -m mismatch; VAL(l) Note that val can process two or more files on a given command line and in turn can process multiple command lines (when reading the standard input). In these cases an aggregate code is � returned-a logical OR of the codes generated for each command line and file processed. SEE ALSO admin( l), delta( l), get( l), prs(l). DIAGNOSTICS Use help(l) for explanations. BUGS Val can process up to 50 files on a single command line. Any number above 50 will produce a co re dump. - 2-
VC (l) VC (l) NAME vc - version control SYNOPSIS vc [-a] [-t] [-cchar] [-s] [keyword=value ... keyword=value] DESCRIPTION The vc command copies lines from the standard input to the standard output under control of its arguments and control statements encountered in the standard input. In the process of performing the copy operation, user declared keywords may be replaced by their string value when they appear in plain text and/or control statements. The copying of lines from the standard input to the standard output is conditional, based on tests (in control statements) of keyword values specified in control statements or as vc command arguments. A control statement is a single line beginning with a control character, except as modified by the -t keyletter (see below). The default control character is colon (:), except as modified by the -c keyletter (see below). Input lines beginning with a backslash (\) followed by a control character are not control lines and are copied to the standard output with the backslash removed. Lines beginning with a backslash followed by a non-control character are copied in their entirety. A keyword is composed of 9 or less alphanumerics; the first must be alphabetic. A value is any ASCII string that can be created with ed(l); a numeric value is an unsigned string of digits. Keyword values may not contain blanks or tabs. Replacement of keywords by values is done whenever a keyword surrounded by control characters is encountered on a version control statement. The -a keyletter (see below) forces replacement of keywords in all lines of text. An uninterpreted control character may be included in a value by preceding it with \. If a literal \ is desired, then it too must be preceded by \. Keyletter Arguments -a Forces replacement of keywords surrounded by control characters with their assigned value in all text lines and not just in vc statements. -t All characters from the beginning of a line up to and including the first tab character are ignored for the purpose of detecting a control statement. If one is found, all characters up to and including the tab are discarded. -cchar Specifies a control character to be used in place of :. -s Silences warning messages (not error) that are normally printed on the diagnostic output. Version Control Statements :del keyword[, ••• , keyword] Used to declare keywords. All keywords must be declared. - 1 -
- Page 563 and 564: TBL(l) TBL(l) BUGS See BUGS under n
- Page 565: TC ( l ) TC ( l ) NAME tc - phototy
- Page 571 and 572: TEE(l) TEE(l) NAME tee - pipe fitti
- Page 573 and 574: TEST ( 1 ) TEST (I) NAME test - con
- Page 575 and 576: TIME ( 1) TIME ( 1) NAME time - tim
- Page 577: TOUCH (!) TOUCH (!) NAME touch - up
- Page 581 and 582: TRUE ( ! ) NAME true, false - provi
- Page 583 and 584: TSET ( 1) {AT&T UNIX PC only ) TSET
- Page 585: TSORT ( l ) TSORT ( 1) NAME tsort -
- Page 588 and 589: � I I I I I I I II I I I I I I I
- Page 590 and 591: UAHELP (l) \US\ \BL\ \BS\ \EOT\ (AT
- Page 592 and 593: !�
- Page 595 and 596: UMODEM(l) UMODEM (l) NAME umodem -
- Page 597 and 598: UNAME(l) UNAME(l) NAME uname - prin
- Page 599: UNGET ( l ) UNGET ( l ) NAME unget
- Page 602 and 603: � \.,_ .:1 :� \__. ·
- Page 605 and 606: UUCP {IC) UUCP {IC) NAME uucp, uulo
- Page 607 and 608: UUSTAT (IC) UUSTAT ( IC ) NAME uust
- Page 609 and 610: UUTO (lC} UUTO (lC} NAME uuto, uupi
- Page 611 and 612: UUX ( lC ) UUX ( lC ) NAME uux - UN
- Page 613: VAL(l) VAL(I) NAME val - validate s
- Page 617: VC (l) VC ( l ) ::text Used for key
- Page 620 and 621: VI ( 1) vi file vi vi + n file vi +
- Page 622 and 623: VI (l) rn OAD Av MODIFYING TEXT Cha
- Page 624 and 625: VI ( 1 ) VI( 1) file to newtext :gf
- Page 626 and 627: VI (l) VI (l) :set x? Show value of
- Page 628 and 629: VI (l) VI ( 1) mapped to I, then if
- Page 630 and 631: VI (l) VI (l) won't be broken. Inse
- Page 632 and 633: � I . .... .,_ J _ . . ·
- Page 634 and 635: .. \ '-�� -·
- Page 637 and 638: WIIO (I) WHO(l) NAME who - who is o
- Page 639: WRITE ( l ) WRITE ( l ) NAME write
- Page 642 and 643: XARGS(l) XARGS (l) -nnumber Execute
- Page 645 and 646: YACC { I ) YACC { l ) NAME yacc - y
- Page 647 and 648: INTRO ( 2) INTR0 ( 2 ) NAME intro -
- Page 649 and 650: INTRO ( 2) INTR0 (2) 21 EISDffi Is
- Page 651 and 652: INTRO (2) INTRO ( 2) ProcO is the s
- Page 653 and 654: INTR0 (2) INTR0 (2) permission requ
- Page 655 and 656: INTR0 (2) time_t shm_dtime; time_t
- Page 657: ACCESS (2} ACCESS (2} NAME access -
- Page 661 and 662: ALARM (2) ALARM (2) NAME alarm - se
- Page 663: BRK(2) BRK ( 2 ) NAME brk, sbrk - c
VAL (l)<br />
bit 5 = SID does not exist;<br />
bit 6 = %Y%, -y mismatch;<br />
bit 7 = %M%, -m mismatch;<br />
VAL(l)<br />
Note that val can process two or more files on a given command<br />
line and in turn can process multiple command lines (when reading<br />
the standard input). In these cases an aggregate code is �<br />
returned-a logical OR of the codes generated for each command<br />
line and file processed.<br />
SEE ALSO<br />
admin( l), delta( l), get( l), prs(l).<br />
DIAGNOSTICS<br />
Use help(l) for explanations.<br />
BUGS<br />
Val can process up to 50 files on a single command line. Any<br />
number above 50 will produce a co re dump.<br />
- 2-