Sunday, August 30, 2020

Linux Information (Page 35)

 

gnutls_hash_init(3) - API function - Linux manual page......
This function will initialize an context that can be used to produce a Message Digest of data. This will effectively use the current crypto backend in use by gn

console_ioctl(4) - ioctl's for console terminal and virtual
The following Linux-specific ioctl(2) requests are supported. Each requires a third argument, assumed here to be argp. KDGETLED Get state of LEDs. argp points t

sane-kodakaio(5) SANE backend for Kodak aio printer scanners
The sane-kodakaio library implements a SANE (Scanner Access Now Easy) backend which provides access to Kodak aio printer / scanners, like the ESP and Hero serie

gnutls_x509_crq_get_basic_constraints(3) - API function.....
gnutls_x509_crq_get_basic_constraints.3 - This function will read the certificates basic constraints, and return the certificates CA status. It reads the basicC

pf2afm(1) - Make an AFM file from Postscript (PFB/PFA/PFM) f
This script invokes gs(1) to make an AFM file from PFB / PFA and (optionally) PFM files. Output goes to fontfilename.afm, which must not already exist. SEE ALSO

XpQueryScreens(3x) - Queries an X Server to determine which
This request returns a non-NULL pointer to a list of screen pointers if one or more screens support the X Print Service Extension; otherwise it returns NULL. Xp

snmp_clone_varbind(3) - netsnmp_varbind_api functions.......
The functions dealing with variable bindings fall into four groups dealing with the creation, setting of values, output and deletion of varbinds. Creation snmp_

glRect(3gl) - draw a rectangle (Library - Linux man page)...
glRect supports efficient specification of rectangles as two corner points. Each rectangle command takes four arguments, organized either as two consecutive pai

inet_pton(3) - convert IPv4 and IPv6 addresses from text to
This function converts the character string src into a network address structure in the af address family, then copies the network address structure to dst. The

isendwin(3ncurses) - curses screen initialization and manipu
initscr is normally the first curses routine to call when initializing a program. A few special routines sometimes need to be called before it; these are slk_in

gnutls_x509_crt_check_hostname(3) - API function (Man Page)
This function will check if the given certificates subject matches the given hostname. This is a basic implementation of the matching described in RFC2818 (HTTP

XkbListComponents(3) - List of components for one or more co
You may ask the server for a list of components for one or more component types. The request takes the form of a set of patterns, one pattern for each of the co

Tcl_UniCharToTitle(3) - routines for manipulating the case o
The first three routines convert the case of individual Unicode characters: If ch represents a lower-case character, Tcl_UniCharToUpper returns the correspondin

gpg-connect-agent(1) - Communicate with a running agent.....
The gpg-connect-agent is a utility to communicate with a running gpg-agent. It is useful to check out the commands gpg-agent provides using the Assuan interface

chkstat(8) - Tool to check and set file permissions.........
The program /usr/bin/chkstat is a tool to check and set file permissions. chkstat can either operate in system mode or on individually specified permission file

sysctl.conf(5) - sysctl(8) preload/configuration file.......
sysctl.conf is a simple file containing sysctl values to be read in and set by sysctl. The syntax is simply as follows: # comment ; comment token = value Note t

ypcat(1) - print values of all keys in a NIS database.......
ypcat prints the values of all keys from the NIS database specified by mapname, which may be a map name or a map nickname. OPTIONS -d domain Specify a domain ot

mq_notify(2) - register for notification when a message is a
mq_notify() allows the calling process to register or unregister for delivery of an asynchronous notification when a new message arrives on the empty message qu

CPU_SET(3) - macros for manipulating CPU sets (Man Page)....
The cpu_set_t data structure represents a set of CPUs. CPU sets are used by sched_setaffinity(2) and similar interfaces. The cpu_set_t data type is implemented

ul(1) - do underlining (Commands - Linux manual page).......
ul reads the named files (or standard input if none are given) and translates occurrences of underscores to the sequence which indicates underlining for the ter

_traceattr2(3ncurses) - curses debugging routines (ManPage)
The trace routines are used for debugging the ncurses libraries, as well as applications which use the ncurses libraries. These functions are normally available

sudoedit(8) - execute a command as another user (Man Page)
sudo allows a permitted user to execute a command as the superuser or another user, as specified by the security policy. sudo supports a plugin architecture for

XOffsetRegion(3) - region arithmetic - Linux manual page....
The XIntersectRegion function computes the intersection of two regions. The XUnionRegion function computes the union of two regions. The XUnionRectWithRegion fu

acl_copy_entry(3) - copy an ACL entry - Linux manual page...
The acl_copy_entry() function copies the contents of the ACL entry indicated by the src_d descriptor to the existing ACL entry indicated by the dest_d descripto

XSetCloseDownMode(3) - control clients - Linux manual page
The XSetCloseDownMode defines what will happen to the clients resources at connection close. A connection starts in DestroyAll mode. For information on what hap

x21 - Linux Manual Pages Index (Manual - Linux man page)..........
x21 - Section 1 of the manual describes user commands and tools, for example, file manipulation tools, shells, compilers, web browsers, file and image viewers a

prlimit(2) - get/set resource limits - Linux manual page....
The getrlimit() and setrlimit() system calls get and set resource limits respectively. Each resource has an associated soft and hard limit, as defined by the rl

x9 - Linux Manual Pages Index (Manual - Linux man page)..........
x9 - Section 1 of the manual describes user commands and tools, for example, file manipulation tools, shells, compilers, web browsers, file and image viewers an

svc_unregister(3) - library routines for remote procedure ca
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the s

XScreenSaverSelectInput(3) - X11 Screen Saver extension clie
The X Window System provides support for changing the image on a display screen after a user-settable period of inactivity to avoid burning the cathode ray tube

rendition(4) - Rendition video driver - Linux manual page...
rendition is an Xorg driver for Rendition/Micron based video cards. The driver supports following framebuffer depths: 8, 15 (Verite V1000 only), 16 and 24. Acce

Remove File
remove_file

vfs_fake_perms(8) - enable read only Roaming Profiles.......
This VFS module is part of the samba(7) suite. The vfs_fake_perms VFS module was created to allow Roaming Profile files and directories to be set (on the Samba

uname(2) - get name and information about current kernel....
uname.2 - uname() returns system information in the structure pointed to by buf. The utsname struct is defined in <sys/utsname.h>: struct utsname { char sysname

grub-install.unsupported(8) - install GRUB on your drive....
Install GRUB on your drive. -h, --help print this message and exit -v, --version print the version information and exit --root-directory=DIR install GRUB images

dl_iterate_phdr(3) - walk through list of shared objects....
The dl_iterate_phdr() function allows an application to inquire at run time to find out which shared objects it has loaded. The dl_iterate_phdr() function walks

rintl(3) - round to nearest integer - Linux manual page.....
The nearbyint(), nearbyintf(), and nearbyintl() functions round their argument to an integer value in floating-point format, using the current rounding directio

sockatmark(3) - determine whether socket is at out-of-band m
sockatmark() returns a value indicating whether or not the socket referred to by the file descriptor sockfd is at the out-of-band mark. If the socket is at the

innmail(1) - Simple mail-sending program - Linux man page...
innmail is a Perl script intended to provide the non-interactive mail-sending functionality of mail(1) while avoiding nasty security problems. It takes the body

IO::Wrap(3pm) - wrap raw filehandles in IO::Handle interface
Lets say you want to write some code which does I/O, but you dont want to force the caller to provide you with a FileHandle or IO::Handle object. You want them

vtysh(1) - a integrated shell for Quagga routing software...
vtysh is a integrated shell for Quagga routing engine. OPTIONS Options available for the vtysh command: -b, --boot Execute boot startup configuration. It makes

keyctl_update(3) - Update a key (Library - Linux man page)
keyctl_update() updates the payload of a key if the key type permits it. The caller must have write permission on a key to be able update it. payload and plen s

build-classpath(1) - build a Java CLASSPATH with the named J
Small utility to build a Java CLASSPATH with the named JARs. The CLASSPATH is returned to standard output. EXAMPLES build-classpath tyrex saxon wsdl4j will retu

perl58delta(1) - what is new for perl v5.8.0 (Man Page).....
This document describes differences between the 5.6.0 release and the 5.8.0 release. Many of the bug fixes in 5.8.0 were already seen in the 5.6.1 maintenance r

DBI::Util::CacheMemory(3pm) - a very fast but very minimal s
Like Cache::Memory (part of the Cache distribution) but doesnt support any fancy features. This module aims to be a very fast compatible strict sub-set for simp

fmt(1) - simple optimal text formatter - Linux manual page
Reformat each paragraph in the FILE(s), writing to standard output. The option -WIDTH is an abbreviated form of --width=DIGITS. Mandatory arguments to long opti

xdr(3) - library routines for external data representation
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using

sasl_getprop(3) - Get a SASL property - Linux manual page...
sasl_getprop gets the value of a SASL property. For example after successful authentication a server may wish to know the authorization name. Or a client applic

sasl_checkpass(3) - Check a plaintext password (Man Page)...
sasl_checkpass() will check a plaintext password. This is needed for protocols that had a login method before SASL (for example the LOGIN command in IMAP). The

pcre16_version(3) Perl-compatible regular expressions.......
This function (even in the 16-bit and 32-bit libraries) returns a zero-terminated, 8-bit character string that gives the version number of the PCRE library and

log2pcap(1) Extract network traces from Samba log files.....
This tool is part of the samba(7) suite. log2pcap reads in a samba log file and generates a pcap file (readable by most sniffers, such as ethereal or tcpdump) b

XQueryColor(3) - obtain color values - Linux manual page....
The XQueryColor function returns the current RGB value for the pixel in the XColor structure and sets the DoRed, DoGreen, and DoBlue flags. The XQueryColors fun

ugetrlimit(2) - get/set resource limits - Linux manual page
The getrlimit() and setrlimit() system calls get and set resource limits respectively. Each resource has an associated soft and hard limit, as defined by the rl

Tcl_ObjGetVar2(3) - manipulate Tcl variables (Man Page).....
These procedures are used to create, modify, read, and delete Tcl variables from C code. Tcl_SetVar2Ex, Tcl_SetVar, Tcl_SetVar2, and Tcl_ObjSetVar2 will create

yn(3) - Bessel functions of the second kind - Linux man page
The y0() and y1() functions return Bessel functions of x of the second kind of orders 0 and 1, respectively. The yn() function returns the Bessel function of x

XkbAllocGeomColors(3) - Allocate geometry colors (Man Page)
XkbAllocGeomColors.3 - Xkb provides a number of functions to allocate and free subcomponents of a keyboard geometry. Use these functions to create or modify key

mvvline_set(3ncurses) - create curses borders or lines using
The border_set and wborder_set functions draw a border around the edges of the current or specified window. These functions do not change the cursor position, a

perllocale(1) - Perl locale handling (internationalization a
In the beginning there was ASCII, the American Standard Code for Information Interchange, which works quite well for Americans with their English alphabet and d

gluOrtho2D(3gl) - define a 2D orthographic projection matrix
gluOrtho2D sets up a two-dimensional orthographic viewing region. This is equivalent to calling glOrtho with $ near ~=~ -1 $ and $ far ~=~ 1 $. SEE ALSO glOrtho

set_tabsize(3ncurses) - curses thread support (Man Page)....
This implementation can be configured to provide rudimentary support for multi-threaded applications. This makes a different set of libraries, e.g., libncursest

mailq(1) - Postfix to Sendmail compatibility interface......
The Postfix sendmail(1) command implements the Postfix to Sendmail compatibility interface. For the sake of compatibility with existing applications, some Sendm

isinff(3) - BSD floating-point classification functions.....
The finite(), finitef(), and finitel() functions return a nonzero value if x is neither infinite nor a not-a-number (NaN) value, and 0 otherwise. The isnan(), i

getc_unlocked(3) - nonlocking stdio functions (Man Page)....
Each of these functions has the same behavior as its counterpart without the _unlocked suffix, except that they do not use locking (they do not set locks themse

_nc_tracebits(3ncurses) - curses debugging routines.........
The trace routines are used for debugging the ncurses libraries, as well as applications which use the ncurses libraries. These functions are normally available

Tcl_UniCharIsDigit(3) - routines for classification of Tcl_U
All of the routines described examine Tcl_UniChars and return a boolean value. A non-zero return value means that the character does belong to the character cla

autoscan(1) - Generate a preliminary configure.in (ManPage)
Examine source files in the directory tree rooted at SRCDIR, or the current directory if none is given. Search the source files for common portability problems,

Tcl_GetVar(3) - manipulate Tcl variables - Linux man page...
These procedures are used to create, modify, read, and delete Tcl variables from C code. Tcl_SetVar2Ex, Tcl_SetVar, Tcl_SetVar2, and Tcl_ObjSetVar2 will create

fanotify(7) monitoring filesystem events - Linux man page...
The fanotify API provides notification and interception of filesystem events. Use cases include virus scanning and hierarchical storage management. Currently, o

exp2(3) - base-2 exponential function - Linux manual page...
The exp2() function returns the value of 2 raised to the power of x. RETURN VALUE On success, these functions return the base-2 exponential value of x. For vari

iswupper(3) - test for uppercase wide character (Man Page)
The iswupper() function is the wide-character equivalent of the isupper(3) function. It tests whether wc is a wide character belonging to the wide-character cla

ionice(1) - set or get process I/O scheduling class and prio
This program sets or gets the I/O scheduling class and priority for a program. If no arguments or just -p is given, ionice will query the current I/O scheduling

fmaf(3) - floating-point multiply and add - Linux man page
The fma() function computes x * y + z. The result is rounded as one ternary operation according to the current rounding mode (see fenv(3)). RETURN VALUE These f

Mail::SpamAssassin::Plugin::DCC(3pm) - perform DCC check of
The DCC or Distributed Checksum Clearinghouse is a system of servers collecting and counting checksums of millions of mail messages. TheSpamAssassin.pm counts c

setup(2) - setup devices and file systems, mount root file s
setup() is called once from within linux/init/main.c. It calls initialization functions for devices and filesystems configured into the kernel and then mounts t

Tcl_FSChdir(3) - procedures to interact with any filesystem
There are several reasons for calling the Tcl_FS API functions (e.g. Tcl_FSAccess and Tcl_FSStat) rather than calling system level functions like access and sta

tknewsbiff(1) - pop up a window when news appears (ManPage)
tknewsbiff pops up a window when there is unread news in your favorite newsgroups and removes the window after youve read the news. tknewsbiff can optionally pl

DBI::Gofer::Serializer::Base(3pm) - base class for Gofer ser
DBI::Gofer::Serializer::* classes implement a very minimal subset of the Data::Serializer API . Gofer serializers are expected to be very fast and are not requi

itclvars(n) - variables used by [incr Tcl] - Linux man page
The following global variables are created and managed automatically by the [incr Tcl] library. Except where noted below, these variables should normally be tre

perldbmfilter(1) - Perl DBM Filters - Linux manual page.....
The four filter_* methods shown above are available in all the DBM modules that ship with Perl, namely DB_File, GDBM_File, NDBM_File, ODBM_File and SDBM_File. E

hsearch(3) - hash table management - Linux manual page......
The three functions hcreate(), hsearch(), and hdestroy() allow the caller to create and manage a hash search table containing entries consisting of a key (a str

dup_field(3form) - create and destroy form fields (ManPage)
The function new_field allocates a new field and initializes it from the parameters given: height, width, row of upper-left corner, column of upper-left corner,

getyx(3ncurses) - get curses cursor and window coordinates
The getyx macro places the current cursor position of the given window in the two integer variables y and x. If win is a subwindow, the getparyx macro places th

Remove File
remove_file

stdin(3) - standard I/O streams (Library - Linux man page)
Under normal circumstances every UNIX program has three streams opened for it when it starts up, one for input, one for output, and one for printing diagnostic

futimes(3) - change file timestamps - Linux manual page.....
futimes() changes the access and modification times of a file in the same way as utimes(2), with the difference that the file whose timestamps are to be changed

radeonhd(4) - AMD GPG (ATI) R5xx/R6xx/R7xx video driver.....
radeonhd is an Xorg driver for AMD GPG (ATI) R5xx/R6xx/R7xx based video cards. At the time of this writing, radeonhd has the following limitations: * Support fo

erfcl(3) - complementary error function - Linux manual page
The erfc() function returns the complementary error function of x, that is, 1.0 - erf(x). RETURN VALUE On success, these functions return the complementary erro

snmpwalk(1) - retrieve a subtree of management values using
snmpwalk is an SNMP application that uses SNMP GETNEXT requests to query a network entity for a tree of information. An object identifier (OID) may be given on

pselect(2) - synchronous I/O multiplexing - Linux man page
select() and pselect() allow a program to monitor multiple file descriptors, waiting until one or more of the file descriptors become ready for some class of I/

lsusb(8) - list USB devices (Admin - Linux man page)........
lsusb is a utility for displaying information about USB buses in the system and the devices connected to them. OPTIONS -v, --verbose Tells lsusb to be verbose a

systemd.exec(5) - systemd execution environment configuratio
Unit configuration files for services, sockets, mount points, and swap devices share a subset of configuration options which define the execution environment of

monodevelop
monodevelop

config(5ssl) - OpenSSL CONF library configuration files.....
The OpenSSL CONF library can be used to read configuration files. It is used for the OpenSSL master configuration file openssl.cnf and in a few other places lik

Tk_Colormap(3) - retrieve information from Tk's local data s
Tk_WindowId and the other names listed above are all macros that return fields from Tks local data structure for tkwin. None of these macros requires any intera

zshcompwid(1) - zsh completion widgets - Linux manual page
The shells programmable completion mechanism can be manipulated in two ways; here the low-level features supporting the newer, function-based mechanism are defi

iswalnum(3) - test for alphanumeric wide character (ManPage)
The iswalnum() function is the wide-character equivalent of the isalnum(3) function. It tests whether wc is a wide character belonging to the wide-character cla

grub2-mkpasswd-pbkdf2(1) generate hashed password for GRUB
Generate PBKDF2 password hash. -c, --iteration-count=NUM Number of PBKDF2 iterations -l, --buflen=NUM Length of generated hash -s, --salt=NUM Length of salt -?,

getprotobynumber_r(3) - get protocol entry (reentrant)......
The getprotoent_r(), getprotobyname_r(), and getprotobynumber_r() functions are the reentrant equivalents of, respectively, getprotoent(3), getprotobyname(3), a

XCompositeRedirectSubwindows(3) - X Composite Extension libr
The composite extension provides several related mechanisms: Per-hierarchy storage The rendering of an entire hierarchy of windows is redirected to off-screen s

Tcl_SetEnsembleFlags(3) - manipulate ensemble commands......
An ensemble is a command, bound to some namespace, which consists of a collection of subcommands implemented by other Tcl commands. The first argument to the en

No comments:

Post a Comment