Sponsored Content
Top Forums Shell Programming and Scripting Bourne Shell Scripting CRISIS Post 22264 by Perderabo on Thursday 30th of May 2002 11:10:47 AM
Old 05-30-2002
Looking at your last post and focusing on the section between the first ** and the last **, I continue to see the "else" clause of an "if" statement that is missing a terminating "fi". This has the effect of placing the line:
4) #Quit **
inside the "else" clause of the "if" statement where it is unexpected.

It's great that you found this problem. But now you need to actually insert the "fi" in your code.
 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Bourne Shell Scripting

Hi, I'm having trouble with some UNIX Bourne shell scripting that I am doing for an assignment. I am trying to sort a comma delimited file into a sort of format that will print out nicely in a telnet terminal window. I'm having a bit of trouble because all I seem to be getting is garble. ... (3 Replies)
Discussion started by: Slamo
3 Replies

2. Shell Programming and Scripting

Bourne Shell scripting help

4. Write a program that will allow a user to input as many numbers as the user wants (use 999 as the choice that ends the user input). The program will then respond: Highest Number: Answer Lowest Number: Answer Sum of the numbers: Answer Average of the numbers: Answer Can any1 help... (1 Reply)
Discussion started by: PoloRL185
1 Replies

3. Shell Programming and Scripting

bourne shell programming help

hey, i have 2 files... orders and products how do i do calculations on the order using the products ? say if the products file is: a123:shirt:10.00 zz123:nice shirt:19.95 and the order file is: 05/08/30 a123 10 zz123 3 Jun-3-1994 a123 2 2005.06.23 a123 2 (1 Reply)
Discussion started by: ganjakh0r
1 Replies

4. UNIX for Dummies Questions & Answers

bourne shell programming help!

hey, i have 2 files... orders and products how do i do calculations on the order using the products ? say if the products file is: a123:shirt:10.00 zz123:nice shirt:19.95 and the order file is: 05/08/30 a123 10 zz123 3 Jun-3-1994 a123 2 2005.06.23 a123 2 (1 Reply)
Discussion started by: ganjakh0r
1 Replies

5. UNIX for Dummies Questions & Answers

Bourne-again shell

Hi guys !! well i'm still new in learning UNIX , and actually i'm still studying it by myself .. anyway, some people told me the Bourne-again shell is a good version of UNIX to work on , and i tried to download yesterday but i didn't know how to start it ...... the ReadMe file associated with... (3 Replies)
Discussion started by: mrsamer
3 Replies

6. Shell Programming and Scripting

I need to understand the differences between the bash shell and the Bourne shell

I do not claim to be an expert, but I have done things with scripts that whole teams of folks have said can not be done. Of course they should have said we do not have the intestinal fortitude to git-r-done. I have been using UNIX actually HPUX since 1992. Unfortunately my old computer died and... (7 Replies)
Discussion started by: awk_sed_hello
7 Replies

7. Shell Programming and Scripting

How to activate Korn Shell functionnalities in Bourne Shell

Hi All I have writing a Korn Shell script to execute it on many of our servers. But some servers don't have Korn Shell installed, they use Borne Shell. Some operations like calculation don't work : cat ${file1} | tail -$((${num1}-${num2})) > ${file2} Is it possible to activate Korn Shell... (3 Replies)
Discussion started by: madmat
3 Replies

8. Shell Programming and Scripting

Bourne/C shell help

Exercise Five Write a Bourne shell script which: • Professionalism: plan for this from the start. • Has one command line argument. • If the command line argument is a directory then the script should output the number of files in the directory. • If the command line argument is an ordinary... (2 Replies)
Discussion started by: moesom
2 Replies

9. Shell Programming and Scripting

Bourne shell & Korn shell

Could some one tell me the difference btw Bourne shell and the Kshell? Which is more flexible and reliable in terms of portability and efficiency. When i type the following command .. $ echo $SHELL yields me /bin/sh Does this tells me that I am in Bourne shell. If yes, how can i get... (6 Replies)
Discussion started by: bobby1015
6 Replies

10. Cybersecurity

'Shell Shock' vulnerability in Bourne shell

A severe vulnerability was discovered in Bourne shell. Just google for: bash vulnerability ... for more details. (5 Replies)
Discussion started by: Cochise
5 Replies
rndc.conf(4)						     Kernel Interfaces Manual						      rndc.conf(4)

NAME
rndc.conf - rndc configuration file DESCRIPTION
is the configuration file for the BIND 9 name server control utility. This file has a structure and syntax similar to the configuration file, The standard (default) configuration file is located at The standard (default) configuration file is located at Syntax The syntax of the file is much simpler than that of the configuration file. It includes three statements and optional comments. Statement blocks are enclosed in braces and terminated with a semicolon. Clauses in the statements are also semicolon-terminated. A servername or keyname must be quoted using double quotes if it matches a keyword, such as having a key named . The options Statement The statement specifies the default server and key definition for the configuration. The clause specifies the default server on which runs, if the server is not specified with the option in the command. defserver is the name or IP address of a name server that is specified in a statement. The clause specifies the default key that will authenticate the server's commands and responses if a key is not specified with the option in the command. defkey is the name of a key that is specified in a statement. The server Statement The statement specifies the servername of a name server, as a host name or an IP address. The clause specifies a keyname that matches a keyname in a statement. Multiple statements are permitted. The key Statement The statement specifies the name, keyname, and definition of a key. The clause identifies the encryption algorithm, algoname. Currently only is supported. The clause contains the random key, secretvalue, that will be used for authentication. It is base-64-encoded, using the algorithm speci- fied in the clause. secretvalue is enclosed in double quotes. The BIND 9 program can be used to generate the secretvalue. Multiple statements are permitted. Comments The following comment styles are supported: C: C++: UNIX: Name Server Configuration The name server must be configured to accept connections and to recognize the key specified in the file, using the statement in WARNINGS
Currently, there is no way to specify the port on which must run. EXAMPLES
Example 1 Here is a sample file: In this example, will, by default, use the server at (127.0.0.1) and the key named Commands directed to the server will use the key. The statement indicates that uses the HMAC-MD5 algorithm and its clause contains the base-64 encoding of the HMAC-MD5 secret enclosed in double quotes. Example 2 To generate a random secretvalue with the command (see rndc-confgen(1)): A complete file, including the randomly generated key, is written to standard output. Commented-out and statements for are also written. Example 3 To generate the secretvalue with the command (see dnssec-keygen(1)): The base-64 secretvalue will appear in two files, and After you copy the secretvalue into statements in the and files, you can delete the and files. AUTHOR
was developed by the Internet Systems Consortium (ISC). SEE ALSO
dnssec-keygen(1), rndc(1), rndc-confgen(1), named(1M). available online at available from the Internet Systems Consortium at BIND 9.3 rndc.conf(4)
All times are GMT -4. The time now is 08:39 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy