05-30-2002
Looking at your last post and focusing on the section between the first ** and the last **, I continue to see the "else" clause of an "if" statement that is missing a terminating "fi". This has the effect of placing the line:
4) #Quit **
inside the "else" clause of the "if" statement where it is unexpected.
It's great that you found this problem. But now you need to actually insert the "fi" in your code.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi, I'm having trouble with some UNIX Bourne shell scripting that I am doing for an assignment.
I am trying to sort a comma delimited file into a sort of format that will print out nicely in a telnet terminal window. I'm having a bit of trouble because all I seem to be getting is garble.
... (3 Replies)
Discussion started by: Slamo
3 Replies
2. Shell Programming and Scripting
4. Write a program that will allow a user to input as many numbers as the user wants (use 999 as the choice that ends the user input). The program will then respond:
Highest Number: Answer
Lowest Number: Answer
Sum of the numbers: Answer
Average of the numbers: Answer
Can any1 help... (1 Reply)
Discussion started by: PoloRL185
1 Replies
3. Shell Programming and Scripting
hey,
i have 2 files... orders and products
how do i do calculations on the order using the products ?
say if the products file is:
a123:shirt:10.00
zz123:nice shirt:19.95
and the order file is:
05/08/30 a123 10
zz123 3
Jun-3-1994 a123 2
2005.06.23 a123 2 (1 Reply)
Discussion started by: ganjakh0r
1 Replies
4. UNIX for Dummies Questions & Answers
hey,
i have 2 files... orders and products
how do i do calculations on the order using the products ?
say if the products file is:
a123:shirt:10.00
zz123:nice shirt:19.95
and the order file is:
05/08/30 a123 10
zz123 3
Jun-3-1994 a123 2
2005.06.23 a123 2 (1 Reply)
Discussion started by: ganjakh0r
1 Replies
5. UNIX for Dummies Questions & Answers
Hi guys !!
well i'm still new in learning UNIX , and actually i'm still studying it by myself ..
anyway, some people told me the Bourne-again shell is a good version of UNIX to work on , and i tried to download yesterday but i didn't know how to start it ...... the ReadMe file associated with... (3 Replies)
Discussion started by: mrsamer
3 Replies
6. Shell Programming and Scripting
I do not claim to be an expert, but I have done things with scripts that whole teams of folks have said can not be done. Of course they should have said we do not have the intestinal fortitude to git-r-done.
I have been using UNIX actually HPUX since 1992. Unfortunately my old computer died and... (7 Replies)
Discussion started by: awk_sed_hello
7 Replies
7. Shell Programming and Scripting
Hi All
I have writing a Korn Shell script to execute it on many of our servers. But some servers don't have Korn Shell installed, they use Borne Shell.
Some operations like calculation don't work :
cat ${file1} | tail -$((${num1}-${num2})) > ${file2}
Is it possible to activate Korn Shell... (3 Replies)
Discussion started by: madmat
3 Replies
8. Shell Programming and Scripting
Exercise Five
Write a Bourne shell script which:
• Professionalism: plan for this from the start.
• Has one command line argument.
• If the command line argument is a directory then the script should output the number of
files in the directory.
• If the command line argument is an ordinary... (2 Replies)
Discussion started by: moesom
2 Replies
9. Shell Programming and Scripting
Could some one tell me the difference btw Bourne shell and the Kshell? Which is more flexible and reliable in terms of portability and efficiency. When i type the following command ..
$ echo $SHELL
yields me
/bin/sh
Does this tells me that I am in Bourne shell. If yes, how can i get... (6 Replies)
Discussion started by: bobby1015
6 Replies
10. Cybersecurity
A severe vulnerability was discovered in Bourne shell.
Just google for: bash vulnerability
... for more details. (5 Replies)
Discussion started by: Cochise
5 Replies
LEARN ABOUT HPUX
rndc.conf
rndc.conf(4) Kernel Interfaces Manual rndc.conf(4)
NAME
rndc.conf - rndc configuration file
DESCRIPTION
is the configuration file for the BIND 9 name server control utility. This file has a structure and syntax similar to the configuration
file,
The standard (default) configuration file is located at The standard (default) configuration file is located at
Syntax
The syntax of the file is much simpler than that of the configuration file. It includes three statements and optional comments. Statement
blocks are enclosed in braces and terminated with a semicolon. Clauses in the statements are also semicolon-terminated.
A servername or keyname must be quoted using double quotes if it matches a keyword, such as having a key named .
The options Statement
The statement specifies the default server and key definition for the configuration.
The clause specifies the default server on which runs, if the server is not specified with the option in the command. defserver is the
name or IP address of a name server that is specified in a statement.
The clause specifies the default key that will authenticate the server's commands and responses if a key is not specified with the option
in the command. defkey is the name of a key that is specified in a statement.
The server Statement
The statement specifies the servername of a name server, as a host name or an IP address.
The clause specifies a keyname that matches a keyname in a statement.
Multiple statements are permitted.
The key Statement
The statement specifies the name, keyname, and definition of a key.
The clause identifies the encryption algorithm, algoname. Currently only is supported.
The clause contains the random key, secretvalue, that will be used for authentication. It is base-64-encoded, using the algorithm speci-
fied in the clause. secretvalue is enclosed in double quotes.
The BIND 9 program can be used to generate the secretvalue.
Multiple statements are permitted.
Comments
The following comment styles are supported:
C:
C++:
UNIX:
Name Server Configuration
The name server must be configured to accept connections and to recognize the key specified in the file, using the statement in
WARNINGS
Currently, there is no way to specify the port on which must run.
EXAMPLES
Example 1
Here is a sample file:
In this example, will, by default, use the server at (127.0.0.1) and the key named Commands directed to the server will use the key. The
statement indicates that uses the HMAC-MD5 algorithm and its clause contains the base-64 encoding of the HMAC-MD5 secret enclosed in double
quotes.
Example 2
To generate a random secretvalue with the command (see rndc-confgen(1)):
A complete file, including the randomly generated key, is written to standard output. Commented-out and statements for are also written.
Example 3
To generate the secretvalue with the command (see dnssec-keygen(1)):
The base-64 secretvalue will appear in two files, and After you copy the secretvalue into statements in the and files, you can delete the
and files.
AUTHOR
was developed by the Internet Systems Consortium (ISC).
SEE ALSO
dnssec-keygen(1), rndc(1), rndc-confgen(1), named(1M).
available online at
available from the Internet Systems Consortium at
BIND 9.3 rndc.conf(4)