Sponsored Content
Top Forums UNIX for Dummies Questions & Answers Project with somewhat simple bourne shell cript.. Post 302185018 by era on Monday 14th of April 2008 04:02:53 AM
Old 04-14-2008
I'm guessing the syntax error is due to quoting issues also. Did you try adding double quotes around $2 everywhere?
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Bourne shell script need help please ?

i have this assignment.. and i mad this script but there is something wrong with it.. if anyone can tell me.. watz going on... i would appreciate it.. tHnX in advance.. count=1 val=$2 op=$1 ans=0 if then if then while do ... (7 Replies)
Discussion started by: dezithug
7 Replies

2. Shell Programming and Scripting

simple bourne script

Hello There, I am trying to write this SIMPLE script in Bourne Shell but I keep on getting a blank response. Can you see what I am doing wrong? I am simply trying to take the day of the week from our system and when the teachers sign on I want them to see the message of the day, when they exe... (2 Replies)
Discussion started by: catbad
2 Replies

3. Shell Programming and Scripting

simple Bourne problem

Hi, I'm a newer for this languages, and I have a log file, which is something like this: 35.75.253.207 - - "GET /products/orgonizer/title.png HTTP/1.1" 200 1555 "-" "Mozilla 1.4" Now, I want to write a shell code to accoplish like ./XXX.sh -N n n is a number by user input, the code should... (5 Replies)
Discussion started by: pnxi
5 Replies

4. UNIX for Dummies Questions & Answers

Bourne-again shell

Hi guys !! well i'm still new in learning UNIX , and actually i'm still studying it by myself .. anyway, some people told me the Bourne-again shell is a good version of UNIX to work on , and i tried to download yesterday but i didn't know how to start it ...... the ReadMe file associated with... (3 Replies)
Discussion started by: mrsamer
3 Replies

5. Shell Programming and Scripting

I need to understand the differences between the bash shell and the Bourne shell

I do not claim to be an expert, but I have done things with scripts that whole teams of folks have said can not be done. Of course they should have said we do not have the intestinal fortitude to git-r-done. I have been using UNIX actually HPUX since 1992. Unfortunately my old computer died and... (7 Replies)
Discussion started by: awk_sed_hello
7 Replies

6. Shell Programming and Scripting

How to activate Korn Shell functionnalities in Bourne Shell

Hi All I have writing a Korn Shell script to execute it on many of our servers. But some servers don't have Korn Shell installed, they use Borne Shell. Some operations like calculation don't work : cat ${file1} | tail -$((${num1}-${num2})) > ${file2} Is it possible to activate Korn Shell... (3 Replies)
Discussion started by: madmat
3 Replies

7. Shell Programming and Scripting

Xapture Plsql Error from Unix Shell cript

Hi Friends, Need your help . I have a shell script which executes the plsql procedure proc_p1. I want to capture the error message when the procuder throws some error message. I codeed in the following way . But it shows Job Success. Kindly anyone give some better idea to over come this ... (2 Replies)
Discussion started by: imipsita.rath
2 Replies

8. Shell Programming and Scripting

Bourne/C shell help

Exercise Five Write a Bourne shell script which: • Professionalism: plan for this from the start. • Has one command line argument. • If the command line argument is a directory then the script should output the number of files in the directory. • If the command line argument is an ordinary... (2 Replies)
Discussion started by: moesom
2 Replies

9. Shell Programming and Scripting

Bourne shell & Korn shell

Could some one tell me the difference btw Bourne shell and the Kshell? Which is more flexible and reliable in terms of portability and efficiency. When i type the following command .. $ echo $SHELL yields me /bin/sh Does this tells me that I am in Bourne shell. If yes, how can i get... (6 Replies)
Discussion started by: bobby1015
6 Replies

10. Cybersecurity

'Shell Shock' vulnerability in Bourne shell

A severe vulnerability was discovered in Bourne shell. Just google for: bash vulnerability ... for more details. (5 Replies)
Discussion started by: Cochise
5 Replies
rndc.conf(4)						     Kernel Interfaces Manual						      rndc.conf(4)

NAME
rndc.conf - rndc configuration file DESCRIPTION
is the configuration file for the BIND 9 name server control utility. This file has a structure and syntax similar to the configuration file, The standard (default) configuration file is located at The standard (default) configuration file is located at Syntax The syntax of the file is much simpler than that of the configuration file. It includes three statements and optional comments. Statement blocks are enclosed in braces and terminated with a semicolon. Clauses in the statements are also semicolon-terminated. A servername or keyname must be quoted using double quotes if it matches a keyword, such as having a key named . The options Statement The statement specifies the default server and key definition for the configuration. The clause specifies the default server on which runs, if the server is not specified with the option in the command. defserver is the name or IP address of a name server that is specified in a statement. The clause specifies the default key that will authenticate the server's commands and responses if a key is not specified with the option in the command. defkey is the name of a key that is specified in a statement. The server Statement The statement specifies the servername of a name server, as a host name or an IP address. The clause specifies a keyname that matches a keyname in a statement. Multiple statements are permitted. The key Statement The statement specifies the name, keyname, and definition of a key. The clause identifies the encryption algorithm, algoname. Currently only is supported. The clause contains the random key, secretvalue, that will be used for authentication. It is base-64-encoded, using the algorithm speci- fied in the clause. secretvalue is enclosed in double quotes. The BIND 9 program can be used to generate the secretvalue. Multiple statements are permitted. Comments The following comment styles are supported: C: C++: UNIX: Name Server Configuration The name server must be configured to accept connections and to recognize the key specified in the file, using the statement in WARNINGS
Currently, there is no way to specify the port on which must run. EXAMPLES
Example 1 Here is a sample file: In this example, will, by default, use the server at (127.0.0.1) and the key named Commands directed to the server will use the key. The statement indicates that uses the HMAC-MD5 algorithm and its clause contains the base-64 encoding of the HMAC-MD5 secret enclosed in double quotes. Example 2 To generate a random secretvalue with the command (see rndc-confgen(1)): A complete file, including the randomly generated key, is written to standard output. Commented-out and statements for are also written. Example 3 To generate the secretvalue with the command (see dnssec-keygen(1)): The base-64 secretvalue will appear in two files, and After you copy the secretvalue into statements in the and files, you can delete the and files. AUTHOR
was developed by the Internet Systems Consortium (ISC). SEE ALSO
dnssec-keygen(1), rndc(1), rndc-confgen(1), named(1M). available online at available from the Internet Systems Consortium at BIND 9.3 rndc.conf(4)
All times are GMT -4. The time now is 08:06 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy