Sponsored Content
Top Forums Shell Programming and Scripting Retrieving a list of functions and reduce results Post 303046119 by Neo on Friday 24th of April 2020 10:28:30 AM
Old 04-24-2020
Please.

No bogus code highlighting marking shell code as PHP.

Please do not abuse the BBCODE.

Thanks.

Retrieving a list of functions and reduce results-99351474-girl-holds-paper-sheet-text-no-means-no-against-harassment-sexual-abusingjpg
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

List grep results

Hi I need to search for matching strings in a database and I want to print out all files that matches in "detail", which means that I want the output to contain datum of last saving. I only get the grep function tp print the actual file names which is not enough since the database is to large... (14 Replies)
Discussion started by: slire
14 Replies

2. Solaris

OS functions for process list

I'm currently fixing a bug in a C program in which I need to check to make sure another specific application is up and running before continuing. Are there any SunOS API functions that can provide me with a list of currently running processes on the system? I'd like to avoid using 'ps' with a... (1 Reply)
Discussion started by: jalburger
1 Replies

3. Shell Programming and Scripting

filtering list results

I created a large file list using: find . -type f -mtime +540 > test2.txt ..which searched recursively down the directory tree searching for any file older than 540 days. I would like to filter the results removing the directory name and the "/" character, resulting in only a list of the... (3 Replies)
Discussion started by: fxvisions
3 Replies

4. AIX

Is there a way to list all the functions dotted in to the env?

Hi People, Please advise if there is a command to retrieve the list of functions (user-defined) available at any certain point? Cheers (1 Reply)
Discussion started by: easwam
1 Replies

5. Shell Programming and Scripting

Get the List of functions with modified parameters

Hi I have 2 files a.c and a.bak where I changed long to int using awk script. I want to get the list of functions whose parameters got modified for eg: fun ( long a, long b ) might be changed to fun ( int a, int b ) (1 Reply)
Discussion started by: Sivaswami
1 Replies

6. Programming

retrieving network interface list

Hello I have a problem with retreiving network interface list using IOCTLs. I have 4 interfaces: $ ip addr 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo inet6 ::1/128 scope... (1 Reply)
Discussion started by: xyzt
1 Replies

7. Shell Programming and Scripting

Help in retrieving the ending line numbers of the functions

Hi! I've a C file which consist of many function definitions with numbers at the beginning as shown below.. 10 void search() 11 { 12 /*body 14 * 15 * 17 * 18 * 40 * 42 * 60 } 90 void func_name() 95 { 99 /*body 100 * 105 * 111 * (7 Replies)
Discussion started by: abk07
7 Replies

8. Emergency UNIX and Linux Support

Retrieving a list of "orphan" ids

I have a situation where I would like to retrieve a list of ids on AIX 5.3 server, which do not have proper gecos information. The need is to fix all of these ids before it gets flagged as an audit exposure. Can someone please help me with a command/script to retrieve this list? G (3 Replies)
Discussion started by: ggayathri
3 Replies

9. Shell Programming and Scripting

Outputting Results to Indexed List

I'm looking for some suggestions on a command line utility I am making. I would like to use 'find' to locate some files and index the results so the user can choose the correct results from the list and push that input into an open command. A simple example below: ... (2 Replies)
Discussion started by: sudo
2 Replies

10. Programming

Code review: recursion in circular array, reduce two functions to one?

Hello, I think there's an easier way to do this but can't seem to recall but given an array of animals and an initial value is a random index in the array, here it's 3. 3,4,5,4,3,2,1,0,1,2,3,4,5,4,3,2,1,0... inifinite repeat a quick brute force solution i came up with was two functions, i... (6 Replies)
Discussion started by: f77hack
6 Replies
ATTACH(5)							File Formats Manual							 ATTACH(5)

NAME
attach, session, nop - messages to initiate activity SYNOPSIS
Tnop tag[2] Rnop tag[2] Tsession tag[2] chal[8] Rsession tag[2] chal[8] authid[28] authdom[48] Tattach tag[2] fid[2] uid[28] aname[28] ticket[72] auth[13] Rattach tag[2] fid[2] qid[8] rauth[13] DESCRIPTION
The nop request does nothing overt but may be used to synchronize the channel between two service hosts initially. The session request is used to initialize a connection between a client and a server. All outstanding I/O on the connection is aborted. The set of messages between session requests is called a session. The host's user name (authid) and its authentication domain (authdom) identify the key to be used when authenticating to this host. The exchanged challenges (chal) are used in the authentication algorithm. If authid is a null string no authentication is performed in this session. The tag should be NOTAG (value 0xFFFF) for a nop or session message. The attach message serves as a fresh introduction from a user on the client machine to a server. The message identifies the user (uid) and may select the file tree to access (aname). The ticket and auth arguments contains authorization data derived from the exchanged chal- lenges of the session message; see auth(6). As a result of the attach transaction, the client will have a connection to the root directory of the desired file tree, represented by fid. An error is returned if fid is already in use. The server's idea of the root of the file tree is represented by the returned qid. ENTRY POINTS
An attach transaction will be generated for kernel devices (see intro(3)) when a system call evaluates a file name beginning with Pipe(2) generates an attach on the kernel device pipe(3). The mount system call (see bind(2)) generates an attach messages to the remote file server. When the kernel boots, an attach is made to the root device, root(3), and then an attach is made to the requested file server machine. SEE ALSO
auth(6) ATTACH(5)
All times are GMT -4. The time now is 06:43 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy