rcp man page on HP-UX

Man page or keyword search:  
man Server   10987 pages
apropos Keyword Search (all sections)
Output format
HP-UX logo
[printable version]

rcp(1)									rcp(1)

NAME
       rcp - remote file copy

SYNOPSIS
   Copy Single File
       size] size] source_file1 dest_file

   Copy Multiple Files
       size] size] source_file1 [source_file2]... dest_dir

   Copy One or More Directory Subtrees
       size] size] source_dir1 [source_dir2]... dest_dir

   Copy Files and Directory Subtrees
       size] size] file_or_dir1 [file_or_dir2]... dest_dir

   In Kerberos V5 Network Authentication Environments
   Copy Single File
       realm] size] size] source_file1 dest_file

   Copy Multiple Files
       realm] size] size] source_file1 [source_file2]... dest_dir

   Copy One or More Directory Subtrees
       realm] size] size] source_dir1 [source_dir2]... dest_dir

   Copy Files and Directory Subtrees
       realm] size] size] file_or_dir1 [file_or_dir2]... dest_dir

DESCRIPTION
       The command copies files, directory subtrees, or a combination of files
       and directory subtrees from one or more systems to  another.   In  many
       respects, it is similar to the command (see cp(1)).

       To  use	you  must have read access to files being copied, and read and
       search (execute) permission on all directories in the  directory	 path.
       Note  that  there  are  special requirements for third-party transfers,
       which are described in the section below.

       In a Kerberos V5 Network Authentication environment, uses the  Kerberos
       V5  protocol  while  initiating	the  connection	 to a remote host. The
       authorization mechanism is dependent on the command line	 options  used
       to  invoke on the remote host (i.e., Kerberos authentication and autho‐
       rization rules are described in the Secure Internet Services man	 page,
       sis(5).

       Although Kerberos authentication and authorizations may apply, the Ker‐
       beros mechanism is not applied when copying files. The files are	 still
       transferred in clear text over the network.

       The option can be set in the file within Refer to the krb5.conf(4) man‐
       page for more information on the If is set to  true  and	 the  kerberos
       authentication fails, will use the non-secure mode of authentication.

	      Note:  Command  line  options  override  the  configuration file
	      options.

   Options and Arguments
       recognizes the following options and arguments:

	      source_file, source_dir
			     This option specifies the	name  of  an  existing
			     file  or  directory  on a local or remote machine
			     that you want to be copied to a specified	desti‐
			     nation.   The source file and directory names are
			     constructed as follows:

				  or

			     Component parts of file and directory  names  are
			     described	below.	 If  multiple  existing	 files
			     and/or    directory    subtrees	(source_file1,
			     source_file2, ...,	 etc.) are specified, then the
			     destination must be a directory.  Shell file name
			     expansion	is  allowed  on	 both local and remote
			     systems.  Multiple files and  directory  subtrees
			     can  be copied from one or more systems to a sin‐
			     gle destination directory by using a single  com‐
			     mand.

	      dest_file	     This option specifies the name of the destination
			     file.  If host name and path name are not	speci‐
			     fied,  then  the  existing	 file is copied into a
			     file named dest_file in the current directory  on
			     the  local	 system.   If dest_file already exists
			     and is writable, then the existing file is	 over‐
			     written.	The  destination  file	names are con‐
			     structed in the same way as source	 files	except
			     that  the usage of file name expansion characters
			     is forbidden in  the  case	 of  destination  file
			     names.

	      dest_dir	     This option specifies the name of the destination
			     directory.	 If host name and path names  are  not
			     specified,	 then the existing file is copied into
			     a directory named dest_dir in the current	direc‐
			     tory  on  the  local system.  If dest_dir already
			     exists in the specified directory path  (or  cur‐
			     rent  directory  if  not  specified),  then a new
			     directory named dest_dir  is  created  underneath
			     the  existing directory named dest_dir.  The des‐
			     tination directory names are constructed  the  in
			     same  way	as  source directory tree names except
			     that the usage of file name expansion  characters
			     is forbidden in the case of destination directory
			     names.

			     If the source_dir has more than one  file	to  be
			     copied,  the  dest_dir does not exist, and if the
			     option is used for recursive copying, then	 first
			     creates  the  dest_dir and later copies the files
			     under the source_dir to the dest_dir.

	      file_or_dir    If a combination of  files	 and  directories  are
			     specified	for  copying  (either explicitly or by
			     file name expansion), then only files are	copied
			     unless the option is specified.  If the option is
			     present, then all the files  and  directory  sub‐
			     trees whose names match the specified file_or_dir
			     name are copied.

	      This option is applicable only in a secure environment based  on
	      Kerberos V5.
			     It	 can be used to obtain tickets from the remote
			     host in the specified realm instead of the remote
			     host's default realm as specified in the configu‐
			     ration file

	      This option is applicable only in a secure environment based  on
	      Kerberos V5.
			     It	 disables  Kerberos  authentication.   If  the
			     remote host has been configured to	 prevent  non-
			     secure  access, using this option would result in
			     the generic error,

			     See in remshd(1M) for more details.

	      This option can be used  to  preserve  (duplicate)  modification
	      times and
			     modes (permissions) of source files, ignoring the
			     current setting of the file creation  mode	 mask.
			     If this option is specified, preserves the sticky
			     bit only if the target user is superuser.

			     If the option is  not  specified,	preserves  the
			     mode and owner of dest_file if it already exists;
			     otherwise uses the mode of the source file	 modi‐
			     fied  by  the on the destination host.  Modifica‐
			     tion and access times of the destination file are
			     set to the time when the copy was made.

	      This option sets the size of the socket send buffer.

	      This option sets the size of the socket receive buffer.

	      This option can be used to recursively copy directory subtrees
			     rooted  at	 the  source  directory	 name.	If any
			     directory subtrees are to be copied,  recursively
			     copies  each  subtree  rooted  at	the  specified
			     source directory name to directory dest_dir.   If
			     source_dir	 is being copied to an existing direc‐
			     tory of the same name, creates  a	new  directory
			     source_dir within dest_dir and copies the subtree
			     rooted at source_dir  to  If  dest_dir  does  not
			     exist,  first  creates  it and copies the subtree
			     rooted at source_dir to dest_dir and  the	output
			     will  be  similar irrespective of whether a wild‐
			     card character (source_dir/*) is used for copying
			     or otherwise.

   Constructing File and Directory Names
       As  indicated above, file and directory names contain one, two, or four
       component parts:

	      user_name	   Login name to be used for accessing directories and
			   files on remote system.

	      hostname	   Hostname  of	 remote	 system	 where directories and
			   files are located.

	      pathname	   Absolute directory path name or directory path name
			   relative to the login directory of user user_name.

	      filename	   Actual  name	 of  source or destination file.  File
			   name expansion is allowed on source file names.

	      dirname	   Actual name of source or destination directory sub‐
			   tree.   File	 name  expansion  is allowed on source
			   directory names.

       Each file or directory argument is either a remote  file	 name  of  the
       form  or	 a local file name (with a slash before any colon hostname can
       be either an official host name or an alias (see hosts(4)).   If	 host‐
       name  is	 of  the  form ruser is used on the remote host instead of the
       current user name.  An unspecified path (that is, refers to the	remote
       user's  login directory.	 If path does not begin with it is interpreted
       relative to the remote  user's  login  directory	 on  hostname.	 Shell
       metacharacters  in  remote  paths  can  be quoted with backslash single
       quotes or double quotes (), so that they will be interpreted remotely.

       does not prompt for passwords.  In a non-secure or traditional environ‐
       ment, user authorization is checked by determining if the current local
       user name or any user name specified via ruser exists on rhost.	 In  a
       Kerberos	 V5  Network  Authentication or secure environment, the autho‐
       rization method is dependent upon the command  line  options  for  (see
       remshd(1M)  for details).  In either case, remote command execution via
       remsh(1) and rcmd(3N), or rcmd_af(3N) in case of IPv6 systems, must  be
       allowed and remshd(1M) must be executable on the remote host.

   Third-Party Transfers
       Third-party transfers in the following form:

       are performed as:

       Therefore,  for	a  such	 a  transfer to succeed, ruser2 on rhost2 must
       allow access by ruser1 from rhost1 (see hosts.equiv(4)).

   rcp With IPv6 Address
       To invoke with an IPv6 address, the IPv6 address must be enclosed in  a
       pair of square brackets as shown in the example below.

       If  the	IPv6 address is not enclosed within square brackets, the first
       occurrence of a colon is treated as the separator between the  hostname
       and the path.

WARNINGS
       The  routine  is confused by any output generated by commands in a file
       on the remote host (see csh(1)).

       Copying a file onto itself, for example:

       may produce inconsistent results.  The current HP-UX version of	simply
       copies  the file over itself.  However, some implementations of includ‐
       ing some earlier HP-UX implementations, corrupt the file.  In addition,
       the  same  file	may  be referred to in multiple ways, for example, via
       hard links, symbolic links, or NFS.  It is  not	guaranteed  that  will
       correctly copy a file over itself in all cases.

       Implementations of based on the 4.2BSD version (including the implemen‐
       tations of prior to HP-UX 7.0) require that remote users	 be  specified
       as  rhost.ruser.	  If  the first remote host specified in a third party
       transfer (rhost1 in the example below) uses this older syntax, the com‐
       mand must have the form:

       since the target is interpreted by rhost1.  A common problem is encoun‐
       tered when two remote files are to be copied to a  remote  target  that
       specifies  a remote user.  If the two remote source systems, rhost1 and
       rhost2, each expect a different form for the remote  target,  the  com‐
       mand:

       will  certainly	fail  on  one  of  the source systems.	Perform such a
       transfer using two separate commands.

       With the existing implementation of the remote copy  may	 result	 in  a
       system overwrite as described in the following example.

       In  this	 example, if you run as root, and unintentionally type a space
       between the colon and the slash then assumes both path and (the	remote
       machine's  root directory) as source.  always interprets the last argu‐
       ment as the destination.	 Therefore, the destination directory  is  the
       local  machine's	 root directory copies the content of path to the root
       directory first.	 It then does another copy with as source to the  root
       directory  again.   This second copy overwrites the local system's root
       directory with the remote system's root directory

DIAGNOSTICS
       Diagnostics can occur from both the  local  and	remote	hosts.	 Those
       diagnostics  that occur on the local host before the connection is com‐
       pletely established are written to standard error.  Once the connection
       is  established, any error messages from the remote host are written to
       standard output, like any other data.

       There are two authentication mechanisms used by
	      One authentication mechanism is based on Kerberos and the
	      other  is	 not.	The type of authentication mechanism is
	      obtained	from  a	 system	 file  which  is   updated   by
	      inetsvcs_sec(1M).	  If  the  system file does not contain
	      known authentication types, the above error is displayed.

AUTHOR
       was developed by the University of California, Berkeley.

SEE ALSO
       cp(1), ftp(1), remsh(1), remshd(1M), inetsvcs_sec(1M), rcmd(3N),
       rcmd_af(3N), hosts(4), hosts.equiv(4), krb5.conf(4), sis(5).

									rcp(1)
[top]

List of man pages available for HP-UX

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net