IMD 1.18: 8/08/2017 9:30:08 SCCS (SOURCE CODE CONTR.) SN 00245 2.3F0 (ACS-8600   0 ( ) *!+",#-$.%/ &0 'install 755 152 2 +RvR>u>t >u%VRRRvRR6>uRhRRRvRfRRRvRE. htB?+҉rtP+҉rDj׃aRfRRRvR- ׃aRfRR~~~F؋t Rg2F؉VW(:=u R?2VJ@=>:| >:' 213 3142671160 5427 2 vRRRvRRFD>t :VFF+҉VVލVRG+R0#PVR,FFvRVR RvR- džtvt? utvtWtwvRRu)ƅ㋗jtj>LJjG}R'RpF<u <R2> ~ QR1BqF<u oR1> ~ R1T;R|vRR>8t0>t6R!t R,R]>tYcRRRvR1vRR(66RP S>J܃Swu\> PFUWVF^?-t^WVu>tFtRRRvR>-vRRo#vt? tcvt U+RR=>t\t9+RR6D%Phg#K#=a#F؋tVFt RL1^>G;~}>>u R!RvR1vRRRRvRVR`vRReRRRvR1vRRuRRRvRZ1^7F-a=v].6ފu@R6}P}+jDu_@tRFP6R`R:`R5FҺR6PRvR v5>uRTRR >uiTRR RvRy,vRRRIRR1>u>t>u>u R0>t>>~ R0>u>t&u 0R08(&^echo "SCCS installed." echo "To use SCCS commands, you must have" echo "the environment variable 'LOGNAME' defined to be your lovRR+RuRR,>t1+'BRvR1vRRGG;>|Ӏ>t^>uWR<tGF?u.6ފu@R6P|Du@tFP6R`R:`R롉68 R RV9,66FRvRO, vRR>ut+RR6x$PFFN R6vҺRvR F+҉V؉Vփt 0RVG;~|>tR+R@KUWVv3*}KUWVUKdžrRHtO >t>t SR+0@Rvgin name." }۾F<uNRTCu GȀ>t(URRRvR}0vRR>u+RURVu NR5^7F-b=v.!<uFPfR`R :`R4<ux R,RV+Vu >u%> t R&5R1Rb R+RERRJRvR+ vRRVRRf>u;RxRJ}+D<>t>u>t0>t>u }R/>t>u R/>u>t R/>tRH>u+;F?t0=uvv SR`R*`R%>tu R/>t>t Rr/>t"><tvR`R4`RI/>u"><uvR`R`4`R 9>0F<HuuWuPƅF< tERBPF+RFVP)VЉjFЋ^ЊuNЋ^t>u R4^7F-b=vG.<uhFPR`R9`R3H<u<65V)F=u R>tWWv FvVW'uFH@UWVW>t 63xWWP @>t W?>u />tk Ht} -R/ttvRDRxR4+RxRSRPRMR RVR`R3`R.>u8usr/local/admin 755 152 2 vlu2>ft+VRturƅRit+u㋗ju u׃alt3V(L@=~| ~',RV{)F=u FRc3VK@=~| ~'aRk<u }R03VRVRV1P>PWn*@UWV~vFcF F+RuRV:$FuN FV׃ RgFuN F+RRV$FuN F+RGPR+RzRvPR-P t Ro.><t/RvRDpR&IpuRjR<.ER$Rv*P 61316 3142671160 7027 t㋟j?at ?auhOt/㋗jt#+RjRR( ht㋗jh6h׃aRP<tFPR`R28`R!<u R,RV)Vu R2Vzt8RRV0 ( ) *!+",#-$.%/ &0 '׃RV#FuN F?UWV@>(5mVVVvV) vVv=u[?UWV3?fV^uvRVPaRu dR+RVW>ƅ&DžD~u+RRVoP,ׁ.R, @R,GP.F 0FFF:UWV~ v:=-uGR$tSRPRt׍ RV뾺@RW9+RV%Rb%lUWV~v@RW * |gFN VGu~ sAF Vځgv[G@PP5UWV~6Ɩ!ׁ#r Rc>q5UWV~F < uFF<uFPW2[<uVFVڀ? tڀ? t썖RSFRvAt&^+^F? u^+ ^ފtNFR5<>F~ {RWFtF?u ^F?ht,#WׁRvw F؀? tWDžL0UWV~v}+҉> WV#:Dt@u> RWX#tύRP(%džRRRm"RRu VځO VځOV+vUWV~v+WGF[8t=t U+UWV~Wv %FPv/= t FG=u=u F5G FFcF FUWV~F?uV8tV&W<u݃uW@;+(^8+tu ^ހ? tR^[GFv;;ˍR;؍؀? uR;؍V5.VWt^F?u ^F?st WNFVڀ? tڀ? tVR FփRFv FփRFv /UWVRV"MtFRWRR#RP R t RVRRR!=tu,7+UWVWdžv R6 F tF Rv=u VzRvWvzR(džz +RW 4UWV~vRvVR*VRVRVRsRRRV+RVW^4UWV~ FFE2PRVR+ҋ4>UWV~v= t=t FG= u >UWV~=at:+,߀8 t$߀80| ހ?9~߀8au aE+Fފuʺ~,"$V`V`V}/UWV~&u +RW,Rׁ.Rt-$ƅ&ׁ.V^uUWV 9+VVvP VVtuUuكtLVVWt#vufutz|džxxRz[RxVڋ[W u x}xzR R(xFwgVUM<tUF+R RV:u"VvV1tVVRG1uƅ:V WSu~tƅ:t|UtW=UWVv+@t)>8u"t VQ" V&VM8>@t>6\v6N+=u=uQ= u= u=utvu ))UWV~v{V3UWV+LJ&F|vG?t}G?ftrG= t= tGƟG= t= tRW0@P[&+RW&stRVR:@=~+UWV>tv%Vuuw~i=%t`}uW}%tNE؊%u<E-Dž ƅ'DžD.UWV~u>uN@RW-xRWFR6DPP6#RP6J6Hv+u2t (V"3VV9" VV 68UWV7^+>t%>t>@t>u 5RV=u=:u=-uv[FGV9Vu V/F<uv[FFV=uGC)㋿&G? uOvtx3UWV~:u R0t-V F;vPR`R`R*J=w. 6+''''''G=t6s<UWV~^u#=u}u}u}u }u}t ~tv&&u.+t!6V>u F <u-UWV~vu+RW'6!v5@+N RVR uRb? u*?\u+RvSG pRUWVt~vV=uVG:VtH+VJVFRGVF[;t ~u~tV~~GvV(t-V F;sPR`R`Rs<tWVu2UWV~vF=auF~t ZR2F2=tVRWV!1<UWV~vFdF FU F FVWZ  FV׃ RqFuN F+R׃RV FuN FuRV%u4 RVRt# RVRt( RVRVV^ F^uVV^ F^uVVv4PR4[=~ RRv4uYF6UWVV6gRv? [GLt UWV~vRWR R(PvR P R'R FNuW'Rv t@RW' |GG9Vt 9VuFvRZR,UWV~vVW=.uGփRW =.uGփRW =.uGփRWFuN Fu RV%FuN FF;UWVv1vE 0FE 0F/FE@ 0FE@^ F^u - RVR.VRZVRhRR1 R6^ t"VRVRVRsRR9 R676w G^4}3R6W?4G|6vJ R|+ԃtՍVR"6FUWV>68F< t< tvD uJXVFVRW|&F }(RVRvs&Fv%~tF;Nt ;Pu W'Rv 1UWV~vu56RVFuN}tuu<RVFuNe1UWV~vFRWpV.@=~ R 0F/FE 0FE 0F FE 0FE 0F:FE 0FE 0F:F 0,UWV>t 6+>>,UWV~W Ft)=gt$=lt4+RW%R+ߊV%%P,+RփR%Rra< t< uV~;w RVv3@Pf+Rv5&VF< t< tvF<uN< t(< t#+Rvv230 ( ) *!+",#-$.%/ &0 '%=tO>tE@RW' |D u"FV;Vt;Xt W'~P&+XVFV~Z}V9Vu+ ^FV UWV~v |\FD Vv[ FGFu֋FUWV~eEu~ |WP"CUWVvv NV֋ڀ?/t3v~}'VVڀ?/uFVVN~=u=/ =u&***)**,* G=-uG&*=0uG,*W $*>(*(*=.uGW**>(*G+һ.!?^ `W(> t~~ WvuUWVvv |s> tZ~tv V`V\=<rM~}:~ ~s,~~#} ~Et7W EteUUv vvEPF:tV+VVڊWFV !UWV~)=uG:Vt T!UWVFF*.*u*F ***uq****u^RR R R6(*6***R.*R+H6(*>(*UWV6P v^ V`Wv@PVvW~vPu V`WbR F }OW~Wv&v#vv@$ |v%Nv%=>tv%"> u FV;Ft~;FuxsUWV~WD +PPREPuueEtebUWV~v F~u39VV | VFVV tF@ Vڋw;6D uT9.+=u~= u=uh=u=uW~VVWv %TUWV~\RW# |=RVRV#FV#~tV9Vt\D* VЉV|GNuFV9VrNjFUWV~v F~u8>VV |\*GD V*PG-NuD <փ7vr׉VVVF+҉FVF +҉FVFVFV~!}=vvF=tmR=uH=ulP R= ui=uM=um=uFG=du=ou=uu=xuO R=u=uVڋ uWGF[ uOFVUWV\vF~;~w=/t V*OVڀ?/u7%UWV W;%UWV~D=0}=9~PGƹ [Ë=u֋$UWVu FV9Vr‹FUWV Pvv& UWVv~Wv~E t+eUWVvN |R R * N R RF RF=uK~uBF F F +҉FV PRFV[YӃ}~=w~u ~t HC=u*U*6*+6*;6$*};+҉V>&*uډV6,*60*vV6* fUWV> *u>"*t>**t *0*vV.VGVUWVuW WW> u=W WW6 DP6 WRvj$ |>u v)vvy; t vh$UWV~;vGOu#VVVFVڊF[ t |LjF̓} ;vu+FVUWVX W~WvyZ t+UWV FB~~F~W~Wv< R8VVvV [VVF vV[VRev(UWV{~uoF 9Vrc~@ TV;r5UWV~ǙPR6"*6 *ǙPR6"*6 *"* *u=tW } *փ0 *փW*UWV6.*4+W WWW WWyvPvWbW WWP@u Wك u v>? uNV$UWVv~W~Wv #UWV~v=F=0}!=9~PGF [N| ^+F FP+PFUWV~EtMEuE@tE)EM}uEuVqEt݁Mv;VtVڋVڋWU~VU;t UT|UWV!*WF *@ >D >B .*6"*> *UWV.*.*6"* *(|s"*-*6"*> *ރ6"*> *aUWV>.*u=6"*> *.*.*='WW3P(> =v.77~7t7UWV ~UWV~v~N}GVFV׋#UWV.| F.RWQ" uVW@"Gj#UWV~狽* uZJ W PJ WN uZ t X VEtVVuEP|uu }'=uMEt eM ]E*UWV~UWVv"@PRvV@RVP |D tVl R`Rw`R7vvvUWV>.*u=6"*> *.*.*(|s"*-*6"*> *ރ6"*> *UWV~+6(*=*u(*G.*.*=0|UWV~= t0GvUWV~VVN~. | ]E* WЋ|^ƈF u̓} W#~狽* W P~狽* WW"T W PT WW" Wv!vYW W7! WW!}tEt uesvuuMuuUWV~V.*V0*>*=%tG=u9>*t+R60*R+*R6* }׋ RvuaUWVvv1 uj>u >t6>toWpWvv W`W0 ( ) *!+",#-$.%/ &0 '=9Gƹ Ë(*UWV~UWV~UWV~rUWV~v9v *PGN^ |^ WGڋF ã+Ë܋O_w0#t tۍP0[r u UPSQRVWF-PP__^ZY[X]+ҋ UWV~vF:uG?=u|=u=t+ҋ UWVF~t1WF2*W tvW v;wn flag (ad3)flag twice (ad4)r arg not numeric (ad6)r out of range (ad7)bad a argument (ad8)too many 'a' keyletters (ad9)btU*t%5tV;wV;r=;w;>t+*>*~F ࣆ*+R*; v v F~}R=-ũ~ 0uƋ^ |^ WGڊ*G멋^ WGڊ*G^ }v *PG;N})^ |^ WGڋ Ӓ܋_#tGË܋_#ø<  ~t~9~v)~ ~~FGWWFvjUWVW2*W UWVWP UWVv Pad e argument (ad10)too many 'e' keyletters (ad11)unknown key letter (cm1)key letter twice (cm2)missing file arg (cm3)illegvŋ*Ru.*V9*롋*RVU8^߉;v *׃UWV~>5F  v v N~uUWV~Et MeEuQ+҉VVVVFvVREP,F_` P r ܋_ t ã[;:s bP;r&:f^_]USWVF y;V u>Rȋv~ } ރV+~ UWVVRK <PRFPRG PR^G[Y+ӉFVVR|FwF/| Jt| Ku\ ㋗ V\ ㋗ Vval use of 'y' or 'm' keyletter (ad30)more than one file (ad15)USER ID not in password file (cm9)directory named with `i' keyl5UWVvVփV>*u**>V9Vv;r~V9Vuߋ׃;uցvV;VuVVtMEEEt@u]VEց;Uv~ uU+։VRVEP FuyEtoUu5X uRyރƋ׍f^_[]øPv~ y Vރ+V y ^ V;| 9~ v+~ F+USWVv ~Ǚ+FVVFvVIF~t8;~ ;~u.||(;~| ;~u|}FVVRCDUWV~v:|u +EE etter (ad26)MRs not allowed (de8)MRs required (de10)r only allowed with i (ad16)t has no argument (ad17)d not allowed with [96v6'UWVvDtV@D+ƺFvto;tkv~VBVV9VsVVv^[։UuMM+҉VV$U+։VV~uvVEPY FVFuV9VtM VP UWV~Uȋƙ+F ȋ+эf^_[]USWVF y;V u.ȋvF y+ yڋ™f^_[]Ëv~ yރ+V y^ +UWV QRR^GPRo FVQRR^GPRyFV~|~sQFVn^Fp*v<n (ad18)file %s exists (ad19)file %s does not exist (ad20)cannot fork, try again%s -s %sshsh-ccannot execute '%s'corrupFFVNu;s+V;r F+ƺNj؋*vUWV~Wvf}+V^wgNuFUt=U+։V~1uEt+vVEP ;Ft M +ҋ UWVN W ;>r UWV~Et>;| 9~ v +~ +FyЋǍf^_[]UVvN^#<^s]PRvv [F<PRvv^ƙ<Fƙ^7FPRFVpPR|*~|0~r(FVted file (co6)cannot create lock file (cm4)0%c%c%s 000000invalid MRs (de9)%c%c %s %c%c %c%c %s %c%c a %c%c %c %sO+Ë^wFg_^UWVv tWv(UWVvtWvUWV~v~GuOGFuFE@u7WaEPR }Et uEtEep UWV~u+^+t+^=at=r@(#)admin 5.1valdirectory `%s' specified as `%c' keyletter value (ad29)d has no argument (ad1)value afte;V=|;Fw6Vx)FVF۾F|~sHPWFVN~~6z*~>~*V7=nu+ +F9~^ %c%c %c %s %c%c %c %c%c %c%c %c%c %u no id keywords (cm6)%s No id keywords (cm7)%c%c %u %s illegal data on line %d (aUWV~vF:uGu+N؊+UWV~+FGuo܋_ø܋O_VtU=wuVv[tRRvz F}>u VvnFR+PRv tR+Rv4 F~}ar %c flag (ad12)bad list format (ad27)element in list out of range (ad28)unknown flag (ad3)flag twice (ad4)f has no argumenBF^7F*p*UWVV*8GFu^G RV*GFGFGFG^^hGFd21)date and time createdby%c%c %s @(#)chkid 5.1@(#)chksid 5.1invalid sid (co8)@(#)del_ba 5.1%u%u@(#)date_ba 5.1@(6>;^sr#tãã!+ø/ø/6X%R LUVW~ vNVUtM^?ruMM׋ UWV~~tL+R) RW F=|%P RW FҁRWt (ad5)value after %c flag (ad13)floor not numeric (ad22)floor out of range (ad23)ceiling not numeric (ad24)ceiling out of GFGFn^7Wn^dRW~n^dRWhn^dRWR^ d|E2E0^W dRW+#)dofile 5.1s.r%s/%ss.@(#)dohist 5.1 MRs? comments? standard input specified w/o -y and/or -m keyletter (de16)^_^]s Ó܋_#tظr܋_؉ãË܋_SXsV RWFF UWVN ;>r+ Eu ܋_UWV~6><t4WFtrange (ad25)no default sid (ad14)flag %c has no value (ad2)abad list format (ad27)element in list out of range (ad28)unknoV*2UWVFunmUWV~G~ |F 0 GF 0GUWVVV>>*0 ( ) *!+",#-$.%/ &0 'line too long (co18)response too long (co19)cannot fork; try again (co20)too many MRs (co21)out of space (co22)@(#)flushto uW Y}tWuaW+Wctory `%s' nonexistent (ut1)xcreat@(#)xlink 3.1can't link `%s' to `%s' (%d)xlink@(#)xopen 3.1`%s' unreadable (ut5)`%s' uzRXdžzz|džxxRz[RxVڋ[W u x}xzRRusr/local/bdiff 755 152 2 5.1@(#)newstats 5.1%c%c %s/%s/%s @(#)permiss 5.1SCCS file locked againWWWW WWWWf Wo+W$.?9W?0}፾WW nwritable (ut6)`%s' unreadable or unwritable (ut7)xopen@(#)xunlink 3.1xunlink@(#)xmsg 3.1no file (ut3)`%s' nonexistent (xFwgV\v6N+=u=uQ= u= u=utvu I 23432 3142671160 7006 st editing (co23)%dnot authorized to make deltas (co14)release %u < %u (floor) (co15)release %u > %u (ceiling) (co16)releasWW1 uWtWWW W >l>WWuu ut4)directory `%s' unwritable (ut2)no space! (ut10)write error (ut8)errno = %d, function = `%s' (ut11)@(#)cat 3.1@(#)dnam'UWV~v{VV=u=:u=-uv[FGV9Vu V/F<uv[FFV=ue `%d' locked against editing (co23)@(#)sid_ab 5.1@(#)sid_ba 5.1%u.%u.%u.%u@(#)sinit 5.1too long (co7)s.not an SCCS +WuvWKuvWWdžUWVnVF~"vv vVv?e 3.1@(#)fatal 3.4ERROR []: @(#)userexit 3.1@(#)zero 3.1@(#)zeropad 3.1(null)GUWVt~vV=uVG:VtH+VJVFRGVF[;t ~u~tV~~Gfile (co1)more than one link (co3)@(#)stats_ab 5.1@(#)fmterr 5.1format error at line %u (co4)@(#)getline 5.1premature eo uv3UWV+WWnW=PFvFPW vWv uv~nWUWVYvV4UWV~D=0}=9~PGƹ [Ë=u֋UWV~v=F @"܃Swu\ PUWVc  ~|~~ $W4W~uu6f (co5)corrupted file (co6)@(#)putline 5.1%05u%05u%05u%5u%c%c%s %c%c %s/%s/%s @(#)auxf 5.1@(#)fdfopen 3.1@(#)imatch^= t=,t=at =ct=du~PW9 F$~WvF>~vW ^ueUWV>GW6W M:/Day Mon 00 00:00:00 1900 SunMonTueWedThuFriSatJanFebMa=0}!=9~PGF [FV׋UWV.| j RWm uVW\GTUWVW~uu 8W XW~uuF+WW~u$ PFZW~uluF+WW~u Pl 3.1@(#)index 3.1/bin/shPATH:/bin:/usr/bin/sh@(#)lockit 3.5%s/%u.%ldlockitLOGNAME@(#)patoi 3.1@(#)rename 3.1@(vv6W >Wv+WUWV>GWW >~vvpv6W{ <Wv+WrAprMayJunJulAugSepOctNovDec**  AAAAAA~狽N uZnWPnWW~狽NWP~狽NWWxWPxWW Wvv Fl ~~X^_?-u ^_st;~ujl=u \W@ ~u^_?-u^_su&vWW#)repeat 3.1@(#)repl 3.2@(#)satoi 3.1@(#)setsig 3.3^ r SIGNAL: (ut12) Illegal instructioUWVnWlWbWXUWV+WWvWWvPP F_UWV~vRWBBBBBB *pad 3.1(null)WW1 WWW{PCUWVv*@PjRvVjRVP |>vWW(u=u +WuvWuvWatv>lnTrace/BPT trapIOT trapEMT trapFloating exceptionKilledBus errorMemory faultBad system callBroken pipeAlarm clockdump |gFVGu~sAF Vځgv[Gu VځO VځOV tV*RRRvvv }׋KRvaUWVvvE 9}0WvWW u&Wdž3>l9}0W vWWA .core@(#)sname 3.1@(#)strend 3.1@(#)trnslat 3.1@(#)any 3.1@(#)xalloc 4.3*out of space (ut9)@(#)xcreat 3.1direvUWV~Wv UWVWdžvRF tF Rv=uVzRvWvM:/Day Mon 00 00:00:00 1900 SunMonTueWedThuFriSatJanFebMa0 ( ) *!+",#-$.%/ &0 '|s> tZ~tv`VVj.~tvvVVMvVV9V#Vv~t~9~v)~ ~~FWW FvUWVW W/UWVWHPVUWVVV>tE EM}uEuV Et݁Mut VEtVVuEPuu }'=#tظr܋_؉ãË܋_SXsã+Ë܋O_w0#t tۍ& 0[r u=6 >   (|s" - 6 > ރ6 > UWV~+6 =*u G  \ =0|=9HkUWV,v tWWCUWV+v uWvUWV6> tU t%5tV;wV;r=;w;>t+ > ~F +R uMEt eM &]E*UWV~V V > =%tG=u9> t+R6 R+ R6  =uu UPSQRVWF-) P__^ZY[X]Gƹ Ë UWV~& UWV~ UWV~ UWV~v9v *PGN^ |^ WGڋF  v v vVWwvS@PVvW~vPVW8R5LFFv6XVW;vŋ Ru. V9 롋 RVU8^߉;v  ׃UWV~>      G=-uG =0uG W  >  =.uGW > G+һ.^RT r ܋_ t ãl[;s bP;r&f^_]USWVF y;V u>Rȋv~ } ރVF~}R=-ũ~ 0uƋ^ |^ WGڊ*G멋^ WGڊ*G^ }v *PG;N})^ |^ WGڋF  v .+=u~= u=uh=u=uW ~VVVڋ uWGF[ u55UWVvVփV> u >V9Vv;r~V9Vuߋ׃;uցvV;VuVRz Rpd Rf6 R\6 6 R R 6   * [t     +~yރƋ׍f^_[]øPv~ y Vރ+V y ^ V;| 9~ v+~ F+USWVFv N~u5 UWV~Et MeEuQ+҉VVVVFvVREPF_PVtMOFVUWV\vNF~;~w=/t V*OVڀ?/uV.VGVJV[96v61UWVvDtV@D+ƺFvto;tkv~VBVV9VsVVv^u    uq   u^RR R R6 6 R R+H6 > t BR y;V u.ȋvF y+ yڋ™f^_[]Ëv~ yރ+V y^ ;| 9~ v +~ +EEEt@u]VEց;Uv~ uU+։VRVEPfFuyEtoUu5uRt։UUWVuWWW>u=WWW6P6WWWWWWW[FFVNu;s+V;r F+ƺNj؋ UWV~Wv}+`UWV~R R R"#  ? "Y=u=u=u=tR% +=tS=u~=tmRFyЋǍf^_[]UVvN^#^s]@(#)bdiff 5.1diff/tmp/bdXXXXXarg count (buMM+҉VV$U+։VV~uvVEPFVFuV9VtM VUWV~UuFUvlPvWWWW|@u W u v>?'WW3PD GuO+ҹ 0+ҹ O=XtGFa~zuVF+Rv=u܋V^wgNO+Ë^=uH=ulP R= ui=uM=um=uFG=du=ou=uu=xuO R=u=uC=ud1)--both files standard input (bd2)--non-numeric limit (bd4)cannot fork, try again (bd3)cannot execute '%s' (bd5)%s'%t=U+։V~1uEt+vVEP{;Ft M +ҋUWV W ;>rgUWV~Et>E@u7Wa>=v.q`V$UWV ~ UWV~VVN~. | ]E* WЋ|^ƈFwFg_^UWVv tWvUWVvtWvUWV~vF:uGu+`N؊+UWV~ U 6 +6 ;6 };+҉V> uډV6 6 vV6  UWV> u> t> t  0 v Us' failed (bd6)%c %s%c%d%da%d,%d %d,%dd%d @(#)fdfopen 3.1@(#)index 3.1/bin/shPATH:/bin:/usr/bin/sh@(#)patoi 3.1EP}Et uKEtEe܋_UWV~6<t4WFt+ u̓} V9Vu+ ^FVUWV~v |\FD VvGFGFu֋FdUWVW~Wv7+FGu7!܋_øjd܋O_@܋O_)s܋O_V6;^sWV~ǙPR6 6 b ǙPR6 6   u=tW }  փ0  փW b UWV6 4+ 6 >@(#)satoi 3.1@(#)setsig 3.3SIGNAL: (ut12) Illegal instructionTrace/BPT trapIOT trapEMҋUWV~vF:uG?=u|=u=t+ҋUWVF~t1WHF WtvWXv!K t+:UWV FB~~F~W~WvN| ^+F FP+PFUWV~EtMEuE@r#tãã +ø6%*sË܋_W+ø܋_ E UWV  6  (|s" - 6 > ރ6 > UWV> u=6 >    UWV> 0 ( ) *!+",#-$.%/ &0 'T trapFloating exceptionKilledBus errorMemory faultBad system callBroken pipeAlarm clockdump.core@(#)xcreat 3.1directu#=u}u}u}u }u}t V:UWV~,Dž4F"R9vWuVRW8=dt%4t׍@RV>뾺 RW*5}+҉>@WV>5 t@u>@-RWBtύRP dž'W6v>u^7#R6(V9 } F߹^u3߹^Wu"ory `%s' nonexistent (ut1)xcreat@(#)xopen 3.1`%s' unreadable (ut5)`%s' unwritable (ut6)`%s' unreadable or unwritable (ut7)$";V|;Fs R$"+FVFԉVҸ3;V|;FstR R#VBVR4v4u VBRRRWRRR@MtFRW/RRvRP5Rt@RV>߹^Wu߹^Wt"F9w }~t?G޹^9 uFȋ^7BRBR6<(xopen@(#)xpipe 3.1pipe@(#)xunlink 3.1xunlink@(#)xmsg 3.1no file (ut3)`%s' nonexistent (ut4)directory `%s' unwritable (VR(v(R 4VW ~Dt,~txvVRtg+RVR&R'Rv F68:ׁ @E \܃Swu\ Pm8UWVv"CUWV~?-tWRRR=t5(UWV~:AvVWD=-tGvVW.~t~u~uv9v| 9vuv9v}  R67vcR6(G;>} RTRRtRRR6'R6'R6'R6'ut2)no space! (ut10)write error (ut8)errno = %d, function = `%s' (ut11)@(#)cat 3.1@(#)dname 3.1@(#)fatal 3.4ERROR [].V ^Ѐ?Dt FЋ^Њu^Њt^ЊV  +҉8V։6V9<|<<v4VډV܉TVމTVTVT FVDTVuVFF=cu=ou=pti=suR'~t+F^tFP+R R, R'F؋HV+vʉvȋvԉvċv9v~v9vuvvvVvŠFPv=FvvVF…uF믋v9vuv9vuv9vuR6'R6'R6'R6'R6w' RR6e' R6W'+㋗VtR׃aR&: @(#)userexit 3.1(null) Y=etb=gt=it=mt8=xtW> ~Du3փRׁ.R.u%/=cu~tWW0 F؅uԃ~t.u W t DR'5^tRRv P>V~FxF;v}>u [RG'>t>t rR/v9v} HV!v9vSvvV@F…t?vVPFPvFvvVF…tvVPFPv=,uG=th3UR61'G|ֺ0R6' RURRuRR2R6&ZR6&RlR6&R6&R6& / uW .u /su4E8UWV~vW uW WVׁ.R8UWV WFFF~FFFV'& Vt Rv F;v|6 5>tR+R6AUWV R_>tRWV~vV~W*9~t<u ZR|uD'|u|t)ZR|t |uD'|t ZRF2UWV~v9R6&R6&R6&R6&R6y&R6k&R6]&R6O&R6A&>@(#)xunlink 3.1xunlink@(#)xmsg 3.1no file (ut3)`%s' nonexistent (ut4)directory `%s' unwritable (ڀ? tڀ? tVڀ?0|.ڀ?9'vFR/FVڀ? tڀ? uFF+FF~~~~=~uv~WAv R3 >t'>>u> t RR6* RpR RPq@}+ t R;&+RRVRu T9UuT9UuT9Uu2+UWV~ F F0PRVRM<tUF+R RV:u"Vv/tVu? RR6(& RR6&>uT RR6%@ RR6%R6% R!R6%=R6%ut2)no space! (ut10)write error (ut8)errno = %d, function = `%s' (ut11)@(#)cat 3.1@(#)dname 3.1@(#)fatal 3.4ERROR []F[~^VW^VW~W~Wv,7UWV~vG?t v G?dtO6= t= uGT G= t R1u RIw FVVP;'>uV RRu@R%4޹^Wu<޹VR/uƅ:V Wu~tƅ:t|UtW2UWV+LJF|vG?t}G?ftrG= ;UWV~?;UWV"~W~~~W v ~WMWvf%>t(v ~WlWvK%v ~WWvusr/local/comb 755 152 2 = tVWG= t= tփ RWV><G= t= tRWF} v vփRW^GVBG= t= t^Wu+޹^WuF9w |=޹^t7Ԁ>u+R6 RB  R<  R 6R3t= tGƟG= t= tRWB/@P[+RW7㋿G? uOv.txu1UWV~:7%FZ;UWV~~=~Nt+~~=~~~} ~u~9~uЋF;~9~tUWVD:UWV:UWV~^ 50476 3142671160 6664 փRWG= t= tփ RW= t v d%UWV~ 5=-uG R tSRP*Rxt>u R%V R67vFu6^7R6S)R6?) 0 ( ) *!+",#-$.%/ &0 'u Rt-VFF;vPR R Rnt-VF;sP5R RM R7PGƹ [Ë=u֋"UWVv~W~Wv "UWV~v=F=0}!=9~tF?u ^F?ht,WׁRv F؀? tWDž,UWV~vׁ.VWt^F?uVU;t UT|UWV!JW=J>>UWVv@PRvVډV<PRF<PR'=u+t6F=tG FNu 'UWV~v RW$ |tWV0UWV~vF=auF~t R0=tVRW G9Vt 9VuFvVRRUWPGF [FV׋A"UWV.| V!RW  uVW G"UWV~狽 uZ ^F?st WNFVڀ? tڀ? tVR, FփRFv FփRFv +UWV~,$DV V RV=P | tVR R Rmvvv }׋ RvagF VGu~> sAF Vځgv[Gu VځO VځOVz&vUWV~v+Vs~><F=uFc~F|~c~F=uF ~|~ F=uvvbF~|vvM;F|nWcPWWv!~狽WDP~狽WWQ!W%PWW8! Wv8 vwWtW  VW+UWV~&u +RW,Rׁ.Rt-$ƅ&ׁ.V^u^F僽@u,UWVvv |s>F tZ~tv V V.~tv4 V VvJ V V VWGF[8t=t ;&UWV~Wv &UWVWdžvHRVF tFM\RvF=uF~|~RF=uF;~}x~;~o0F=uF;~}V~;~M+FVFlFvv)FWW WP>!CUWVvvNV֋ڀ?/t3v~}'VVڀ?/uFVVNPDž,;u rRDt3t R@t9+PPR,Dž@Dž$DžDžDž ƅ'DžDj*UWn VvJkUWV6F v V Wwv@PVvW~vP V =u^VzRvWvzRz#Fdžz_z|džxxRz[RxVڋ[W u x}VF~9~}vvFVNuFHFVPR~W.FFV<PR~W.FFV<PR~W.FFV~=u=/tBVGV UWV~Gڊ uO UWV~Yv G u?VVVڊV~u>BuN RW)xRWFR6 P PDLRP6 6 v'~tv&&uW8R L Fv6F V W.+=u~= u=uh=u=uW}v~~WQ%؋Gt v~v~^w?+.UWV~uv(=nu.~狽UWV6< <0|< u'VڊF:tV+VVڊWFV ( UWVFFVFVV t.+t!6DV>Bu F <uB)UWV~vu+RW'6DKu4RVRtV>~VVVڋ uWGF[ uOFV$UWV\vF~;~w=/t V*OutvuF $_$UWV~v{VV=u=:u=-uv[FGV9Vu V9~F<u<t#F <t F6<).UWV~vVW =.uGփRWw =.uGփRWb =.FVڋw;6uT9@u=W> WW6@P/F<uv[FFV=uG)$UWVt~vV=uVG:VtH+VJVFRGVF[;uGփRWM -UWV~vu5RV FuN}tuuRVFuN-UWV~^4w 6ֹVF+҉FV+҉FVFVFV~!}=vvF=t RlF R_F=uK~u RVR.VRVRhRRR6D t"VRVRVRsRRR6Da6D}(UWV>Dt 6D6@WWA WWWC WWvPvWWF WW@u Wރ u vt ~u~tV~~GvV#UWVbW#UWVqVV ua~v3R^4[ӉVڋ;uW;UuW;UuW;UtNuŋ+-UWV~vFRWV*@=~ RGV PRwBF F +҉FV PRFV[YӃ}~=w~u ~t R8VVvV [VV+>B>DY(UWV~WFt)=gt$=lt4+RWLR +ߊVLL(+RփRLR +RVLR LlUWVH>?' WW3P>6 =v.))))UWV ~}UWV~v~N}ցt:u FGNVBVNu VVFNu FG #UWV~D=0}=9~u R'+RVWhƅ&DžD~u+RRVP,ׁ.R,  R,GPl*> ~ RWFvV[VReH(UWV{~uo9Vrc~TV;rv;VtVڋVڋWU~R1u=uF6=tG FNu=-t+VtGF=9GF F=0}~tV 0 ( ) *!+",#-$.%/ &0 'GVQUWV~= t0Gv%UWV~VVN~. | ]E* WЋ|^ƈ UWV ;>H r+ Eu ܋_UWV~6 <t4WFt+ҋz UWV~vF:uvuuMuuIUWV~VV>=%tG=u9>t+R6R+R6 =u^nmUWV~G~ |F 0 GF 0GUWVVV> >DtUHt%5tUWV~TUWV~FUWV~8UWV~v9v *PGN^ |^ WGڋF  v v F~}R=-ũF u̓} V9Vu+ ^FVUWV~v |\FD Vv1 FGFu֋F|UWV~eEuG?=u|=u=t+ҋH UWVF~t1WFW tvWv ~t~9~v)~ ~~F G=-uG=0uGW >=.uGW>G+һ.1^RTRz RpdV;wV;r=;w;> t+H>H~F H+RuH;vŋHRZu.H~ 0uƋ^ |^ WGڊ*G멋^ WGڊ*G^ }v *PG;N})^ |^ WGڋF  v v N~u~ |}uEt5FVFV~ u'R+PREP?ȋڋƙ+FV ƙ)FVEu9~4ƙ;V|,;Fr%9WWFvjUWVWW UWVWP UWVv P UWVVR<PRF Rf6 R\66RR 6*[t ux V9H롋HRVU  8^߉ ;v F ׃UWV~> 55|UWVvVփcUWV~Et MeEuQ+҉VVVVFvVREP F_ P tMEJEJEt@E+E;V|;FwVUV)+ҋEt UUev vvEPFV>Et7Wo EteUUv vPR PR^G[Y+ӉFVVR|FwF/| Jt| Ku\ ㋗: V\ ㋗< VvVVFvVIF~tuqu^RR R R66RR+H6>tBRRRR"#V>DuDD> V9Vv;r~V 9Vuߋ׃;uցvV;VuVV[96 v6 UWVu]VEց;Uv~ uU+։VRVEPZ FuyEtoUu5 uR։UuMM+҉vEPyFV;Ft~;FuxsUWV~W +PPREP=uueEteUWV~v F~u8;~ ;~u.||(;~| ;~u|}FVVRCDUWV~v:|u +EE +rUWV QR?"1A1f1|11=u=u=u=tR%+=tS=u~=tmR=uH=vDtV@D+ƺFvto;tkv~VBVV9VsVVv^[FFVNu;s+VVV$U+։VV~uvVEP FVFuV9VtM V UWV~UuFUt=U+։V~1u39VV | \D* VmЉV|GNuFV9VrNjFUWV~v F~u8>VV |\*GD V*PGR^GPR5 FVQRR^GPR?FV~|~sQFVn^F2v<PRvv[F<PulP R= ui=uM=um=uFG=du=ou=uu=xuO R=u=uC=uU6;r F+ƺNj؋F<UWV~Wvf}+^wgNO+Ë^wFgEt+vVEPo ;Ft M +ҋ UWV W ;>H r UWV~Et>E@u7WaEP$ NuD u FV9Vr‹FEUWVX Pvv ,UWVv~Wv~E t+UWVv |  *Rvv^ƙ<Fƙ^7FPRFVpPR>~|0~r(FV;V=|;Fw6Vx)FV+6;6};+҉V>uډV66vV6 ,UWV>u>t>t 0vUWV~ǙPR66_^UWVv tWvUWVvtWvUWV~vF:uGu+N؊+UWV~+FGu}Et uEtEe6 UWV~u+^+t+^=at=rtU=wuVv[tR RЋ t |LjF̓} ;vu+FVUWV FB~~F~W~Wv<N| ^+F FP+PF۾F|~sHPWFVN~~6<~>@V7=nuL + +J F9J ~L ^BF^7FB2ǙPR66u=tW } փ0 փWUWV64+6>sUWVc܋_ø܋O_V6 ;^sF/ø/6j%Rv( F}>Fu VvnFR+PRv tR+Rv F~}aVUtM^?ruMF\UWV~EtMEuE@tEJEM}uEuVqEt݁M u t VEUWVj GFu^G Ƅ GFGFGFG^^ƚ GFGFGFn^7W6(|s"-6>ރ6>'UWV>u=6>UWV>u=6>dUVW~ vN^_^]s FÓ0܋_ #tظr ܋_؉ ãFË܋_SM׋V UWV~~tL+R RWF=|%PRWd FҁRWV RWFFtVVuEP*uu }'=uMEt eM ]E*UWV~}tEt uesn^dRW~n^dRWhn^dRWR^ d|E2E0^W dRW+UWVFu(|s"-6>ރ6>UWV~+6=*uG=0|=9Gƹ Ë 0 ( ) *!+",#-$.%/ &0 'XsFã +Ë܋O_w0 #t tۍxB0[r u FUPSQRVWF-{BP __^ZH M:/Day Mon 00 00:00:00 1900 SunMonTueWedThuFriSatJanFebMarAprMayJunJulA comb$$ <<\! 1d $c *** DELTA TABLE PRIOR TO COMBINE *** . w q ! prs -e %s >>comb$$ admin -tcomb$$ s.COMB$$\ -f%c%s\ u0RF# F;v}> u RzF>u2S=&<<Vt Rv+F;v|>>t%05u%05u%5u%c%c%s %c%c %s/%s/%s @(#)auxf 5.1PF ESTEDTTZ@(#)fdfopen 3.1@(#)imatch 3.1Y[X] Ӓ܋_#tGË܋_#ø<ugSepOctNovDecDDJo = %d, function = `%s' (ut11)@(#)cat 3.1@(#)dname 3.1@(#)fata sed -n '/^%c%c$/,/^%c%c$/p' %s >comb$$ ed - comb$$ <<\! v/^%c/s/.*/ -a& \\/ 1c admin s.COMB$$\ . $c . w q ! . comR+REVaUWV:ya@R]tRvR->tv,2_PRzRR`2P7t RE@(#)index 3.1/bin/shPATH:/bin:/usr/bin/shLOGNAME@(#)move 3.1@(#)patoi 3.1@(#)repl 3.2@(#)satoi 3.1@(#)setsig 3.3 [; s bP;r& USWV^v Ǚ+ȋƙ+Fȋ+щGf^_[]f^_]USWVF y;Vl 3.4ERROR []: @(#)userexit 3.1@(#)zero 3.1@(#)zeropad 3.1(null)JJb$$ rm comb$$ rm -f %s mv s.COMB$$ %s admin -dv %s set `ls -s s.COMB$$ %s` c=`expr 100 - 100 '*' $1 / $3` echo '%s ' ${c}2 +RgRR.2PRD+RRRBPX3RRh ؋G"W W$&W&(+RRRR .5?L\hSIGNAL: (ut12) Illegal instructionTrace/BPT trapIOT trapEMT trapFloating exceptionKi u>Rȋv~ } ރV+~yރƋ׍f^_[]øPv~ y Vރ+V y ^ V;| 9~ vusr/local/delta 755 152 2 '%% ' $1/$3 rm -f s.COMB$$ get -s -k -r%s -p %s > COMB$$ a=`prs -r%s -d:C: %s` b=`prs -r%s -d:MR: %s` @(#)chksid 5.1invau R.R,tRRh,t RD6*6(6&RpVR)Rw R!RlledBus errorMemory faultBad system callBroken pipeAlarm clockdump.core@(#)sname 3.1@(#)strend 3.1@(#)trnslat 3.1@(#)+~ F+USWVv ~Ǚ+Fȋƙ+F ȋ+эf^_[]USWVF y;V u.ȋvF y+ yڋ 72350 3142671160 7030 lid sid (co8)@(#)dodelt 5.1clock set wrong!!! (co10)Clock may be set wrong! (co11) @(#)del_ab 5.1 @(#)dofile 5.1s.r%RR9R!RTRR+RdRR1PRCR$RRv@P-2R&6Rxalloc 4.3Jout of space (ut9)@(#)xcreat 3.1directory `%s' nonexistent (ut1)xcreat@(#)xopen 3.1`%s' unreadable (uf^_[]Ëv~ yރ+V y^ ;| 9~ v +~ +FyЋǍf^_[]UVvN^# s/%ss.@(#)dolist 5.1bad range (co12)delta list syntax (co13)@(#)eqsid 5.1@(#)permiss 5.1$FR|%u6^R24RRwEtRtR>t'> >Tu>t5)`%s' unwritable (ut6)`%s' unreadable or unwritable (ut7)xopen@(#)xmsg 3.1no file (ut3)`%s' nonexistent (ut4)directory^sF]@(#)comb 5.1 unknown key letter (cm1)valueSCCS file locked against editing (co23)%dnot authorized to make deltas (co14)release %u < %u (floor) (cVtRR6"H>4u(>t RC>t1R< RGdž dž/6Q>tR$uRp^ `%s' unwritable (ut2)no space! (ut10)write error (ut8)errno = %d, function = `%s' (ut11)@(#)cat 3.1@(#)dname 3.1@(#)fata after %c arg (cm7)key letter twice (cm2)missing file arg (cm3)can't have both -p and -c (cb2) %s: p-file exists (cb1)sid  e܃Swu\PXUWVvsAcUWV~<3?-t Wo15)release %u > %u (ceiling) (co16)release `%d' locked against editing (co23)@(#)date_ab 5.1@(#)sid_ab 5.1@(#)sid_ba 5.1u* uRGR:R:H:RBuRbR< RcG68Q8:+RRR@P0l 3.4ERROR []: @(#)userexit 3.1@(#)zero 3.1@(#)zeropad 3.1(null)JJdoesn't exist (cb3)nothing to do (cb4)admin -iCOMB$$ -r%d -fv%s -m '-yThis was COMBined' s.COMB$$ rm -f COMB$$ get -s -r%d -Vu ߋVFF-g=wi.^u RRv&.PgV*]V,SV. R R%u.%u.%u.%u@(#)sidtoser 5.1@(#)sinit 5.1too long (co7)s.not an SCCS file (co1)more than one link (co3)@(#)stats_ab 5RPHVVRvRl VRVR: Fu~ItPvR ʺR+g -e -t s.COMB$$ get -s -a%d -r%d -g -e s.COMB$$ delta -s -m"$b" -y"$a" s.COMB$$ sed -n '/^%c%c$/,/^%c%c$/p' %s >comb$$ ed -6.=7F2|RG&~t+F^tFPR:RK:RFF؋.1@(#)fmterr 5.1format error at line %u (co4)@(#)getline 5.1premature eof (co5)corrupted file (co6)@(#)putline 5.1%05u 0 ( ) *!+",#-$.%/ &0 'B+҉R+RR dž+RTRRRgRRK.P}644+sssssssssG=t64-OUWV~^u#=u}u}u}u }u}t V33NV_VVUBVv'eVv'eVVvVV#BVvg't>XUWV)XFPW|WWAC%FVڀ? tڀ? uFF+FF~~~~=~uv~WiF[~^VW^VW~Wx+B(!DR덦UWV~vSSVWv IRRRR= RWH"FRRP<RR R\+>t6R6ER6ER6EUWV~vFdF FU F FVW* FV׃ RqFuN F+R׃RV!2FuN FuRV7FuNWv&'~4} ~;~(v};~u vWWAWv&N~uWv&WUWV@>t~Wv#IUWV~vG?t vhG?dtOI= t= uGT G= t= tVWG= t= tփ RW RW("Nuv ERRRR< RW!-SUWV~vRVWv DRRRRt< RW!RRd,RR\RxRR-P6RY86u=t:RqRR_-P6:R>q Fu RV7FuN FFANUWVvCvE 0FE 0F/FE@ 0FE@ 0F(5mVVVvVJA vVv&=uWUWV~2RW0F(V!V =+VVpVWY(P9P)>rG= t= tDRWbF} vvփRWj"^GVBG= t= tփRW#G= t= tփ RW#VJRW,v ERRRR@< RW!RUWV~vVW9"u +RW`!RUWV~v9"} WuqRUWVRR>-P>+RF >uN6MNY} Rn@uYPZR[+RkPR[[UWV*[/FE 0FE 0F FE 0FE 0F:FE 0FE 0F:F 0F VVqVW4(P7Pr)VvVV~vvVStv4u9tIIV1;(= t vd%UWV~ nH=-uGVR1tSR$PVRXt׍vRVt뾺RWG}~vVW<-=,uvGW*-^;RUWV~vF RW NuRUWV~v6VW7Ft>t 6W&8~ u<^t1Vv5'VVv6Dv6MhVVVV EVvQ*VVv#VvV0FFF[MUWV~,Dž4FXRLvWUVRW8=dt%4tZX;V|;Fs R;1ZX+FVV!VvV0v4;vu!vt;vuvt;vu vt;vt+v4;vuTvt;vuIvt;vu>vt;vu3tIH+҉>vWVtUHt@uT>vYRW0tύRP2džRRR/RRR/FQUWV vVv 4~(VvRVv4VTt Y[;~v|;rmE-=wU.F=gv4>t;v4^B;~,vtu"vtutu_udždžt^v4+7džv4t vFԉVҸ3;V|;FstR< R5VBVR4v42VBVR(v(14VW V:(V!VvVnV~<VV<t*HVDPS*6(866+VpVW&MtFRW[RRD1R#PaRvtvRVtRRR~/=t:UWt(=it=xtD!VVW83"VVW`V+VW"Vq5HVnViQUWV QUWVNPzWW!P)uvv&tNvZ6XVvV+VvV3P~7FDVvV VvK)>&tiV!Vv~Dt,~txvVR tg+RVR\R/Rv1Flnpׁ.V ^Ѐ?Dt FЋ^Њu^Њt^ЊP:Vp9fH\H>!u V9!UUWVvV7S|vRvRV9wUv{RVV  G+VVv(PzVV-tuUuكtLVV,t#vufuttu>t 6gC>8t68VCxWW!P/PdWW!PPqWWl!PPW7!0NPzWWF!>(txV"Vv>*tgV`Vv>.t?6u V`>=t~ uWvt V=>v>tV  +҉nV։lV9<|<<v4VډV܉TVމTVTVT FVDT Y=etb=gt=it=mt8=xtW~DuqRvRv_RWURG|vVvV>+VVvVvvVV(VR VhIuvQ+Vvuăt fu0Z9džV+VC|>0t)>.u"t xV/xV~VM.>0t>,u2P']PUWV~vO+RRW1Pd"Fdž<u1vBgRV P@R:R{9:R;4vR V$>cVV1VVCCVv(6,P7VVCVv_(:VvR(eVV<VVB3փRׁ.R.u%/=cu~tW%WF؅uԃ~t.u WuW.u /su4JUWV'FdUWV~vwTRRu+ҋT?-uI*!(!RRt V/VV/xVV ,7FUWVE^+<<>Vt%>$t>0t>uvR.*R5uvdBOUWV>4tv%VS-uw~i=%t`}uW}%tNE؊m%u<E-J=w.Vv-(tv YVSVsVVBVVBPv'NN⃾tNv䍶VvV Vv'cV~vWuWWVׁ.RJUWV W/.FFF~FFFVڀ? tڀ? tVڀ?0|.ڀ?9'vFR-a=v.+BDRrRR+BIL*!+BRR 0 ( ) *!+",#-$.%/ &0 '<vB@+( RVR+uRb"? u*?\u+RvS)G R)VV^^tWt~t+vvVVVVڀIuڀtVڀDu.ڀu&VڀDu ڋWV~u^WV ^D'|t R%@UWV~v9u T9UuT9UuT9Uu@+UWV~F?uV8tV&WRu݃փRFv6 T2UWV~,$$0V:V:Vk#2UWV~&u +RW,Rׁ.Rt-~o0F=uF;~}V~;~M+FVFlFv4FVF~9~}vvFVNuFHFVv4BPR(B[=~ R)RvAuYF"EUWVtV6tgRv[Gt twIuF^Vuu~t V9U~F~t V9U}F֋6UWV~F^(4w (^utuW+RW"R@UWV~vRvVRVRVRVRsRRRV)+RVW@UWV~ FFs=PH$ƅ&ׁ.V^u^F僽@u,>$Dž,;u ^RDt3t rR@t9+PPR,PR~W';FFV<PR~W ;FFV<PR~W:FFV6>v~~W0؋Gt v~v~^ tG8?B}3R)DWAG|6tvR 9ԃtՍVRDFUWV>t6.F< t< tva޹4W uW޹4_ (޹4GW ;|;v RRv>~tRׁRֹ4R%RVRY)M<tUF+R RV}:u"VvZ<tVVRK<uƅ:VI Wi u~tƅ:t|UtWDž@Dž$DžDžDž ƅ'DžD61UWV~u>:uNRWV0xRWFR6P_Pw?+:UWV~uv3=nu:~狽UWV6r <0|<9~F<u<t#F <t F6< t< uVt~;w R(VvA@Pf+Rv5'VF< t< tvF<uN< t(< t#+Rvv@@F+RRv +RRv^uֹ4R(Nt5UWVvvtgD=gtR=it5=xt< b?UWV+LJF|vG?t}G?ftrG= t= tGƟG= t= tRW;@PVۃ[+RWw8 #RPx6$6"v-~tv&&u.+t!68V>:u F <u:|0UWV~vrc:UWV~>V3.F?te't"tJ>t~uMR"FR$R6!>u ~tWR"RR$RPPh'CUWV~6v,!ׁ #r (R'>vCUWV~F < uFF<uFPWE@[DF~tvvVR/NFFFFFF@5UWV~~t }u VUv u4UWV~v"㋿G? uOv tx>UWV~:u KR"t-VLF;vPpR:R':R"u+RW'68u4RVRtRVRtRVRVV^ F^uVV^6" FF=It=Dt=Et WlF< t< tVRV~~ 4W ;V}W;~Eu vW5`V(V%FP߃v/= t FG=u=u F8CG FFcF FUWV~t.^tJW~6+iWvvPVW=.uGփRW=.uGփRW=.uGփRW4UWV~vu5RVFuN}tuut-VF;sPR:R':Rw"tWV>UWV~vF=auF~t R6"==t F^uVV^ F^u RVRVRHVRhRRR68L t"VRVRVRsu#ڋW Rv~IuRRvW!^W Rv~IuR+RvW) Wt*t \R@+ҋ8UWV~~t.^tUW~6+xWvv~ tgWv vBUWV~:AvVWD=-tGvVW.RVFuNO4UWV~^4w 6ֹR^4[ӉVڋ;uW;UuW;UuW;UtNuŋ3UWV~vVRWG9Vt 9VuFvR R0'UWV~vs:@P!v+RvV!<t< uTvWV{RRR68%68!I/UWV>8t 68!+>:>8%/UWV~WF Ft)=gt$=lt4+RW %R+ߊV*tV9UV9Uu vqRՃF^?^VW^VW^V W^V W^Bt"v*Sv[G~t~u~uv9v| 9vuv9v} pV|&+vʉvȋvԉvċv9v~v9vuvvvVvŠFPvFvvVFRW^V0@=~ R VPRwu R+RVW,ƅ&DžD~u+RRV%P,ׁ.RF׃RVkFRVcFE~sv׃RVn^G F럺R^!vF׃ RVg6rE$E&~tI<tDV % %.+RփR %R`+RV %RP %lUWVR#u=uF6=tG FNu=-t+t ^>^GvXJ8UWV~*vtV9Tut|t>^V2W W7UWV~ F…uF믋v9vuv9vuv9vuv9v} pV%v9vSvvVN F…t?vVPFPvFvvV" F,R,GP0> ~ RWFtF?u ^F?ht,%WׁRv F؀? tW9@P6كF+RVP` vrF=uFc~F|~c~FVtGF=9GF F=0}~tVډV<PRF<PR.=u+t6F=t*tG|tT'u:\4^^W^W^Wƅ'7UWV~}Iu}t}Du}t+tvVPFPvv=,uG=tBAUWV~vV~W8 9~t<u RX%|uD'|u|t)R|t |uDž2UWV~vׁ.VWt^F?u ^F?st WNFVڀ? tڀ? tVR` FփRFvK F=uF ~|~ F=uvvbF~|vvM;F|nF=uF~|~RF=uF;~}x~;0 ( ) *!+",#-$.%/ &0 'G FNu-UWV~vRWB+ |gF( VGu~ sAF Vځgv[GuRV?P | tV2 R:R:Rovvv( }׋S RvaUWrM~}:~ ~s,~~#} ~u >t6>toWpWvvh W:W :W(> t~~ Wv!RWc& |?RVRVw&FVA%~tV9Vt W' (UWV$Wv%F  u̓} V9Vu+ ^FVUWV~v |\FD Vv[ FGFu֋FUWV~eEuBVGVT#UWV~Gڊ uO'#UWV~ DvvVVGOuvFF[ ut,UWVWdžv4 RD!F tF9 H Rv=uJ VzRvWvzR)džzK z^uUWVvvK |s> tZ~tv V:V.~tv V:Vwv V:Vc}OW~Wv{'v$vv% |v.'Nv'=>tv'"> uh Wv~ |}uEt5FVFV~ u'R+PREPȋڋƙ+FV ƙ)FVEu9~4ƙ;V|,;Fr%E+EVV"UWV~Yv G u?VVVڊ u'VڊF:tV+VVڊWFV j"|džxxRz[RxVڋ[W u x}xzR, RM)xFwgV :V# VvkUWV,v t W WCUWV+v u V'TUWV~\RW?% |=RVRVS%FV$~tV9Vt;V|;FwVUV)+ҋEt UUev vvEP{FV>Et7W EteUUv vvUWV~)=uG:Vt 0"UWVFFVFVV tF \v6N+=u=uQ= u= u=utvu +++UWV~v{VV WvQUWV6* v8 V:Wv@PVvW~vPO V:Wb&UWVp WI&UWVqVV ua~v3ցt:u FGNVBVNu VEP7FV;Ft~;FuxsUWV~WD +PPREPuueEteUWV~v F~u39Vڋw;6 uT9.+=u~= u=uh=u=uWVFNu FGM&UWV~D=0}=9~PGƹ [Ë=u֋%UWVRvVV | \D* VЉV|GNuFV9VrNjFUWV~v F~u8>VV |\*GD V*PG-VF+҉FV +҉FVFVFV~!}=vvcF=t RNF RAF=uK~uBF Vt~vV=uVG:VtH+VJVFRGVF[;t ~u~tV~~GvVr*U~VVVڋ uWGF[ uOFV,UWV\vF~;~w=/t V*Ob% |>u vH)vv; t v%UWV~;vGOu#VVVFVڊF[ NuD u FV9Vr‹FMUWV Pvv& 4UWVv~Wv~E t+ UWVv( |, , * (F +҉FV PRFV[YӃ}~=w~u ~t  R8VVvV [VV vWV~vRWR R)PvRP^ R'R FNuW'Rv tRW>) |Vڀ?/uV.VGVUWV><uW WW<>vu=W WW 6vDP6vuNVP%UWVv~W~Wvc(%UWV~v=F=0}!=9~PGF [F RЋ t |LjF̓} ;vu+FVUWV2 W~Wvy4 t+UWV FB~~F~W~V[VReR (UWV{~uo 9Vrc~ TV;rv;VtVڋVڋWU~V uJ20FVRW'F }(RVRv'Fv&~tF;(t ;*u W(Rv5'WW WWW WWvPvWW WW<@u WɃ< u vV׋$UWV.| B?RWI# uVW8#G$UWV~狽 uZ WK!P WW$Wv<N| ^+F FP+PF:UWV~EtMEuE@tE)EM}uEuVqU;t UT|UWV!*W * > > UWVvZ@PRvV=tO>tERW( | u"FV;0t;2t W(~PV(+20FV~Z}=<><?'@WW3P(> =v.5IIIHUWV ~UWV~v~N}~狽 W,!P~狽 WW# W !P WW# Wv"vӃW W" WW"^0 ( ) *!+",#-$.%/ &0 'Et݁M( u4 t 2 VEtVVuEPuu }'=uMEt eM t]E*GFGFGFn^7Wn^dRW~n^dRWhn^dRWR^ d|E2E0^W)UWV>)u=6)>)))(|s")-)6)>)ރ6)>)UWV~+6)=*u)G))ø6% UVW~ vN^_^]s Óz*RWVR RWFF UWV( ;> r+ Eu ܋_UWV~6<t4WUWV~}tEt uesvuuMuu'UWV~V)V)>)=%tG=u9>)t+R6)R+ dRW+)UWVFunmUWV~G~ |F 0 GF 0G|UWVVVh=0|=9Gƹ Ë)UWV~2UWV~$UWV~UWV~v9v *PGN^ |^ WGsË܋_W+øF܋_#tظr܋_؉ãË܋_SXsã+ø܋OFt+ҋX UWV~vF:uG?=u|=u=t+ҋ& UWVF~t1WF)W tvW )R6) =u))2)))) G=-uG)=0uG)W )>))=.uGW)>)G+һ>j>*tU*t%5tV;wV;r=;w;>ht+*>*~F *+R+ڋF  v v F~}R=-ũ~ 0uƋ^ |^ WGڊ*G멋^ WGڊ*G^ }v *PG;N})^ |^_w0#t tۍb0[r u UPSQRVWF-bP__^ZY[X]v ~t~9~v)~ ~~F8YWWH FvUWVW)W UWVWPDv UWVv .P^RTRz Rpd Rf6 R\6)6))R)R) 6)))*)[t))*;vŋ*Ru.*V9*롋*RVUhj8^߉j;v *j׃tUWV~ WGڋF  v v N~uAUWV~Et MeEuQ+҉VVVVFvVREPF_8 Ӓ܋_#tGË܋_#ø< r ܋_ P^ UWVVR <PRFPR PR^G[Y+ӉFVVR|FwF/| Jt| Ku\ ㋗ V\  )))u) )))uq)))u^RR R R6)6))R)R+>j55ZUWVvVփV>*u**>hV9Vv;r~Vh9Vuߋ׃;uցvV;V: P tMEEEt@u]VEց;Uv~ uU+։VRVEP8FuyEtoUu52 ut ã[;s bP;r&USWV^v Ǚ+ȋƙ+Fȋ+щGf^_[]f^_]USWVF y VvVVFvVIF~t8;~ ;~u.||(;~| ;~u|}FVVRCD UWV~v:|u H6)>)t)BRR)R)R"#))?)"PP Q"QmQ=u=u=u=tR%)+=tS=uuVV[96hv6hUWVvDtV@D+ƺFvto;tkv~VBVV9VsVVR։UuMM+҉VV$U+։VV~uvVEP FVFuV9VtM V UWV~;V u>Rȋv~ } ރV+~yރƋ׍f^_[]øPv~ y Vރ+V y ^ V;| +EE +P UWV QRR^GPR FVQRR^GPR FV~|~sQFVn^~=tmR=uH=ulP R= ui=uM=um=uFG=du=ou=uu=xuO R=v^[FFVNu;s+V;r F+ƺNj؋*UWV~Wvf}+^UuFUt=U+։V~1uEt+vVEPM ;Ft M +ҋ UWV( W ;> rs UWV~9~ v+~ F+USWVv ~Ǚ+Fȋƙ+F ȋ+эf^_[]USWVF y;V u.ȋvF y+ yF*v<PRvv [F<PRvv^ƙ<Fƙ^7FPRFVpPR] *~|0~ru=uC=u)U)6)+6);6)};+҉V>)uډV6)6)vV6) UWV>)u>)t>)t )wgNO+Ë^wFg_^UWVv tWvjUWVvtWvRUWV~v~GuOGEt>E@u7WaEPR }Et uEtEe UWV~u+^+t+^ڋ™f^_[]Ëv~ yރ+V y^ ;| 9~ v +~ +FyЋǍf^_[]UVvN^#(FV;V=|;Fw6Vx)FVF۾F|~sHPWFVN~~6*~>*V7=nu + + F9 0)vUWV~ǙPR6)6)ǙPR6)6)))u=tW } )փ0 )փW)nUWFuF]UWV~vF:uGu+<N؊+UWV~+FGu܋_ø~xrl=at=rtU=wuVv[tRRv F}>u VvnFR+PRva tR+Rvv F~^s]@(#)delta 5.1bdiffambiguous `r' keylette~ ^BF^7F**UWV)GFu^G ,)GFGFGFG^^BV6)4+)6)>)QUWV))6))(|s")-)6)>)ރ6)>)UWV>)u=6)>))܋O_@܋O_)s܋O_V6;^sr#tãã +ø/ø/}aVUtM^?ruMM׋4 UWV~~tL+R RW F=|%P RW Fҁ0 ( ) *!+",#-$.%/ &0 'r value (de15)leading SOH char in line %d of file `%s' not allowed (de14)unknown key letter (cm1)value after %c arg (cm7)keAAAABBBBBB *pad 3.1(null)pace (co22)@(#)doie 5.1Included: Excluded: @(#)dolist 5.1bad range (co12)delta list syntax (co13)@(#)eqsid 5.1@(#)fl]c]c1c]']]c]c]]cccG~t+F^tFPR RL RFF؋uRFT trapIOT trapEMT trapFloating exceptionKilledBus errorMemory faultBad system callBroken pipeAlarm clockdump.core@(#)y letter twice (cm2)missing file arg (cm3)cannot create lock file (cm4)invalid sid in p-file (de3) %s: no id keywords (cm6)ushto 5.1@(#)newstats 5.1%c%c %s/%s/%s @(#)permiss 5.1SCCS file lockedF;v}`>u RF>t>t RF>t>u>t) %u (ceiling) (co16)t RvBF;v|> tR+RVbaUWV,"R]t>t@ +Rv R++^P RzRv/directory `%s' nonexistent (ut1)xcreat@(#)xlink 3.1can't link `%s' to `%s' (%d)xlink@(#)xopen 3.1`%s' unreadable (ut5)d %u deleted %u unchanged cannot fork, try again%s %c%c00000 0MRs not allowed (de8)invalid MRs (de9)MRs required (de10)usr/local/get 755 152 2 release `%d' locked against editing (co23)@(#)pf_ab 5.1 bad p-file format (co17)@(#)date_ab 5.1@(#)rdmod 5.1Inex conflicP7t RERv R* >t  `%s' unwritable (ut6)`%s' unreadable or unwritable (ut7)xopen@(#)xpipe 3.1pipe@(#)xunlink 3.1xunlink@(#)xmsg 3.1no fil%c%c %s %c%c %c%c %s/%s/%05u 0000000000%c%c AUTO NULL DELTA %c%c %c%c %u %c%c %s missing -r argument (de1)login  71304 3142671160 6514 t %s at line %u (%s) beginsco12endsco13premature eof (co5)@(#)setup 5.1@(#)sid_ab 5.1@(#)sid_ba 5.1%u.%u.%u.%u@(#)+RgR RU/P RxD>t'>>6u>8t R$R6I+RRVR Rlu R+ R Re (ut3)`%s' nonexistent (ut4)directory `%s' unwritable (ut2)no space! (ut10)write error (ut8)errno = %d, function = `%s' (uname or SID specified not in p-file (de2)cannot fork, try again (de11)%d-s%c%c %u %c%c %u %c%c %u %c%c %u internal errorsidtoser 5.1@(#)sinit 5.1too long (co7)s.not an SCCS file (co1)more than one link (co3)@(#)stats_ab 5.1@(#)fmterr 5.1>u Rz69w s *RDRRֹRU:>t09t&IR RHRREt11)@(#)cat 3.1@(#)dname 3.1@(#)fatal 3.4ERROR []: @(#)userexit 3.1@(#)zero 3.1@(#)zeropad 3.1(null) in delta/enter() (de5)internal error in delta/enter() (de6)internal error in delta/enter() (de7)@(#)chkid 5.1@(#)chksid 5.1format error at line %u (co4)@(#)getline 5.1premature eof (co5)corrupted file (co6)@(#)putline 5.1%05u%05u%05u%5u%c%c%RRR :+R66 RV R&xu >uG>u@ R Rz^}+* t"€t RJR invalid sid (co8)@(#)del_ba 5.1%u%u@(#)date_ba 5.1@(#)dodelt 5.1clock set wrong!!! (co10)Clock may be set wrong! (co1 e F܃Swu\ PXUWVvGBcUWV~?-tWs %c%c %s/%s/%s @(#)auxf 5.1PFESTEDTTZ@(#)fdfopen 3.1@(#)imatch 3.1@(#)index 3.1/binRH RC>t VRRM(VReR6H>u>u>uRRR;9>Tt>u+RR R. M:/Day Mon 00 00:00:00 1900 SunM1) @(#)del_ab 5.1 @(#)dofile 5.1s.r%s/%ss.@(#)dohist 5.1xMRs? comments? standard input specified w/o -y andVurߋVFF-a=v.i^u 8vL>^tݺRRv+,P.>| >/shPATH:/bin:/usr/bin/sh@(#)lockit 3.5%s/%u.%ldlockitLOGNAME@(#)move 3.1@(#)patoi 3.1@(#)rename 3.1@(#)repeat 3 R RpR RJ-P]}+ 6/Q t㺘 R66 R >u6uP[F҅} onTueWedThuFriSatJanFebMarAprMayJunJulAugSepOctNovDec**  AA/or -m keyletter (de16)line too long (co18)response too long (co19)cannot fork; try again (co20)too many MRs (co21)out of s'>RG^tRv?$uxTRԋVh^upVR^uZV<F6hR뒤]c.1@(#)repl 3.2@(#)satoi 3.1@(#)setsig 3.3 ( 7 @ I \ c m z SIGNAL: (ut12) Illegal instructionTrace/BP0 ( ) *!+",#-$.%/ &0 'iRB~t=&[Px\>t RRTR Ru R>u_>t PR>z^RHLt VRR R VRR R8x@RVR5tRLLP"vxBUWV~F*PJF@t } P! |WGں**PI^v}. |WGںIt%4t;V|;Fs ZR/+FVFԉVҸ3;V|;FsttR Ro3VBVRJ4vt bR8R$t R8RQt R8RvF/FW0Pv`WvY"R"R\="RtR$R R>P0% R R R6WC R u6O>t> t 6O>tu6XVt ׁRׁRvP Dž'FFuM4W V~uv4|t>t9|˜IPIq |WGںXXPԋ |WGںCCP뱋 |WGں PV4/VBVR'(v(/4VW ~Dt,~txvVR8tg+RVRR-Rv/Fv=RvF6PF FRvF FvRvqFRP^%F^FF<t^ 6R6DF>u/>u(>bt RA>tR RF+RsQkVR=\~t &_A>t 6sOqR9~ VVN뽃t>u~4W V v49u 9TtMN~uBuJ4W V)v4 |WGڸ  PHvVV3!vV2VAvVV VvV6V@5uׁ.V ^Ѐ?Dt FЋ^Њu^Њt^ЊV  +҉V։V9<|<<v4VډV܉TVމTVT SuY4RR\>HfzpFUWV~vGFuHRUWV~ >tVV8 Ra+P\j==ZPzR RE+PD5d\UWV~FuSWV%u"9<~uWVtn9u9Tu 9Tt N~uыVVuWׁRF~u R{2v4RׁRV/(~uu"9H=ct =et9=muDuV=V@VV=Fu~tKuD |WGڸ  PHVT FVDT Y=etb=gt=it=mt8=xtW~Du3փRׁ.R.u%/=cu~tW;WxF؅uԃ~t;>t#vVVvVV8;_RUWV>t 6#E6D>t> t6E WQ>u| FJu~u F;~u$WVw%uWVUt DžF~t9NFWuRׁRׁR(FoMUWVfMUWV,M>dt WpWvPL}++> t+WWpWvPf/VVL=tI t IVUWV~:RR LCBNR:R4w (.u W]uW .u /su4aHUWV~vW'uWWVׁ.R1HUWV W,FFF~> upW W PtQ^ WqW W P!Q}+=> t5+WpW W PW5WqW Ws P,|2V$uWV"%tFWV%uWV t V?7[UWV vVv $^tvVP WW@3t_PIE+W~W ~=;~u~};~u~};~u~};~uo?tNutXRֹ4 R ja`lRXRQvRׁRjVt +RvR +R RR:rFFFVڀ? tڀ? tVڀ?0|.ڀ?9'vFR#FVڀ? tڀ? uFF+FF~~~~=~uOOPzW WW PV*vQUWV~Q+z RpRW) VP|+ҺRRVJ2P$vR+PRv8Vv6DD~(VE-=vz. ~iu!VVW#g"VVWvVv $vVV V^D VH?L]?UWV~L+VVpVW:P.PFVVqVWPQ-PFvV2vVVu VUWV~vU0tFUF/FU0tFUF/FFUFUUWV~>uv%R3uVv~WF[~^VW^VW~W~Wv!HGUWV~vG?t vG?dtOG= t= VRׁRc|RׁRQVRR5VRz|RVRRv: ~tvRv9~tvRv91vVv #vVV V3D VӾ Vu ( J YZUWV~JY+VVW<P-2tdž %V$VlVW(Y2uv>v>KUWV~^u#=u}u}u}u }u}t (Vm0KUWVvAvE 0F ve<%tR|uI|%t@F-A=v(.RvyFk6vAR"R>"RvDR"RuGT G= t= tVWG= t= tփ RW0>G= t= tRW F} vTvփRW(!^GVRv9vXCt|RR69`P uRV2L+RP#xvVMƋG+RNRV]>P!;Pz-VV7@tstVV @VVkDtC(tvFE 0F/FE@ 0FE@ 0F/FE 0FE 0F FE 0FE 0F:F>"Rv GR"R>"Rv JR"R>"Rv~:RvtNRvj6Lv`XRvVlRvL6jvBBG= t= tփRWU"G= t= tփ RW9"= t vd%UWV~ E=-uG8R/tSRC#dt9Nu9Pu 9Ru 9Tt(9VuD9Xu:9Zu09\u&xBVRR Rc9 RM4(uR |WGڸ  PeJ |WGں ˜t Pd |WGڸ*E 0FE 0F:F 0F 0FFFJUWV~,Dž4FRIvWVRW8=dRv86v.RvFRPF FvRv+RWRE8R8RO$t MR8R1Q0 ( ) *!+",#-$.%/ &0 'PRt׍RV뾺 RW$E}+҉>WVE t@u6>RW.tύRtgD=gtR=it5=xt<DF~tvvVR/NFFFFFF@ 7UWV~~t =@P6݃[R+RWR$㋿RG? uOv tx@UWV~:u Ra%\t-VF;<u2UWV~vu+RW'6u4RVRtRVRtRVRVV^!>u ~tR"RR6+% FF=It=Dt=Et WlF< t< tVRV~~ 4W ;V}W;~Pp0džRRR-RRR-MtFRWRR.Ra"PR4tR}u VUv u6UWV~vVW=.uGփRW=.uGփRW=.uGփRW6UWV~vu5vPR R@* R*%Vt-VkF;sPR R * R$htWV%@UWV~vF F^uVV^ F^uVV^ F^u  RVRnVRVRhRREu vW5`V(Vڀu#ڋW Rv~IuRRvW!^W Rv~IuR+RvW) WtVRRRb-=t7UWV~t.^tW~6-iWvvP~t.^tRVL FuN}tuu RV+ FuNW6UWV~^4w 6ֹR^4[ӉVڋ;uW;UuW;Uu=auF~t R$?=tVRWG9Vt 9VuFvRR)UWV~v<@P#v+RvVR6 t"VRVRVRsRRR66/$Q1UWV>t 6$+>>-1UWV~WPFt)=*t R+ҋ:UWV~*tV9UV9Uu vqRփF^?^VW^VW^V W^V WW~6-xWvv~ tgWv vXDUWV~:AvVWD=-tGvVW.~t~u~uW;UtNuŋ5UWV~vFRWV2@=~ 2RVPAR u DRg+RVWƅ&DžD~u#<t< uTvWV{F׃RVkFPRVFE~sv׃RV^G F럺RR#vF׃ RVggt$=lt4+RW$R+ߊV$$0+RփR$R+RV$R$lUWV`Rq%u=uF6:=^Bt"v*Sv[Gt ^>^GvXR:UWV~*vtV9Tut|t>^V4v9v| 9vuv9v} V(+vʉvȋvԉvċv9v~v9vuvvvVvŠFPv}FvvVM F…uF믋v+RRVP,ׁ.R,M  R,GP2> ~ [RWFtF?u ^F?ht,'W6E$E&~tI<tDV;@PۃF+RVP"vFUWV ~>F=tG FNu=-t+VtGF=9GF F=0}~tVډV<PRF<PR086=uW W:UWV~*tG|tT'u:\4^^W^W^Wƅ'9UWV9vuv9vuv9vuv9v} V#(v9vSvvV F…t?vVPFPvFvvV F…tvVPFPvׁRvF؀? tWDž4UWV~vׁ.VWt^F?u ^F?st WNFVڀ? tڀ? tuFc~F|~c~F=uF ~|~ F=uvvbF~|vvM;F|nF=uF~|~+>t6<F=tG FNu/UWV6VtV&Vv6&Vv,/UWVVR~}Iu}t}Du}t+VV^^tWt~t+vvVVVVڀIuڀtVڀDu.ڀu&VڀD=,uG=tBUWV~vV~W 9~t<u R'|uD'|u|t) R|t |uD'|t RH'VRjFփRFvUFփRFv@\4UWV~,%'$V V V+4UWV~&u +RWRF=uF;~}x~;~o0F=uF;~}V~;~M+FVFlFv$7FVF~9~}vv{R. |vȃtVƉVR}R- |VRW, |W_,V9Vt%&/u ڋWV~u^WV ^IuF^Vuu~t V9U~F~t V9U}F֋8UWV~F^(4BUWV~v9u T9UuT9UuT9UuYB+UWV~F?uV8tV&Wu݃uW +RW,Rׁ.RFt-$ƅ&ׁ.V^u^F僽@u,&Dž,;u RWDt3FVNuFHFVPR~W/=FFV<PR~W=FFV<PR~W<FFV68>6v~~W2&&W/,eVVNRVRW-=t~uV/VRv. }V9VtVʁ@tVVw (^ut޹4W uW޹4_ (޹4GW ;|;v RRv>BUWV~ FgF?PRVR+M<tUF+R RV:u"Vv~>tVVRo>uƅ:VS Wi t R<@t9+PPR,_Dž@Dž$DžDžDž ƅ'DžD>3UWV~u>uN RW^2xRW؋Gt v~v~^w?+UWV6 <0|<9~F<u<t#F6&VڊF[ u&~u &/&&W|+SWj+RRT, |@R&RW~tRׁRֹ4R{F+RRv +RRv^uֹ4R(Nt7UWVvvu~tƅ:t|UtW jAUWV+LJRF|vG?t}G?ftrG= t= tGƟG= t= tRWFR6 PPl"RP6 6 v/~tv&&u.+t!6VV>u F  <t F6k<UWV~>V3.F?te't"tJ>t~uR"RR60 ( ) *!+",#-$.%/ &0 'F,=@tVR&R>- |W+NV9VtF'6&VڊF[ u&~u &/&&Wo~ 9Vrc~x TV;rv;VtVڋVڋWU~VU;t UT|UWRWR RC(PvR8 PR:'R FNuW:'Rv t RW' | uJW/ȃ u v>?'"WW3P>< =v.IIII(UWV ~=0}!=9~PGF [FV׋#UWV.| l@RWG" uVW6"G#UW*eW*RR+ |F9vu)RVRWp+=uWW*WE*RV!:*Ws~ :*x >| >z UWVv@PRvV RVP | tV R  FVRW&F }(RVRv&Fv%~tF; t ; u W'Rv &=tO>UWV~v~N}GVUWV~= t0GvUWV~VVN~. | ]E*V~狽b uZWe PWW #~狽bWF P~狽bWW"W' PWW" Wv!v)* |jRX |FFVV6&VڊF[ u&~u &/&&V RM R7vvv }׋ RvuFaUWVvv! uj>u >t6tE RWF' | u"FV; t; t WG'~P'+  FV~Z}=<rM~} WЋ|^ƈF u̓} V9Vu+ ^FVPUWV~v |\FD Vv1 FGFu֋FЃW$ W'! WW!WP"CUWVvvNV֋ڀ?/t3v~}'VVڀ?/u,6UWV~v RW* |gF VGu~D sAF Vځgv[Gu VځO>toWpWvv W W  W(> t~~ WvuUWVvv |s:~ ~s,~~#} ~ tZ~tv V V2.~tv" V Vv8 V V V\ VvIk |?RVRV)%FV$~tV9Vt WJ&&UWV$Wv#F }OWu9~4ƙ;V|,;Fr%E+E;V|;FwVUV)+ҋVEt UUev vvEP)FV>Et7Wo EG u?VVVڊ u'VڊF:tV+VVڊWFV !UWV~)=uG:Vt WdžvR@ F tFRv=uVzRvWvzR(džzz|džxUWV+v~ ur WvUWV6 v V Wwv@PVvW~Wv-&v#vvd$ |v%Nv%=>tv%"> uWv? teUUv vvEPFV;Ft~;FuxsUWV~W +PPREPuueEte!UWVFFVFVV tFx Vڋw;6| uT9VV |$v[WVv+[vT[W<փ7vr׉VVVF+҉FV~ +҉FVFVFV~N+=u=uQ= u= u=utvu 9*)UWV~v{VV=u=~VVVڋ uWGF[ uOFVUWV\vF~;~wWVWE|%UWVqVV ua~v3ցt:u FGNVBVNu VVF\*GD V*PGNuD u FV9Vr‹FUWVX Pvv UWVv~Wv~E t+U!}=vvF=t RF RF=uK~uBF F ~ +҉FV PRFV[YӃ}~:u=-uv[FGV9Vu V/F<uv[FFV=uG)UWVt~v=/t V*OVڀ?/uV.VGVNUWV uW> WW>u=WNu FG$UWV~D=0}=9~PGƹ [Ë=u֋$UWVRv$ |WVv |  * RЋ t |LjF̓} ;vu+FV?UWV FB~~F~W~Wv<N=w~u ~t R8VVvV [VV~ vV[VRe(UWV{~uV=uVG:VtH+VJVFRGVF[;t ~u~tV~~GvV$)UWV~vD WW6P6WWG WWWI WWovPvWXWL WWF@u >u vn)vv-;< t vEL$UWVv~W~Wv &$UWV~v=F0 ( ) *!+",#-$.%/ &0 '| ^+F FP+PFUWV~EtMEuE@tE:)EM}uEuVqEt݁MF^7F2*"*wUWV*p GFu^G Ɗ *GFGFGFG^^Ơ GFGF6)>)UWV))6))(|s")-)6)>)ރ6)>)UWV>)u=6)>)))UW ;^sr#tãã +ø/ø/ø6%tM^?ruMM׋ UWV~~tL+RI RWF=|%PRW FҁRWV  u t VEtVVuEPuu }'=uMEt eM *]E*UWV~}GFn^7Wn^dRW~n^dRWhn^dRWR^ d|E2E0^W dRW+V>)u=6)>)))(|s")-)6)>)ރ6)>)FUWV~+6)=*u)G))=0|=9 UVW~ vN^_^]s ÓXF܋_ #tظr ܋_؉ ãËRWFFy UWV ;>N r+ EuS ܋_UWV~6 <t4WFt+ҋtEt uesvuuMuuUWV~V)V)>)=%tG=u9>)t+R6)R+)R6) *UWVFunrmUWV~G~ |F 0 GF 0G2UWVVV> >4*tUGƹ Ë)UWV~UWV~UWV~UWV~v9v *PGN^ |^ WGڋF  v _SXsã +ø܋O_w0 #t tۍc0[r u UPSQRVWF-cP UWV~vF:uG?=u|=u=t+ҋ UWVF~t1WF)W tvW6 v ~=u))N)))) G=-uG)=0uG)W )>))=.uGW)>)G+һ.Q^R8*t%5tV;wV;r=;w;> t+8*>8*~F 8*+R8*;vŋv F~}R=-ũ~ 0uƋ^ |^ WGڊ*G멋^ WGڊ*G^ }v *PG;N})^ |^ WGڋF  __^ZY[X]8 Ӓ܋_#tGË܋_#t~9~v)~ ~~FYWWFvjUWVW)WB UWVWP, UWVv P UTRz Rpd Rf6 R\6)6))R)R) 6)))*)[t)) ))8*Ru.8*V98*롋8*RVU  8^߉ ;v 6* ׃*UWV~> 55 v v N~uUWV~Et MeEuQ+҉VVVVFvVREPLF_ P tø< r ܋_ t ã[; s bP;r& USWV^v Ǚ+ȋƙ+FȋWVVRk <PRFPR PR^G[Y+ӉFVVR|FwF/| Jt| Ku\ ㋗@ V\ ㋗B VvVV)u)~ )))uq)))u^RR R R6)6))R)R+H6)>)tUWVvVփV>4*u4*4*> V9Vv;r~V 9Vuߋ׃;uցvV;VuVVMEEEt@u]VEց;Uv~ uU+։VRVEP FuyEtoUu5 uR+щGf^_[]f^_]USWVF y;V u>Rȋv~ } ރV+~yރƋ׍f^_[]øPv~ y VFvVIF~t8;~ ;~u.||(;~| ;~u|}FVVRCD< UWV~v:|u +EE )BRR)R)R"#))?)"'QYQ~QQQ=u=u=u=tR%)+=tS=u~=tm[96 v6 UWVvDtV@D+ƺFvto;tkv~VBVV9VsVVv^[F։UuMM+҉VV$U+։VV~uvVEPy FVFuV9VtM V UWV~UuFރ+V y ^ V;| 9~ v+~ F+USWVv ~Ǚ+Fȋƙ+F ȋ+эf^_[]USWVF y+ UWV QRR^GPR FVQRR^GPRFV~|~sQFVn^F"*v<PRR=uH=ulP R= ui=uM=um=uFG=du=ou=uu=xuO R=u=uC=FVNu;s+V;r F+ƺNj؋6*UWV~Wvf}+^wgNOUt=U+։V~1uEt+vVEP ;Ft M +ҋF UWV W ;>N r) UWV~Et>E@;V u.ȋvF y+ yڋ™f^_[]Ëv~ yރ+V y^ ;| 9~ v +~ +Fyvvi [F<PRvvx^ƙ<Fƙ^7FPRFVpPR .*~|0~r(FV;Vu)U)6)+6);6)};+҉V>)uډV6)6)vV6) UWV>)u>)t>)t )0)v+Ë^wFg_^UWVv tWvBXUWVvtWv*@UWV~vF:uGu+ N؊+u7WaEP* }Et uEtEe UWV~u+^+t+^=at=rtU=ЋǍf^_[]UVvN^# ^s]@(#)get 5.1@(#)WARNING: being edited:=|;Fw6Vx)FVF۾F|~sHPWFVN~~6,*~>0*V7=nuR + +P F9P ~R ^BUWV~ǙPR6)6)VǙPR6)6)i))u=tW } )փ0 )փW)$UWV6)4+)UWV~+FGu܋_ø b\VPJ܋O_@܋O_)s܋O_V6wuVv[tRRv F}>u VvnFR+PRv9 tR+RvN F~}aVU0 ( ) *!+",#-$.%/ &0 ' `%s' (ge18) r out of range (ge22)bad date/time (cm5)unknown key letter (cm1)value after %c arg (cm8)key letter twice (cm2) 14660 3142671160 6667 t editing (co23)@(#)pf_ab 5.1 bad p-file format (co17)@(#)date_ab 5.1@(#)rdmod 5.1Inex conflict %s at line %u (%s) begiځO VځOVvUWVv~W~Wv ~UWV~Yv G u?VVVڊ u'Vڊe (ut6)`%s' unreadable or unwritable (ut7)xopen@(#)xunlink 3.1xunlink@(#)xmsg 3.1no file (ut3)`%s' nonexistent (ut4)dirmissing file arg (cm3)e not allowed with m (ge3)User ID not in password file (cm9)cannot create lock file (cm4) %s: serialnsco12endsco13premature eof (co5)@(#)setup 5.1@(#)sid_ab 5.1@(#)sid_ba 5.1%u.%u.%u.%u@(#)sidtoser 5.1@(#)sinit 5.F:tV+VVڊWFV UWVvv{ |s> tZ~tvVV.~tectory `%s' unwritable (ut2)no space! (ut10)write error (ut8)errno = %d, function = `%s' (ut11)@(#)cat 3.1@(#)dname 3.1@( number too large (ge19)writable `%s' exists (ge4)%s cannot fork, try again%u lines no id keywords (cm6)No id keywords (c1too long (co7)s.not an SCCS file (co1)more than one link (co3)@(#)stats_ab 5.1@(#)fmterr 5.1format error at line %u (cvVVvVVVVvvkUWV6,v:VW7v#)fatal 3.4ERROR []: @(#)userexit 3.1@(#)zero 3.1@(#)zeropad 3.1(null)m7) bad SID calculated in newsid()%s %s already included (ge9)%s already excluded (ge10)internal error in get/enter() (ge11 ܃Swu\ P%UWV~ujP6>t V;~}v4Go4)@(#)getline 5.1premature eof (co5)corrupted file (co6)@(#)putline 5.1%05u%05u%05u%5u%c%c%s %c%c %s/%s/%s @(#)auxf@PVvW~vPQVWRqLFv6VW.+=u~= u=uh=u)%s %s %s %s%u%u%u%ucurdir failed (ge20)cannot change directory (ge21)curdir failed (ge20)cannot change directory (g+VUWV2V]tv@=2~ 6V~ =0|=9~G=u=uT+VvvV+VNV&VV 5.1PFX\ESTEDTTZ@(#)curdir 3.2/dev//.//etc/mtab....@(#)fdfopen 3.1@(#)imatch 3.1=uW~VVVڋ uWGF[ uOFVPUWVN M:/Day Mon 00 00:00:00 1900 SunMonTueWedThuFriSatJanFebMarAprMayJe21)%u%s %s being edited: `%s' (ge17)%s %s %s %s -i%s -x%s new delta %s nonexistent sid (ge5)@(#)chksid 5.1invalid VV}+6t+VVV;~u+VvvVn+VVVy+VvvVP^ʋ+V+VvV&VV.@(#)index 3.1/bin/shPATH:/bin:/usr/bin/sh@(#)lockit 3.5%s/%u.%ldlockitLOGNAME@(#)move 3.1@(#)patoi 3.1@(#)rename\vF~;~w=/t V*OVڀ?/uV.VGVUWVuWunJulAugSepOctNovDec4*4*:*o = %d, function = `%s' (ut11)@(#)cat 3.1@(#)dname 3.1@(sid (co8)@(#)date_ba 5.1@(#)dodelt 5.1clock set wrong!!! (co10)Clock may be set wrong! (co11) @(#)del_ab 5.1 @(#)dofile+VWvV VV}+6u!+VvvV+VVV+VVVYP*6VVt* 3.1@(#)repl 3.2@(#)satoi 3.1@(#)setsig 3.3  SIGNAL: (ut12) Illegal instructionTrace/WW>u=WWW~6 P6WeWWWSWWWAv PvW*W#)fatal 3.4ERROR []: @(#)userexit 3.1@(#)zero 3.1@(#)zeropad 3.1(null) 5.1s.r%s/%ss.@(#)doie 5.1Included: Excluded: @(#)dolist 5.1bad range (co12)delta list syntax (co13)@(#)eqsid 5.+V VV>-uЍvVVAuu%SVvUVVVvhV6VV.t>-t>BPT trapIOT trapEMT trapFloating exceptionKilledBus errorMemory faultBad system callBroken pipeAlarm clockdump.core@(WW@u W u v>?'W W3P >=v.kO>41@(#)flushto 5.1@(#)permiss 5.1SCCS file locked against editing (co23)%d*tVnVt6VVt>-u6KUWV qW463W W+W W WKUWV#)sname 3.1@(#)strend 3.1@(#)trnslat 3.1@(#)any 3.1@(#)xalloc 4.3:*out of space (ut9)@(#)xcreat 3.1directory `% UWV ~ UWV~VVN~. | ]E* WЋ|^ƈF u̓} V9Vu+ ^FVusr/local/help 755 152 2 not authorized to make deltas (co14)release %u < %u (floor) (co15)release %u > %u (ceiling) (co16)release `%d' locked agains6 8UWV~vRW |gF VGu~sAF Vځgv[Gu Vs' nonexistent (ut1)xcreat@(#)xlink 3.1can't link `%s' to `%s' (%d)xlink@(#)xopen 3.1`%s' unreadable (ut5)`%s' unwritabl0 ( ) *!+",#-$.%/ &0 '@ UWVW~Wv7 t+ UWV FB~~F~W~WvN| ^+F FP+PF UWЋǍf^_[]UVvN^#^s]@(#)help 5.1/usr/lib/help/default/usr/lib/h >UWV6 4+ 6 > !UWV  6  (|s" - 6 > ރ6 > UWV> u=6 ;vŋ Ru. V9 롋 RVU8^߉;v  ׃UWVV~EtMEuE@tE EM}uEuVEt݁M ut VEtVelp/argument too long (he2)cmds %s not found (he1) %s: %smsg number or comd name? @(#)fdfopen 3.1@(#)repl 3.2@(#)tr >   UWV> u=6 >   (|s" - 6 > ރ6 > `UWV~+6 =*u G  Ud ~!܃Swu\d PGUWVv1RUWVn#^?-t^~>55UWVvVփV> u >V9Vv;r~V9Vuߋ׃;uցvVVuEP uu }'=uMEt eM  ]E*UWV~V V > =%tG=u9> t+nslat 3.1@(#)xopen 3.1`%s' unreadable (ut5)`%s' unwritable (ut6)`%s' unreadable or unwritable (ut7)xopen@(#)xmsg 3.1no f 8=0|=9Gƹ Ë UWV~UWV~UWV~UWV~v9v *PGN^ WVu^7F=ath=du=et[=ltV=rt}<t V t LR6d#RV F؋ t R6;VuVV[96v6!UWVvDtV@D+ƺFvto;tkv~VBVV9VsVVR6 R+ R6  =u  ,    G=-uG =0uG W  >  =.uGW > G+ile (ut3)`%s' nonexistent (ut4)directory `%s' unwritable (ut2)no space! (ut10)write error (ut8)errno = %d, function = `%s' |^ WGڋF  v v F~}R=-ũ~ 0uƋ^ |^ WGڊ*G멋^ WGڊ*G^ }v *PG;N}^9<tҊFP^R R; R6변<t6B먺wRG;~}>u RR66B.&n#n#v^[FFVNu;s+V;r F+ƺNj؋ pUWV~Wvf}+P^һ.5 ^RTRz Rpd Rf6 R\6 6 R R 6   * [t(ut11)@(#)cat 3.1@(#)dname 3.1@(#)fatal 3.4ERROR []: @(#)userexit 3.1(null))^ |^ WGڋF  v v N~uUWV~Et MeEuQ+҉VVVVFvVREP^t RVNG;~|>p#tR+R FQUWV~r#V#NtVWV VVd#V,^#VG >wgNO+Ë^wFg_^UWVv tWvtUWVvtWv\UWV~vF:uGu+     u    uq   u^RR R R6 6 F_PBtMEEEt@u]VEց;Uv~ uU+։VRVEPBFuyEtoUtUVhV6VUVV>tTVV6 uVTVY#VVuVB!> u >N؊+UWV~+FGu6܋_#tظr܋_؉ãË܋_ R R+H6 > t BRR R R"#  ? "? q =u=u=u=tR% + s' unwritable (ut6)`%s' unreadable or unwritable (ut7)xopen@(#)xmsg 3.1no fu5uR`։UuMM+҉VV$U+։VV~uvVEPFVFuV9VtM V u> u> u D >Dt WV :V  PUWV~.+vvvVW u~tvVW =dtWSXsã+ørl[;s bP;r&f^_]USWVF y;V u>Rȋv~ } ރV+=tS=u~=tmR=uH=ulP R= ui=uM=um=uFG=du=ou=uu=xuOusr/local/prs 755 152 2 UWV~UuFUt=U+։V~1uEt+vVEPW;Ft M +ҋ`UWV  W ;>rC > u'~Dt!WeV~u&> u)WeV렍vVVtFF> t ~tF>t V >u}~yރƋ׍f^_[]øPv~ y Vރ+V y ^ V;| 9~ v+~ F+USWVF y R=u=uC=u U 6 +6 ;6 };+҉V> uډV6 6 vV6  UWV> u> t> 60164 3142671160 6543 UWV~Et>E@u7WaEP}Et u7EtEe܋_UWVVV  n=eu=gtH=it+=mtG=xt0W~t .uWvV"vVvV>t vW;V u.ȋvF y+ yڋ™f^_[]Ëv~ yރ+V y^ ;| 9~ v +~ +Fy t  0 vUWV~ǙPR6 6 > ǙPR6 6   u=tW }  փ0  փWV>> tU t%5tV;wV;r=;w;>t+ > ~F +R0 ( ) *!+",#-$.%/ &0 'Ft.u/=ctp>tṽ>t 6A>t 6 AvVvV6BV\NVRN9NUWVUWV~vF< t< tV=ƋGV}RW-*@UWVFv_F>L!t"Fvv&WFuxRq>tRcR\f RRcI}*j u&R,f RR FV RRv~=:t}u}:tGVF-A=v:.  RR7}^7R^wR^~t>L!u V8M!t Wg~u Wv)v2 @UWVTVvf]\ Vvv5l#6R-P Rrt R.PR Gt R-PRBt R-P RFt R-PR R2R,'PtSRPxRt׍#RV#뾺f RWJ:}+҉>#WV#:j t@u#>#{RW#u~DtWeVVVvV8 vvt~uvVVz tFWFt1.u*/=ct=et=gt=WuYwRʋ^WuCwR봺TRR6fR렋VRR듺f RR6M}+j uR R;7t +VW@ Vj#gVvPV@ V9)66PuP 66RuR u?UWV~=t= u62V> RH W P:P:*# e & T y =u=$ur=% u=$ u-=$ u } : =]uS=tύRPn%džRRR"RRR"MtFRW}RR#R7PRit=mt=xtWr~t.tW^vVW+t/utW>~u VV(CUWV~vׁ.VW?t^6PRP6RRE>uֺRԺ@ RR- R@ RFRR6FR R@ R6PFRR6 yFRRR++6W%;?UWV~6 W%!?UWV~F?uV8t Wqu>UWV>t VS(6t WV>(6u=u=u= u= u+R RR%VR=]uRv=yu=y u#=y tpl#w (R=ut#RV#RRR6"=t,UWV~v9u T9UuT9UuT9Uu9+UWVF?u ^F?st+ҋCVڀ? tڀ? uFVv FփRFv FփRFvUWV~vWuPR | :  P:P>O;.~$sG=:tj}ua}ut WV)(6t WV(>t V(>t V'6t WV'6t WV'>t V=u=@ u=@ u= um= t2^w R=u=yu=u= tl#w7Rz=u = tu~ F5F7PRVRC#M<tUF+R RV:u"Vv6tVVRw6uƅ:V W u~W+Rׁ.RR&WVׁ.RCUWV+W4Wv&WWv"?P{$PFBUWV~+RRW$X}:tO}:u$ | : ˜ P:PGVGVF+һ . ^7R5 | /  P/'6t WV'6t WV'>tBV|'6t W)Vg'! |   P P.=UWVVRU=\uX=]ux=% tl#w<R/=uR=\ u=$ u=\ tRZRV~\tNG='u=:t_=\utƅ:t|UtWl *9UWV+LJF|vG?t}G?ftrG= t= tGƟG= t= tRW6@PPF V-R",vRR(uvB5BUWV~>uRV.>t 6V(F?tP&=^w R5 | /  P/P<^wR^7R^wR}^G P%Rnl#WBR-R^~-VW=t1VW=t6VW=t;VWt=t@VW^=tU=UWVv 3=bu=fu=nt'=ru=ttI } \  |  Q P P |6 P:P | " [+RWa㋿G? uOv tx8UWV~:u Rt-VpF;vPFF=It=Dt=Et WfF< t< tVRV~Eu vW`V(Vڀu#ڋW Rv~IuRRvl#w2RPl#7ARC^wFR6^w IR)RLR4RHtROR4RHutRSRRvE 0FE 0F/FE@ 0FE@ 0F/FE 0FE 0F FE 0FE P P } PP |  P P~ } P Pm | \ ' P\PI (R R! Rt-V9F;sPGR R! RatWV7UWV~vF=auFW!^W Rv~IuR+RvW Wt(>t 614*t 0R%+hAUWVAxWv*xWDWRR]RtV`RcRPf RRWJ}j uR f RhR0J}j uhR>t 0F:FE 0FE 0F:F 0F 0FFFo<UWV~vG?t v G?dt} P'P9 P\P7 |  *s P*P } P*P6G=tK+҈ |   P P~t R 7=tVRW7G9Vt 9VuFvhRR!UWVG ~>#F=uFc~F|~c~WdW*vIWW*>F} LW|%~u?+WWdWfWcWWWWiW Wz* W:%@~WK@hRlRuoRVtR8>twR{R>t~RRtVRRtVRRO@<= t= uGT G= t= tVW G= t= tփ RW>#G= t= tfRWF} v vփRW6EUWV>Jt 6J[8WWEW EhWDWDWDiEUWV~+v=0t=.u+0 ( ) *!+",#-$.%/ &0 'F=uF ~|~ F=uvvbF~|vvM;F|nF=uF~|~RF=uF;~}|F9vu)RVRW&=uW &W%R% |jRX |FF}t+VV^^tWt~t+vvVVVVڀIuڀtVڀDu.ڀu&VڀDu ڋWV~u^WGƹ [Ë=u֋#UWVv~W~Wv v#UWV~v=F=0}!=9~PGFuVV^ F^u RVRVRVRhRRR6# t"VRVRVRsRRR6#x~;~o0F=uF;~}V~;~M+FVFlFv/FVF~9~}vvFVNuFHFVV6+VڊF[ u+~u +/++V'6UWV~vf RW% |gFV ^IuF^Vuu~t V9U~F~t V9U}F֋1UWV~vVW=.uGփRW =.uGփRW  [FV׋'#UWV.| R0RW! uVW!G"UWV~狽& uZFW6#o,UWV>#t 6#U+>#>#,UWV~Wh Ft)=gt$=lt4+RW)R+ߊV))R,+RփRVPR~W5FFV<PR~W5FFV<PR~W5FFV6.>,v~~W+؋Gt v~ VGu~ sAF Vځgv[Gu VځO VځOV`'vUWV~v+WG=.uGփRW )1UWV~vu5RVFuN}tuu$RVFuN0UWV~vFRWPFWW\"~狽&WP~狽&WW7"PWPPWW" Wv v܃WW}  )R+RV)R)lUWVVR u=uF60=tG FNu=-t+VtGF=9v~^w?+5UWV~uv.=nu5~狽4UWV6# <0|<9~F<u<t#F <t FF[8t=t !'UWV~Wv 'UWVWdžvRF tFRv=fV-@=~ :RVPIRC u LR+RVW4ƅ&DžD~u+RRVPl,ׁ.R,WW WP$"CUWVvvHNV֋ڀ?/t3v~}'VVڀ?/uFVVN~GF F=0}~tVډV<PRF<PR7,.,=u+4t62F=tG FNuI+6#95UWV~>V3.F?te't"tJ>t~uR"RR6!>u ~tR"uVzRvWvzR $#džzz|džxxRz[RxVڋ[W u x}f R,GP->l ~ cRWFtF?u ^F?ht,"W-ׁRvo F؀? tW Dž=u=/tBVGV!UWV~Gڊ uOu!UWV~Yv G u?VVVڊ uUWV6VjV+Vv6+Vv}( +UWVVRqR7* |vȃtVƉVRsRRR6 FF=It=Dt=Et WF< t< tVRV ~~ 4W ;V}W~Eu vW5`V#xzRR#xFwgV\v6N+=u=uQ= u= u=u/UWV~,e"$V V= V/UWV~&u +RW,Rׁ.R\t-$ƅ&ׁ.V'VڊF:tV+VVڊWFV !UWVFFVFVV tF0( |VRWo( |W(V9Vt%+/++W'eVVNRVRW((Vڀu#ڋW Rv~IuRRvW!^W Rv~IuR+RvW) WZt*t R8+ҋ3Utvu# %E%UWV~v{VV=u=:u=-uv[FGV9Vu V/F^u^F僽@u,!Dž,;u RmDt3t RR@t9+PPR,uDž@Dž$Vڋw;64uT9#uNf RW-xRWFR6j PPl#'RP 6p VF+҉FV6+҉FVFVFV~!}=vvEF=t R0F R#F=uK~uBF++W2'SW 'RuR' |@R+RW'=@tVR+R( |W&N[Gt ^>^GvX 3UWV~*vtV9Tut|t>^V-W W2UWV ~u~tV~~GvV$UWVWn$UWVqVV ua~v3ց6n v+~tv&&u.+t!6#Vl>#u F <u#-UWV~vu+RW'6 F 6+҉FV PRFV[YӃ}~=w~u ~t 8R8VVvV [VV6vV9VtF+6+VڊF[ u+~u +/++Wq&eW_&RR& ~*tG|tT'u:\4^^W^W^Wƅ'f2UWV~}Iu}t}Dut:u FGNVBVNu VVFNu FG#UWV~D=0}=9~P#u4RVREtRVR4tRVR#VV^ F^uVV^ F^0 ( ) *!+",#-$.%/ &0 'V[VRe.(UWV{~uo69Vrc~0TV;rv;VtVڋVڋWU~,UWV>,u=6|,>z,,,(|s"x,-x,6|,>z,ރ6|,>z,nUWV~+6,=*u,G,,GV7UWV~= t0Gv UWV~VVN~. | ]E* WЋ|^ƈFRW/ V0 RW- FF UWV ;> r+ Eu{ ܋_UWV~6d <t4WUWV~}tEt uesvuuMuuUWV~V,V,>v,=%tG=u9>v,t+R6,R+VU;t UT|UWV!,W6,0>4>2uUWVv@PRvVF=0|=9Gƹ Ë,UWV~UWV~UWV~UWV~v9v *PGN^ |^ WG u̓} V9Vu+ ^FVUWV~v |\FD Vv[ FGFu֋FbUWV~eEuFt+ҋ6 UWV~vF:uG?=u|=u=t+ҋ UWVF~t1WBF,W{tvW^ v,R6v, =u,,+x,v,, G=-uG,=0uG,W ~,>,,=.uGW,>,G+һf RV=P~ |j tV\R R Rmv|vvt }׋}RvaUڋF  v v F~}R=-ũ~ 0uƋ^ |^ WGڊ*G멋^ WGڊ*G^ }v *PG;N})^ |^~ |}uEt5FVFV~ u'R+PREPȋڋƙ+FV ƙ)FVEu9~4ƙ;V|,;Fr%E+Ev ~t~9~v)~ ~~FHWW& FvUWVW,W)j UWVWBPPT UWVv .+@^RTRz Rpd Rf6 R\6,6,x,R,R, 6x,x,,*,[tx,,WVvv |s># tZ~tvV V&.~tvV V vV V V WGڋF  v v N~uUWV~Et MeEuQ+҉VVVVFvVREPtF_;V|;FwVUV)+ҋEt UUev vvEPFV>Et7W EteUUv vvP< UWVVR <PRFPR PR^G[Y+ӉFVVR|FwF/| Jt| Ku\ ㋗ V\  ,v,,uv, v,x,x,uqx,x,,u^RR R R6,6,x,R,R+Vv0kUWV6#v V Wv1@PVvW~vP V Wb P tME#E#Et@u]VEց;Uv~ uU+։VRVEPFuyEtoUu5 uEP=FV;Ft~;FuxsUWV~WD +PPREPuueEteUWV~v F~u39 VvVVFvVIF~t8;~ ;~u.||(;~| ;~u|}FVVRCDd UWV~v:|u H6,>,t,BRRx,R,R"#,,?,"5@g@@@@=u=u=u=tR%~,+=tS=uR; LL Fv6#^ V W>.+=u~= u=uh=u=uWcR։UuMM+҉VV$U+։VV~uvVEP FVFuV9VtM V UWV~VV | \D* VЉV|GNuFV9VrNjFUWV~v F~u8>VV |\*GD V*PG-+EE +. UWV QRR^GPR FVQRR^GPRFV~|~sQFVn^~=tmR=uH=ulP R= ui=uM=um=uFG=du=ou=uu=xuO R=~VVVڋ uWGF[ uOFV UWV\v,F~;~w=/t V*OUuFUt=U+։V~1uEt+vVEP+ ;Ft M +ҋn UWV W ;> rQ UWV~NuD u FV9Vr‹F+UWV Pvv& UWVv~Wv~E t+UWVv |  * F,v<PRvv [F<PRvv^ƙ<Fƙ^7FPRFVpPR; ,~|0~ru=uC=ux,Ux,6x,+6v,;6~,};+҉V>,uډV6,6,vV6v, UWV>z,u>|,t>,t x,Vڀ?/uV.VGVUWVp#n#uW WW>#u=W WW6#P6#Et>E@u7WaEP }Et uEtEe UWV~u+^+t+^ RЋ t |LjF̓} ;vu+FVUWV W~Wvy t+fUWV FB~~F~W~(FV;V=|;Fw6Vx)FVF۾F|~sHPWFVN~~6,~>,V7=nu + + F9 0x,vUWV~ǙPR6|,6z,~ǙPR6|,6z,|,z,u=tW } x,փ0 x,փWx,LUWWW WWW WWvJPvWW WWn#@u W!Ճn# u v#=at=rtU=wuVv[tRRv F}>#u VvnFR+PRvg tR+Rv| F~Wv<N| ^+F FP+PFUWV~EtMEuE@tE+EM}uEuVq~ ^BF^7F,,UWV, GFu^G  ,GFGFGFG^^V6,4+,6|,>z,/UWV,,6|,z,(|s"x,-x,6|,>z,ރ6|,>z,UWV>,u=6|,>z,,>n#?'r#WlW3P(> =v.888~8zUWV ~cUWV~v~N}}aVUtM^?ruMM׋ UWV~~tL+Rq RWn F=|%PY RW FҁEt݁M u t VEtVVuEPuu }'=uMEt eM R]E*0 ( ) *!+",#-$.%/ &0 ' GFGFGFn^7Wn^dRW~n^dRWhn^dRWR^ d|E2E0^W link (co3)@(#)fmterr 5.1format error at line %u (co4)@(#)getline 5.1premature eof (co5)corrupted file (co6)@(#)putline ã#ã'+ø/ø/6%UVW~ vN^_^]s #ÓR M:/Day Mon 00 00:00:0 %s%s%s %s %s%s%s%s%05d%05d%05d%05d%05d%05d%c%02d%02d%02d%02d%02d%02d%d%d%s/%s/%s%s%s%s%snoneyesnon dRW+,UWVFunmUWV~G~ |F 0 GF 0GZUWVVV5.1%05u%05u%05u%5u%c%c%s %c%c %s/%s/%s @(#)auxf 5.1PFNRESTEDTTZ@(#)curdir 3.2/dev//@܋_: #tظr: ܋_؉: ã#Ë܋_SXs#ã: +Ë܋O_w0< < #t tۍ0 1900 SunMonTueWedThuFriSatJanFebMarAprMayJunJulAugSepOctNovDec,,/,= %d, functione%syesnoyesno%snone%snone%snoneyesnocurdir failed (prs2)cannot change directory (prs3)curdir failed (prs2)can>6 >,tU,t%5tV;wV;r=;w;>4 t+,>,~F ,+R.//etc/mtab....@(#)fdfopen 3.1@(#)imatch 3.1@(#)index 3.1/bin/shPATH:/bin:/usr/bin/shLOGNAME@(#)move 3.1@(#)8R0[r u #UPSQRVWF-;RP< __^ZY[X]on = `%s' (ut11)@(#)cat 3.1@(#)dname 3.1@(#)fatal 3.4ERROR []: @(#)userexit 3.1@(#)zero 3.1@(#)zeropad 3.1(nulnot change directory (prs3)%s/%s%snonexistent SID (prs1)%spremature eof (co5)-r%s%scannot fork, try again-s-pcannot ,;vŋ,Ru.,V9,롋,RVU4 6 8^߉6 ;v ,6 ׃RUWV~patoi 3.1@(#)repl 3.2@(#)satoi 3.1@(#)setsig 3.3Zn}SIGNAL: (ut12) Illegal instructionTr8 Ӓ܋_#tGË܋_#ø< r ܋_ t ã#[;` s bl)%%execute '%s'%s(none) %sbranch ceiling %s default SID %s floor %s id keywd err/warn joint edit locked releases %s modu>6 558UWVvVփV>,u,,>4 V9Vv;r~V4 9Vuߋ׃;uցvV;Vace/BPT trapIOT trapEMT trapFloating exceptionKilledBus errorMemory faultBad system callBroken pipeAlarm clockdump.corP;r&` USWV^v Ǚ+ȋƙ+Fȋ+щGf^_[]f^_]USWVF y;V u>Rȋv~ } ރV+ M:/Day Mon 00 00:00:0le %s null delta csect name %s type %s validate MRs %s :C::MR::UN::FD::BD:@(#)date_ba 5.1@(#)del_ab 5.1 @(#)dofiuVV[964 v64 UWVvDtV@D+ƺFvto;tkv~VBVV9VsVVe@(#)sname 3.1@(#)strend 3.1@(#)trnslat 3.1@(#)xalloc 4.3,out of space (ut9)@(#)xcreat 3.1directory `%s' nonex~yރƋ׍f^_[]øPv~ y Vރ+V y ^ V;| 9~ v+~ F+USWVv usr/local/rmchg 755 152 2 le 5.1s.r%s/%ss.@(#)eqsid 5.1@(#)permiss 5.1SCCS file locked againstv^[FFVNu;s+V;r F+ƺNj؋,UWV~Wv}+UWVistent (ut1)xcreat@(#)xopen 3.1`%s' unreadable (ut5)`%s' unwritable (ut6)`%s' unreadable or unwritable (ut7)xopen@(#)xmsg~Ǚ+Fȋƙ+F ȋ+эf^_[]USWVF y;V u.ȋvF y+ yڋ™f^_[]Ëv~ yރ+V 56030 3142671160 7034  editing (co23)%dnot authorized to make deltas (co14)release %u < %u (floor) (co15)release %u > %u (ceiling) (co16)release ~GuO+ҹ 0+ҹ O=XtGFa~zu8 VF+Rv=u܋Vc^wgNO+ 3.1no file (ut3)`%s' nonexistent (ut4)directory `%s' unwritable (ut2)no space! (ut10)write error (ut8)errno = %d, functi y^ ;| 9~ v +~ +FyЋǍf^_[]UVvN^#b ^s#]`%d' locked against editing (co23)@(#)date_ab 5.1@(#)rdmod 5.1Inex conflict %s at line %u (%s) beginsco12endsco13prematË^wFg_^UWVv tWvUWVvtWvUWV~vF:uGu+N؊+Uon = `%s' (ut11)@(#)cat 3.1@(#)dname 3.1@(#)fatal 3.4ERROR []: @(#)userexit 3.1@(#)zero 3.1@(#)zeropad 3.1(nul@(#)prs 5.1get:Dt: :DL: MRs: :MR:COMMENTS: :C:/tmp/prXXXXXX@(#)invalid sid (co8)value after %c argure eof (co5)@(#)sid_ab 5.1@(#)sid_ba 5.1%u.%u.%u.%u@(#)sinit 5.1too long (co7)s.not an SCCS file (co1)more than oneWV~+FGu!*܋_ø ܋O_V6d ;^s#r#tl)%% (cm7)unknown key letter (cm1)key letter twice (cm2)missing file arg (cm3)%s: %s%u%u%u%u%s%s%s%s%syesno%s%s%s0 ( ) *!+",#-$.%/ &0 ' @P P܃Swu\ PBUWV^?-t^WVuuGT G= t= tVW G= t= tփ RW( >G= t= tRWF} vvփRW^GVt(vпW tgW >t yW-UWlu+WWWxWWGPp$8HUWV>t LtՍVR\:FUWV>6 F< t< tva< t< uV~;w R%Vv7@Pf+Rv5HFE 0F/FE@ 0FE@ 0F/FE 0FE 0F FE 0FE 0F:F^7F=mta=rt8=ytl(RW2F؋  t AR;2^C<u R2j RRV;P볉6 R RV1BG= t= tփRW=G= t= tփ RW!= t v-d%UWV~ >=-uGR>(tSR+> Du&>t tvVڀ/muC.VF^u^*u W->t~.WvVF< t< tvF<uN< t(< t#+RvvT7@PP:UWV~6&ׁ!r R>9E 0FE 0F:F 0F 0FFFCUWV~,Dž4FRBvWVRW8=d)랉6 r G;~};>r u XR1^7x*WV> t@u>RWz'tύRbH> Du>t t.6 YPcWWW`W1 `WvGv tcWWW`W1`WvUWV~F < uFF<uFPW6[%FPv/= t FG=u=u Fz9G FFcF Ft%4t;V|;Fs tR'+FVFԉVҸ3;V|;FstRn R,VBVR\4v1#)&^t RV G;~|>tR+ROALUWVv*LUWV8bWHtm>PJ)džRRR&RRRx&MtFRWRR'RIPRtRWv`WWF`Wv7"PW`Ws1`Wv1UWVF F >k?!u45v+VvvvUWV~v9u T9UuT9UuT9Uu39+UWV~F?uV8tV&WLu݃uW+RW 8UW4(VBVR9(v((4VW ~Dt,~txvVR0 tg+RVRvR_&RvB(F u W0> Du>tv WvsK}+> uvW W5 W0IPWzWv/P"VRRR&=t0UWV O=+VVvP VV#tuUuكD@PF [PF*+v)+V5v5YD@P [PF*v=u GUWV@>(5mVVVV~ FWF}6P@RVR"M<tUF+R RVw:u"Vv5tVVR5uƅ:VC Wuׁ.V ^Ѐ?Dt FЋ^Њu^Њt^ЊV  +҉V։V9<|<<v4VډV܉TVމTVTt Wn0WvW71WWj WP& Pj W~WWu WWW>j t W/WtLVVy#t#vufuttuˀuăt fu`/džV+V9|>`t)> vV0 vVv=uFUWVW WxWWPE}+> txWWPF):'>t.DPz~tƅ:t|UtWZD8UWV+LJF|vG?t}G?ftrG= t= tGƟG= t= tRW5@PVT FVDT Y=etb=gt=it=mt8=xtW~Du3փRׁ.R.u%/=cu~tWWF؅uԃ~tj WW%WgWW W>FEPH> ~+WW`W. W`W./P?JtF> ~u"t Vs&VVM >`t> u2t V@&VV[&VV  y<UWV<^+WWPEOFUWV~*E+VVpVWtP](PRVvVVyv4;vu5vt;vu*vt;vuvtP[+RW㋿G? uOvtx7UWV~:u CRt-VF;vP.u WuW^.u /su43AUWV~vWeuW(WVׁ.RAUWV W$FFF~HFƋ~;u~;t.Q%PvWGtvWW W{4 W;/> Rt>N} ~%~ҹ>N~ċ} ;>u 8W/Nҋ>9>t%> t>`t> uR vA9@+Z RVR,"uR;vu8Vb*VV+u8EUWVEE +RvRj)+R R?! DhR R"! Rt-V[F;sPR R  RtWV6UWV~vF=auFFFFVڀ? tڀ? tVڀ?0|.ڀ?9'vFRFVڀ? tڀ? uFF+FF~~~~=~u~ҿ WpWWPI}+> tj WW+WTWWFU[~Љ~FЋVЋڀ? tڀ? t~WR%F? u*?\u+RvSG BRA v8PR8[=~ WR Rv=8uYFd;5QBu1^Ƈ&+RbB@P$ P )=uEUWV@ <t Rv'+5cRR)RV~t Rj6=tVRWG9Vt 9VuFvRRd UWV~v3@PKv+RvVI<v~WF[~^VW^VW~W~Wv@UWV~vG?t vG?dtO?= t= = t W>9~u@^΀?IuFFWFЅuzFЀ?u~u@҃> t5>~Ѕu QW-^UWVV6gRv [G t w G 8}3pR ;Wa8G|6vpR/ԃR. VRv=uDUWV~^u#=u}u}u}u }u}t BV)DUWVvk:vE 00 ( ) *!+",#-$.%/ &0 't< uTvWV F׃RVFRV FE~sv׃RV^G F럺RvF׃ RVg6E u"FV; t; t W1'~P&+  FV~Z}=<rM~}:~ ~s,~~Wt^F?u ^F?st WNFVڀ? tڀ? tVR FփRFv FփRFv 0UWV~,WWj!WPz"CUWVvvNV֋ڀ?/t3v~}'VVڀ?/uFVVN RW* |gFZ VGu~ sAF Vځgv[Gu VځO VځOV$E&~tI<tDV2@P0F+RVPvF=uFc#} ~tv%"> uWv %TUWV~ƅ'DžD/UWV~u>uN RW.xRWFR6 PP!RPf6 6 v,~LVڋw;6PuT9Bv~~W)؋G\RW$ |=RVRV#FV #~tV9Vt%UWVW7f%tv&&u.+t!6V>u F <u/UWV~vu+RW'6uVF+҉FVR+҉FVFVFV~!}=vvF=t RF RF=uK~uBQ= u= u=utvu #*)UWV~v{VV=u=:u=-uv[Ft v~v~^w?+3UWV~uv+-=nu3~狽JUWV6 <0|<9~F<u<t#F <UWVqVV ua~v3ցt:u FGNVBVNu VVFNu FG$4 RVRtRVRtRVRVV^ F^uVV^ F^uVV^F F R+҉FV PRFV[YӃ}~=w~u ~t TR8VVvV [VVRGV9Vu V/F<uv[FFV=uG)UWVt~vV=uVG:VtHt F6E3UWV~vVW(=.uGփRW=.uGփRW=.uGփRW2UWVUWV~D=0}=9~PGƹ [Ë=u֋$UWVRv# |>u v6 F^u RVR VR6VRhRRR6: t"VRVRVRsRR%R66 -vV[VRe(UWV{~uoR9Vrc~LTV;rv;VtVڋVڋWU~+VJVFRGVF[;t ~u~tV~~GvV)UWV~vRWR R-~^4w 6ֹR^4[ӉVڋ;uW;UuW;UuW;UtNuŋ2UWV~vFRWLV/@=~ >R)vv; t v 6$UWVv~W~Wv $UWV~v=F=0}!=9~PGUWV>t 6 +>>-UWV~W Ft)=gt$=lt4+RW#Rr+ߊV##~-+RփR#RN+RVVU;t UT|?UWV!(WR(L>P>NUWVv"@PRvV(PvR PR%R FNuW%Rv t RW' | uJ  FVRW&VPMRwu PR+RVWƅ&DžD~u+RRVKP,ׁ.R, R,GP/> F [FV׋#UWV.| *RW1" uVW "G#UWV~狽B uZbW#R>#lUWVlR "u=uF6F=tG FNu=-t+VtGF=9GF  RVP | tVxR Rw R7vvv }׋RvuhaF }(RVRv&Fv%~tF; t ; u W'Rv%=tO>tE RW0' |~ gRoWFtF?u ^F?ht,$WׁRv F؀? tWDžz1UWV~vׁ.V PbWW"~狽BWf P~狽BWW"lWG PlWW" Wv!v9܃WW! F=0}~tVډV<PRF<PRc-DB=u+Jt6HF=tG FNuu,UWV~v0 ( ) *!+",#-$.%/ &0 'UWVvvI uj>u >t6>toWpWvvW W W(> t~~WvUWV~UWV~UWV~v9v *PGN^ |^ WGڋF  v v F~}R=-ũ~ 0uƋ^ |^ |\FD Vv[ FGFu֋F2UWV~eEu~ |}uEt5FVFV~ u'Ru=t+ҋ UWVF~t1WF'W tvW. v ~t~9~v)~ ~~FDWW=-uG'=0uG'W '>''=.uGW'>'G+һ.w;^RTRz Rpd Rf6 RuUWVvv |s> tZ~tvV V\.~tvV V?v V V WGڊ*G멋^ WGڊ*G^ }v *PG;N})^ |^ WGڋF  v v N~uUWV~+PREPȋڋƙ+FV ƙ)FVEu9~4ƙ;V|,;Fr%E+E;V|;FwVUV)+ҋxEt UUevFvUWVW'W: UWVWP$ UWVv P UWVVRc <PRFPR PR^\6'6''R'R' 6'''*'[t'' '''u'R '''uq+ V0 VvI6kUWV+v uF WvUWV6\ Et MeEuQ+҉VVVVFvVREPDF_l P tME"E"Et@u]VE vvEPQFV>Et7W EteUUv vvEP FV;Ft~;FuxsUWV~WD G[Y+ӉFVVR|FwF/| Jt| Ku\ ㋗ V\ ㋗ VvVVFvVIF~t8;~ ;~u.|'''u^RR R R6'6''R'R+H6'>'t'BRR'R'R"#''?vj V Wv@PVvW~vP V WbR L Fv6 V W>.+=u~ց;Uv~ uU+։VRVEP FuyEtoUu5d uR։UuMM+҉VV$U+։V+PPREPuueEteUWV~v F~u39VV | \D* VЉV|GNuFV9|(;~| ;~u|}FVVRCD4 UWV~v:|u +EE +UWV QRR^GPR'";;;;9<=u=u=u=tR%'+=tS=u~=tmR=uH=ulP R= = u=uh=u=uW3~VVVڋ uWGF[ uOFV~uvVEPq FVFuV9VtM V UWV~UuFUt=U+։V~1uEt+VrNjFZUWV~v F~u8>VV |\*GD V*PG-NuD u FV9Vr‹FUWV Pvv&  FVQRR^GPRFV~|~sQFVn^F(v<PRvva [F<PRvvpui=uM=um=uFG=du=ou=uu=xuO R=u=uC=u'U'6'+6';6'};+VUWV\vF~;~w=/t V*OVڀ?/uV.VGVpUWVvVEP ;Ft M +ҋ> UWVZ W ;>" r! UWV~Et>E@u7WaEPR }Et UWVv~Wv~E t+UWVvZ |^ ^ * Z RЋ t |LjF̓} ;vu+FV^ƙ<Fƙ^7FPRFVpPR  (~|0~r(FV;V=|;Fw6Vx)FVF۾F|~҉V>'uډV6'6'vV6' UWV>'u>'t>'t '0'vUWV~ǙPR6'6'NǙPRuW WW>u=W WW6DP6WW WWW WWvuEtEe UWV~u+^+t+^=at=rtU=wuVv[tRRv aUWVd W~Wvyf t+6UWV FB~~F~W~Wv<N| ^+F FP+PFUWsHPWFVN~~6 (~>(V7=nu& + +$ F9$ ~& ^BF^7F((oUWV6'6'a''u=tW } 'փ0 'փW'UWV6'4+'6'>'UWV''6'PvWzW WWh@u WӃ u v >?'bWW3P(> F}>u VvnFR+PRv7 tR+RvL F~}aVUtM^?ruMM׋V~EtMEuE@tE'EM}uEuVqEt݁MZ uf t d VEtV'D GFu^G ^ 'GFGFGFG^^t GFGFGFn^7Wn^dRW'(|s"'-'6'>'ރ6'>'UWV>'u=6'>'''UWV>'u=6'>'''(|s=v.4333JUWV ~3UWV~v~N}GVUWV~= t0Gv UWV~~tL+RA RW F=|%P RW FҁRWV RWFFq UWVZ ;>VuEPuu }'=uMEt eM "]E*UWV~}tEt uesvuuM~n^dRWhn^dRWR^ d|E2E0^W dRW+'UWVFunjm"'-'6'>'ރ6'>'>UWV~+6'=*u'G''=0|=9Gƹ Ë'UWV~UWV~VVN~. | ]E* WЋ|^ƈF u̓} V9Vu+ ^FVrUWV~v" r+ EuK ܋_UWV~6 <t4WFt+ҋ UWV~vF:uG?=u|=uuUWV~V'V'>'=%tG=u9>'t+R6'R+'R6' =u'','''' G0 ( ) *!+",#-$.%/ &0 'UWV~G~ |F 0 GF 0G*UWVVV> >(tU(t%5tV;wV%s @(#)auxf 5.1PFdhESTEDTTZ@(#)fdfopen 3.1@(#)imatch 3.1@(#)index 3.1/bin/shPATH:/binw0 #t tۍTM0[r u UPSQRVWF-WMP __^ZY[X]M:/Day Mon 00 00:00:00 1900 SunMonTueWedThuFriSatJanFebMarAprMayJunJulAugSepOctNovDec(((9)%c%c %s %c%c *** CHANGED *** %s %c%c %s being edited -- sid is in p-file (rc12)c *** LIST OF DELETED MRS *** %c%c %s;r=;w;> t+(>(~F (+R(;vŋ(Ru.(V9(롋(:/usr/bin/sh@(#)lockit 3.5%s/%u.%ldlockitLOGNAME@(#)move 3.1@(#)patoi 3.1@(#)rename 3.1@(#)repl 3.2@(#)satoi 3.8 Ӓ܋_#tGË܋_#ø< r ܋_ t o = %d, function = `%s' (ut11)@(#)cat 3.1@(#)dname 3.1@(#)fatal 3.4ERROR []: @(#)userexit 3 @(#)chksid 5.1invalid sid (co8)@(#)date_ba 5.1@(#)dodelt 5.1clock set wrong!!! (co10)Clock may be set wrong! (co11) @(RVU  8^߉ ;v ( ׃"UWV~> 55UWVvVփV>(u1@(#)setsig 3.3vSIGNAL: (ut12) Illegal instructionTrace/BPT trapIOT trapEMT trapFloat[; s bP;r& USWV^v Ǚ+ȋƙ+Fȋ+щGf^_[]f^_]USWVF y;V u.1@(#)zero 3.1@(#)zeropad 3.1(null)""#)del_ab 5.1 @(#)dofile 5.1s.r%s/%ss.@(#)dohist 5.1MRs? comments? standard input specified w/o -y and/or -m((> V9Vv;r~V 9Vuߋ׃;uցvV;VuVV[96 v6 yUWVvDtVing exceptionKilledBus errorMemory faultBad system callBroken pipeAlarm clockdump.core@(#)sname 3.1@(#)strend 3.1@(#)>Rȋv~ } ރV+~yރƋ׍f^_[]øPv~ y Vރ+V y ^ V;| 9~ v"  keyletter (de16)line too long (co18)response too long (co19)cannot fork; try again (co20)too many MRs (co21)out of space (@D+ƺFvto;tkv~VBVV9VsVVv^[FFVNu;s+V;r F+trnslat 3.1@(#)xalloc 4.3(out of space (ut9)@(#)xcreat 3.1directory `%s' nonexistent (ut1)xcreat@(#)xlink 3.1ca+~ F+USWVv ~Ǚ+Fȋƙ+F ȋ+эf^_[]USWVF y;V u.ȋvF y+ yڋ™M:/Day Mon 00 00:00:00 1900 SunMonTueWedThuFriSatJanFebMarAprMayJunJulAugSepOctNovDec(((co22)@(#)eqsid 5.1@(#)flushto 5.1@(#)permiss 5.1SCCS file locked againstNj؋(UWV~Wvf}+^wgNO+Ë^wFg_^UWn't link `%s' to `%s' (%d)xlink@(#)xopen 3.1`%s' unreadable (ut5)`%s' unwritable (ut6)`%s' unreadable or unwritable (ut7)f^_[]Ëv~ yރ+V y^ ;| 9~ v +~ +FyЋǍf^_[]UVvN^# usr/local/rmdel 755 152 2  editing (co23)%dnot authorized to make deltas (co14)release %u < %u (floor) (co15)release %u > %u (ceiling) (co16)release Vv tWv@PUWVvtWv(8UWV~v~GuOGFuF UWV~vF:uGu+Nxopen@(#)xunlink 3.1xunlink@(#)xmsg 3.1no file (ut3)`%s' nonexistent (ut4)directory `%s' unwritable (ut2)no space! (ut10^s]@(#)rmchg 5.1r has no sid (rc11)unknown  56030 3142671160 12044 1usr/local/rmchg`%d' locked against editing (co23)@(#)pf_ab 5.1 bad p-file format (co17)@(#)date_ab 5.1@(#)sid_ab 5.1@(#)sidtoser 5.1+UWV~+FGu܋_ø,& ܋O_V6 ;^sr#tã)write error (ut8)errno = %d, function = `%s' (ut11)@(#)cat 3.1@(#)dname 3.1@(#)fatal 3.4ERROR []: @(#)userexit 3key letter (cm1)key letter twice (cm2)missing file arg (cm3)rmdelcdcbad invocation (rc10)User ID not in password file (cm9@(#)sinit 5.1too long (co7)s.not an SCCS file (co1)more than one link (co3)@(#)stats_ab 5.1@(#)fmterr 5.1format error aã"+ø/ø/ø6% UVW~ vN^_^]s .1@(#)zero 3.1@(#)zeropad 3.1(null)"")missing r (rc1)file %s does not exist (rc2)cannot create lock file (cm4)nonexistent sid (rc3)you are neither owner nor '%st line %u (co4)@(#)getline 5.1premature eof (co5)corrupted file (co6)@(#)putline 5.1%05u%05u%05u%5u%c%c%s %c%c %s/%s/ÓR@܋_ #tظr ܋_؉ ãË܋_SXsã +Ë܋O_" ' (rc4)not a 'leaf' delta (rc5)MRs not allowed (rc6)invalid MRs (rc7)MRs required (rc8)delta specified has delivered MR (rc0 ( ) *!+",#-$.%/ &0 'usr/local/cdc 755 152 2 FFV<PR~W1FFV6>v~~W(؋Gt v~v~^w?+1UWV~uv_+=nu~t+F^tFP)W&W|%&Wf F؋OOuwBWG jF~9~}>u YW! pWVV^ F^uVV^ F^u RVRVR*VRhRRR6:. t"VF~ |^wG[* v ЉVt4~6 |^6WGڋF봋^6v'vT).6UWV~^u# 56030 3142671160 11472 1usr/local/rmchg1~狽UWV66 <0|<9~F<u<t#F <t F6691UWV~vVW=.uG~5XP8u >u/&F!~~=~t WvF~9~|׃>tW+W/RVRVRsRRR6:6:o,UWV>:t 6:{+>8>:K,UWV~W Ft)=gt$=lt4+RWlRf=u}u}u}u }u}t "V5UWV~ 5=-uG0RtSRPDRL t׍4RVփRW=.uGփRW =.uGփRW 0UWV~vu5RVFuN}tuuRVF:UWV5:W"7t+Wv W  +WgW WPW> t'>>.u>0t Wu+ߊVll,+RփRlRB+RVlR2llUWVR u=uF6=tG FNu2뾺RW4}+҉>4WV2o5 t@u.>4GRWtύRPb džRRRuN0UWV~vFRWV-@=~ RcVPRu RC+RVWƅ&DžD~u+RRVW6#>t WA7PWzW W PTt {WW W> t"WPWW6%#=-t+VtGF=9GF F=0}~tVډV<PRF<PR+=u+t6RRRMtFRWIRRRPORj t4RV2RRRTusr/local/sact 755 152 2 P,ׁ.R,)R,GP-> ~ RWFtF?u ^F?ht,"W-ׁR6>utWqW W/ PWqW W P}7PzW W P>uA6F} WF=tG FNu*UWV~vRW( |gFVGu~TsAF Vځgv=t'UWV~v1@Pv+RvV<t< uTvWV F׃RVF`RV FE 43124 3142671160 6666 v F؀? tW Džz/UWV~,"$V&Vc&VMI/UWV~&u +RW,Rׁ.R~u6P7W{8+W-~Wo88UWV28dždžF(WDW+WWpWvc P@P [Gu VځO VځOVl*vUWV~v+WGF[8t=t -*UWV~Wv~sv׃RV^G F럺bRvF׃ RVg66E$E&~tI<tDV0@PZF+RVPv6F=uFc~F|~c~F=uF ~|~ F=uvt9+PPR,Dž@Dž$DžDžDž ƅ'DžD\.UWV~u>8uNRW|-xRWFR6 PyW(WDWW1~};u8~};u,~};u (WDWW~=;tWWW4tdžz5z|džxxRz[RxVڋ[W u x}<xzRR&xFwvbF~|vvM;F|nF=uF~|~RF=uF;~}x~;~o0F=uF;~}V~;~ @>f܃Swu\PW1UWVvK<UWVF^^?-t^P:lRP066v]+~tv&&u.+t!6:V>8u F <u8-UWV*/*WEP856>6>+WpWv PWi*_*>TuuWWDgV\v6N+=u=uQ= u= u=utvu< (Q(UWV~M+FVFlFv:,FVF~9~}vvFVNuFHFVPR~W1FFV<PR~W1^WVu~~=~FF-n=w<.^u~~WWv PFW  ~vu+RW'6:u4RVRktRVRZtRVRIVV^ F^u7UWV4PzW W Pt1qW W P`64PzW W P.6UWV+WWpWvb P?P  0 ( ) *!+",#-$.%/ &0 'v{VV=u=:u=-uv[FGV9Vu V/F<uv[FFV=uGW3P>L=v.""v"l"UWV ~UWV~v~N}GVVVFNu FGs#UWVRv" |><u v|)vv;;Lt vSPNuu }'=uMEt eM ]E*UWV~}tEt uesvuuMuuv@PRvVRVP |  tVR&RM&R7vvv }(UWVt~vV=uVG:VtH+VJVFRGVF[;t ~u~tV~~GvVUWV~= t0GvqUWV~VVN~. | ]E* WЋ|^ƈF u̓} V9Vu+#UWV~v=F=0}!=9~PGF [FV׋"UWV.| RW3!UWV~VV>=%tG=u9>t+R6R+R6 =u ~ G=-uG׋RvuaUWVvv uj><u ><t6><toWpWvvW&W &W'UWV~vRWR R&PvR PHRjRY FNuWjRv tRWd&  ^FVUWV~v |\FD Vv1 FGFu֋FUWV~eEu~ |}u uVW"!G"UWV~狽 uZWPWW!~狽WzP~狽WW!W[PW=0uGW >  =.uGW > G+һ.)^RTRz Rpd Rf6 R\6 (>< t~~WvjuUWVvvy |s>< tZ~tvV&V2.~t|  uJFVRW%F }(RVRv %Fv7$~tF;t ;u W&Et5FVFV~ u'R+PREPcȋڋƙ+FV ƙ)FVEu9~4ƙ;V|,;Fr%E+E;V|;FwVW! Wv vW`W  WWl WP!CUWVvvNV֋ڀ?/t6 RR 6*[t uuqv2V&VvHV&V&VlVvIkUWV+v6 uWvRv}$=tO><tERW% |  u"FV;t;t W%~P|%+FV~UV)+ҋEt UUev vvEPFV>Et7Wo EteUUv vvEPFV3v~}'VVڀ?/uFVVN~=u=/tBVGV>!UWVFFV u^RR R R6 6 RR+H6 > t BRRRR"#?"UWV6<vV&Wwv@PVvW~vPV&W8RLFZ}=<rM~}:~ ~s,~~#} ~~VVVڋUWV~^RW# |?RVRV#FV"~tV9Vt W$1%UWV$Wv VmЉV|GNuFV9VrNjFUWV~v F~u8>VV |\*GD V*PGNuD u FV7vr׉VVVF+҉FV+҉FVFVFV~!}=vvoF=t RZuM=um=uFG=du=ou=uu=xuO R=u=uC=uU6+6;6};+҉V> uWGF[ uOFVpUWV\vF~;~w=/t V*OVڀ?/uV"F }OW~Wv$vb"vv" |vT$NvC$=><tv($">< 9Vr‹FUWVX Pvv xUWVv~Wv~E t+MUWVv|* RЋ t F RMF=uK~uBF F +҉FV PRFV[YӃ}~=w~u ~t RuډV66vV6 xUWV>u>t> t 0vGUWV~ǙPR66ǙPR66.VGVUWVuWNWW>4u=WTWWd64P64WKWWWuRWv|$TUWV~\RW" |=RVRVy"FV!~tV9Vt|LjF̓} ;vu+FVUWV FB~~F~W~Wv<N| ^+F FP+PFUWV~E8VVvV [VVvV[VRe^(UWV{~uo9Vrc~TV;rv!u=tW } փ0 փWUWV64+6>UWV6(|W9WYWW'vPvWW\WW@u W- u v>>?'W$UWVZW#UWVqVV ua~v3ցt:u FGNVBVNu tMEuE@tEjEM}uEuVqEt݁Mut VEtVVuE;VtVڋVڋWU~VU;t UT|UWV!jW+j>>UWV!0 ( ) *!+",#-$.%/ &0 's"-6>ރ6>sUWV>u=6>OUWV>u=6>(|s"-6% UVW~ vN^_^]s <ÓXF܋_#tظr܋_؉~~tL+R RWF=|%PRW FҁRWV RWFF1 UWV ;>^r+ o8)@(#)dofile 5.1s.r%s/%ss.@(#)pf_ab 5.1 bad p-file format (co17)@(#)date_ab 5.1@(#)sid_ab 5.1@(#)sid_ba 5.1%u.%n^dRWhn^dRWR^ d|E2E0^W dRW+8DUWVFun*mUWV~6>ރ6>UWV~+6 =*u G=0|=9Gƹ Ë UWV~UWã<Ë܋_SXs<ã+ø܋O_w0#t tۍ;0[r u <UPSQRVWF Eu ܋_UWV~6<t4WFt+ҋ UWV~vF:uG?=u|=u=tu.%u.%u@(#)sinit 5.1too long (co7)s.not an SCCS file (co1)more than one link (co3)@(#)fmterr 5.1format error at line %G~ |F 0 GF 0GUWVVV>>dtUht%5tV;wV;rV~UWV~UWV~v9v *PGN^ |^ WGڋF  v v F~}R=-ũ~ 0uƋ^ |^ WG-;P__^ZY[X]8 Ӓ܋_#tG+ҋ UWVF~t1WFW tvWvM ~t~9~v)~ ~~F|2WWFvu (co4)@(#)getline 5.1premature eof (co5)corrupted file (co6)@(#)putline 5.1%05u%05u%05u%5u%c%c%s %c%c %s/%s/%s @(#)=;w;>t+h>h~F h+Rh;vŋhR~u.hV9h롋hRVUڊ*G멋^ WGڊ*G^ }v *PG;N})^ |^ WGڋF  v v N~uUWV~Et Ë܋_#ø< r ܋_ t ã<[;s bP;r&USWV^v Ǚ+ȋƙj<UWVWW UWVWP UWVv P UWVVR# <PRFPRY PR^G[Yauxf 5.1PFESTEDTTZ@(#)fdfopen 3.1@(#)imatch 3.1@(#)index 3.1/bin/shPATH:/bin:/usr/bi8^߉;v f׃UWV~>55UWVvVփV>dudd>MeEuQ+҉VVVVFvVREPF_P tME@E@Et@u]VEց;U+Fȋ+щGf^_[]f^_]USWVF y;V u>Rȋv~ } ރV+~yރƋ׍f^_[]øPv~+ӉFVVR|FwF/| Jt| Ku\ ㋗PV\ ㋗RVvVVFvVIF~t8;~ ;~u.||(;~| n/sh@(#)lockit 3.5%s/%u.%ldlockitLOGNAME@(#)move 3.1@(#)rename 3.1@(#)satoi 3.1@(#)setsig 3.3V9Vv;r~V9Vuߋ׃;uցvV;VuVV[96v69UWVvDtV@Dv~ uU+։VRVEP FuyEtoUu5uR։UuMM+҉VV$U+։VV~ y Vރ+V y ^ V;| 9~ v+~ F+USWVv ~Ǚ+Fȋƙ+F ȋ+эf^_[]US;~u|}FVVRCDUWV~v:|u +EE +UWV QRR^GPR F!+8HTSIGNAL: (ut12) Illegal instructionTrace/BPT trapIOT trapEMT trapFloating exceptionKilledBus errorMemor+ƺFvto;tkv~VBVV9VsVVv^[FFVNu;s+V;r F+ƺuvVEP1 FVFuV9VtM Vb UWV~UuFUt=U+։V~1uEt+vVEWVF y;V u.ȋvF y+ yڋ™f^_[]Ëv~ yރ+V y^ ;| 9~ v +~ VQRR^GPRFV~|~sQFVn^FRv<PRvv! [F<PRvv0^ƙy faultBad system callBroken pipeAlarm clockdump.core@(#)sname 3.1@(#)xalloc 4.3jout of space (ut9)@(#)xcreat 3Nj؋fUWV~Wvf}+h^wgNO+Ë^wFg_^UWVv tWP ;Ft M +ҋ UWV W ;>^r UWV~Et>E@u7WaEP$ }Et u+FyЋǍf^_[]UVvN^#^s<]@(#)unget 5.1unknown key letter (cm1)value a<Fƙ^7FPRFVpPR^~|0~r(FV;V=|;Fw6Vx)FVF۾F|~sHPW.1directory `%s' nonexistent (ut1)xcreat@(#)xlink 3.1can't link `%s' to `%s' (%d)xlink@(#)xopen 3.1`%s' unreadable (ut5vUWVvtWvUWV~vF:uGu+N؊+UWV~+FGu܋_øEtEe UWV~u+^+t+^=at=rtU=wuVv[tRRvL F}>fter %c arg (cm7)key letter twice (cm2)missing file arg (cm3)sact %s: cannot create lock file (cm4)%s cannot fork, try agFVN~~6\~>`V7=nub+ +`F9`~b^BF^7FbR/UWV8G)`%s' unwritable (ut6)`%s' unreadable or unwritable (ut7)xopen@(#)xunlink 3.1xunlink@(#)xmsg 3.1no file (ut3)`%s' nonex܋O_V6;^s<r#tã<ã@+øø<u VvnFR+PRv tR+Rv F~}aVUtM^?ruMM׋ UWVainSID must be specified (un1)login name not in p-file (un2)specified SID not in p-file (un3)@(#)chksid 5.1invalid sid (cFu^G ƚ8GFGFGFG^^ưGFGFGFn^7Wn^dRW~"0 ( ) *!+",#-$.%/ &0 'istent (ut4)directory `%s' unwritable (ut2)no space! (ut10)write error (ut8)errno = %d, function = `%s' (ut11)@(#)cat 3.1R tFPFPv#RtFPFPv?Rt v[Rt vtRt vR tt F?u ^F?dt>} t."u&vR6vlu>DuFWFt-.u&/=ct=et=gtV؋ t/Ft( @ FЍZRvFF^t~u > t0~u*>$tRX6 @(#)dname 3.1@(#)fatal 3.4ERROR []: @(#)userexit 3.1@(#)zero 3.1@(#)zeropad 3.1(null)@@ vR@t vRxǀt vReUWV~+v=0t=.u+G?.uFF=0t=.tF~~GF=it=mt=xt~u.tuW3tD/ut]>} tu"u"+AUWV~.W,t F?u~u8~t >$t RX6"=uO=.tƃtu+UWV~,Rׁ.Rat%$ׁ.V^t3^F耽;u" Dt3usr/local/val 755 152 2 t+UWV~WFt)=gt$=lt4+RW*R+ߊV**x+RփR*R+RV*R*lUWVdF RR6"KG;~}xUWV+vvvv6"v&VvW PV tVv Ru "^M:/Day Mon 00 00:00:00 1900 SunMonTueWedThuFriSatt" :UWV~vFRW+RVWpƅ&DžD UWV~.F?tFF=It=Dt =EtF< t< t 21114 3142671160 6511 ~v+WGF[8t=t UWVv~W~WvUWV~v=F=0}!=9~&V G?uG?ht" 6RϾBVW D>} tvft"vv&Vzt6R"JanFebMarAprMayJunJulAugSepOctNovDecddjo = %d, function = `%s' (ut11)@(#)cat 3.1VRV~Eu vW-`V(Vڀu#ڋW Rv~IuRRvW!^W Rv~IuR+RvW# WPGF [FV׋UWVvvNV֋ڀ?/t3v~}'VVڀ?/uFVVN }&VUV> t>x t&VtV&VTVa &VuNG?ujG?ft`G= t= t+V VW@(#)dname 3.1@(#)fatal 3.4ERROR []: @(#)userexit 3.1@(#)zero 3.1@(#)zeropad 3.1(null)@@t@*t" +*UWV~*tV9UV9Uu" R(F^?^VW^VW^V W^~=u=/tBVGVUWV~Yv G u?VVVڊ u'VڊF:tV+VVڊW=tuWvu!F=muFWv uF&VuO=tt6R~u > t">x t4~u.v gVV W^Bt"v*Sv[Gt ^>^Gv[UWV~*vtV9Tut!|t>^ |\܃Swu\| P/UWV~ug^_?-u\^_WuO$FvVFV UWV>~VVVڋ uWGF[ uOFVfUWV~v~N}vPP u">x u~u~tUWV~vF< t< tF< t< tu< tF< uF^M:/Day Mon 00 00:00:00 1900 SunMonTueWedThuFriSatVW" /UWV~*tG|tT'u:\4^^W^W^Wƅ' Vu> t+V V V  V~6  6$"v4V V PG;~|پ VnO~GV7UWV~VVN~. | ]E* WЋ|^ƈF u̓} V9Vu+ ^FVU< t< tu< t F< tF< t< u< tF< uF< t< tu< tF< uF< t< tu< tF< uF< t< tu usr/local/unget 755 152 2 UWV~}Iu}t}Du}t+VV^^tWt~t+vvVVVVڀIuڀtVڀDu.ڀu&+ҋƇ  V6 66EUWVcF+҈    +҉ VVX+ƅl G|FVڀ? tWV Pvvb UWVW~Wv7 t+UWV FB~~F~W~WvN| ^+F FP++R RV+7UWV~F?uV8t Wku UWV~v= t=t FG= uUWV~vF%<t V 43124 3142671160 11715 1usr/local/sactVڀDu ڋWV~u^WV ^IuF^Vuu~t V9U~F~t V9U}F֋UWV~vWFڀ? tڀ?-tF^VFV-m= w5.+FF RvtF4 Rv Rv @#0 ( ) *!+",#-$.%/ &0 'PF:UWV~EtMEuE@tE(EM}uEuV! Et݁Mut V~yރƋ׍f^_[]øPv~ y Vރ+V y ^ V;| 9~ v+~ F+USWVF  UWV>u=6># UWV>u=6>(|s"-6>ރ6>UWV~+%PRWFҁRW[VRWSFFUWV ;>pr+ Eu ܋_UWEtVVuEP, uu }'=uMEt eM t ]E*UWV~VV> y;V u.ȋvF y+ yڋ™f^_[]Ëv~ yރ+V y^ ;| 9~ v +~ +F6=*uG=0|=9Gƹ ËUWV~tUWV~fUWV~XUWV~v9v usr/local/vc 755 152 2 VVV>t>tUt%5tV;wV;r=;w;>rt+>~F =%tG=u9>t+R6R+R6 =u< G=-uG=0uGW >=.uGWyЋǍf^_[]UVvN^#z^s&]@(#)val 5.1%s %ss.r%s %s: %cM%c*PGN^ |^ WGڋF  v v F~}R=-ũ~ 0uƋ^ |^ WGڊ*G멋^ WGڊ*G^ } 24230 3142671160 6341 +R;vŋRu.V9롋RVUrt8^߉t;v t׃>G+һ.^RTRz Rpd Rf6 R\66RR 6, -m mismatch %s: %cY%c, -y mismatch %s: SID nonexistent %s: SID invalid or ambiguous %s: can't open file orv *PG;N})^ |^ WGڋF  v v N~uUWV~Et MeEuQ+҉VVVVUWV~>t55UWVvVփV>u>rV9Vv;r~Vr9Vuߋ׃;uց*[t uuqu^RR R file not SCCS %s: corrupted SCCS file %s: Unknown or dupilcate keyletter argument %s: missing file argument @(FvVREPF_PtME&E&Et@u]VEց;Uv~ uU+։VRVEPFuvV;VuVV[96rv6rUWVvDtV@D+ƺFvto;tkv~VBVV R66RR+H6>tBRRRR"#?"(>=u=u=u=t#)auxf 5.1@(#)imatch 3.1@(#)repl 3.2@(#)satoi 3.1@(#)sname 3.1@(#)trnslat 3.1@(#)cat 3.1@(#)zero 3.1(null)((yEtoUu5uR։UuMM+҉VV$U+։VV~uvVEP?FVFuV9V #܃Swu\PUWVv]9!UWV! Fb^^7<-u;D9VsVVv^[FFVNu;s+V;r F+ƺNj؋jUWV~Wv,}+JR%+=tS=u~=tmR=uH=ulP R= ui=uM=um=uFG=du=ou=tM V6UWV~UuFUt=U+։V~1uEt+vVEP;Ft M +ҋUWV =at!=ct$=st=tt 6.&TVeƋ VFV9V|>t6>tUWVv tWvz,UWVvtWvbUWV~vF:uGu+N؊+UWV~+FGuuu=xuO R=u=uC=uU6+6;6};+҉V>uډV66vV6 L UWpSID invalid or ambiguous %s: can't open file orW ;>prUWV~Et>E@u7WaEP}Et uEtEeVUWV~< tF<uF? u8tK=\u8UuFGFu>t;>t R&RRGWR t ׃6UVW~ vN^_^]s &Ó܋_v#tظrv܋_؉vã&V>u>t>t 0v UWV~ǙPR66 ǙPR66 u=tW }  file not SCCS %s: corrupted SCCS file %s: Unknown or dupilcate keyletter argument %s: missing file argument @(u+^+t+^=at=rtU=wuVv[tRRvxF}>&u VvnFR+PRvRWR t^>tWR t ׃RWRj t ׃R4W"RO t ׃RW&R4 ܋_SXs&ãv+ø<rl[;xs bP;r&xf^_]USWVF y;V u>Rȋv~ } ރV+փ0 փW UWV64+6> UWV6(|s"-6>ރ6>G#)auxf 5.1@(#)imatch 3.1@(#)repl 3.2@(#)satoi 3.1@(#)sname 3.1@(#)trnslat 3.1@(#)cat 3.1@(#)zero 3.1(null)((tR+Rv2F~}aVUtM^?ruMM׋vUWV~~tL+R7RWF=|$0 ( ) *!+",#-$.%/ &0 't ׃Rn8uBR3W*R tKW-R t4W1R t U66RR0R (UWV{~uo&9Vrc~ TV;rv;VtVڋVڋWU~VU;t U6VV 6FVt ~!uVu6FV~u.^RTRz Rpd Rf6 R\6| 6~ r R R 6r r  * [tr ; {UWVv@= ~6WWsWMGUWV~HV8VtI~\u9}u6RR2R RRRAt=F~(|^*u">uV,RWRR^*u">uVT|UWV! Wu&  >$>"OUWV>~VVVڋ uWGF[ uOFV-vv~>ut ~uV,RRR9F^㋗*tK>~ R"+RgUWV~UWVuWXWW>u=W^WW6JP6WWaWWqWcV VqUWV~G= t= tRW=tG= t= t>-UWV~vWbV[G=0H6| >| t~ BRRr R R"#  ? "$o=u=u=u=tR%x +=tS=RvFGFu~GVuWUWV~v+WGF[8t=t UWV.|WG= t= t~6RW = t= uG=RW;u6RRR GW*FvWW_vPvWHWfWW6@u Wi u v>?'W0 WAuF<0tV@FPW@F[;V9V}8~8|GF=u+ҋUWV~'=0|=9~6VV Vu~=tmR=uH=ulP R= ui=uM=um=uFG=du=ou=uu=xuO R= RW+ uVWGUWV~狽8 uZXWWPXWW~狽8W8P~狽8WWkvv|UWV~W6G= t= t;rw~,RWGvvqF*t!6vRPT >V=v.wf\UWVUWV ~UWV~VVN~. | ]E* WG=uUWVH~G? uO>FVVGF~ u6 RRU R/^VӋڋVPW<u=uC=ur Ur 6r +6p ;6x };+҉V>z uډV6 6 vV6p  UWV>t u>v t>~ t r bWPbWWR WvvWW WWdW_PrCUWV~)=uR"R ^く*= t= tGUWV>uvFPWW6WWW UWVЋ|^ƈF u̓} V9Vu+ ^FVPUWV~v |\FD VvIFGFu֋FUWVu!6P)RR RFF~ u6IRR R^VRWF؋6[^く*v0r vw UWV~ǙPR6v 6t ǙPR6v 6t Q v t u=tW } r փ0 r փWr UG:Vt UWVFFVFVV tF Vڋw;6$uT9~]UWV>uvP6iWW'1UWVvPyWWUWVv~Wv:~E t+ UWV FB~~F~W~WvN| ^+F FP+PF UWV~EPv9=tF~ u6gRRv RP^VӋڋV~uVpFF^VӋ7FFWV6 4+ 6v >t UWV  6v t (|s"r -r 6v >t ރ6v >t UWV> u=6v >t ׃;s vT[W$v[WVv+[vT[W<փ7vr׉VVVF+҉FV&+>nv|ڀ? tڀ? tR}R~t +4t6RR R ;ttMEuE@tE EM}uEuVEt݁Mut VEtVVuEV9V~FvFV^VӋ7FV9V~މ6UWVvFt(A|Z~a|z~^;t  UWV> u=6v >t   (|s"r -r 6v >t ރ6v >t .UWV~+6| =*u| G  FVFVFV~!}=vvF=t RF RF=uK~uBF F &+҉FV PUWVMFڀ? tڀ? t?|u"" Fڀ? tڀ? uF3UWVMFڀ? tڀ? tP uu }'=uMEt eM  ]E*UWV~V V >p =%tG=u9>p t+R6 R 0|9~΃t6RRRa+#(}-׹,RvugG߹㋗*u΋߹*^u9+RvS=0|=9Gƹ Ë| UWV~UWV~UWV~UWV~v9v *PGN^ |^ WRFV[YӃ}~=w~u ~t (RI8VVvV [VV&vV[VRe?&u""!Fڀ? tڀ? uFUWV ڀ? tڀ? tڀ?(uA"ڀ? tڀ? tڀ?)u+p R6p  =uz ~ r p  G=-uGz =0uG W x >| | =.uGW~ >| G+һ+RRv^GR[G P럺RUWVv*t +v:@D+RvtGD P%0 ( ) *!+",#-$.%/ &0 'GڋF  v v F~}R=-ũ~ 0uƋ^ |^ WGڊ*G멋^ WGڊ*G^ }v *PG;N})^ |T trapIOT trapEMT trapFloating exceptionKilledBus errorMemory faultBad system callBroken pipeAlV9VsVVv^[FFVNu;s+V;r F+ƺNj؋ (UWV~Wvf}+eЉVt.t)7RvUuZ| ^V롸ZPvZ|^ ^ZP P ~t WvUWV~) declared twice on line %d (vc5)ERROR:%s err statement on line %d (vc15)`end' without matching `if' on line %d (vc10)Message^ WGڋF  v v N~uUWV~Et MeEuQ+҉VVVVFvVREPnFarm clockdump.core@(#)any 3.1@(#)xalloc 4.3 out of space (ut9)@(#)cat 3.1@(#)fatal 3.4ERROR []: @(#)clea^wgNO+Ë^wFg_^UWVv tWvzUWVvtWvbUWV~vF=uG:Vt UWV Pvv xUWVv~Wvd~E t+MUWVZW~Wv(%d):%s %s not syntax on line %d (vc18)parenthesis error on line %d (vc11)invalid operator on line %d (vc12) non-numeric_PXtMEEEt@u]VEց;Uv~ uU+։VRVEPFuyEtoUu5un 3.1@(#)userexit 3.1(null) :uGu+xN؊+UWV~+FGuO6%zt܋_^#tظr7\ t+"UWV~~u 5=u0]EM]V+Etu9uwu9ut˾ UWV~EtMEal value on line %d (vc14)out of space [line %d] (vc16)unmatched `%c' on line %d (vc7)out of space [line %d] (vc16)out of spRv։UuMM+҉VV$U+։VV~uvVEPFVFuV9VtM VUWV~usr/local/what 755 152 2 ^܋_؉^ã Ë܋_SXs ã^+Ë܋O_w0``#t tۍ!0[r u  UuE@tEEM}uEuV! Et݁MPu\t ZVEtVVuEP uace [line %d] (vc16)invalid keyword name on line %d (vc9)out of space (vc6)keyword name too long on line %d (vc8)syntax on UuFUt=U+։V~1uEt+vVEP%;Ft M +ҋ.UWV W ;>XrUWV 11562 3142671160 6700 PSQRVWF-!P`__^ZY[X]l[;s bP;u }'=uMEt eM  ]E*UWV~VnVp>\=%tG=u9>\t+R6pR+\R6\line %d (vc19)syntax on line %d (vc19)@(#)imatch 3.1@(#)setsig 3.3lSIGNAL: (ut12) Ille~Et>E@u7WaEP}Et uMEtEe܋_UWVWLPZr&f^_]USWVF y;V u>Rȋv~ } ރV+~yރƋ׍f^_[]øPv~ y Vރ+ =ufj^\l G=-uGf=0uGlW d>hh=.uGWj>hG+һ.^gal instructionTrace/BPT trapIOT trapEMT trapFloating exceptionKilledBus errorMemory faultBad system callBroken pipeAlUWVVV>\> tU t%5tV;wV;r=;w;>Zt+ > ~FV y ^ V;| 9~ v+~ F+USWVF y;V u.ȋvF y+ yڋ™f^_[]Ëv~RTRz Rpd Rf6 R\6h6j^RnRl 6^^n*n[t^l narm clockdump.core@(#)any 3.1@(#)xalloc 4.3 out of space (ut9)@(#)cat 3.1@(#)fatal 3.4ERROR []: @(#)clea ࣊ +R ;vŋ Ru. V9 롋 RVUZ\8^߉\;v  \ @"V܃Swu\" P UWV~~} PRX^;v}R1Fu yރ+V y^ ;| 9~ v +~ +FyЋǍf^_[]UVvN^#^s \nu\H\^^uq^^ju^RR R R6h6j^RnR+H6h>hn 3.1@(#)userexit 3.1(null) UWV~>\55hUWVvVփV> u >ZV9Vv;r~VZ9Vuߋ׃;u1RdR12RvFUWV~ | ]E* WЋt$;u RWˠ;uúRWWn ]@(#)vc 5.1:if endasg dcl errmsgonoffctl unknown command on line %d (vc1)`%s' never used (vc2) `%tjBRR^RnR"#nn?n"c=u=u=u=tR%d+=tS=u~=tX ցvV;VuVV[96Zv6ZUWVvDtV@D+ƺFvto;tkv~VBVUWV~v&P | ]E* WЉV[;uF<uՀ<tZ|^ ^˜ZP P4 | ]E* Ws' never declared (vc3) `%s' never assigned a value (vc20) `if' with no matching `end' (vc4)= syntax on line %d (vc17)`%s'&0 ( ) *!+",#-$.%/ &0 'mR=uH=ulP R= ui=uM=um=uFG=du=ou=uu=xuO R=u=u 2371 3142671160 7477 uFUt=U+։V~1uEt+vVEP;Ft M +ҋlUWVP W ;>rOUWV~Et>eta$$ then if get -s -p -k -r$sid2 $i > /tmp/getb$$ then bdiff /tmp/geta$$ /tmp/getb$$ $num > /tmp/getc$$ fi fi if ttWv6UVW~ vN^_^]s Ó܋_#tظr܋C=u^U^6^+6\;6d};+҉V>fuډV6l6pvV6\ UWV>`u>bt>jt ^0^vE@u7WaEP|}Et uEtEeUWV~u+^+t+^=at=rest -f /tmp/getc$$ then if test ! -s /tmp/getc$$ then echo "$i: No differences" > /tmp/getc$$ fi fi if test \"$pipe\_؉ãË܋_SXsã+ø<VPf^_]USWVF y;V u>Rȋv~ } ރV+~ UWV~ǙPR6b6`J ǙPR6b6` b`u=tW } ^փ0 ^փW^J UWV6n4+tU=wuVv[tRRv.F}>u VvnFR+PRvtR+RvF~}a" != \"\" then pr -h "$i: $sid1 vs. $sid2" /tmp/getc$$ else cat /tmp/getc$$ fi done trap 0 rm -f /tmp/get[abc]$$ les="$fyރƋ׍f^_[]øPv~ y Vރ+V y ^ V;| 9~ v+~ F+USWVF y;V u.n6b>`- UWVnn6b`(|s"^-^6b>`ރ6b>`UWV>nu=6b>`nn: 'sccsdiff @(#)sccsdiff 5.1' : 'DESCRIPTION: ' : ' Execute bdiff(1) on two versions of a set of ' : ' SCCS files and optVUtM^?ruMM׋UWV~~tL+RRWJF=|%P5RWjFҁRWiles $i" ;; *) echo "$0: $i not an SCCS file" 1>&2 ;; esac done for i in $files do if get -s -p -k -r$sid1 $i > /tmp/gȋvF y+ yڋ™f^_[]Ëv~ yރ+V y^ ;| 9~ v +~ +FyUWV>nu=6b>`nn(|s"^-^6b>`ރ6b>`lUWV~+6h=*uhGnnD=0|ionally pipe through pr(1). ' : ' Optionally specify bdiff segmentation size. ' trap "rm -f /tmp/get[abc]$$;exit 1" 0 1 2 3 1VRW FFUWVP ;>r+ Euy ܋_UWVVV>>rtUvteta$$ then if get -s -p -k -r$sid2 $i > /tmp/getb$$ then bdiff /tmp/geta$$ /tmp/getb$$ $num > /tmp/getc$$ fi fi if tЋǍf^_[]UVvN^# ^s]@(#)what 6.6@(#)~|^`rcan't open %s (26)=9Gƹ ËhUWV~UWV~UWV~UWV~v9v *PGN^ |^ WGڋF 5 if expr $# \< 3 2>&1 > /dev/null then echo "Usage: sccsdiff -r -r [-p] [-s] sccsfile ..." 1>&2 exit 1 %5tV;wV;r=;w;>t+v>v~F v+R}v;vŋvRbusr/man/man1/admin.1 664 152 2  %s: "\> @(#)any 3.1(null) v v F~}R=-ũ~ 0uƋ^ |^ WGڊ*G멋^ WGڊ*G^ }v *PG;N})^ |^ WGڋfi for i in $@ do case $i in -*) case $i in -r*) if test \"$sid1\" = \"\" then sid1=`echo $i | sed -e 's/^-r/u.vV9v롋vRVU8^߉;v t׃^UWV~>55DUWV 30037 3142671160 7476 rrx y;V u.F  v v N~uUWV~Et MeEuQ+҉VVVVFvVREPF_bP/'` elif test \"$sid2\" = \"\" then sid2=`echo $i | sed -e 's/^-r//'` fi ;; -s*) num=`echo $i | sed -e 's/^vVփV>rurr>V9Vv;r~V9Vuߋ׃;uցvV;VuVV[96vȋvF y+ yڋ™f^_[]Ëv~ yރ+V y^ ;| 9~ v +~ +FytMEEEt@u]VEց;Uv~ uU+։VRVEPjFuyEtoUu5ZuR-s//'` ;; -p*) pipe=yes ;; *) echo "$0: unkown argument: $i" 1>&2 exit 1 ;; esac ;; *s.*) files="$f6UWVvDtV@D+ƺFvto;tkv~VBVV9VsVVv^[FFVNusr/local/sccsdiff 755 152 2 ։UuMM+҉VV$U+։VV~uvVEPFVFuV9VtM VUWV~Uiles $i" ;; *) echo "$0: $i not an SCCS file" 1>&2 ;; esac done for i in $files do if get -s -p -k -r$sid1 $i > /tmp/gu;s+V;r F+ƺNj؋tUWV~Wv,}+UWVv tWv0UWVv'0 ( ) *!+",#-$.%/ &0 '.tr ~ .nr f 0 .bd S B 3 .de SP .if n .ul \%[\fB\-\\$1\fR\\c .if n .ul 0 \\$2\\$3 .. .de SF .if n .ul \%[\fB\-\\$1\fR] .if n .ul tter is not used, the initial delta is inserted into release 1. The level of the initial delta is always 1 (by default initial dme] ] .SP r rel ] .SP t \%[name] ] .if n .br .SP f flag\%[flag-val] ] .ZZ .SP d flag\%[flag-val] ] .ZZ .if n .br .SP a login ] .99. .F1 f floor The lowest release (i.e., ``floor''), a number greater than 0 but less than 9999, which may be retrieved by a .I and unreadable files are silently ignored. .PP The keyletter arguments are as follows. Each is explained as though only one nam0 .. .de ZZ \fB.\|.\|.\fR .. .de AR .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \fB\-\\$1\\fR \\$2 \\$3 \\$4 \\$5 \\$6eltas are named 1.1). .A1 t name The \fIname\fR of a file from which descriptive text for the \*(S) file is to be taken. If the ZZ .SP e login ] .ZZ .SP m \%[mrlist] ] .SP y \%[comment] ] .SF h .SF z files .SH DESCRIPTION .I Admin\^ is used to create new \R get (1) command for editing. The default value for an unspecified .B f flag is 1. .F1 d \s-1SID\s0 The default delta number (\ed file is to be processed since the effects of the arguments apply independently to each named file. .AR n This keyletter indic \\$7 \\$8 \\$9 .nr f 1 .. .de C1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \\$1 \\$2 \\$3 \\$4 \\$5 \\$6 \\$7 \\$8 .B \-t keyletter is used and .I admin\^ is creating a new \*(S) file (the .B \-n and/or .B \-i keyletters also used), the descri*(S) files and change parameters of existing ones. Arguments to .I admin\c\^ , which may appear in any order, consist of keylett*(I)) to be used by a .IR get (1) command. .F1 i \& Causes the "No id keywords (ge6)" message issued by .IR get (1) or .IR deltaates that a new \*(S) file is to be created. .A1 i name The \fIname\fR of a file from which the text for a new \*(S) file is to \\$9 .nr f 1 .. .de A1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \fB\-\\$1\fR[\fI\\$2\fR] \\$3 \\$4 \\$5 \\$6 \\$7 \ptive text file name must also be supplied. In the case of existing \*(S) files: (1) a .B \-t keyletter without a file name causer arguments, which begin with \fB\-\fR, and named files (note that \*(S) file names must begin with the characters \fBs.\fR). I (1) to be treated as a fatal error. In the absence of this flag, the message is only a warning. The message is issued if no \*(be taken. The text constitutes the first delta of the file (see .B \-r keyletter for delta numbering scheme). If the .B i keylet\$8 \\$9 .nr f 1 .. .de A2 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \fB\-\\$1\fI\\$2\fR \\$3 \\$4 \\$5 \\$6 \\$7 \\es removal of descriptive text (if any) currently in the \*(S) file, and (2) a .B \-t keyletter with a file name causes text (iff a named file doesn't exist, it is created, and its parameters are initialized according to the specified keyletter arguments. S) identification keywords (see .IR get (1)) are found in the text retrieved or stored in the \*(S) file. .F1 j \& Allows concurter is used, but the file name is omitted, the text is obtained by reading the standard input until an end-of-file is encountere$8 \\$9 .nr f 1 .. .de FI .PP .TP 30 \\$1 \\$2 .i0 .. .ds F) \fI\s-1FILES\s+1\fR .ds W) \fI\s-1WARNINGS\s+1\fR .ds X) \fI\s-1 any) in the named file to replace the descriptive text (if any) currently in the \*(S) file. .A2 f flag This keyletter specifieParameters not initialized by a keyletter argument are assigned a default value. If a named file does exist, parameters corresporent .IR get (1) commands for editing on the same \*(I) of an \*(S) file. This allows multiple concurrent updates to the same ved. If this keyletter is omitted, then the \*(S) file is created empty. Only one \*(S) file may be created by an .I admin\^ commaEXAMPLES\s+1\fR .ds T) \fI\s-1TABLE\s+1\fR .ds K) \fI\s-1DATA KEYWORDS\s+1\fR .ds D) \fI\s-1DDDDD\s+1\fR .ds M) \fI\s-1MR\s+s a \fIflag\fR, and, possibly, a value for the \fIflag\fR, to be placed in the \*(S) file. Several .B f keyletters may be supplinding to specified keyletter arguments are changed, and other parameters are left as is. .PP If a directory is named, .I admin\^rsion of the \*(S) file. .F1 l list A \fIlist\fR of releases to which deltas can no longer be made .RB ( "get \-e" against one ond on which the .B i keyletter is supplied. Using a single .I admin\^ to create two or more \*(S) files require that they be cre1\fR .ds R) \fI\s-1RELEASE NUMBER\s+1\fR .ds S) \s-1SCCS\s+1 .ds I) \s-1SID\s+1 .de F1 .if \\nf \{ \ . RE . nr f 0 \} .ed on a single .I admin\^ command line. The allowable \fIflag\fRs and their values are: .F1 b \& Allows use of the .B \-b keylet behaves as though each file in the directory were specified as a named file, except that non-\*(S) files (last component of thef these ``locked'' releases fails). The \fIlist\fR has the following syntax: .F1 \& \& ::= \(or , ated empty (no .B \-i keyletter). Note that the .B \-i keyletter implies the .B \-n keyletter. .A2 r rel The .I rel\c\^ ease intPP .RS 13 .TP 7 \fB\\$1\fI\\$2\fR \\$3 .nr f 1 .. .de F2 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 13 .TP 7 \fB\\$1[\fI\\$2\fter on a .IR get (1) command to create branch deltas. .F1 c ceil The highest release (i.e., ``ceiling''), a number less than or  path name does not begin with \fBs.\fR) and unreadable files are silently ignored. If a name of \fB\-\fR is given, the standard.br ~::= \*(R) \(or \fBa\fR .F1 \& \& The character \fBa\fR in the \fIlist\fR is equivalent to specifying .I "all releaseo which the initial delta is inserted. This keyletter may be used only if the .B \-i keyletter is also used. If the .B \-r keyleR] \\$3 .nr f 1 .. .TH ADMIN 1 .SH NAME admin \- create and administer \s-1SCCS\s0 files .SH SYNOPSIS .B admin .SF n .SP i \%[naequal to 9999, which may be retrieved by a .IR get (1) command for editing. The default value for an unspecified .B c flag is 99 input is read; each line of the standard input is taken to be the name of an \*(S) file to be processed. Again, non-\*(S) files(0 ( ) *!+",#-$.%/ &0 's\^" for the named \*(S) file. .F1 n \& Causes .IR delta (1) to create a ``null'' delta in each of those releases (if any) beingthe sum of all the characters in the \*(S) file except those in the first line) with the check-sum that is stored in the first lset when creating an .SM SCCS file, the .B m keyletter must also be used even if its value is null). .A2 d flag Causes removal (\*(S) file only if no errors occurred. .PP It is recommended that directories containing \*(S) files be mode 755 and that \*(S)  that group \s-1ID\s+1. Several .B e keyletters may be used on a single .I admin\^ command line. .A1 y comment The .I comment\^  skipped when a delta is made in a .I new\^ release (e.g., in making delta 5.1 after delta 2.7, releases 3 and 4 are skipped). Tine of the \*(S) file. Appropriate error diagnostics are produced. .C1 \& This keyletter inhibits writing on the file, so that ideletion) of the specified \fIflag\fR from an \*(S) file. The .B \-d keyletter may be specified only when processing existing \*files themselves be mode 444. The mode of the directories allows only the owner to modify \*(S) files contained in the directoritext is inserted into the \*(S) file as a comment for the initial delta in a manner identical to that of .IR delta (1). Omissionhese null deltas serve as ``anchor points'' so that branch deltas may later be created from them. The absence of this flag causet nullifies the effect of any other keyletters supplied, and is, therefore, only meaningful when processing existing files. .AR (S) files. Several .B \-d keyletters may be supplied on a single .I admin\^ command. See the .B \-f keyletter for allowable \fIfes. The mode of the \*(S) files prevents any modification at all except by \*(S) commands. .PP If it should be necessary to patc of the \fB\-y\fR keyletter results in a default comment line being inserted in the form: .sp \n(PDu date and time created .IR \s skipped releases to be non-existent in the \*(S) file preventing branch deltas from being created from them in the future. .F1z The \*(S) file check-sum is recomputed and stored in the first line of the \*(S) file (see .BR \-h , above). .C1 \& Note that lag\fR names. .F1 l list A \fIlist\fR of releases to be ``unlocked''. See the .B \-f keyletter for a description of the .B l flah an \*(S) file for any reason, the mode may be changed to 644 by the owner allowing use of .IR ed (1). .I "Care must be taken!\s-1YY\s+1 / \s-1MM\s+1 / \s-1DD\s+1 .IR \s-1HH\s+1 : \s-1MM\s+1 : \s-1SS\s+1 by .I login\^ .sp \n(PDu The .B \-y keyletter is v q text User definable text substituted for all occurrences of the %Q% keyword in \*(S) file text retrieved by .IR get (1). .F1 use of this keyletter on a truly corrupted file may prevent future detection of the corruption. .i0 .SH FILES The last componentg and the syntax of a \fIlist\fR. .A2 a login A \fIlogin\fR name, or numerical \s-1UNIX\s+1 group \s-1ID\s+1, to be added to the^" The edited file should .I always\^ be processed by an .B admin .B \-h to check for corruption followed by an .B admin .B \-z alid only if the .B \-i and/or .B \-n keyletters are specified (i.e., a new \*(S) file is being created). .A1 m mrlist The list m mod \fIMod\|\fRule name of the \*(S) file substituted for all occurrences of the %M% keyword in \*(S) file text retrieved by . of all \*(S) file names must be of the form \fBs.\fP\fIfile-name\fP. New \*(S) files are given mode 444 (see .IR chmod (1)). Wr list of users which may make deltas (changes) to the \*(S) file. A group \s-1ID\s+1 is equivalent to specifying all \fIlogin\fRto generate a proper check-sum. Another .B admin .B \-h is recommended to ensure the \*(S) file is valid. .PP .I Admin\^ also maof Modification Requests (\*(M)) numbers is inserted into the \*(S) file as the reason for creating the initial delta in a manneIR get (1). If the .B m flag is not specified, the value assigned is the name of the \*(S) file with the leading \fBs.\fR removeite permission in the pertinent directory is, of course, required to create a file. All writing done by .I admin\^ is to a tempo names common to that group \s-1ID\s+1. Several .B a keyletters may be used on a single .I admin\^ command line. As many \fIlogikes use of a transient lock file (called \fBz.\fP\fIfile-name\fP), which is used to prevent simultaneous updates to the \*(S) fir identical to .IR delta (1). The .B v flag must be set and the \*(M) numbers are validated if the .B v flag has a value (the nad. .F1 t type \fIType\fR of module in the \*(S) file substituted for all occurrences of %Y% keyword in \*(S) file text retrievedrary x-file, called \fBx.\fP\fIfile-name\fP, (see .IR get (1)), created with mode 444 if the .I admin\^ command is creating a nen\fRs, or numerical group \s-1ID\s+1s, as desired may be on the list simultaneously. If the list of users is empty, then anyone le by different users. See .IR get (1) for further information. .SH "SEE ALSO" delta(1), ed(1), get(1), help(1), prs(1), what(1)me of an \*(M) number validation program). Diagnostics will occur if the .B v flag is not set or \*(M) validation fails. .AR h C by .IR get (1). .F2 v pgm Causes .IR delta (1) to prompt for Modification Request (\*(M)) numbers as the reason for creating a w \*(S) file, or with the same mode as the \*(S) file if it exists. After successful execution of .I admin\c\^ , the \*(S) file may add deltas. .A2 e login A \fIlogin\fR name, or numerical group \s-1ID\s+1, to be erased from the list of users allowed to ma, sccsfile(5). .br .I "Source Code Control System User's Guide\^" by L. E. Bonanni and C. A. Salemi. .SH DIAGNOSTICS Use .IR helauses .I admin\^ to check the structure of the \*(S) file (see .I sccsfile\c\^ (5)), and to compare a newly computed check-sum (delta. The optional value specifies the name of an \*(M) number validity checking program (see .IR delta (1)). (If this flag is is removed (if it exists), and the x-file is renamed with the name of the \*(S) file. This ensures that changes are made to the ke deltas (changes) to the \*(S) file. Specifying a group \s-1ID\s+1 is equivalent to specifying all \fIlogin\fR names common to)0 ( ) *!+",#-$.%/ &0 'p (1) for explanations. .tr ~~ Another .B admin .B \-h is recommended to ensure the \*(S) file is valid. .PP .I Admin\^ also ma7 \\$8 \\$9 .nr f 1 .. .de FI .PP .TP 30 \\$1 \\$2 .i0 .. .ds F) \fB\s-1FILES\s+1\fR .ds W) \fI\s-1WARNINGS\s+1\^\fR .ds X) \fI\to allow processing of files which are too large for .IR diff . .I Bdiff\^ ignores lines common to the beginning of both files, ame of .B \- is given, the standard input is read (see \%\*(W)); each line of the standard input is taken to be the name of an \usr/man/man1/cdc.1 664 152 2 kes use of a transient lock file (called \fBz.\fP\fIfile-name\fP), which is used to prevent simultaneous updates to the \*(S) fis-1EXAMPLES\s+1\^\fR .ds T) \fB\s-1TABLE\s+1\fR .ds K) \fB\s-1DATA KEYWORDS\s+1\fR .ds D) \fB\s-1DDDDD\s+1\fR .ds M) \fB\s-1MR\ssplits the remainder of each file into .IR n -line segments, and invokes .I diff\^ upon corresponding segments. The value of .I *(S) file to be processed. .PP Arguments to .IR cdc , which may appear in any order, consist of .I keyletter\^ arguments, and fi 13061 3142671160 7135 le by different users. See .IR get (1) for further information. .SH "SEE ALSO" delta(1), ed(1), get(1), help(1), prs(1), what(1)+1\fR .ds R) \fB\s-1RELEASE NUMBER\s+1\fR .ds S) \s-1SCCS\s+1 .ds I) \fI\s-1SID\s+1\fR .de F1 .if \\nf \{ \ . RE . nr f 0 n\^ is 3500 by default. If the optional third argument is given, and it is numeric, it is used as the value for .IR n . This is le names. .PP All the described .I keyletter\^ arguments apply independently to each named file: .A2 r \s-1SID\s+1 Used to speci, sccsfile(5). .br .I "Source Code Control System User's Guide\^" by L. E. Bonanni and C. A. Salemi. .SH DIAGNOSTICS Use .IR hel\} .PP .RS 13 .TP 7 \fB\\$1\fR\fI\\$2\^\fR \\$3 .nr f 1 .. .de F2 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 13 .TP 7 \fB\\$1\useful in those cases in which 3500-line segments are too large for .IR diff , causing it to fail. If .I file1\^ .RI ( file2 ) ify the .IR S \s-1CCS\s+1 .IR ID entification (\*(I)) string of a delta for which the delta commentary is to be changed. .A1 m mrusr/man/man1/bdiff.1 664 152 2 fR[\fI\\$2\^\fR] \\$3 .nr f 1 .. .TH CDC 1 .SH NAME cdc \- change the delta commentary of an \s-1SCCS\s+1 delta .SH SYNOPSIS .B s \fB\-\fR, the standard input is read. The optional .B \-s (silent) argument specifies that no diagnostics are to be printed bylist If the \*(S) file has the .B v flag set (see .IR admin (1)) then a list of \*(M) numbers to be added and/or deleted in the .tr ~ .nr f 0 .de SP .if n .ul \%[\fB\-\\$1\fR\\c .if n .ul 0 \\$2\\$3 .. .de SF .if n .ul \%[\fB\-\\$1\fR] .if n .ul 0 .. .de Z 2743 3142671160 7443 cdc \fB\-r\fR\c .SM SID .SP m [mrlist]] .SP y [comment]] files .SH DESCRIPTION .I Cdc\^ changes the .IR "delta commentary" , for .I bdiff\^ (note, however, that this does not suppress possible exclamations by .IR diff . If both optional arguments are specidelta commentary of the \*(I) specified by the .B \-r keyletter .I may\^ be supplied. A null \*(M) list has no effect. .C1 \& \*Z .hc ^ \fB^...\fR .hc .. .de AR .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \fB\-\\$1\\fR \\$2 \\$3 \\$4 \\$5 \\$6 \\ the \*(I) specified by the .B \-r keyletter, of each named \*(S) file. .PP .I "Delta commentary\^" is defined to be the Modificfied, they must appear in the order indicated above. .PP The output of .I bdiff\^ is exactly that of .IR diff , with line number(M) entries are added to the list of \*(M)s in the same manner as that of .IR delta (1). In order to delete an \*(M), precede th$7 \\$8 \\$9 .nr f 1 .. .de C1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \\$1 \\$2 \\$3 \\$4 \\$5 \\$6 \\$7 \\$8 \\$ation Request (\*(M)) and comment information normally specified via the .IR delta (1) command .RB ( \-m and .B \-y keyletters).s adjusted to account for the segmenting of the files (that is, to make it look as if the files had been processed whole). Note e \*(M) number with the character \fB!\fR (see \*(X)). If the \*(M) to be deleted is currently in the list of \*(M)s, it is remo9 .nr f 1 .. .de A1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \fB\-\\$1\fR[\fI\\$2\^\fR] \\$3 \\$4 \\$5 \\$6 \\$7 \\.TH BDIFF 1 .SH NAME bdiff \- big diff .SH SYNOPSIS .B bdiff file1 file2 [n] .RB [ \-s ] .SH DESCRIPTION .I Bdiff\^ is used in a .PP If a directory is named, .I cdc\^ behaves as though each file in the directory were specified as a named file, except that that because of the segmenting of the files, .I bdiff\^ does not necessarily find a smallest sufficient set of file differences.ved and changed into a ``comment'' line. A list of all deleted \*(M)s is placed in the comment section of the delta commentary a$8 \\$9 .nr f 1 .. .de A2 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \fB\-\\$1\fR\fI\\$2\^\fR \\$3 \\$4 \\$5 \\$6 \\$ manner analogous to .IR diff (1) to find which lines must be changed in two files to bring them into agreement. Its purpose is non-\*(S) files (last component of the path name does not begin with \fBs.\fR) and unreadable files are silently ignored. If a n .SH FILES /tmp/bd????? .SH "SEE ALSO" diff(1). .SH DIAGNOSTICS Use .IR help (1) for explanations. optional arguments are speci*0 ( ) *!+",#-$.%/ &0 'nd preceded by a comment line stating that they were deleted. .C1 \& If .B \-m is not used and the standard input is a terminal,0 .. .de ZZ .hc ^ \fB^...\fR .hc .. .de AR .if \\nf \{ \ . RE . nr f 0 \} .PP .TP 8 \fB\-\\$1\\fR \\$2 \\$3 \\$4 \\$5 \\$6tandard input is not a terminal, no prompt is issued. An unescaped new-line character terminates the \fIcomment\^\fR text. .i0 .cified as a named file, except that non-\s-1SCCS\s+1 files (last component of the path name does not begin with \fBs.\fR) and unOSTICS Use .IR help (1) for explanations. .tr ~~ .PP does the same thing. .DT .SH WARNINGS If \*(S) file names are supplied to  the prompt .B \s-1MR\s+1s? is issued on the standard output before the standard input is read; if the standard input is not a t \\$7 \\$8 \\$9 .nr f 1 .. .de C1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 8 \\$1 \\$2 \\$3 \\$4 \\$5 \\$6 \\$7 \\$8 \PP The exact permissions necessary to modify the \*(S) file are documented in the .IR "Source Code Control System User's Guide" readable files are silently ignored. If a name of \fB\-\fR is given, the standard input is read; each line of the standard inputthe .I cdc\^ command via the standard input (\fB\-\fR on the command line), then the .B \-m and .B \-y keyletters must also be uerminal, no prompt is issued. The \fB\s-1MR\s+1s?\fR prompt always precedes the \fBcomments?\fR prompt (see .B \-y keyletter). .\$9 .nr f 1 .. .de A1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 8 \fB\-\\$1\fR[\fI\\$2\fR] \\$3 \\$4 \\$5 \\$6 \\$7 \\$. Simply stated, they are either (1) if you made the delta, you can change its delta commentary; or (2) if you own the file and  is taken to be the name of an \s-1SCCS\s+1 file to be processed; non-\s-1SCCS\s+1 files and unreadable files are silently ignorsed. .SH FILES .PD 0 .TP 10 x-file (see .IR delta (1)) .TP z-file (see .IR delta (1)) .PD .SH SEE ALSO admin(1), delta(1), get(1C1 \& \*(M)s in a list are separated by blanks and/or tab characters. An unescaped new-line character terminates the \*(M) list.8 \\$9 .nr f 1 .. .de A2 .if \\nf \{ \ . RE . nr f 0 \} .PP .TP 8 \fB\-\\$1\fI\\$2\fR \\$3 \\$4 \\$5 \\$6 \\$7 \\$8 \\$9 .directory you can modify the delta commentary. .SH EXAMPLES .RS 5n cdc \-r1\fB.\fP6 \-m"bl78-12345 !bl77-54321 bl79-00001" \-ytred. .PP The generated shell procedure is written on the standard output. .PP The keyletter arguments are as follows. Each is exp), help(1), prs(1), sccsfile(5). .br .I "Source Code Control System User's Guide\^" by L. E. Bonanni and C. A. Salemi. .SH DIAGN .C1 \& Note that if the .B v flag has a value (see .IR admin (1)), it is taken to be the name of a program (or shell procedure)nr f 1 .. .de FI .PP .TP 30 \\$1 \\$2 .i0 .. .de F1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 13 .TP 7 \fB\\$1\fI\\$2\fR \\$3ouble s\fB.\fPfile .RE .PP adds bl78-12345 and bl79-00001 to the \*(M) list, removes bl77-54321 from the \*(M) list, and adds thlained as though only one named file is to be processed, but the effects of any keyletter argument apply independently to each nusr/man/man1/comb.1 664 152 2  which validates the correctness of the \*(M) numbers. If a non-zero exit status is returned from the \*(M) number validation pr .nr f 1 .. .de F2 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 13 .TP 7 \fB\\$1[\fI\\$2\fR] \\$3 .nr f 1 .. .TH COMB 1 .SH NAMEe comment \fBtrouble\fR to delta 1\fB.\fR6 of s\fB.\fRfile. .PP .RS 5n cdc \-r1\fB.\fR6 s\fB.\fRfile .br \s-1MR\s+1s? !bl77-5432amed file. .A2 p \s-1SID\s+1 The .IR S "\s-1CCS\s+1 " ID entification string (\s-1SID\s+1) of the oldest delta to be preserved.  7505 3142671160 7312 ogram, .I cdc\^ terminates and the delta commentary remains unchanged. .A1 y comment Arbitrary text used to replace the \fIcomme comb \- combine \s-1SCCS\s+1 deltas .SH SYNOPSIS .B comb .SF o .SF s .SP p sid ] .SP c list] files .SH DESCRIPTION .I Comb\^ ge1 bl78-12345 bl79-00001 .br comments? trouble .RE .PP does the same thing. .DT .SH WARNINGS If \*(S) file names are supplied to All older deltas are discarded in the reconstructed file. .A2 c list A .I list\^ (see .IR get (1) for the syntax of a \fIlist\fRnt\^\fR(s) already existing for the delta specified by the .B \-r keyletter. The previous comments are kept and preceded by a conerates a shell procedure (see .IR sh (1)) which, when run, will reconstruct the given \s-1SCCS\s+1 files. The reconstructed filthe .I cdc\^ command via the standard input (\fB\-\fR on the command line), then the .B \-m and .B \-y keyletters must also be u) of deltas to be preserved. All other deltas are discarded. .AR o For each .B get \-e generated, this argument causes the reconmment line stating that they were changed. A null \fIcomment\^\fR has no effect. .C1 \& If .B \-y is not specified and the standes will, hopefully, be smaller than the original files. The arguments may be specified in any order, but all keyletter argumentssed. .SH FILES .PD 0 .TP 10 x-file (see .IR delta (1)) .TP z-file (see .IR delta (1)) .PD .SH SEE ALSO admin(1), delta(1), get(1structed file to be accessed at the release of the delta to be created, otherwise the reconstructed file would be accessed at th.tr ~ .nr f 0 .bd S B 3 .de SP .if n .ul \%[\fB\-\\$1\fR\\c .if n .ul 0 \\$2\\$3 .. .de SF .if n .ul \%[\fB\-\\$1\fR] .if n .ul ard input is a terminal, the prompt \fBcomments?\fR is issued on the standard output before the standard input is read; if the s apply to all named \s-1SCCS\s+1 files. If a directory is named, .I comb\^ behaves as though each file in the directory were spe), help(1), prs(1), sccsfile(5). .br .I "Source Code Control System User's Guide\^" by L. E. Bonanni and C. A. Salemi. .SH DIAGN+0 ( ) *!+",#-$.%/ &0 'e most recent ancestor. Use of the .B \-o keyletter may decrease the size of the reconstructed \s-1SCCS\s+1 file. It may also alehaves as though each file in the directory were specified as a named file, except that non-\*(S) files (last component of the pe reconstructed file to actually be larger than the original. .tr ~~ 14 .RB s . \s-1COMB\s+1 The name of the reconstructed \s-1, as well as the number of lines inserted, deleted and unchanged in the \*(S) file. .AR n Specifies retention of the edited .I g6 \\$7 \\$8 \\$9 .nr f 1 .. .de A2 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \fB\-\\$1\fI\\$2\fR \\$3 \\$4 \\$5 \\$6ter the shape of the delta tree of the original file. .AR s This argument causes .I comb\^ to generate a shell procedure which, ath name does not begin with \fBs.\fR) and unreadable files are silently ignored. If a name of \fB\-\fR is given, the standard iSCCS\s+1 file. .RE .TP 14 comb????? Temporary. .PD .SH "SEE ALSO" admin(1), delta(1), get(1), help(1), prs(1), sccsfile(5). .br -file\^ (normally removed at completion of delta processing). .A2 g list Specifies a \fIlist\fR (see .IR get (1) for the definit \\$7 \\$8 \\$9 .nr f 1 .. .de FI .PP .TP 30 \\$1 \\$2 .i0 .. .ds F) \fI\s-1FILES\s+1\fR .ds W) \fI\s-1WARNINGS\s+1\fR .ds X) when run, will produce a report giving, for each file: the file name, size (in blocks) after combining, original size (also in bnput is read (see \*(W)); each line of the standard input is taken to be the name of an \*(S) file to be processed. .PP .I Deltausr/man/man1/delta.1 664 152 2 ion of \fIlist\fR) of deltas which are to be .I ignored\^ when the file is accessed at the change level (\*(I)) created by this  \fI\s-1EXAMPLES\s+1\fR .ds T) \fI\s-1TABLE\s+1\fR .ds K) \fI\s-1DATA KEYWORDS\s+1\fR .ds D) \fI\s-1DDDDD\s+1\fR .ds M) \fB\locks), and percentage change computed by: .br .ce 1 \%100~\fB\(**\fR~(original~\-~combined)~/~original .br It is recommended t\^ may issue prompts on the standard output depending upon certain keyletters specified and flags (see .IR admin (1)) that may b 15013 3142671160 7474 delta. .A1 m mrlist If the \*(S) file has the .B v flag set (see .IR admin (1)) then a Modification Request (\*(M)) number \fImus-1MR\s+1\fR .ds R) \fI\s-1RELEASE NUMBER\s+1\fR .ds S) \s-1SCCS\s+1 .ds I) \s-1SID\s+1 .de F1 .if \\nf \{ \ . RE . nr hat before any \s-1SCCS\s+1 files are actually combined, one should use this option to determine exactly how much space is savede present in the \*(S) file (see .B \-m and .B \-y keyletters below). .PP Keyletter arguments apply independently to each named st\fR be supplied as the reason for creating the new delta. .C1 \& If .B \-m is not used and the standard input is a terminal, tf 0 \} .PP .RS 13 .TP 7 \fB\\$1\fI\\$2\fR \\$3 .nr f 1 .. .de F2 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 13 .TP 7 \fB\\$1[\ by the combining process. .PP If no keyletter arguments are specified, .I comb\^ will preserve only leaf deltas and the minimalfile. .A2 r SID Uniquely identifies which delta is to be made to the \*(S) file. The use of this keyletter is necessary only if he prompt .SM .B MR\*Ss? is issued on the standard output before the standard input is read; if the standard input is not a termfI\\$2\fR] \\$3 .nr f 1 .. .if t .ds )S \\| .TH DELTA 1 .SH NAME delta \- make a delta (change) to an \s-1SCCS\s+1 file .SH SYNO number of ancestors needed to preserve the tree. .SH FILES .PD 0 .TP 14 .RB s . \s-1COMB\s+1 The name of the reconstructed \s-1two or more outstanding .IR get s for editing .RB ( "get \-e" ) on the same \*(S) file were done by the same person (login name).tr ~ .if n .ds D " -- .if t .ds D _ .nr f 0 .bd S B 3 .de SP .if n .ul \%[\fB\-\\$1\fR\\c .if n .ul 0 \\$2\\$3 .. .de SF .if ninal, no prompt is issued. The .SM .B MR\*Ss? prompt always precedes the .B comments? prompt (see .B \-y keyletter). .PP .C1 \& PSIS .B delta .SP r SID ] .SF s .SF n .SP g list] .SP m \%[mrlist] ] .SP y \%[comment] ] .SF p files .SH DESCRIPTION .I Delta\^ SCCS\s+1 file. .RE .TP 14 comb????? Temporary. .PD .SH "SEE ALSO" admin(1), delta(1), get(1), help(1), prs(1), sccsfile(5). .br . The \*(I) value specified with the .B \-r keyletter can be either the \*(I) specified on the .I get\^ command line or the \*(I .ul \%[\fB\-\\$1\fR] .if n .ul 0 .. .de AR .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \fB\-\\$1\\fR \\$2 \\$3 \\$4 \\*(M)s in a list are separated by blanks and/or tab characters. An unescaped new-line character terminates the \*(M) list. .C1 \is used to permanently introduce into the named \*(S) file changes that were made to the file retrieved by .IR get (1) (called t.I "Source Code Control System User's Guide\^" by L. E. Bonanni and C. A. Salemi. .SH DIAGNOSTICS Use .IR help (1) for explanati) to be made as reported by the .I get\^ command (see .IR get (1)). A diagnostic results if the specified \*(I) is ambiguous, or\$5 \\$6 \\$7 \\$8 \\$9 .nr f 1 .. .de C1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \\$1 \\$2 \\$3 \\$4 \\$5 \\$6 \\& Note that if the .B v flag has a value (see .IR admin (1)), it is taken to be the name of a program (or shell procedure) whichhe .IR g-file , or generated file). .PP .I Delta\^ makes a delta to each named \*(S) file. If a directory is named, .I delta\^ bons. .SH BUGS .I Comb\^ may rearrange the shape of the tree of deltas. It may not save any space; in fact, it is possible for th, if necessary and omitted on the command line. .AR s Suppresses the issue, on the standard output, of the created delta's \*(I)$7 \\$8 \\$9 .nr f 1 .. .de A1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \fB\-\\$1\fR[\fI\\$2\fR] \\$3 \\$4 \\$5 \\$,0 ( ) *!+",#-$.%/ &0 ' will validate the correctness of the \*(M) numbers. If a non-zero exit status is returned from \*(M) number validation program, .ds M) \fB\s-1MR\s+1\fR .ds R) \fB\s-1RELEASE NUMBER\s+1\fR .ds S) \s-1SCCS\s+1 .ds I) \s-1SID\s+1 .TH GET 1 .SH NAME get \.TP x-file Created during the execution of .IR delta ; renamed to \*(S) file after completion of .IR delta . .TP z-file Created o \fI\s-1FILES\s+1\fP\^, below). .PP Each of the keyletter arguments is explained below as though only one \*(S) file is to be pns. .tr ~~ large amount of data. Instead, multiple .I "get/delta\^" sequences should be used. .PP If the standard input (\fB\-\f .I delta\^ terminates (it is assumed that the \*(M) numbers were not all valid). .A1 y comment Arbitrary text used to describe - get a version of an \s-1SCCS\s+1 file .SH SYNOPSIS .B get .SP r SID ] .SP c cutoff ] .SP i list ] .SP x list ] .SP a seq-no. ]during the execution of .IR delta ; removed during the execution of .IR delta . .TP d-file Created during the execution of .IR drocessed, but the effects of any keyletter argument applies independently to each named file. .TP "\w'\fB\-a\fIseq-no.\fR~~'u" .R) is specified on the .I delta\^ command line, the .B \-m (if necessary) and .B \-y keyletters .I must\^ also be present. Omissthe reason for making the delta. A null string is considered a valid \fIcomment\fR. .C1 \& If .B \-y is not specified and the st .SF k .SF e .if n .ul [\-l[p]] .if n .ul 0 .SF p .SF m .SF n .SF s .SF b .SF g .SF t file .B ".\|.\|." .SH DESCRIPTION .I Get\^elta ; removed after completion of .IR delta . .TP /usr/bin/bdiff Program to compute differences between the ``gotten'' file andBI \-r SID\^ The .IR S "\s-1CCS\s+1 " ID entification string (\*(I)) of the version (delta) of an \*(S) file to be retrieved. Taion of these keyletters causes an error to occur. .SH "SEE ALSO" admin(1), bdiff(1), get(1), help(1), prs(1), sccsfile(5). .br .andard input is a terminal, the prompt .B comments? is issued on the standard output before the standard input is read; if the s generates an \s-1ASCII\s+1 text file from each named \*(S) file according to the specifications given by its keyletter argument the .IR g-file . .PD .SH WARNINGS Lines beginning with an \s-1\fBSOH\fP ASCII\s+1 character (binary 001) cannot be placed in thble~1 below shows, for the most useful cases, what version of an \*(S) file is retrieved (as well as the \*(I) of the version toI "Source Code Control System User's Guide\^" by L. E. Bonanni and C. A. Salemi. .SH DIAGNOSTICS Use .IR help (1) for explanatiotandard input is not a terminal, no prompt is issued. An unescaped new-line character terminates the comment text. .AR p Causes s, which begin with \fB\-\fR. The arguments may be specified in any order, but all keyletter arguments apply to all named \*(S) e \*(S) file unless the .SM .B SOH is escaped. This character has special meaning to \*(S) (see .I sccsfile\c\^ (5)) and will ca be eventually created by .IR delta (1) if the .B \-e keyletter is also used), as a function of the \*(I) specified. .TP .BI \-cusr/man/man1/get.1 664 152 2 .I delta\^ to print (on the standard output) the \*(S) file differences before and after the delta is applied in a .IR diff (1) files. If a directory is named, .I get\^ behaves as though each file in the directory were specified as a named file, except thause an error. .PP A .I get\^ of many \*(S) files, followed by a .I delta\^ of those files, should be avoided when the .I get\^ g cutoff\^ \fICutoff\fR date-time, in the form: .IP \s-1YY[MM[DD[HH[MM[SS]]]]]\s+1 .IP No changes (deltas) to the \*(S) file whi 37702 3142671160 7173 format. .RE .SH FILES All files of the form .IR ?- file are explained in the \fISource Code Control System User's Guide\fP. The t non-\*(S) files (last component of the path name does not begin with .BR s. ) and unreadable files are silently ignored. If a enerates a large amount of data. Instead, multiple .I "get/delta\^" sequences should be used. .PP If the standard input (\fB\-\fch were created after the specified \fIcutoff\fR date-time are included in the generated \s-1ASCII\s+1 text file. Units omitted naming convention for these files is also described there. .PP .PD 0 .TP "\w`/usr/bin/bdiff\ \ \ `u" g-file Existed before the ename of \fB\-\fR is given, the standard input is read; each line of the standard input is taken to be the name of an \*(S) file R) is specified on the .I delta\^ command line, the .B \-m (if necessary) and .B \-y keyletters .I must\^ also be present. Omissfrom the date-time default to their maximum possible values; that is, .B \-c7502 is equivalent to .BR \-c750228235959 . Any numbxecution of .IR delta ; removed after completion of .IR delta . .TP p-file Existed before the execution of .IR delta ; may existto be processed. Again, non-\*(S) files and unreadable files are silently ignored. .PP The generated text is normally written inion of these keyletters causes an error to occur. .SH "SEE ALSO" admin(1), bdiff(1), get(1), help(1), prs(1), sccsfile(5). .br .er of non-numeric characters may separate the various 2 digit pieces of the \fIcutoff\fR date-time. This feature allows one to s'\" t .tr ~ .nr f 0 .de SP .if n .ul \%[\fB\-\\$1\fR\\c .if n .ul 0 \\$2\\$3 .. .de SF .if n .ul \%[\fB\-\\$1\fR] .if n .ul 0 .. after completion of .IR delta . .TP q-file Created during the execution of .IR delta ; removed after completion of .IR delta . to a file called the .I g-file\^ whose name is derived from the \*(S) file name by simply removing the leading .BR s. ; (see alsI "Source Code Control System User's Guide\^" by L. E. Bonanni and C. A. Salemi. .SH DIAGNOSTICS Use .IR help (1) for explanatio-0 ( ) *!+",#-$.%/ &0 'pecify a \fIcutoff\fR date in the form: \&"\fB\-c77/2/2 9:22:25\fP". Note that this implies that one may use the %E% and %U% ideses the actual retrieval of text from the \*(S) file. It is primarily used to generate an .IR l-file , or to verify the existencI) in a new branch as shown in Table~1. This keyletter is ignored if the .B b flag is not present in the file (see .IR admin (1)or if a directory or standard input is named, each file name is printed (preceded by a new-line) before it is processed. If the ummary is written on the standard output instead. See \fI\s-1FILES\s+1\fP for the format of the .IR l-file . .TP .B \-p Causes tntification keywords (see below) for nested .I gets\^ within, say the input to a .IR send (1C) command: .tr ~~ .IP ~!get "\-c%e of a particular \*(I). .TP .B \-t Used to access the most recently created (``top'') delta in a given release (e.g., .BR \-r1 ) or if the retrieved .I delta\^ is not a leaf .IR delta . (A leaf .I delta\^ is one that has no successors on the \*(S) file tr.B \-i keyletter is used included deltas are listed following the notation ``Included''; if the .B \-x keyletter is used, excludhe text retrieved from the \*(S) file to be written on the standard output. No .I g-file\^ is created. All output which normallyE% %U%" s.file .br .tr ~ .TP .B \-e Indicates that the .I get\^ is for the purpose of editing or making a change (delta) to th), or release and level (e.g., .BR \-r1.2 ). .TP .BI \-a "seq-no." The delta sequence number of the \*(S) file delta (version) tee.) .br Note: A branch .I delta\^ may always be created from a non-leaf .IR delta . .TP .BI \-i list\^ A \fIlist\fR of deltas ted deltas are listed following the notation ``Excluded''. .ne 10v .PP .in 0 .TS center expand ; c s s s s c1 c1 c1 c1 c0 c c c c goes to the standard output goes to file descriptor 2 instead, unless the .B \-s keyletter is used, in which case it disappearse \*(S) file via a subsequent use of .IR delta (1). The .B \-e keyletter used in a .I get\^ for a particular version (\*(I)) of o be retrieved (see .I sccsfile\c\^ (5)). This keyletter is used by the .IR comb (1) command; it is not a generally useful keyleo be included (forced to be applied) in the creation of the generated file. The \fIlist\fR has the following syntax: .IP  c l c l l l . TABLE 1. Determination of \s-1SCCS\s+1 Identification String .sp 1.5p = \s-1SID\s+1* \fB\-b\fP Keyletter Other \s. .TP .B \-s Suppresses all output normally written on the standard output. However, fatal error messages (which always go to fithe \*(S) file prevents further .I get\c\^ s for editing on the same \*(I) until .I delta\^ is executed or the .B j (joint edit)tter, and users should not use it. If both the .B \-r and .B \-a keyletters are specified, the .B \-a keyletter is used. Care sh ::= \(or , .br ::= \*(I) \(or \*(I) \- \*(I) .IP \*(I), the \*(S) Identification of a delta, ma-1SID\s+1 \s-1SID\s+1 of Delta Specified Used\(dg Conditions Retrieved to be Created .sp 1.5p = none\(dd no R defaults to mR mR.le descriptor 2) remain unaffected. .TP .B \-m Causes each text line retrieved from the \*(S) file to be preceded by the \*(I) o flag is set in the \*(S) file (see .IR admin (1)). Concurrent use of .B "get \-e" for different \*(I)s is always allowed. .IP Iould be taken when using the .B \-a keyletter in conjunction with the .B \-e keyletter, as the \*(I) of the delta to be created y be in any form shown in the ``\*(I) Specified'' column of Table~1. Partial \*(I)s are interpreted as shown in the ``\*(I) RetrmL mR.(mL\^+1) _ none\(dd yes R defaults to mR mR.mL mR.mL.(mB\^+1).1 .sp 1.5p = R no R > mR mR.mL R.1*** _ R no R = mR mR.mL mRf the delta that inserted the text line in the \*(S) file. The format is: \*(I), followed by a horizontal tab, followed by the tf the .I g-file\^ generated by .I get\^ with an .B \-e keyletter is accidentally ruined in the process of editing it, it may be may not be what one expects. The .B \-r keyletter can be used with the .B \-a and .B \-e keyletters to control the naming of theieved'' column of Table~1. .TP .BI \-x list\^ A \fIlist\fR of deltas to be excluded (forced not to be applied) in the creation o.(mL\^+1) _ R yes R > mR mR.mL mR.mL.(mB\^+1).1 _ R yes R = mR mR.mL mR.mL.(mB\^+1).1 _ R \- R < mR and hR.mL** hR.mL.(mB\^+1).1ext line. .TP .B \-n Causes each generated text line to be preceded with the %M% identification keyword value (see below). The fregenerated by re-executing the .I get\^ command with the .B \-k keyletter in place of the \fB\-e\fP keyletter. .IP .SM SCCS fil \*(I) of the delta to be created. .i0 .PP For each file processed, .I get\^ responds (on the standard output) with the \*(I) bef the generated file. See the .B \-i keyletter for the \fIlist\fR format. .TP .B \-k Suppresses replacement of identification ke \^ \^ R does \fInot\fP exist \^ \^ _ R \- Trunk succ.# R.mL R.mL.(mB\^+1).1 \^ \^ in release > R \^ \^ \^ \^ and R exists \^ \^ormat is: %M% value, followed by a horizontal tab, followed by the text line. When both the .B \-m and .B \-n keyletters are usee protection specified via the ceiling, floor, and authorized user list stored in the \*(S) file (see .IR admin (1)) are enforceing accessed and with the number of lines retrieved from the \*(S) file. .PP If the .B \-e keyletter is used, the \*(I) of the dywords (see below) in the retrieved text by their value. The .B \-k keyletter is implied by the .B \-e keyletter. .TP .BR \-l [  .sp 1.5p = R.L no No trunk succ. R.L R.(L\^+1) _ R.L yes No trunk succ. R.L R.L.(mB\^+1).1 _ R.L \- Trunk succ. R.L R.L.(mB\^+1d, the format is: %M% value, followed by a horizontal tab, followed by the .B \-m keyletter generated format. .TP .B \-g Suppresd when the .B \-e keyletter is used. .TP .B \-b Used with the .B \-e keyletter to indicate that the new delta should have an \*(elta to be made appears after the \*(I) accessed and before the number of lines generated. If there is more than one named file p ] Causes a delta summary to be written into an .IR l-file . If .B \-lp is used then an .I l-file\^ is not created; the delta s.0 ( ) *!+",#-$.%/ &0 ').1 \^ \^ in release \(>= R \^ \^ .sp 1.5p = R.L.B no No branch succ. R.L.B.mS R.L.B.(mS\^+1) _ R.L.B yes No branch succ. R.L.B.e-name\fP, the auxiliary files are named by replacing the leading \fBs\fR with the tag. The .I g-file\^ is an exception to this es if the .B d (default \s-1SID\s+1) flag is .I not present in the file. If the .B d flag .I is present in the file, then the \s or wasn't applied and ignored; .br \fB\(**\fR if the delta wasn't applied and wasn't ignored. .TP \n+a. A code indicating a ``s%Y% Module type: value of the .B t flag in the \*(S) file (see .IR admin (1)). .TP .B %F% \*(S) file name. .TP .B %P% Fully qualmS R.L.(mB\^+1).1 .sp 1.5p = R.L.B.S no No branch succ. R.L.B.S R.L.B.(S\^+1) _ R.L.B.S yes No branch succ. R.L.B.S R.L.(mB\^+1)scheme: the .I g-file\^ is named by removing the .B s. prefix. For example, .BR s.xyz.c , the auxiliary file names would be .BR -1SID\s+1 obtained from the .B d flag is interpreted as if it had been specified on the command line. Thus, one of the other caspecial'' reason why the delta was or was not applied: .RS 10 ``I'': Included. .br ``X'': Excluded. .br ``C'': Cut off (by a .B \ified \*(S) file name. .TP .B %Q% The value of the .B q flag in the file (see .IR admin (1)). .TP .B %C% Current line number. Th.1 _ R.L.B.S \- Branch succ. R.L.B.S R.L.(mB\^+1).1 .sp 1.5p = .TE .in \n(INu .PP .PD 0 .TP "\w@***\ \ \ @u" * ``R'', ``L'', ``Bxyz.c , .BR l.xyz.c , .BR p.xyz.c , and .BR z.xyz.c , respectively. .PP The .IR g-file , which contains the generated text, is ces in this table applies. .PD .SH IDENTIFICATION KEYWORDS Identifying information is inserted into the text retrieved from the \-c keyletter). .RE .TP \n+a. Blank. .TP \n+a. \*(S) identification (\*(I)). .TP \n+a. Tab character. .TP \n+a. Date and time (inis keyword is intended for identifying messages output by the program such as ``this shouldn't have happened'' type errors. It i'', and ``S'' are the ``release'', ``level'', ``branch'', and ``sequence'' components of the \s-1SID\s+1, respectively; ``m'' mereated in the current directory (unless the .B \-p keyletter is used). A .I g-file\^ is created in all cases, whether or not any*(S) file by replacing .I "identification keywords\^" with their value wherever they occur. The following keywords may be used i the form \s-1YY/MM/DD~HH:MM:SS\s+1) of creation. .TP \n+a. Blank. .TP \n+a. Login name of person who created \fIdelta\fP. .PD .s .I not\^ intended to be used on every line to provide sequence numbers. .TP .B %Z% The 4-character string \fB@(#)\fR recognizaans ``maximum''. Thus, for example, ``R.mL'' means ``the maximum level number within release R''; ``R.L.(mB+1).1'' means ``the f lines of text were generated by the .IR get . It is owned by the real user. If the .B \-k keyletter is used or implied its moden the text stored in an \*(S) file: .br .ne 5v .PP .PD 0 .TP "\w'Keyword~~~'u" .I Keyword .I Value .TP .B %M% Module name: eitheRE .IP The comments and \*(M) data follow on subsequent lines, indented one horizontal tab character. A blank line terminates eable by .IR what (1). .TP .B %W% A shorthand notation for constructing .IR what (1) strings for \s-1UNIX\s+1 program files. %W%~=irst sequence number on the .I new branch (i.e., maximum branch number plus one) of level L within release R''. Note that if the is 644; otherwise its mode is 444. Only the real user need have write permission in the current directory. .PP The .I l-file\^ r the value of the .B m flag in the file (see .IR admin (1)), or if absent, the name of the \*(S) file with the leading .B s. rech entry. .PP The .I p-file\^ is used to pass information resulting from a .I get\^ with an .B \-e keyletter along to .IR delta ~%Z%%M%%I% .TP .B %A% Another shorthand notation for constructing .IR what (1) strings for non-\s-1UNIX\s+1 prog \s-1SID\s+1 specified is of the form ``R.L'', ``R.L.B'', or ``R.L.B.S'', each of the specified components .I must exist. .TP **contains a table showing which deltas were applied in generating the retrieved text. The .I l-file\^ is created in the current dmoved. .TP .B %I% \*(S) identification (\*(I)) (%R%.%L%.%B%.%S%) of the retrieved text. .TP .B %R% Release. .TP .B %L% Level. .T. Its contents are also used to prevent a subsequent execution of .I get\^ with an .B \-e keyletter for the same \*(I) until .I ram files. %A%~=~%Z%%Y%~%M%~%I%%Z% .PD .SH FILES Several auxiliary files may be created by .IR get , These files are known gener ``hR'' is the highest .I existing release that is lower than the specified, .IR nonexistent , release\ R. .TP *** This is used irectory if the .B \-l keyletter is used; its mode is 444 and it is owned by the real user. Only the real user need have write pP .B %B% Branch. .TP .B %S% Sequence. .TP .B %D% Current date (\s-1YY/MM/DD\s+1). .TP .B %H% Current date (\s-1MM/DD/YY\s+1). .Tdelta\^ is executed or the joint edit flag, .BR j , (see .IR admin (1)) is set in the \*(S) file. The .I p-file\^ is created in ically as the .IR g-file , .IR l-file , .IR p-file , and .IR z-file . The letter before the hyphen is called the tag. An auxiliato force creation of the .I first delta in a .I new release. .TP # Successor. .TP \(dg The .B \-b keyletter is effective only ifermission in the current directory. .PP Lines in the .I l-file\^ have the following format: .PP .PD 0 .RS .nr a 0 1 .af a a .TP P .B %T% Current time (\s-1HH:MM:SS\s+1). .TP .B %E% Date newest applied delta was created (\s-1YY/MM/DD\s+1). .TP .B %G% Date nthe directory containing the \*(S) file and the effective user must have write permission in that directory. Its mode is 644 andry file name is formed from the \*(S) file name: the last component of all \*(S) file names must be of the form \fBs.\fP\fImodul the .B b flag (see .IR admin\^ (1)) is present in the file. An entry of \fB\-\fR means ``irrelevant''. .TP \(dd This case appli\n+a. A blank character if the delta was applied; .br \fB\(**\fR otherwise. .TP \n+a. A blank character if the delta was appliedewest applied delta was created (\s-1MM/DD/YY\s+1). .TP .B %U% Time newest applied delta was created (\s-1HH:MM:SS\s+1). .TP .B /0 ( ) *!+",#-$.%/ &0 ' it is owned by the effective user. The format of the .I p-file\^ is: the gotten \*(I), followed by a blank, followed by the \*( 20433 3142671160 7211 te permission (either explicitly or implicitly) in the directory containing the \*(S) files, but the real user doesn't, then onlf 0 \} .PP .RS 13 .TP 7 \f3\\$1\fP[\f2\\$2\\^fP] \\$3 .nr f 1 .. .if t .ds )S \\| .TH PRS 1 .SH NAME prs \- print an \s-1SCCS\s+ The non-numeric prefix is usually an abbreviation for the program or set of routines which produced the message (e.g., \fBge6\fI) that the new delta will have when it is made, followed by a blank, followed by the login name of the real user, followed by ay one file may be named when the .B \-e keyletter is used. .tr ~~ le\^ apply for the .IR z-file . The .I z-file\^ is created mod1 file .SH SYNOPSIS .B prs .SP d [dataspec]] .SP r [\s-1SID\s+1]] .SF e .SF l .SF a files .SH DESCRIPTION .I Prs\^ prints, on thP, for message 6 from the .I get\^ command). .PP .RE .RS 10 .TP 10 type 2 Does not contain numerics (as a command, such as .BR  blank, followed by the date-time the .I get\^ was executed, followed by a blank and the .B \-i keyletter argument if it was preusr/man/man1/help.1 664 152 2 e standard output, parts or all of an \*(S) file (see .IR sccsfile (5)) in a user supplied format. If a directory is named, .I pget ) .PP .RE .RS 10 .TP 10 type 3 Is all numeric (e.g., \fB212\fP) .RE .PP The response of the program will be the explanatorysent, followed by a blank and the .B \-x keyletter argument if it was present, followed by a new-line. There can be an arbitrary'\" t .tr ~ .nr f 0 .bd S B 3 .de SP .if n .ul \%[\f3\-\\$1\fP\\c .if n .ul 0 \\$2\\$3 .. .de SF .if n .ul \%[\f3\-\\$1\fP] .if  2146 3142671160 7316 rs\^ behaves as though each file in the directory were specified as a named file, except that non-\*(S) files (last component of information related to the argument, if there is any. .PP When all else fails, try ``help stuck''. .SH FILES .PP .TP 20 /usr/li number of lines in the .I p-file\^ at any time; no two lines can have the same new delta \*(I). .PP The .I z-file\^ serves as an .ul 0 .. .de ZZ .hc ^ \f3^.\^.\^.\fP .hc .. .de AR .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \f3\-\\$1\\fP \\$2 \\ the path name does not begin with \f3s.\fP), and unreadable files are silently ignored. If a name of \f3\-\fP is given, the stab/help directory containing files of message text. .SH DIAGNOSTICS Use .IR help (1) for explanations. he message (e.g., \fBge6\f .I lock-out\^ mechanism against simultaneous updates. Its contents are the binary (2 bytes) process \s-1ID\s+1 of the command ($3 \\$4 \\$5 \\$6 \\$7 \\$8 \\$9 .nr f 1 .. .de C1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \\$1 \\$2 \\$3 \\$4 \\$ndard input is read; each line of the standard input is taken to be the name of an \*(S) file or directory to be processed; non-P, for message 6 from the .I get\^ command). .PP .RE .RS 10 .TP 10 type 2 Does not contain numerics (as a command, such as .BR i.e., .I get\c\^ ) that created it. The .I z-file\^ is created in the directory containing the \*(S) file for the duration of .5 \\$6 \\$7 \\$8 \\$9 .nr f 1 .. .de A1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \f3\-\\$1\fP[\f2\\$2\^\fP] \\$3 \\.TH HELP 1 .SH NAME help \- ask for help .SH SYNOPSIS .B help [\^args\^] .SH DESCRIPTION .I Help\^ finds information to explain \*(S) files and unreadable files are silently ignored. .PP Arguments to .IR prs , which may appear in any order, consist of .I kget ) .PP .RE .RS 10 .TP 10 type 3 Is all numeric (e.g., \fB212\fP) .RE .PP The response of the program will be the explanatoryIR get . The same protection restrictions as those for the .I p-file\^ apply for the .IR z-file . The .I z-file\^ is created mod$4 \\$5 \\$6 \\$7 \\$8 \\$9 .nr f 1 .. .de A2 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \f3\-\\$1\fP\f2\\$2\^\fP \\$a message from a command or explain the use of a command. Zero or more arguments may be supplied. If no arguments are given, .I eyletter\^ arguments, and file names. .PP All the described .I keyletter\^ arguments apply independently to each named file: .A1 information related to the argument, if there is any. .PP When all else fails, try ``help stuck''. .SH FILES .PP .TP 20 /usr/lie 444. .SH "SEE ALSO" admin(1), delta(1), help(1), prs(1), what(1), sccsfile(5). .br .I "Source Code Control System User's Guide3 \\$4 \\$5 \\$6 \\$7 \\$8 \\$9 .nr f 1 .. .de FI .PP .TP 30 \\$1 \\$2 .i0 .. .ds S) \s-1SCCS\s+1 .ds I) \s-1SID\s+1 .de F1 .ihelp\^ will prompt for one. .PP The arguments may be either message numbers (which normally appear in parentheses following mess d dataspec Used to specify the output data specification. The .I dataspec\^ is a string consisting of \*(S) file .I "data keywousr/man/man1/prs.1 664 152 2 \^" by L. E. Bonanni and C. A. Salemi. .SH DIAGNOSTICS Use .IR help (1) for explanations. .SH BUGS If the effective user has wrif \\nf \{ \ . RE . nr f 0 \} .PP .RS 13 .TP 7 \f3\\$1\fP\f2\\$2\^\fP \\$3 .nr f 1 .. .de F2 .if \\nf \{ \ . RE . nr ages) or command names, of one of the following types: .PP .RE .RS 10 .TP 10 type 1 Begins with non-numerics, ends in numerics.00 ( ) *!+",#-$.%/ &0 'rds\^" (see .IR "\s-1DATA KEYWORDS\s+1" ) interspersed with optional user supplied text. .A1 r \s-1SID\s+1 Used to specify the .s text M \f3:\fPFL\f3:\fP Flag list Flags text M \f3:\fPY\f3:\fP Module type flag " text S \f3:\fPMF\f3:\fP T{ MR validation flahe order of appearance in the \f2dataspec\^\fP. The format of a data keyword value is either .I Simple\^ (S), in which keyword s3:\fPPN\f3:\fP SCCS file path name N/A text S .sp .5v * \f3:\fPDt\f3:\fP~=~\f3:\fPDT\f3:\fP~\f3:\fPI\f3:\fP~\f3:\fPD\f3:\fP~\f3 \f3:\fPDy\f3:\fP/\f3:\fPDm\f3:\fP/\f3:\fPDd\f3:\fP S \f3:\fPDy\f3:\fP T{ Year Delta created T} " nn S \f3:\fPDm\f3:\fP T{ MonthIR S "\s-1CCS\s+1 " ID entification (\*(I)) string of a delta for which information is desired. If no \*(I) is specified, the \*g T} " \f2yes\^\fP~or~\f2no\^\fP S \f3:\fPMP\f3:\fP T{ MR validation pgm name T} " text S \f3:\fPKF\f3:\fP T{ Keyword error/warnubstitution is direct, or .I "Multi-line\^" (M), in which keyword substitution is followed by a carriage return. .PP User suppli:\fPT\f3:\fP~\f3:\fPP\f3:\fP~\f3:\fPDS\f3:\fP~\f3:\fPDP\f3:\fP .TE .bp .if t .ps +1 .if t .vs +1p .SH EXAMPLES .IP prs \-d"Users Delta created T} " nn S \f3:\fPDd\f3:\fP T{ Day Delta created T} " nn S \f3:\fPT\f3:\fP T{ Time Delta created T} " \f3:\fPTh\f3(I) of the most recently created delta is assumed. .AR e Requests information for all deltas created .I earlier\^ than and incluing flag T} " \f2yes\^\fP~or~\f2no\^\fP S \f3:\fPBF\f3:\fP Branch flag " \f2yes\^\fP~or~\f2no\^\fP S \f3:\fPJ\f3:\fP Joint edit ed text is any text other than recognized data keywords. A tab is specified by \f3\et\fP and carriage return/new-line is specifi and/or user \s-1ID\s+1s for \f3:\fPF\f3:\fP are\f3:\fP\en\f3:\fP\s-1UN\s+1\f3:\fP" s\f3.\fPfile .PP may produce on the standard:\fP\f3:\fP:Tm\f3:\fP\f3:\fP:Ts\f3:\fP S \f3:\fPTh\f3:\fP T{ Hour Delta created T} " nn S \f3:\fPTm\f3:\fP T{ Minutes Delta creading the delta designated via the .B \-r keyletter. .AR l Requests information for all deltas created .I later\^ than and includflag " \f2yes\^\fP~or~\f2no\^\fP S \f3:\fPLK\f3:\fP Locked releases " \f3:\fPR\f3:\fP\|\f3.\^.\^.\fP S \f3:\fPQ\f3:\fP User defied by \f3\en\fP. .bp .in 0 .if t .ps -1 .if t .vs -1p .TS center expand ; c s s s s cI lIw(20m) cI1 cI1 cI0 c l c c c . \s+1TABL output: .PP .RS .nf Users and/or user \s-1ID\s+1s for s\f3.\fPfile are\f3:\fP xyz 131 abc .fi .RE .IP prs \-d"Newest delta for ted T} " nn S \f3:\fPTs\f3:\fP T{ Seconds Delta created T} " nn S \f3:\fPP\f3:\fP T{ Programmer who created Delta T} " logname Sing the delta designated via the .B \-r keyletter. .AR a Requests printing of information for both removed, i.e., delta type = .ned keyword " text S \f3:\fPM\f3:\fP Module name " text S \f3:\fPFB\f3:\fP Floor boundary " \f3:\fPR\f3:\fP S \f3:\fPCB\f3:\fP CE 1.\| SCCS Files Data Keywords\s-1 .sp 1.5p Keyword Data Item File Section Value Format \f3:\fPDt\f3:\fP Delta information Deltpgm \f3:\fPM\f3:\fP\f3:\fP \f3:\fPI\f3:\fP Created \f3:\fPD\f3:\fP By \f3:\fPP\f3:\fP" \-r s\f3.\fPfile .PP may produce on the s \f3:\fPDS\f3:\fP T{ Delta sequence number T} " nnnn S \f3:\fPDP\f3:\fP T{ Predecessor Delta seq-no. T} " nnnn S \f3:\fPDI\f3:\fIR R , (see .IR rmdel (1)) and existing, i.e., delta type = .IR D , deltas. If the .B \-a keyletter is not specified, informatioeiling boundary " \f3:\fPR\f3:\fP S \f3:\fPDs\f3:\fP Default SID " \f3:\fPI\f3:\fP S \f3:\fPND\f3:\fP Null delta flag " \f2yes\^a Table See below* S \f3:\fPDL\f3:\fP T{ Delta line statistics T} " \f3:\fPLi\f3:\fP/\f3:\fPLd\f3:\fP/\f3:\fPLu\f3:\fP S \f3:\fPtandard output: .IP Newest delta for pgm main\f3.\fPc\f3:\fP 3\f3.\fP7 Created 77/12/1 By cas .PP As a \f2special case:\^\fP .IPP T{ Seq-no. of deltas incl., excl., ignored T} " \f3:\fPDn\f3:\fP/\f3:\fPDx\f3:\fP/\f3:\fPDg\f3:\fP S \f3:\fPDn\f3:\fP Deltas in for existing deltas only is provided. .PP .i0 .SH "DATA KEYWORDS" Data keywords specify which parts of an \*(S) file are to be\fP~or~\f2no\^\fP S \f3:\fPFD\f3:\fP T{ File descriptive text T} Comments text M \f3:\fPBD\f3:\fP Body Body text M \f3:\fPGB\f3:Li\f3:\fP T{ Lines inserted by Delta T} " nnnnn S \f3:\fPLd\f3:\fP T{ Lines deleted by Delta T} " nnnnn S \f3:\fPLu\f3:\fP T{ Li prs s\f3.\fPfile .PP may produce on the standard output: .PP .RS .nf D 1\f3.\fP1 77/12/1 00\f3:\fP00\f3:\fP00 cas 1 000000/0000ncluded (seq #) " \f3:\fPDS\f3:\fP~\f3:\fPDS\f3:\fP\|\f3.\^.\^.\fP S \f3:\fPDx\f3:\fP Deltas excluded (seq #) " \f3:\fPDS\f3:\fP retrieved and output. All parts of an \*(S) file (see .IR sccsfile (5)) have an associated data keyword. There is no limit on t\fP Gotten body " text M \f3:\fPW\f3:\fP T{ A form of \f2what\^\fP(1) string T} N/A \f3:\fPZ\f3:\fP\f3:\fPM\f3:\fP\et\f3:\fPI\f3nes unchanged by Delta T} " nnnnn S \f3:\fPDT\f3:\fP Delta type " \f2D\^\fP~or~\f2R\^\fP S \f3:\fPI\f3:\fP T{ SCCS ID string (SI0/00000 \s-1MR\s+1s\f3:\fP bl78-12345 bl79-54321 \s-1COMMENTS\s+1\f3:\fP this is the comment line for s\f3.\fPfile initial delta~\f3:\fPDS\f3:\fP\|\f3.\^.\^.\fP S \f3:\fPDg\f3:\fP Deltas ignored (seq #) " \f3:\fPDS\f3:\fP~\f3:\fPDS\f3:\fP\|\f3.\^.\^.\fP S he number of times a data keyword may appear in a .IR dataspec . .PP The information printed by .I prs\^ consists of: (1) the us:\fP S \f3:\fPA\f3:\fP T{ A form of \f2what\^\fP(1) string T} N/A \f3:\fPZ\f3:\fP\f3:\fPY\f3:\fP~\f3:\fPM\f3:\fP~\f3:\fPI\f3:\fPD) T} " \f3:\fPR\f3:.:\fPL\f3:.:\fPB\f3:.:\fPS\f3:\fP S \f3:\fPR\f3:\fP Release number " nnnn S \f3:\fPL\f3:\fP Level number " n .fi .RE .PP for each delta table entry of the ``D'' type. The only keyletter argument allowed to be used with the .I "special c\f3:\fPMR\f3:\fP MR numbers for delta " text M \f3:\fPC\f3:\fP Comments for delta " text M \f3:\fPUN\f3:\fP User names User Nameer supplied text; and (2) appropriate values (extracted from the \*(S) file) substituted for the recognized data keywords in t\f3:\fPZ\f3:\fP S \f3:\fPZ\f3:\fP T{ \f2what\^\fP(1) string delimiter T} N/A @(#) S \f3:\fPF\f3:\fP SCCS file name N/A text S \fnnn S \f3:\fPB\f3:\fP Branch number " nnnn S \f3:\fPS\f3:\fP Sequence number " nnnn S \f3:\fPD\f3:\fP T{ Date Delta created T} "10 ( ) *!+",#-$.%/ &0 'ase\^" is the .B \-a keyletter. .PP .SH FILES .RE .TP 10 /tmp/pr????? .i0 .SH "SEE ALSO" admin(1), delta(1), get(1), help(1), sc .BR \-r \s-1SID\s+1\&2 .RB [ \-p ] .RB [ \-s n] files .SH DESCRIPTION .I Sccsdiff\^ compares two versions of an .SM SCCS file ahe delta to be removed must be the newest (most recent) delta in its branch in the delta chain of each named \s-1SCCS\s+1 file. (1), get(1), help(1), pr(1). .br .IR "Source Code Control System User's Guide" by L. E. Bonanni and C. A. Salemi. .SH DIAGNOSTICs(1), sccsfile(5). .br .I "Source Code Control System User's Guide\^" by L. E. Bonanni and C. A. Salemi. .br .SH DIAGNOSTICS Usecsfile(5). .br .I "Source Code Control System User's Guide\^" by L. E. Bonanni and C. A. Salemi. .SH DIAGNOSTICS Use .IR help (1nd generates the differences between the two versions. Any number of .SM SCCS files may be specified, but arguments apply to allIn addition, the \*(I) specified must .I not\^ be that of a version being edited for the purpose of making a delta (i. e., if a usr/man/man1/unget.1 664 152 2  .IR help (1) for explanations. ve a delta are documented in the .IR "Source Code Control System User's Guide" . Simply stated, ) for explanations. .tr ~~ bl78-12345 bl79-54321 \s-1COMMENTS\s+1\f3:\fP this is the comment line for s\f3.\fPfile initial delta files. .RS 5 .TP 12 .BI \-r \s-1SID\s+1?\^ .IR \s-1SID\s+11 \ and \ \s-1SID\s+12 \ specify the deltas of an .SM SCCS file that .I p-file\^ (see .IR get (1)) exists for the named \s-1SCCS\s+1 file, the \*(I) specified must .I not\^ appear in any entry of t 2563 3142671160 7513 they are either (1) if you make a delta you can remove it; or (2) if you own the file and directory you can remove a delta. .SH  .fi .RE .PP for each delta table entry of the ``D'' type. The only keyletter argument allowed to be used with the .I "special care to be compared. Versions are passed to .IR bdiff (1) in the order given. .TP 12 .B \-p pipe output for each file through .IRhe .I p-file\c\^ ). .PP If a directory is named, .I rmdel\^ behaves as though each file in the directory were specified as a namFILES .PD 0 .TP 10 x-file (see .IR delta (1)) .TP 10 z-file (see .IR delta (1)) .PD .SH "SEE ALSO" delta(1), get(1), help(1), prusr/man/man1/rmdel.1 664 152 2  pr (1). .TP 12 .BI \-s n\^ \fIn\fP is the file segment size that .I bdiff\^ will pass to .IR diff (1). This is useful when .I ded file, except that non-\s-1SCCS\s+1 files (last component of the path name does not begin with \fBs.\fR) and unreadable files usr/man/man1/sccsdiff.1 664 152 2  3240 3142671160 7465 iff\^ fails due to a high system load. .SH FILES .TP "\w'/tmp/get?????\ \ 'u" /tmp/get????? Temporary files .SH "SEE ALSO" bdiffare silently ignored. If a name of \fB\-\fR is given, the standard input is read; each line of the standard input is taken to be.TH UNGET 1 .SH NAME unget \- undo a previous get of an \s-1SCCS\s+1 file .SH SYNOPSIS .B unget .RB [ \-r \s-1SID\s+1] .RB [ \-s 2175 3142671160 10154 (1), get(1), help(1), pr(1). .br .IR "Source Code Control System User's Guide" by L. E. Bonanni and C. A. Salemi. .SH DIAGNOSTIC the name of an \s-1SCCS\s+1 file to be processed; non-\s-1SCCS\s+1 files and unreadable files are silently ignored. .PP The exa ] .RB [ \-n ] files .SH DESCRIPTION Unget undoes the effect of a .B "get \-e" done prior to creating the intended new delta. IfS .PD 0 .TP 25 .RI `` file ": No differences''" If the two versions are the same. .PP Use .IR help (1) for explanations. .PD .IRct permissions necessary to remove a delta are documented in the .IR "Source Code Control System User's Guide" . Simply stated,  a directory is named, .I unget\^ behaves as though each file in the directory were specified as a named file, except that non-\.TH RMDEL 1 .SH NAME rmdel \- remove a delta from an \s-1SCCS\s+1 file .SH SYNOPSIS .B rmdel .if n .ul \fB\-r\fR\c .if n .ul 0 \ pr (1). .TP 12 .BI \-s n\^ \fIn\fP is the file segment size that .I bdiff\^ will pass to .IR diff (1). This is useful when .I dthey are either (1) if you make a delta you can remove it; or (2) if you own the file and directory you can remove a delta. .SH s-1SCCS\s+1 files and unreadable files are silently ignored. If a name of .B \- is given, the standard input is read with each l.TH SCCSDIFF 1 .SH NAME sccsdiff \- compare two versions of an \s-1SCCS\s+1 file .SH SYNOPSIS .B sccsdiff .BR \-r \s-1SID\s+1\&1s-1SID\s0 files .SH DESCRIPTION .I Rmdel\^ removes the delta specified by the .SM \fISID\fP from each named \s-1SCCS\s+1 file. Tiff\^ fails due to a high system load. .SH FILES .TP "\w'/tmp/get?????\ \ 'u" /tmp/get????? Temporary files .SH "SEE ALSO" bdiffFILES .PD 0 .TP 10 x-file (see .IR delta (1)) .TP 10 z-file (see .IR delta (1)) .PD .SH "SEE ALSO" delta(1), get(1), help(1), pr20 ( ) *!+",#-$.%/ &0 'ine being taken as the name of an .SM SCCS file to be processed. .P Keyletter arguments apply independently to each named file. he presence of this argument silences the diagnostic message normally generated on the standard output for any error that is detous; bit 5 = \*(I) does not exist; bit 6 = %Y%, \fB\-y\fR mismatch; bit 7 = %M%, \fB\-m\fR mismatch; .RE .fi .PP Note that .I va.RS 13 .TP 7 \fB\\$1\fI\\$2\fR \\$3 .nr f 1 .. .de F2 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 13 .TP 7 \fB\\$1[\fI\\$2\fR] .RS 5 .TP 12 .BI \-r \s-1SID\s+1\^ Uniquely identifies which delta is no longer intended. (This would have been specified by .I ected while processing each named file on a given command line. .A2 r \s-1SID\s0 The argument value \*(I) .RI ( S \s-1CCS\s+1 " l\^ can process two or more files on a given command line and in turn can process multiple command lines (when reading the stand\\$3 .nr f 1 .. .if t .ds )S \\| .TH VAL 1 .SH NAME val \- validate \s-1SCCS\s0 file .SH SYNOPSIS \fBval \-\fR .br .B val .SF s get\^ as the ``new delta''). The use of this keyletter is necessary only if two or more outstanding .IR get s for editing on theID" entification String) is an \*(S) delta number. A check is made to determine if the \*(I) is ambiguous (e. g., .B \*-r\c 1 is.nr f 0 .bd S B 3 .de SP .if n .ul \%[\fB\-\\$1\fR\\c .if n .ul 0 \\$2\\$3 .. .de SF .if n .ul \%[\fB\-\\$1\fR] .if n .ul 0 .. .ard input). In these cases an aggregate code is returned \- a logical \fB\s-1OR\s0\fR of the codes generated for each command li.SP r \s-1SID\s0 ] .SP m name ] .SP y type ] files .SH DESCRIPTION .I Val\^ determines if the specified .I file\^ is an \*(S) fi same .SM SCCS file were done by the same person (login name). A diagnostic results if the specified .I \s-1SID\s+1\^ is ambiguo ambiguous because it physically does not exist but implies 1.1, 1.2, etc. which may exist) or invalid (e. g., .B \*-r\c 1.0 or de ZZ .hc ^ \fB^...\fR .hc .. .de AR .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \fB\-\\$1\\fR \\$2 \\$3 \\$4 \\$5 \\$ne and file processed. .SH "SEE ALSO" admin(1), delta(1), get(1), prs(1). .SH DIAGNOSTICS Use .IR help (1) for explanations. .SHle meeting the characteristics specified by the optional argument list. Arguments to .I val\^ may appear in any order. The argumus, or if it is necessary and omitted on the command line. .TP 12 .B \-s Suppresses the printout, on the standard output, of the.B \*-r\c 1.1.0 are invalid because neither case can exist as a valid delta number). If the \*(I) is valid and not ambiguous, a 6 \\$7 \\$8 \\$9 .nr f 1 .. .de C1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \\$1 \\$2 \\$3 \\$4 \\$5 \\$6 \\$7 \\$8 BUGS .I Val\^ can process up to 50 files on a single command line. Any number above 50 will produce a .B core dump. that .I vaents consist of keyletter arguments, which begin with a \fB\-\fR, and named files. .PP .I Val\^ has a special argument, \fB\-\fR intended delta's .IR \s-1SID\s+1 . .TP 12 .B \-n Causes the retention of the gotten file which would normally be removed from tcheck is made to determine if it actually exists. .A2 m name The argument value .I name\^ is compared with the \*(S) %M% keyword \\$9 .nr f 1 .. .de A1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \fB\-\\$1\fR[\fI\\$2\fR] \\$3 \\$4 \\$5 \\$6 \\$7 usr/man/man1/vc.1 664 152 2 , which causes reading of the standard input until an end-of-file condition is detected. Each line read is independently processhe current directory. .SH "SEE ALSO" delta(1), get(1), sact(1). .SH DIAGNOSTICS Use .IR help (1) for explanations. diting on the in .IR file . .A2 y type The argument value .I type\^ is compared with the \*(S) %Y% keyword in .IR file . .RE .PP The 8\fB-\fR\\$8 \\$9 .nr f 1 .. .de A2 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \fB\-\\$1\fI\\$2\fR \\$3 \\$4 \\$5 \\$6 \\$7 \ 14516 3142671160 7022 ed as if it were a command line argument list. .PP .I Val\^ generates diagnostic messages on the standard output for each comman same .SM SCCS file were done by the same person (login name). A diagnostic results if the specified .I \s-1SID\s+1\^ is ambiguobit code returned by .I val\^ is a disjunction of the possible errors, i.\ e., can be interpreted as a bit string where (moving \$8 \\$9 .nr f 1 .. .de FI .PP .TP 30 \\$1 \\$2 .i0 .. .ds F) \fB\s-1FILES\s0\fR .ds W) \fB\s-1WARNINGS\s0\fR .ds X) \fB\s-1Ed line and file processed and also returns a single 8\fB-\fRbit code upon exit as described below. .PP The keyletter arguments ausr/man/man1/val.1 664 152 2 from left to right) set bits are interpreted as follows: .nf .PP .RS bit 0 = missing file argument; bit 1 = unknown or duplicateXAMPLES\s0\fR .ds T) \fB\s-1TABLE\s0\fR .ds K) \fB\s-1DATA KEYWORDS\s0\fR .ds D) \fB\s-1DDDDD\s0\fR .ds M) \fB\s-1MR\s0\fR .re defined as follows. The effects of any keyletter argument apply independently to each named file on the command line. .AR s T 7765 3142671160 7164  keyletter argument; bit 2 = corrupted \*(S) file; bit 3 = can't open file or file not \*(S); bit 4 = \*(I) is invalid or ambiguds R) \fB\s-1RELEASE NUMBER\s0\fR .ds S) \s-1SCCS\s0 .ds I) \fI\s-1SID\s0\fR .de F1 .if \\nf \{ \ . RE . nr f 0 \} .PP 30 ( ) *!+",#-$.%/ &0 '.nr f 0 .bd S B 3 .de SP .if n .ul \%[\fB\-\\$1\fR\\c .if n .ul 0 \\$2\\$3 .. .de SF .if n .ul \%[\fB\-\\$1\fR] .if n .ul 0 .. .ll previous .BR asg 's for that keyword. Keywords declared, but not assigned values have null values. .if \\n()s .bp .PP .nf \fBed .I keywords\^ may be replaced by their string .I value\^ when they appear in plain text and/or control statements. .PP The cond when present, inverts the value of the entire condition .in -3 .fi .sp The \fB>\fR and \fB<\fR operate only on unsigned intement of keywords in .I all\^ lines of text. An uninterpreted control character may be included in a value by preceding it with de ZZ .hc ^ \fB^...\fR .hc .. .de AR .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \fB\-\\$1\\fR \\$2 \\$3 \\$4 \\$5 \\$:\fRif condition .sp -.5v \s+3.\s0 .sp -.5v \s+3.\s0 .sp -.5v \s+3.\s0 \fB:\fRend .fi .br .RS 5 Used to skip lines of the stapying of lines from the standard input to the standard output is conditional, based on tests (in control statements) of keyword eger values (e. g.\fB:\fR 012 > 12 is false). All other operators take strings as arguments (e. g.\fB:\fR 012 != 12 is true). Th\fB\\\fR. If a literal \fB\e\fR is desired, then it too must be preceded by \fB\e\fR. .PP .B "Keyletter arguments" .AR a Forces 6 \\$7 \\$8 \\$9 .nr f 1 .. .de C1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \\$1 \\$2 \\$3 \\$4 \\$5 \\$6 \\$7 \\$8ndard input. If the condition is true all lines between the .I if\^ statement and the matching .I end\^ statement are copied to values specified in control statements or as .I vc\^ command arguments. .PP A control statement is a single line beginning with e precedence of the operators (from highest to lowest) is\fB:\fR .in +3 .nf = != > < all of equal precedence & \(or .fi .inreplacement of keywords surrounded by control characters with their assigned value in .I all\^ text lines and not just in .I vc\ \\$9 .nr f 1 .. .de A1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \fB\-\\$1\fR[\fI\\$2\fR] \\$3 \\$4 \\$5 \\$6 \\$7 the standard output. If the condition is false, all intervening lines are discarded, including control statements. Note that inta control character, except as modified by the .B \-t keyletter (see below). The default control character is colon (\fB:\fR), e -3 Parentheses may be used to alter the order of precedence. .br Values must be separated from operators or parentheses by at l^ statements. .AR t All characters from the beginning of a line up to and including the first .I tab\^ character are ignored for\\$8 \\$9 .nr f 1 .. .de A2 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 5 .TP 15 \fB\-\\$1\fI\\$2\fR \\$3 \\$4 \\$5 \\$6 \\$7 \ervening .I if\^ statements and matching .I end\^ statements are recognized solely for the purpose of maintaining the proper .I xcept as modified by the .B \-c keyletter (see below). Input lines beginning with a backslash (\fB\\\fR) followed by a control ceast one blank or tab. .RE .TP 5 \fB::\fRtext .br Used for keyword replacement on lines that are copied to the standard output.  the purpose of detecting a control statement. If one is found, all characters up to and including the .I tab\^ are discarded. .\$8 \\$9 .nr f 1 .. .de FI .PP .TP 30 \\$1 \\$2 .i0 .. .de F1 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 13 .TP 7 \fB\\$1\fI\\if-end\^ matching. .br .ne 9 The syntax of a condition is\fB:\fR .nf .sp .in +1 .ta 8,17,25 \fB::\fR= [ "not" ] haracter are not control lines and are copied to the standard output with the backslash removed. Lines beginning with a backslasThe two leading control characters are removed, and keywords surrounded by control characters in text are replaced by their valuA2 c char Specifies a control character to be used in place of \fB:\fR. .AR s Silences warning messages (not error) that are nor$2\fR \\$3 .nr f 1 .. .de F2 .if \\nf \{ \ . RE . nr f 0 \} .PP .RS 13 .TP 7 \fB\\$1[\fI\\$2\fR] \\$3 .nr f 1 .. .TH VC 1  \fB::\fR= \(or "\(or" \fB::\fR= \(or "&" \fB::\fR= "(" ")" \(or \fB::\fR= "=" \(or "!=" \(or "<" \(or ">" \fB::\fR= \(or rst must be alphabetic. A value is any \s-1ASCII\s0 string that can be created with .IR ed (1); a numeric value is an unsigned s.RE .TP 5 \fB:\fRoff .br Turn on or off keyword replacement on all lines. .PP .RE .TP 5 \fB:\fRctl char .br Change the control cyword] .br Used to declare keywords. All keywords must be declared. .PP .RE .TP 5 \fB:\fRasg keyword=value .br Used to assign vH DESCRIPTION The .I vc\^ command copies lines from the standard input to the standard output under control of its .I arguments .in -1 .fi .sp The available operators and their meanings are\fB:\fR .sp .in +3 .nf .if n .ta 7 .if t .ta 8 = equal != not equatring of digits. Keyword values may not contain blanks or tabs. .PP Replacement of keywords by values is done whenever a keywordharacter to char. .PP .in -10 .RE .TP 5 \fB:\fRmsg message .br Prints the given message on the diagnostic output. .PP .RE .TP 5 alues to keywords. An .B asg statement overrides the assignment for the corresponding keyword on the .I vc\^ command line and a\^ and .I "control statements\^" encountered in the standard input. In the process of performing the copy operation, user declarl & and \(or or > greater than < less than ( ) used for logical groupings not may only occur immediately after the \fIif\^\fP, a surrounded by control characters is encountered on a version control statement. The .B \-a keyletter (see below) forces replac40 ( ) *!+",#-$.%/ &0 '\fB:\fRerr message .br Prints the given message followed by\fB:\fR .ti +5 \fB\s-1ERROR\s0\fR\fB:\fR err statement on line \fB... 2G-207 .TM 79-9441-4 77-9442-1 .AS The Source Code Control System (\*s) is a system for controlling changes to files of text (trints out what follows until the first .BR ~ , .BR > , new-line, .BR \e , or null character. For example, if the C program in figrammer's Workbench" \*p .MT 4 1 .H 1 "INTRODUCTION" The Source Code Control System (\*s) is a collection of \*p commands that husr/man/docs/sccs_guide 664 152 2 \fR (915) .br on the diagnostic output. .I Vc\^ halts execution, and returns an exit code of 1. .PP .i0 .SH DIAGNOSTICS Use .I hypically, the source code and documentation of software systems). It provides facilities for storing, updating, and retrieving ale \fBf.c\fR contains .PP .RS 5 char ident[] = "\|@(#)identification information\|"; .RE .PP and \fBf.c\fR is compiled to yield elp individuals or projects control and account for changes to files of text (typically, the source code and documentation of so 232570 3142671160 10501 elp\c\^ (1) for explanations. .SH "EXIT CODES" 0 \- normal .br 1 \- any error .RE .TP 5 \fB:\fRctl char .br Change the control cny version of a file of text, for controlling updating privileges to that file, for identifying the version of a retrieved file,\fBf.o\fR and \fBa.out\fR, then the command .PP .RS 5 what\| .RB f . c\| .RB f . o\| .RB a . out .RE .PP will print .PP .RS 5 .Tftware systems). It is convenient to conceive of \*s as a custodian of files; it allows retrieval of particular versions of the haracter to char. .PP .in -10 .RE .TP 5 \fB:\fRmsg message .br Prints the given message on the diagnostic output. .PP .RE .TP 5  and for recording who made each change, when and where it was made, and why. \*(s) is a collection of programs that run under tP 8 f\fB.\fRc: .br identification information .TP 8 f\fB.\fRo: .br identification information .TP 8 a\fB.\fRout: .br identificatfiles, administers changes to them, controls updating privileges to them, and records who made each change, when and where it wausr/man/man1/what.1 664 152 2 he \*u\*(Tm based \*p (Programmer's Workbench) time-sharing system. .P This document, together with relevant portions of [1], ision information .RE .PP .I What\^ is intended to be used in conjunction with the \*(S) command .IR get (1), which automatically s made, and why. This is important in environments in which programs and documentation undergo frequent changes (because of main.nr Pt 0 .nr Hs 5 .nr Hi 0 .nr Hu 1 .nr Hb 5 .if n .ds d " -- .if t .ds d \(em .ds s \s-2SCCS\s0 .ds s) S\s-2CCS\s0 .ds p \s-2P 2325 3142671160 7330  a complete user's guide to \*s, and supersedes all previous versions. The following topics are covered: .BL "" 1 .LI How to getinserts identifying information, but it can also be used where the information is inserted manually. .SH SEE ALSO get(1), help(1tenance and/or enhancement work), inasmuch as it is sometimes desirable to regenerate the version of a program or document as itWB\s0 .ds u \s-2UNIX\s0 .ds p) P\s-2WB\s0 .ds i \s-2SID\s0 .ds i) S\s-2ID\s0 .ds k \s-2ID\s0 .ds k) I\s-2D\s0 .ds s] \s-2SCCS/PW started with \*s. .LI The scheme used to identify versions of text kept in an \*s file. .LI Basic information needed for day-to). .SH DIAGNOSTICS Use .IR help (1) for explanations. .SH BUGS It's possible that an unintended occurrence of the pattern .B @(# was before changes were applied to it. Obviously, this could be done by keeping copies (on paper or other media), but this quicB\s0 .ds s} S\s-2CCS/PWB\s0 .ds a \s-2ASCII\s0 .tr ~ .ds . \fB.\fP .de dT .cc : \*. :cc . .. .ds HP +1 +1 .ds :? SCCS User's Gui-day use of \*s commands, including a discussion of the more useful arguments. .LI Protection and auditing of \*s files, includi) could be found just by chance, but this causes no harm in nearly all cases. .tr ~~ ormation .TP 8 a\fB.\fRout: .br identificatkly becomes unmanageable and wasteful as the number of programs and documents increases. \*(s) provides an attractive solution bde .PH "''''" .OH "|\s9\f2\*(:?\fP||\\\\nP\s0|" .EH "|\s9\\\\nP||\f2\*(:?\^\fP\s0|" .ND "April 1, 1979" .TL 39382 "39373-066, 39.tr ~" .TH WHAT 1 .SH NAME what \- identify \s-1SCCS\s+1 files .SH SYNOPSIS .B what files .SH DESCRIPTION .I What\^ searches theng the differences between the use of \*s by .I individual users on one hand, and .I groups of users on the other. .LE .P Neitheion information .RE .PP .I What\^ is intended to be used in conjunction with the \*(S) command .IR get (1), which automatically ecause it stores on disk the original file and, whenever changes are made to it, stores only the .I changes; each set of changes382-900" Source Code Control System User's Guide .AU "L. E. Bonanni" LEB PY 9441 4382 2F-223 .AU "C. A. Salemi" CAS PY 9442 4162 given files for all occurrences of the pattern that .IR get (1) substitutes for %Z% (this is \fB@(#)\fR at this printing) and pr the implementation of \*s nor the installation procedure for \*s are described here. .AE .OK "Source Code Control System" "Proinserts identifying information, but it can also be used where the information is inserted manually. .SH SEE ALSO get(1), help(150 ( ) *!+",#-$.%/ &0 ' is called a ``delta.'' .P .ne 14 This document, together with relevant portions of [1], is a complete user's guide to \*s. Thisrieving a File\(emThe ``get'' Command" .ne 10 The command: .DS 1 get s\*.lang .DE causes the creation (retrieval) of the latest For the time being, however, only basic concepts will be discussed. .H 2 "Terminology" .P Each \*s file is composed of one or mDS 1 get \(eme s\*.lang 1\*.1 new delta 1\*.2 5 lines .DE .P .ne 11 The file ``lang'' may now be changed, for example, by: .Des: .DS 1 c pl/i fortran cobol algol .DE .P .ne 4 We wish to give custody of this file to \*s. The following .I admin command (w manual contains the following sections: .BL "" 1 .LI .I "\*(s) for Beginners:" How to make an \*s file, how to update it, and h version of file ``s\*.lang'', and prints the following messages: .DS 1 1\*.1 5 lines .DE This means that .I get retrieved versiore sets of changes applied to the null (empty) version of the file, with each set of changes usually depending on all previous S 1 ed lang 27 $a snobol ratfor .dT w 41 q .DE .ne 7 .H 2 "Recording Changes\(emThe ``delta'' Command" .P In order to record wihich is used to .I administer \*s files) creates an \*s file and initializes delta 1\*.1 from the file ``lang'': .DS 1 admin \(ow to retrieve a version thereof. .LI .I "How Deltas Are Numbered:" How versions of \*s files are numbered and named. .LI .I "\*on 1\*.1 of the file, which is made up of 5 lines of text. The retrieved text is placed in a file whose name is formed by deletisets. Each set of changes is called a ``delta'' and is assigned a name, called the \f2S\|\fP\s-2CCS\s0 \f2ID\|\fPentification stthin the \*s file the changes that have been applied to ``lang'', execute: .DS 1 delta s\*.lang .DE .ne 8 .I Delta prompts withemilang s\*.lang .DE .P .ne 5 All \*s files .I must have names that begin with ``s\*.'', hence, ``s\*.lang''. The .B \(emi keyl(s) Command Conventions:" Conventions and rules generally applicable to all \*s commands. .LI .I "\*(s) Commands:" Explanation ong the ``s\*.'' prefix from the name of the \*s file; hence, the file ``lang'' is created. .P .ne 7 The above .I get command simring (\*i), composed of at most four components, only the first two of which will concern us for now; these are the ``release'' : .DS 1 comments? .DE the response to which should be a description of why the changes were made; for example: .DS 1 comments? aetter, together with its value ``lang'', indicates that .I admin is to create a new \*s file and .I initialize it with the contef all \*s commands, with discussions of the more useful arguments. .LI .I "\*(s) Files:" Protection, format, and auditing of \*sply creates the file ``lang'' read-only, and keeps no information whatsoever regarding its creation. On the other hand, in orderand ``level'' numbers, separated by a period. Hence, the first delta is called ``1\*.1'', the second ``1\*.2'', the third ``1\*.dded more languages .DE .P .I Delta then reads the .I p-file, and determines what changes were made to the file ``lang''. It doents of the file ``lang''. This initial version is a set of changes applied to the null \*s file; it is delta 1\*.1. .P .ne 4 The files, including a discussion of the differences between using \*s as an individual and using it as a member of a group or proj to be able to subsequently apply changes to an \*s file with the .I delta command (see below), the .I get command must be infor3'', etc. The release number can also be changed allowing, for example, deltas ``2.1'', ``3.19'', etc. The change in the releases this by doing its own .I get to retrieve the original version, and by applying .I diff\| (1)\*F .FS All references of the form .I admin command replies: .DS 1 No id keywords (cm7) .DE This is a warning message (which may also be issued by other \*s commaect. The role of a ``project \*s administrator'' is introduced. .LE .H 1 "SCCS FOR BEGINNERS" It is assumed that the reader knowmed of your intention to do so. This is done as follows: .DS 1 get \(eme s\*.lang .DE .ne 11 The .B \(eme keyletter causes .I  number usually indicates a major change to the file. .P Each delta of an \*s file defines a particular version of the file. For .I name\^ (\f2N\|\fP) refer to item .I name in command writeup section .I N of [1]. .FE to the original version and the edited nds) that is to be ignored for the purposes of this section. Its significance is described in Section 5.1 below. In the followins how to log onto a \*p system, create files, and use the text editor [1]. A number of terminal-session fragments are presented get to create a file ``lang'' for both reading and writing (so that it may be edited) and places certain information about the \ example, delta 1\*.5 defines version 1\*.5 of the \*s file, obtained by applying to the null (empty) version of the file the chversion. .P .ne 8 When this process is complete, at which point the changes to ``lang'' have been stored in ``s\*.lang'', .I delg examples, this warning message is not shown, although it may actually be issued by the various command. .P .ne 4 The file ``labelow. All of them should be tried: the best way to learn \*s is to use it. .P To supplement the material in this manual, the de*s file in another new file, called the .I p-file, that will be read by the .I delta command. The .I get command prints the sameanges that constitute deltas 1\*.1, 1\*.2, etc., up to and including delta 1\*.5 itself, in that order. .H 2 "Creating an SCCS Fta outputs: .DS 1 1\*.2 2 inserted 0 deleted 5 unchanged .DE The number ``1\*.2'' is the name of the delta just created, and theng'' should be removed (because it can be easily reconstructed by using the .I get command, below): .DS 1 rm lang .DE .H 2 "Rettailed \*s command descriptions (appearing in [1]) should be consulted. Section 5 below contains a list of all the \*s commands. messages as before, except that the \*i of the version to be created through the use of .I delta is also issued. For example: .ile\(emThe ``admin'' Command" .P .ne 9 Consider, for example, a file called ``lang'' that contains a list of programming languag60 ( ) *!+",#-$.%/ &0 ' next three lines of output refer to the number of lines in the file ``s\*.lang''. .H 2 "More about the ``get'' Command" .P .ne ge the .I release number when making a delta, to indicate that a major change is being made. When this is done, the release numbumber (second component of the \*i), we must indicate to \*s that we wish to change the release number. This is done with the .Iw version that will then be released to the user, but will .I not affect the changes being applied for release 2 (i.e., deltas 1R [abc]\fB:\fP not an SCCS file (co1) .DE .ne 5 The string ``co1'' is a code for the diagnostic message, and may be used to obta7 As we have seen: .DS 1 get s\*.lang .DE retrieves the latest version (now 1\*.2) of the file ``s\*.lang''. This is done by ster also applies to all successor deltas, unless specifically changed again. Thus, the evolution of a particular file may be repr get command: .DS 1 get \(eme \(emr2 s\*.lang .DE .ne 8 Because release 2 does not exist, .I get retrieves the latest version\*.4, 2\*.1, 2\*.2, etc.). .P The new delta is a node on a ``branch'' of the tree, and its name consists of .I four components, in a fuller explanation of that message by use of the .I help command: .DS 1 help co1 .DE .ne 7 This produces the following outarting with the original version of the file and successively applying deltas (the changes) in order, until all have been applieesented as in \%Figure\ 1. .DS .sp 1i .FG "Evolution of an \*(s) File" .sp 0.5v .DE Such a structure may be termed the ``trunk'' .I before release 2; it also interprets this as a request to change the release number of the delta we wish to create to 2, thenamely, the release and level numbers, as with trunk deltas, plus the ``branch'' and ``sequence'' numbers, as follows: .DS 1 relput: .DS 1 co1\fB:\fP "not an SCCS file" A file that you think is an SCCS file does not begin with the characters "s\*.". .DE Thd. .P .ne 8 For our example, the following commands are all equivalent: .DS 1 get s\*.lang .sp .5 get \(emr1 s\*.lang .sp .5  of the \*s tree. It represents the normal .I sequential development of an \*s file, in which changes that are part of any givenreby causing it to be named 2\*.1, rather than 1\*.3. This information is conveyed to .I delta via the .I p-file. .I Get then ouease\*.level\*.branch\*.sequence .DE The .I branch number is assigned to each branch that is a descendant of a particular trunk us, .I help is a useful command to use whenever there is any doubt about the meaning of an \*s message. Fuller explanations of aget \(emr1.2 s\*.lang .DE The numbers following the .B \(emr keyletter are \*is (see Section 2.1 above). Note that omitting th delta are dependent upon .I all the preceding deltas. .P However, there are situations in which it is necessary to cause a .I btputs: .DS 1 1\*.2 new delta 2\*.1 7 lines .DE .ne 10 which indicates that version 1.2 has been retrieved and that 2.1 is the vedelta, with the first such branch being 1, the next one 2, and so on. The .I sequence number is assigned, in order, to each deltlmost all \*s messages may be found in this manner. .H 1 "HOW DELTAS ARE NUMBERED" It is convenient to conceive of the deltas ape level number of the \*i (as in the second example above) is equivalent to specifying the .I highest level number that exists wranching in the tree, in that changes applied as part of a given delta are .I not dependent upon all previous deltas. As an examrsion .I delta will create. If the file is now edited, for example, by: .DS 1 ed lang 41 /cobol/d w 35 q .DE .ne 12 and .I delta on a .I "particular branch." Thus, 1\*.3\*.1\*.2 identifies the second delta of the first branch that derives from delta 1\*.3plied to an \*s file as the nodes of a tree, in which the root is the initial version of the file. The root delta (node) is normithin the specified release. Thus, the second command requests the retrieval of the latest version in release 1, namely 1\*.2. Tple, consider a program which is in production use at version 1\*.3, and for which development work on release 2 is already in pa executed: .DS 1 delta s\*.lang comments? deleted cobol from list of languages .DE we will see, by .I delta's output, that ver. This is shown in Figure\ 2. .DS .sp 2i-.5v .FG "Tree Structure with Branch Deltas" .sp 0.5v .DE .P The concept of branching maally named ``1\*.1'' and successor deltas (nodes) are named ``1\*.2'', ``1\*.3'', etc. The components of the names of the deltashe third command specifically requests the retrieval of a particular version, in this case, also 1\*.2. .P .ne 8 Whenever a trulrogress. Thus, release 2 may already have some deltas, precisely as shown in Figure\ 1. Assume that a production user reports a sion 2\*.1 is indeed created: .DS 1 2\*.1 0 inserted 1 deleted 6 unchanged .DE .P Deltas may now be created in release 2 (deltasy be extended to any delta in the tree; the naming of the resulting deltas proceeds in the manner just illustrated. .P Two obser are called the ``release'' and the ``level'' numbers, respectively. Thus, normal naming of successor deltas proceeds by incremey major change is made to a file, the significance of that change is usually indicated by changing the .I release number (first problem in version 1\*.3, and that the nature of the problem is such that it cannot wait to be repaired in release 2. The change 2\*.2, 2\*.3, etc.), or another new release may be created in a similar manner. This process may be continued as desired. .H 2 vations are of importance with regard to naming deltas. First, the names of trunk deltas contain exactly two components, and thenting the level number, which is performed automatically by \*s whenever a delta is made. In addition, the user may wish to chancomponent of the \*i) of the delta being made. Since normal, automatic, numbering of deltas proceeds by incrementing the level ns necessary to repair the trouble will be applied as a delta to version 1\*.3 (the version in production use). This creates a ne"The ``help'' Command" .P .ne 8 If the command: .DS 1 get abc .DE is executed, the following message will be output: .DS 1 ERRO70 ( ) *!+",#-$.%/ &0 ' names of branch deltas contain exactly four components. Second, the first two components of the name of branch deltas are alway admin\^ (1). .P The distinction between the .I "real user" (see .I passwd\^ (1)) and the .I "effective user" of a \*p system isncept of branch deltas allows the generation of arbitrarily complex tree structures. Although this capability has been provided her commands that that \*s file is being updated. Thus, other commands that modify \*s files will not process an \*s file if theral, file arguments may .I not begin with a minus sign. However, if the name ``\(em'' (a lone minus sign) is specified as an args those of the ancestral trunk delta, and the branch component is assigned in the order of creation of the branch, independently of concern in discussing various actions of \*s commands. For the present, it is assumed that both the real user and the effectfor certain specialized uses, it is strongly recommended that the \*s tree be kept as simple as possible, because comprehension  corresponding .I z-file exists. The .I z-file is created with mode 444 (read-only) in the directory containing the \*s file, anument to a command, the command reads the standard input for lines and takes each line as the .I name of an \*s file to be proce of its location relative to the trunk delta. Thus, a branch delta may always be identified as such from its name. Although the ive user are one and the same (i.e., the user who is logged into a \*p system); this subject is further discussed in Section 6.1of its structure becomes extremely difficult as the tree becomes more complex. .H 1 "SCCS COMMAND CONVENTIONS" This section discd is owned by the effective user. This file exists only for the duration of the execution of the command that creates it. In genssed. The standard input is read until end-of-file. This feature is often used in pipelines [1] with, for example, the .I find\^ancestral trunk delta may be identified from the branch delta's name, it is .I not possible to determine the .I entire path lead. .P All \*s commands that modify an \*s file do so by writing a temporary copy, called the .I x-file, which ensures that the \*usses the conventions and rules that apply to \*s commands. These rules and conventions are generally applicable to .I all \*s ceral, users can ignore .I x-files and .I z-files; they may be useful in the event of system crashes or similar situations. .P .n (1) or .I ls\^ (1) commands. Again, names of non-\*s files and of unreadable files are silently ignored. .P All keyletters specing from the trunk delta to the branch delta. For example, if delta 1\*.3 has one branch emanating from it, all deltas on that bs file will not be damaged should processing terminate abnormally. The name of the .I x-file is formed by replacing the ``s\*.''ommands, except as indicated below. \*(s) commands accept two types of arguments: .I keyletter arguments and .I file arguments. e 4 \*(s) commands produce diagnostics (on the diagnostic output [1]) of the form: .DS 1 ERROR [name-of-file-being-processed]\fBified for a given command apply to .I all file arguments of that command. All keyletters are processed before any file argumentsranch will be named 1\*.3\*.1\*.\f2n\fP. If a delta on this branch then has another branch emanating from .I it, all deltas on t of the \*s file name with ``x\*.''. When processing is complete, the old \*s file is removed and the .I x-file is renamed to be.P .I Keyletter arguments (hereafter called simply ``keyletters'') begin with a minus sign (\(em), followed by a lower-case alph:\fP message text (code) .DE The .I code in parentheses may be used as an argument to the .I help command (see Section 5.5) to o, with the result that the placement of keyletters is arbitrary (i.e., keyletters may be interspersed with file arguments). Filehe new branch will be named 1\*.3\*.2\*.\f2n\fP (see Figure\ 3). The only information that may be derived from the name of delta the \*s file. The .I x-file is created in the directory containing the \*s file, is given the same mode (see .I chmod\^ (1)) asabetic character, and, in some cases, followed by a value. These keyletters control the execution of the command to which they abtain a further explanation of the diagnostic message. .P Detection of a fatal error during the processing of a file causes the  arguments, however, are processed left to right. .P Somewhat different argument conventions apply to the .I help, .I what, .I s 1\*.3\*.2\*.2 is that it is the .I chronologically second delta on the .I chronologically second branch whose .I trunk ancestor the \*s file, and is owned by the effective user. .P To prevent simultaneous updates to an \*s file, commands that modify \*s fre supplied. .P .I File arguments (which may be names of files and/or directories) specify the file(s) that the given \*s comman\*s command to terminate processing of .I that file and to proceed with the next file, in order, if more than one file has been ccsdiff, and .I val commands (see Sections 5.5, 5.8, 5.9, and 5.11). .P Certain actions of various \*s commands are controlled b is delta 1\*.3. In particular, it is .I not possible to determine from the name of delta 1\*.3\*.2\*.2 all of the deltas betweeiles create a .I lock-file, called the .I z-file, whose name is formed by replacing the ``s\*.'' of the \*s file name with ``z\*d is to process; naming a directory is equivalent to naming .I all the \*s files within the directory. Non-\*s files and unreadanamed. .H 1 "SCCS COMMANDS" .P This section describes the major features of all the \*s commands. Detailed descriptions of the cy .I flags appearing in \*s files. Some of these flags are discussed below. For a complete description of all such flags, see .In it and its trunk ancestor (1\*.3). .DS .sp 2i-.5v .FG "Extending the Branching Concept" .sp 0.5v .DE It is obvious that the co.''. The .I z-file contains the .I "process number" [1] of the command that creates it, and its existence is an indication to otble\*F .FS Because of permission modes (see .I chmod\^ (1)). .FE files in the named directories are silently ignored. .P In gene80 ( ) *!+",#-$.%/ &0 'ommands and of all their arguments are given in the .I "\*(p) User's Manual," and should be consulted for further information. Ted as the \*k keyword that is replaced by the \*i of the retrieved version of a file. Similarly, .B %H% is defined as the \*k kele into a single delta; often reduces the size of the \*s file. .LI val Validates an \*s file. .LE .H 2 "get" .P The .I get commalue of this flag is used as a default. The default \*i is interpreted in exactly the same way as the value supplied with the .B of invoking .I get is intended to produce .I g-files only for inspection, compilation, etc., and .I not for editing (i.e., .I nhe discussion below covers only the more common arguments of the various \*s commands. .P Because the commands .I get and .I delyword for the current date (in the form ``mm/dd/yy''), and .B %M% is defined as the name of the .I g-file. .ne 9 Thus, executingand creates a text file that contains a particular version of an \*s file. The particular version is retrieved by beginning with \(emr keyletter of .I get. .P .ne 5 The .B \(emr keyletter is used to specify an \*i to be retrieved, in which case the .B d (dot for making deltas). .P .ne 16 In the case of several file arguments (or directory-name arguments), similar information is givta are the most frequently used, they are presented first. The other commands follow in approximate order of importance. .P .ne  .I get on an \*s file that contains the PL/I declaration: .DS 1 DCL ID CHAR(100) VAR INIT(\^\'\^%M% %I% %H%\^\'\^)\fB;\fP the initial version, and then applying deltas, in order, until the desired version is obtained. The created file is called the efault \*i) flag (if any) is ignored. For example: .DS 1 get \(emr1\*.3 s\*.abc .DE .ne 6 retrieves version 1\*.3 of file ``s\en for each file processed, but the \*s file name precedes it. For example: .DS 1 get s\*.abc s\*.def .DE produces: .DS 1 s\*.28 The following is a summary of all the \*s commands and of their major functions: .VL 13 3 .LI get Retrieves versions of \*s f .DE gives (for example) the following: .DS 1 DCL ID CHAR(100) VAR INIT(\^\'\^MODNAME 2\*.3 07/07/77\^\'\^)\fB;\fP .DE .P .I g-file; its name is formed by removing the ``s\*.'' from the \*s file name. The .I g-file is created in the current directory*.abc'', and produces (for example) on the standard output: .DS 1 1\*.3 64 lines .DE .ne 8 A branch delta may be retrieved similabc\fB:\fP 1\*.3 67 lines No id keywords (cm7) .sp .5 s\*.def\fB:\fP 1\*.7 85 lines No id keywords (cm7) .DE .H 3 "\*(k) Keywordiles. .LI delta Applies changes (deltas) to the text of \*s files, i.e., creates new versions. .LI admin Creates \*s files and a.ne 4 When no \*k keywords are substituted by .I get, the following message is issued: .DS 1 No id keywords (cm7) .DE This messa [1] and is owned by the real user. The mode assigned to the .I g-file depends on how the .I get command is invoked, as discussearly: .DS 1 get \(emr1\*.5\*.2\*.3 s\*.abc .DE which produces (for example) on the standard output: .DS 1 1\*.5\*.2\*.3 234 lis" In generating a .I g-file to be used for compilation, it is useful and informative to record the date and time of creation, tpplies changes to parameters of \*s files. .LI prs Prints portions of an \*s file in user specified format. .LI help Gives explage is normally treated as a warning by .I get, although the presence of the .B i flag in the \*s file causes it to be treated asd below. .P .ne 4 The most common invocation of .I get is: .DS 1 get s\*.abc .DE .ne 7 which normally retrieves the latest versnes .DE When a two- or four-component \*i is specified as a value for the .B \(emr keyletter (as above) and the particular versihe version retrieved, the module's name, etc., within the .I g-file, so as to have this information appear in a load module whennations of diagnostic messages. .LI rmdel Removes a delta from an \*s file; allows the removal of deltas that were created by mi an error (see Section 5.2 for further information). .P For a complete list of the approximately twenty \*k keywords provided, sion on the trunk of the \*s file tree, and produces (for example) on the standard output [1]: .DS 1 1\*.3 67 lines No id keywordon does not exist in the \*s file, an error message results. .ne 4 Omission of the level number, as in: .DS 1 get \(emr3 s\*.a one is eventually created. \*(s) provides a convenient mechanism for doing this automatically. .I "Identification (\*k) keywordstake. .LI cdc Changes the commentary associated with a delta. .LI what Searches any \*p file(s) for all occurrences of a speciaee .I get\^ (1). .H 3 "Retrieval of Different Versions" Various keyletters are provided to allow the retrieval of other than thes (cm7) .DE .ne 7 which indicates that: .AL 1 "" 1 .LI Version 1\*.3 of file ``s\*.abc'' was retrieved (1\*.3 is the latest trunbc .DE .ne 6 causes retrieval of the .I trunk delta with the highest level number within the given release, if the given releases" appearing anywhere in the generated file are replaced by appropriate values according to the definitions of these \*k keywordl pattern and prints out what follows it; is useful in finding identifying information inserted by the .I get command. .LI sccsd default version of an \*s file. Normally, the default version is the most recent delta of the highest-numbered release on the .k delta). .LI This version has 67 lines of text. .LI No \*k keywords were substituted in the file (see Section 5.1.1 for a discu exists. Thus, the above command might output: .DS 1 3\*.7 213 lines .DE If the given release does not exist, .I get retrieves ts. .ne 5 The format of an \*k keyword is an upper-case letter enclosed by percent signs (%). For example: .DS 1 %I% .DE is definiff Shows the differences between any two versions of an \*s file. .LI comb Combines two or more consecutive deltas of an \*s fiI trunk of the \*s file tree. However, if the \*s file being processed has a .B d (default \*i) flag, the \*i specified as the vssion of \*k keywords). .LE 1 .P The generated .I g-file (file ``abc'') is given mode 444 (read-only), since this particular way90 ( ) *!+",#-$.%/ &0 'he .I trunk delta with the highest level number within the highest-numbered existing release that is lower than the given releaspdating) of a .I p-file, which is used to pass information to the .I delta command (see Section 5.1.4). .P .ne 10 The following ne 6 However, if branch delta 3\*.2\*.1\*.5 were the latest delta (created after delta 3\*.5), the same command might produce: .e, for example, when each one changes the same line of the retrieved .I g-file. )~ Any interference is indicated by a warning thribed in Section 5.1.5). .LE .P A failure of any of the first three conditions causes the processing of the corresponding \*s fie. .ne 10 For example, assuming release 9 does not exist in file ``s\*.abc'', and that release 7 is actually the highest-numbereis an example of the use of the .B \(eme keyletter: .DS 1 get \(eme s\*.abc .DE which produces (for example) on the standard oDS 1 3\*.2\*.1\*.5 46 lines .DE .H 3 "Retrieval with Intent to Make a Delta" .ne 19 Specification of the .B \(eme keyletter to tat shows the range of lines within the retrieved .I g-file in which the problem may exist. The user is expected to examine the .le to terminate. .P If the above checks succeed, the .B \(eme keyletter causes the creation of a .I g-file in the current directd release below 9, execution of: .DS 1 get \(emr9 s\*.abc .DE might produce: .DS 1 7\*.6 420 lines .DE .ne 5 which indicates tutput: .DS 1 1\*.3 new delta 1\*.4 67 lines .DE .P If the .B \(emr and/or .B \(emt keyletters are used together with the .B \(emhe .I get command is an indication of the intent to make a delta, and, as such, its use is restricted. The presence of this keylI g-file to determine whether a problem actually exists, and to take whatever corrective measures (if any) are deemed necessary ory with mode 644 (readable by everyone, writable only by the owner) owned by the real user. If a .I writable .I g-file already hat trunk delta 7\*.6 is the latest version of file ``s\*.abc'' below release 9. Similarly, omission of the sequence number, as e keyletter, the version retrieved for editing is as specified by the .B \(emr and/or .B \(emt keyletters. .P The keyletters .B etter causes .I get to check: .AL 1 "" 1 .LI The .I "user list" (which is the list of .I login names and\fB/\fPor .I "group \*ks(e.g., edit the file). .P .I \ \(rh\ \ The .B \(emi and .B \(emx keyletters should be used with extreme care. .R .P The .B \(emexists, .I get terminates with an error. This is to prevent inadvertent destruction of a .I g-file that already exists and is bein: .DS 1 get \(emr4\*.3\*.2 s\*.abc .DE .ne 7 results in the retrieval of the branch delta with the highest sequence number o\(emi and .B \(emx may be used to specify a list (see .I get\^ (1) for the syntax of such a list) of deltas to be .I included an" of users allowed to make deltas (see Section 6.2)) to determine if the login name or group \*k of the user executing .I get isk keyletter is provided to facilitate regeneration of a .I g-file that may have been accidentally removed or ruined subsequent ting edited for the purpose of making a delta. .P Any \*k keywords appearing in the .I g-file are .I not substituted by .I get whn the given branch, if it exists.~ (If the given branch does not exist, an error message results.)~ This might result in the fold .I excluded, respectively, by .I get. Including a delta means forcing the changes that constitute the particular delta to be i on that list. Note that a .I null (empty) user list behaves as if it contained .I all possible login names. .LI That the .I relo the execution of .I get with the .B \(eme keyletter, or to simply generate a .I g-file in which the replacement of \*k keyworden the .B \(eme keyletter is specified, because the generated .I g-file is to be subsequently used to create another delta, and lowing output: .DS 1 4\*.3\*.2\*.8 89 lines .DE .P .ne 13 The .B \(emt keyletter is used to retrieve the latest (``top'') versioncluded in the retrieved version. This is useful if one wants to apply the same changes to more than one version of the \*s fileease (R) of the version being retrieved satisfies the relation: .DS 1 floor \(<= R \(<= ceiling .DE to determine if the release s has been suppressed. Thus, a .I g-file generated by the .B \(emk keyletter is identical to one produced by .I get executed witreplacement of \*k keywords would cause them to be permanently changed within the \*s file. .ne 6 In view of this, .I get does nn in a particular .I release (i.e., when no .B \(emr keyletter is supplied, or when its value is simply a release number). The l. Excluding a delta means forcing it to be .I not applied. This may be used to undo, in the version of the \*s file to be createbeing accessed is a protected release. The .I floor and .I ceiling are specified as .I flags in the \*s file. .LI That the .I reh the .B \(eme keyletter. However, no processing related to the .I p-file takes place. .H 3 "Concurrent Edits of Different \*is"ot need to check for the presence of \*k keywords within the .I g-file, so that the message: .DS 1 No id keywords (cm7) .DE is natest version is defined as that delta which was produced most recently, independent of its location on the \*s file tree. Thus,d, the effects of a previous delta. Whenever deltas are included or excluded, .I get checks for possible interference between sulease (R) is not .I locked against editing. The .I lock is specified as a flag in the \*s file. .LI Whether or not .I "multiple  The ability to retrieve different versions of an \*s file allows a number of deltas to be ``in progress'' at any given time. Thever output when .I get is invoked with the .B \(eme keyletter. .P In addition, the .B \(eme keyletter causes the creation (or u if the most recent delta in release 3 is 3\*.5, .DS 1 get \(emr3 \(emt s\*.abc .DE might produce: .DS 1 3\*.5 59 lines .DE .ch deltas and those deltas that are normally used in retrieving the particular version of the \*s file. (Two deltas can interferconcurrent edits" are allowed for the \*s file as specified by the .B j flag in the \*s file (multiple concurrent edits are desc:0 ( ) *!+",#-$.%/ &0 'is means that a number of .I get commands with the .B \(eme keyletter may be executed on the same file, provided that no two exeL 5 2 .LI * ``R'', ``L'', ``B'', and ``S'' are the ``release'', ``level'', ``branch'', and ``sequence'' components of the SID, r the \*i of the version to be retrieved, unless multiple concurrent edits are allowed. .P If both checks succeed, the user is iner normal conditions, \fIget\fRs for editing .B (\(eme keyletter is specified) based on the same \*i are not permitted to occur tions \ Retrieved to be Created = 1. none\(dd no R defaults to mR mR\*.mL mR\*.(mL\|+1) _ 2. none\(dd yes R defaults to mR mR\*.cutions retrieve the same version (unless multiple concurrent edits are allowed, see Section 5.1.5). .P The .I p-file (which is espectively; ``m'' means ``maximum''. Thus, for example, ``R\*.mL'' means ``the maximum level number within release R''; ``R\*.Lformed that other deltas are in progress, and processing continues. If either check fails, an error message results. It is imporconcurrently. That is, .I delta must be executed before a subsequent .I get for editing is executed at the same \*i as the previmL mR\*.mL\*.(mB\|+1)\*.1 = 3. R no R > mR mR\*.mL R\*.1\(sc _ 4. R no R = mR mR\*.mL mR\*.(mL\|+1) _ 5. R yes R > mR mR\*.mL mRcreated by the .I get command invoked with the .B \(eme keyletter) is named by replacing the ``s\*.'' in the \*s file name with \*.(mB\|+1)\*.1'' means ``the first sequence number on the .I new branch (i.e., maximum branch number plus 1) of level L within tant to note that the various executions of .I get should be carried out from different directories. Otherwise, only the first eous .I get. However, multiple concurrent edits (defined to be two or more .I successive executions of .I get for editing based o\*.mL\*.(mB\|+1)\*.1 _ 6. R yes R = mR mR\*.mL mR\*.mL\*.(mB\|+1)\*.1 _ 7. R \(em R < mR and hR\*.mL** hR\*.mL\*.(mB\|+1)\*.1 \^``p\*.''. It is created in the directory containing the \*s file, is given mode 644 (readable by everyone, writable only by the release R''. Note that if the SID specified is of the form ``R\*.L'', ``R\*.L\*.B'', or ``R\*.L\*.B\*.S'', each of the specifiedxecution will succeed, since subsequent executions would attempt to over-write a .I writable .I g-file, which is an \*s error con the same retrieved \*i) .I are allowed if the .B j flag is set in the \*s file. .ne 13 Thus: .DS 1 get \(eme s\*.abc 1\*.1 n \^ \^ R does \fInot\fP exist \^ \^ _ 8. R \(em Trunk successor R\*.mL R\*.mL\*.(mB\|+1)\*.1 \^ \^ \^ in release > R \^ \^ \^ \^owner), and is owned by the effective user. .ne 7 The .I p-file contains the following information for each delta that is still  components .I must exist. .LI \(dg The .B \(emb keyletter is effective only if the .B b flag (see .I admin\^ (1)) is present inndition. In practice, such multiple executions are performed by different users,\*F .FS See Section 6.1 for a discussion of how ew delta 1\*.2 5 lines .DE may be immediately followed by: .DS 1 get \(eme s\*.abc 1\*.1 new delta 1\*.1\*.1\*.1 5 lines .DE w \^ and R exists \^ \^ = 9. R\*.L no No trunk successor R\*.L R\*.(L\|+1) _ 10. R\*.L yes No trunk successor R\*.L R\*.L\*.(mB\|``in progress'':\*F .FS Other information may be present, but is not of concern here. See .I get\^ (1) for further discussion. . the file. In this table, an entry of ``\(em'' means ``irrelevant''. .LI \(dd This case applies if the .B d (default SID) flag idifferent users are permitted to use SCCS commands on the same files. .FE so that this problem does not arise, since each user nithout an intervening execution of .I delta. In this case, a .I delta command corresponding to the first .I get produces delta 1+1)\*.1 _ 11. R\*.L \(em Trunk successor R\*.L R\*.L\*.(mB\|+1)\*.1 \^ \^ \^ in release \(>= R \^ \^ = 12. R\*.L\*.B no No brancFE .BL 6 1 .LI The \*i of the retrieved version. .LI The \*i that will be given to the new delta when it is created. .LI The logs .I not present in the file. If the .B d flag .I is present in the file, then the SID obtained from the .B d flag is interpreteormally has a different working directory [1]. .P Table\ 1 shows, for the most useful cases, what version of an \*s file is retr.2 (assuming 1.1 is the latest (most recent) trunk delta), and the .I delta command corresponding to the second .I get produces h successor R\*.L\*.B\*.mS R\*.L\*.B\*.(mS\|+1) _ 13. R.L\*.B yes No branch successor R\*.L\*.B\*.mS R\*.L\*.(mB\|+1)\*.1 = 14. in name of the real user executing .I get. .LE .P The first execution of ``get \(eme'' causes the .I creation of the .I p-file fd as if it had been specified on the command line. Thus, one of the other cases in this table applies. .LI \(sc This case is useieved by .I get, as well as the \*i of the version to be eventually created by .I delta, as a function of the \*i specified to .delta 1.1.1.1. .H 3 "Keyletters That Affect Output" Specification of the .B \(emp keyletter causes .I get to write the retrievedR\*.L\*.B\*.S no No branch successor R\*.L\*.B\*.S R\*.L\*.B\*.(S\|+1) _ 15. R\*.L\*.B\*.S yes No branch successor R\*.L\*.B\*.Sor the corresponding \*s file. Subsequent executions only .I update the .I p-file by inserting a line containing the above inford to force the creation of the .I first delta in a .I new release. .LI ** ``hR'' is the highest .I existing release that is loweI get. .DF .B .TB "\s-1Determination of New SID\s+1" .R .sp 3p .TS center expand; cfI cfI cfI cfI cfI cfI cfI cfI cfI cfI cfI cf text to the standard output, rather than to a .I g-file. In addition, all output normally directed to the standard output (such R\*.L\*.(mB\|+1)\*.1 _ 16. R\*.L\*.B\*.S \(em Branch successor R\*.L\*.B\*.S R\*.L\*.(mB\|+1)\*.1 = .TE .ft R .ps 8 .vs 9.5p .Vmation. Before inserting this line, however, .I get checks that no entry already in the .I p-file specifies as already retrievedr than the specified, .I nonexistent, release\ R. .LE .br \l'\n(.lu' .br .vs .ps .DE .H 3 "Concurrent Edits of the Same \*i" UndI nfR lfR cfR lfR lfR lfR . = Case \*i \fB\(emb\fP Keyletter Other \*i \*i of Delta \^ Specified\|\fR*\fP Used\|\fR\(dg\fP Condi;0 ( ) *!+",#-$.%/ &0 ' as the \*i of the version retrieved and the number of lines retrieved) is directed instead to the diagnostic output. This may bied, each line of the generated .I g-file is preceded by the value of the %M% \*k keyword and a tab (this is the effect of the .ges from appearing on the user's terminal, and is often used in conjunction with the .B \(emp keyletter to ``pipe'' the output o1)) with its own, temporary copy of the .I g-file as it was before editing. This temporary copy of the .I g-file is called the .. Specifying a .I value of ``p'' with the .B \(eml keyletter, as in: .DS 1 get \(emlp \(emr2\*.3 s\*.abc .DE causes the genere used, for example, to create .I g-files with arbitrary names: .DS 1 get \(emp s\*.abc > arbitrary-filename .DE The .B \(emB \(emn keyletter), followed by the line in the format produced by the .B \(emm keyletter. Because use of the .B \(emm keyletterf .I get, as in: .DS 1 get \(emp \(ems s\*.abc \(bv nroff .DE .P The .B \(emg keyletter is supplied to suppress the actual I d-file (its name is formed by replacing the ``s\*.'' of the \*s file name with ``d\*.'') and is obtained by performing an inteated output to be written to the standard output rather than to the .I l-file. Note that the .B \(emg keyletter may be used withp keyletter is particularly useful when used with the ``!'' or ``$'' arguments of the \*p .I send\^ (1) command. For example: .D and/or the .B \(emn keyletter causes the contents of the .I g-file to be modified, such a .I g-file must .I not be used for creretrieval of the text of a version of the \*s file. This may be useful in a number of ways. For example, to verify the existencernal .I get at the \*i specified in the .I p-file entry. .P The required .I p-file entry is the one containing the login name of the .B \(eml keyletter to suppress the actual retrieval of the text. .P The .B \(emm keyletter is of use in identifying, line bS 1 send MOD=s\*.abc REL=3 compile .DE .ne 10 if file ``compile'' contains: .DS 1 //plicomp job job-card-information //stepating a delta. Therefore, neither the .B \(emm keyletter nor the .B \(emn keyletter may be specified together with the .B \(eme  of a particular \*i in an \*s file, one may execute: .DS 1 get \(emg \(emr4\*.3 s\*.abc .DE This outputs the given \*i if it the user executing .I delta, because the user who retrieved the .I g-file must be the one who will create the delta. However, iy line, the changes applied to an \*s file. Specification of this keyletter causes each line of the generated .I g-file to be pr1 exec plickc //pli\*.sysin dd \(** .tr ~~ ~\^\(ems ~\^!\^get \(emp \(emrREL MOD /\(** // .DE will .I send the highest lekeyletter. .P See .I get\^ (1) for a full description of additional .I get keyletters. .H 2 "delta" .P The .I delta command is u exists in the \*s file, or it generates an error message, if it does not. Another use of the .B \(emg keyletter is in regeneratf the login name of the user appears in more than one entry (i.e., the same user executed .I get with the .B \(eme keyletter moreceded by the \*i of the delta that caused that line to be inserted. The \*i is separated from the text of the line by a tab chavel of release 3 of file ``s\*.abc''. Note that the line ``\^~\^\(ems'', which causes .I send\^ (1) to make \*k keyword substitused to incorporate the changes made to a .I g-file into the corresponding \*s file, i.e., to create a delta, and, therefore, a ning a .I p-file that may have been accidentally destroyed: .DS 1 get \(eme \(emg s\*.abc .DE The .B \(eml keyletter causes the than once on the same \*s file), the .B \(emr keyletter must be used with .I delta to specify an \*i that uniquely identifies racter. .P The .B \(emn keyletter causes each line of the generated .I g-file to be preceded by the value of the %M% \*k keywordtions before detecting and interpreting control lines, is necessary if .I send\^ (1) is to substitute ``s\*.abc'' for MOD and ``ew version of the file. .P Invocation of the .I delta command requires the existence of a .I p-file (see Sections 5.1.3 and 5.1.e creation of an .I l-file, which is named by replacing the ``s\*.'' of the \*s file name with ``l\*.''. This file is created inthe .I p-file entry\*F. .FS The SID specified may be either the SID retrieved by .I get, or the SID .I delta is to create. .FE T (see Section 5.1.1) and a tab character. The .B \(emn keyletter is most often used in a pipeline with .I grep\^ (1). For exampl3'' for REL in the line ``\^~\^!\^get \(emp \(emrREL MOD''. .P The .B \(ems keyletter suppresses all output that is .I norma4). .I Delta examines the .I p-file to verify the presence of an entry containing the user's login name. If none is found, an er the current directory, with mode 444 (read-only), and is owned by the real user. It contains a table (whose format is describedhis entry is the one used to obtain the \*i of the delta to be created. .P .ne 8 In practice, the most common invocation of .I de, to find all lines that match a given pattern in the latest version of each \*s file in a directory, the following may be execlly directed to the standard output. .tr ~ Thus, the \*i of the retrieved version, the number of lines retrieved, etc., are not ror message results. .I Delta also performs the same permission checks that .I get performs when invoked with the .B \(eme keyle in .I get\^ (1)) showing which deltas were used in constructing a particular version of the \*s file. For example: .DS 1 get \elta is: .DS 1 delta s\*.abc .DE which prompts on the standard output (but only if it is a terminal): .DS 1 comments? .DE to whuted: .DS 1 get \(emp \(emn \(ems directory \(bv grep pattern .DE If both the .B \(emm and .B \(emn keyletters are specifoutput. This does not, however, affect messages to the diagnostic output. This keyletter is used to prevent non-diagnostic messatter. If all checks are successful, .I delta determines what has been changed in the .I g-file, by comparing it (via .I diff\| ((emr2\*.3 \(eml s\*.abc .DE generates an .I l-file showing which deltas were applied to retrieve version 2\*.3 of the \*s file<0 ( ) *!+",#-$.%/ &0 'ich the user replies with a description of why the delta is being made, terminating the reply with a newline character. The user but the delta is made, unless there is an .B i flag in the \*s file, indicating that this should be treated as a fatal error. Iletter is allowed only if the \*s file has a .B v flag. These keyletters are useful when .I delta is executed from within a .I "format of this output is similar to that produced by .I diff\| (1). .H 2 "admin" .P The .I admin command is used to .I administeo describe a set of such changes, especially if lines are moved around in the .I g-file, and .I delta is likely to find a descri's response may be up to 512 characters long, with newlines .I not intended to terminate the response escaped by ``\\''. .P .ne n this last case, the delta is not created. .P After processing of an \*s file is complete, the corresponding .I p-file entry isShell procedure" (see .I sh\^ (1)). .P The commentary (comments and/or MR numbers), whether solicited by .I delta or supplied vir \*s files, that is, to create new \*s files and to change parameters of existing ones. When an \*s file is created, its parameption that differs from the user's perception. However, the .I total number of lines of the new delta (the number inserted plus 4 If the \*s file has a .B v flag, .I delta first prompts with: .DS 1 MRs? .DE on the standard output.~ (Again, this prompt is p removed from the .I p-file. \*F~ .FS All updates to the .I p-file are made to a temporary copy, the .I q-file, whose use is sima keyletters, is recorded as part of the entry for the delta being created, and applies to .I all \*s files processed by the samters are initialized by use of keyletters or are assigned default values if no keyletters are supplied. The same keyletters are the number left unchanged) should agree with the number of lines in the edited .I g-file. .P .ne 5 If, in the process of making rinted only if the standard output is a terminal.)~ The standard input is then read for MR\*F .FS In a tightly controlled enviroilar to the use of the .I x-file, which is described in Section 4 above. .FE If there is only .I one entry in the .I p-file, thee invocation of .I delta. This implies that if .I delta is invoked with more than one file argument, and the first file named haused to change the parameters of existing files. .P Two keyletters are supplied for use in conjunction with detecting and correca delta, .I delta finds no \*k keywords in the edited .I g-file, the message: .DS 1 No id keywords (cm7) .DE is issued after thenment, it is expected that deltas are created only as a result of some trouble report, change request, trouble ticket, etc. (coln the .I p-file itself is removed. .P .ne 5 In addition, .I delta removes the edited .I g-file, unless the .B \(emn keyletter iss a .B v flag, all files named must have this flag. Similarly, if the first file named does not have this flag, then none of theting ``corrupted'' \*s files, and are discussed in Section 6.3 below. .P Newly-created \*s files are given mode 444 (read-only)  prompts for commentary, but before any other output. This indicates that any \*k keywords that may have existed in the \*s filelectively called here Modification Requests, or MRs) and that it is desirable or necessary to record such MR number(s) within ea specified. Thus: .DS 1 delta \(emn s\*.abc .DE will keep the .I g-file upon completion of processing. .P The .B \(ems (``sile files named may have it. Any file that does not conform to these rules is not processed. .P When processing is complete, .I deland are owned by the effective user. .P Only a user with write permission in the directory containing the \*s file may use the . have been replaced by their values, or deleted during the editing process. This could be caused by creating a delta from a .I gch delta. .FE numbers, separated by blanks and/or tabs, terminated in the same manner as the response to the prompt ``comments?'nt'') keyletter suppresses all output that is normally directed to the standard output, other than the prompts ``comments?'' anta outputs (on the standard output) the \*i of the created delta (obtained from the .I p-file entry) and the counts of lines insI admin command upon that file. .H 3 "Creation of \*(s) Files" .ne 4 An \*s file may be created by executing the command: .DS 1 -file that was created by a .I get without the .B \(eme keyletter (recall that \*k keywords are replaced by .I get in that case)'. .P The .B \(emy and/or .B \(emm keyletters are used to supply the commentary (comments and MR numbers, respectively) on the cd ``MRs?''. Thus, use of the .B \(ems keyletter together with the .B \(emy keyletter (and possibly, the .B \(emm keyletter) causerted, deleted, and left unchanged by the delta. .ne 7 Thus, a typical output might be: .DS 1 1\*.4 14 inserted 7 deleted 345 unadmin \(emifirst s\*.abc .DE in which the value (``first'') of the .B \(emi keyletter specifies the name of a file from which , or by accidentally deleting or changing the \*k keywords during the editing of the .I g-file. Another possibility is that the ommand line, rather than through the standard input. .ne 4 For example: .DS 1 delta \(emy"descriptive comment" \(emm"mrnum1 mres .I delta neither to read the standard input nor to write the standard output. .P The differences between the .I g-file and thchanged .DE .P It is possible that the counts of lines reported as inserted, deleted, or unchanged by .I delta do not agree withthe text of the .I initial delta of the \*s file ``s\*.abc'' is to be taken. Omission of the value of the .B \(emi keyletter indfile may never have had any \*k keywords. In any case, it is left up to the user to determine what remedial action is necessary,num2" s\*.abc .DE In this case, the corresponding prompts are not printed, and the standard input is not read. The .B \(emm keye .I d-file (see above), which constitute the delta, may be printed on the standard output by using the .B \(emp keyletter. The  the user's perception of the changes applied to the .I g-file. The reason for this is that there usually are a number of ways t=0 ( ) *!+",#-$.%/ &0 'icates that .I admin is to read the standard input for the text of the initial delta. .ne 4 Thus, the command: .DS 1 admin \(emcription of all the flags. .ne 5 For example, the .B i flag specifies that the warning message stating there are no \*k keywordsmmentary stating the reason for creation of the file. This is done by supplying comments .B (\(emy keyletter) and/or MR numbers\in, and may be intermixed with .B \(emf keyletters. .P \*(s) files contain a list (\c .I "user list" ) of login names and/or groontents may be arbitrary, and it may be arbitrarily long. .P When an \*s file is being created and the .B \(emt keyletter is supi s\*.abc < first .DE .ne 5 is equivalent to the previous example. If the text of the initial delta does not contain \*k keyw contained in the \*s file should be treated as an error, and the .B d (default \*i) flag specifies the default version of the \*F .FS The creation of an SCCS file may sometimes be the direct result of an MR. .FE .B (\(emm keyletter) in exactly the same maup \*ks of users who are allowed to create deltas (see Sections 5.1.3 and 6.2). This list is empty by default, which implies thaplied, it must be followed by the name of a file from which the descriptive text is to be taken. .ne 6 For example, the command:ords, the message: .DS 1 No id keywords (cm7) .DE is issued by .I admin as a warning. However, if the same invocation of the com*s file to be retrieved by the .I get command. The .B \(emf keyletter is used to set a flag and, possibly, to set its value. Fornner as for .I delta. .ne 6 If comments .B (\(emy keyletter) are omitted, a comment line of the form: .DS 1 date and time cret .I anyone may create deltas. To add login names and/or group \*ks to the list, the .B \(ema keyletter is used. .ne 4 For examp .DS 1 admin \(emifirst \(emtdesc s\*.abc .DE specifies that the descriptive text is to be taken from file ``desc''. .P .ne 5mand also sets the .B i flag (not to be confused with the .B \(emi keyletter), the message is treated as an error and the \*s fi example: .DS 1 admin \(emifirst \(emfi \(emfmmodname s\*.abc .DE sets the .B i flag and the .B m (module name) flag. The vaated \s-2YY/MM/DD HH:MM:SS\s+2 by logname .DE is automatically generated. .P If it is desired to supply MR numbers .B (\(emmle: .DS 1 admin \(emaxyz \(emawql \(ema1234 s\*.abc .DE adds the login names ``xyz'' and ``wql'' and the group \*k ``1234''  When processing an .I existing \*s file, the .B \(emt keyletter specifies that the descriptive text (if any) currently in the fle is not created. Only .I one \*s file may be created at a time using the .B \(emi keyletter. .P When an \*s file is created, tlue ``modname'' specified for the .B m flag is the value that the .I get command will use to replace the .B %M% \*k keyword. (In keyletter), the .B v flag must also be set (using the .B \(emf keyletter described below). The .B v flag simply determines whetto the list. The .B \(ema keyletter may be used whether .I admin is creating a new \*s file or processing an existing one, and mile is to be .I replaced with the text in the named file. Thus: .DS 1 admin \(emtdesc s\*.abc .DE .ne 6 specifies that the deshe .I release number assigned to its first delta is normally ``1'', and its .I level number is always ``1''. Thus, the first de the absence of the .B m flag, the name of the .I g-file is used as the replacement for the .B %M% \*k keyword.)~ Note that seveher or not MR numbers must be supplied when using any \*s command that modifies a .I "delta commentary" (see .I sccsfile\^ (5)) ay appear several times. The .B \(eme keyletter is used in an analogous manner if one wishes to remove (``erase'') login names ocriptive text of the \*s file is to be replaced by the contents of ``desc''; omission of the file name after the .B \(emt keyletlta of an \*s file is normally ``1\*.1''. The .B \(emr keyletter is used to specify the release number to be assigned to the firral .B \(emf keyletters may be supplied on a single invocation of .I admin, and that .B \(emf keyletters may be supplied whetherin the \*s file. .ne 4 Thus: .DS 1 admin \(emifirst \(emmmrnum1 \(emfv s\*.abc .DE Note that the .B \(emy and .B \(emm keyler group \*ks from the list. .H 2 "prs" .P .I Prs is used to print on the standard output all or parts of an \*s file (see Sectioter as in: .DS 1 admin \(emt s\*.abc .DE causes the .I removal of the descriptive text from the \*s file. .P The .I flags (seest delta. .ne 4 Thus: .DS 1 admin \(emifirst \(emr3 s\*.abc .DE indicates that the first delta should be named ``3\*.1'' rath the command is creating a new \*s file or processing an existing one. .P .ne 5 The .B \(emd keyletter is used to delete a flag tters are only effective if a new \*s file is being created. .H 3 "Initialization and Modification of \*(s) File Parameters" Then 6.2) in a format, called the output .I "data specification," supplied by the user via the .B \(emd keyletter. The data specifi Section 6.2) of an \*s file may be initialized and changed, or deleted through the use of the .B \(emf and .B \(emd keyletters,er than ``1\*.1''. Because this keyletter is only meaningful in creating the first delta, its use is only permitted with the .B from an \*s file, and may only be specified when processing an existing file. As an example, the command: .DS 1 admin \(emdm s portion of the \*s file reserved for .I "descriptive text" (see Section 6.2) may be initialized or changed through the use of tcation is a string consisting of \*s file \fIdata keywords\fR\*F .FS Not to be confused with .I "get ID" .I keywords. .FE inters respectively. The flags of an \*s file are used to direct certain actions of the various commands. See .I admin\^ (1) for a des\(emi keyletter. .H 3 "Inserting Commentary for the Initial Delta" When an \*s file is created, the user may choose to supply co\*.abc .DE removes the .B m flag from the \*s file. Several .B \(emd keyletters may be supplied on a single invocation of .I admhe .B \(emt keyletter. The descriptive text is intended as a summary of the contents and purpose of the \*s file, although its c>0 ( ) *!+",#-$.%/ &0 'persed with optional user text. .P .ne 5 Data keywords are replaced by appropriate values according to their definitions. For ex.1 can be removed, and so on. .P To be allowed to remove a delta, the effective user must have write permission in the directory defaults to the most recently created delta. .P In addition, information from a .I range of deltas may be obtained by specifyin are not satisfied, processing is terminated, and the delta is not removed. After the specified delta has been removed, its typents. .ne 13 Explanatory information related to an argument, if it exists, is printed on the standard output. If no information iample: .DS 1 \fB:\fRI\fB:\fR .DE is defined as the data keyword that is replaced by the \*i of a specified delta. Similarly, \fB containing the \*s file. In addition, the real user must either be the one who created the delta being removed, or be the ownerg the .B \(eml or .B \(eme keyletters. The .B \(eme keyletter substitutes data keywords for the \*i designated via the .B \(emr  indicator in the .I "delta table" of the \*s file (see Section 6.2) is changed from ``D'' (for ``delta'') to ``R'' (for ``removs found, an error message is printed. Note that each argument is processed independently, and an error resulting from one argume:F:\fR is defined as the data keyword for the \*s file name currently being processed, and \fB:C:\fR is defined as the comment l of the \*s file and its directory. .P .ne 6 The .B \(emr keyletter, which is mandatory, is used to specify the .I complete \*i keyletter and all deltas created .I earlier. The .B \(eml keyletter substitutes data keywords for the \*i designated via the .B ed''). .ne 9 .H 2 "cdc" .P The .I cdc command is used to .I change a delta's commentary that was supplied when that delta was crnt will .I not terminate the processing of the other arguments. .P Explanatory information related to a command is a synopsis ofine associated with a specified delta. All parts of an \*s file have an associated data keyword. For a complete list of the dataof the delta to be removed (i.e., it must have two components for a trunk delta, and four components for a branch delta). Thus: \(emr keyletter and all deltas created .I later. .ne 12 Thus, the command: .DS 1 prs \(emd\fB:\fRI\fB:\fR \(emr1\*.4 \(eme seated. Its invocation is analogous to that of the .I rmdel command, except that the delta to be processed is .I not required to  the command. For example: .DS 1 help ge5 rmdel .DE produces: .DS 1 ge5\fB:\fP "nonexistent sid" The specified sid does not ex keywords, see .I prs\^ (1). .P .ne 5 There is no limit to the number of times a data keyword may appear in a data specification.DS 1 rmdel \(emr2\*.3 s\*.abc .DE .ne 5 specifies the removal of (trunk) delta ``2\*.3'' of the \*s file. Before removal of t\*.abc .DE may output: .DS 1 1\*.4 1\*.3 1\*.2\*.1\*.1 1\*.2 1\*.1 .DE .ne 13 and the command: .DS 1 prs \(emd\fB:\fRI\fB:\fR be a leaf delta. For example: .DS 1 cdc \(emr3\*.4 s\*.abc .DE specifies that the commentary of delta ``3\*.4'' of the \*s filist in the given file. Check for typos. .ne 3 rmdel\fB:\fP rmdel \(emrSID name \fB.\|.\|.\fP .DE .H 2 "rmdel" .P The .I rmd. Thus, for example: .DS 1 prs \(emd"\fB:\fRI\fB:\fR this is the top delta for \fB:\fRF\fB: :\fRI\fB:\fR" s\*.abc .DE .ne 4 mahe delta, .I rmdel checks that the .I release number (R) of the given \*i satisfies the relation: .DS 1 floor \(<= R \(<= ceilin\(emr1\*.4 \(eml s\*.abc .DE may produce: .DS 1 3\*.3 3\*.2 3\*.1 2\*.2\*.1\*.1 2\*.2 2\*.1 1\*.4 .DE Substitution of data keye is to be changed. .P The .I new commentary is solicited by .I cdc in the same manner as that of .I delta. The old commentary ael command is provided to allow .I removal of a delta from an \*s file, though its use should be reserved for those cases in whiy produce on the standard output: .DS 1 2\*.1 this is the top delta for s\*.abc 2\*.1 .DE .ne 5 Information may be obtained fromg .DE .I Rmdel also checks that the \*i specified is .I not that of a version for which a .I get for editing has been executed awords for .I all deltas of the \*s file may be obtained by specifying both the .B \(eme and .B \(eml keyletters. .H 2 "help" .P ssociated with the specified delta is kept, but it is preceded by a comment line indicating that it has been changed (i.e., supech incorrect, global changes were made a part of the delta to be removed. .P .ne 4 The delta to be removed must be a ``leaf'' de a single delta by specifying the \*i of that delta using the .B \(emr keyletter. For example: .DS 1 prs \(emd"\fB:\fRF\fB:: :\nd whose associated .I delta has not yet been made. In addition, the login name or group \*k of the user must appear in the fileThe .I help command prints explanations of \*s commands and of messages that these commands may print. Arguments to .I help, zerrseded), and the new commentary is entered ahead of this comment line. The ``inserted'' comment line records the login name of tlta. That is, it must be the latest (most recently created) delta on its branch or on the trunk of the \*s file tree. In Figure\fRI\fB:\fR comment line is\fB: :\fRC\fB:\fR" \(emr1\*.4 s\*.abc .DE .ne 4 may produce the following output: .DS 1 s\*.abc\fB:\f's .I "user list," or the .I "user list" must be empty. Also, the release specified can not be .I locked against editing (i.e.,o or more of which may be supplied, are simply the names of \*s commands or the code numbers that appear in parentheses after \*he user executing .I cdc and the time of its execution. .P .ne 9 .I Cdc also allows for the deletion of selected MR numbers asso 3, only deltas 1\*.3\*.1\*.2, 1\*.3\*.2\*.2, and 2\*.2 can be removed; once they are removed, then deltas 1\*.3\*.2\*.1 and 2\*R 1\*.4 comment line is\fB:\fR \s-1THIS IS A COMMENT\s0 .DE If the .B \(emr keyletter is .I not specified, the value of the \*i if the .B l flag is set (see .I admin\^ (1)), the release specified .I must not be contained in the list). If these conditionss messages. If no argument is given, .I help prompts for one. .I Help has no concept of .I keyletter arguments or .I file argume?0 ( ) *!+",#-$.%/ &0 'ciated with the specified delta. This is specified by preceding the selected MR numbers by the character ``\fB!\fR''. Thus: .DS at is to be preserved in the reconstruction. All older deltas are discarded. .P The .B \(emc keyletter specifies a .I list (see ting .I g-file is compiled to produce ``prog.o'' and ``a.out'', then the command: .DS 1 what prog\*.c prog\*.o a\*.out .DE pre set by the .B t or .B m flag respectively (see .I admin\^ (1) for a description of the flags). .P .I Val treats the special arccsdiff: .DS 1 sccsdiff \(emr3\*.4 \(emr5\*.6 s\*.abc .DE .H 2 "comb" .P .I Comb generates a .I "Shell procedure" (see .I sh\1 cdc \(emr1\*.4 s\*.abc MRs? mrnum3 \fB!\fPmrnum1 comments? deleted wrong MR number and inserted correct MR number .DE inse.I get\^ (1) for the syntax of such a list) of deltas to be preserved. All other deltas are discarded. .P The .B \(ems keyletteroduces: .DS 1 prog\*.c\fB:\fP prog\*.c\fB:\fP3\*.4 prog\*.o\fB:\fP prog\*.c\fB:\fP3\*.4 a\*.out\fB:\fP prog\*.c\fB:\fP3\*.4 .gument ``\fB\(em\fP'' differently from other \*s commands (see Section 4). This argument allows .I val to read the argument list^ (1)) which attempts to reconstruct the named \*s files so that the reconstructed files are smaller than the originals. The genrts ``mrnum3'' and deletes ``mrnum1'' for delta 1.4. .H 2 "what" .P The .I what command is used to find identifying information  causes the generation of a Shell procedure, which, when run, produces .I only a report summarizing the percentage space (if anyDE .P The string searched for by .I what need not be inserted via an \*k keyword of .I get; it may be inserted in any convenient from the standard input as opposed to obtaining it from the command line. The standard input is read until end-of-file. This caerated Shell procedure is written on the standard output. .P Named \*s files are reconstructed by discarding unwanted deltas andwithin .I any \*p file whose name is given as an argument to .I what. Directory names and a name of ``\(em'' (a lone minus sign)) to be saved by reconstructing each named \*s file. It is recommended that .I comb be run with this keyletter (in addition to a manner. .H 2 "sccsdiff" .P The .I sccsdiff command determines (and prints on the standard output) the differences between two spability allows for one invocation of .I val with different values for the keyletter and file arguments. .ne 6 For example: .DS  combining specified other deltas. The intended use is for those \*s files that contain deltas that are so old that they are no  are .I not treated specially, as they are by other \*s commands, and no .I keyletters are accepted by the command. .P .I What sny others desired) .I before any actual reconstructions. .P It should be noted that the Shell procedure generated by .I comb is pecified versions of one or more \*s files. The versions to be compared are specified by using the .B \(emr keyletter, whose for1 val \(em \(emyc \(emmabc s\*.abc \(emmxyz \(emypl1 s\*.xyz .DE first checks if file ``s.abc'' has a value ``c'' for its .longer useful. It is .I not recommended that .I comb be used as a matter of routine; its use should be restricted to a .I very searches the given file(s) for all occurrences of the string ``@(#)'', which is the replacement for the .B %Z% \*k keyword (see ..I not guaranteed to save any space. In fact, it is possible for the reconstructed file to be .I larger than the original. Note,mat is the same as for the .I get command. The two versions .I must be specified as the first two arguments to this command in tI type flag and value ``abc'' for the .I "module name" flag. Once processing of the first file is completed, .I val then processmall number of times in the life of an \*s file. .P In the absence of any keyletters, .I comb preserves only leaf deltas and theI get\^ (1)), and prints (on the standard output) what follows that string until the first double quote (\^"\^), greater than (> too, that the shape of the \*s file tree may be altered by the reconstruction process. .H 2 "val" .P .I Val is used to determinhe order in which they were created, i.e., the older version is specified first. Any following keyletters are interpreted as arges the remaining files, in this case ``s.xyz'', to determine if they meet the characteristics specified by the keyletter argumen minimum number of ancestor deltas necessary to preserve the ``shape'' of the \*s file tree. The effect of this is to eliminate ), backslash (\^\\), newline, or (non-printing) NUL character. .ne 9 Thus, for example, if the \*s file ``s.prog.c'' (which is ae if a file is an \*s file meeting the characteristics specified by an optional list of keyletter arguments. Any characteristicsuments to the .I pr\^ (1) command (which actually prints the differences) and must appear before any file names. \*(s) files to ts associated with them. .P .I Val returns an 8-bit code which is a disjunction of the possible errors detected. That is, each b``middle'' deltas on the trunk and on all branches of the tree. Thus, in Figure\ 3, deltas 1\*.2, 1\*.3\*.2\*.1, 1\*.4, and 2\*. C program), contains the following line (the %M% and %I% \*k keywords were defined in Section 5.1.1): .DS 1 char id[\|] "%Z%% not met are considered errors. .P .I Val checks for the existence of a particular delta when the \*i for that delta is \fIexplibe processed are named last. Directory names and a name of ``\(em'' (a lone minus sign) are .I not acceptable to .I sccsdiff. .Pit set indicates the occurrence of a specific error (see .I val\^ (1) for a description of the possible errors and their codes).1 would be eliminated. Some of the keyletters are summarized as follows: .P The .B \(emp keyletter specifies the oldest delta thM%\fB:\fP%I%"\fB;\fP .DE and then the command: .DS 1 get \(emr3\*.4 s\*.prog\*.c .DE .ne 14 is executed, and finally the resulcitly\fR specified via the .B \(emr keyletter. The string following the .B \(emy or .B \(emm keyletter is used to check the valu .ne 4 The differences are printed in the form generated by .I diff\| (1). The following is an example of the invocation of .I s@0 ( ) *!+",#-$.%/ &0 ' In addition, an appropriate diagnostic is printed unless suppressed by the .B \(ems keyletter. A return code of ``0'' indicates privileges of the interface program for the duration of that command's execution. In this manner, the owner of an \*s file can y temporary files created by \*s commands. This simplifies protection and auditing of \*s files (see Section 6.3). The contents trol certain actions of various \*s commands. .LI Descriptive~Text Arbitrary text provided by the user; usually a summary of the\*s may be used directly without any preliminary preparation. .P However, in those situations in which several users with unique all named files met the characteristics specified. .H 1 "SCCS FILES" This section discusses several topics that must be considemodify it at will. Other users whose .I login names or .I group \*ks are in the .I "user list" for that file (but who are .I notof directories should correspond to convenient logical groupings, e.g., sub-systems of a large project. .P \*(s) files must have contents and purpose of the file. .LI Body Actual text that is being administered by \*s, intermixed with internal \*s control  user \*ks are assigned responsibility for one \*s file (for example, in large software development projects), one user (equivalred before extensive use is made of \*s. These topics deal with the protection mechanisms relied upon by \*s, the format of \*s  its owners) are given the necessary permissions only for the duration of the execution of the interface program, and are thus a only .I one link (name). The reason for this is that those commands that modify \*s files do so by creating a temporary copy oflines. .LE .P Detailed information about the contents of the various sections of the file may be found in .I sccsfile\^ (5); theently, one user \*k) must be chosen as the ``owner'' of the \*s files and be the one who will ``administer'' them (e.g., by usinfiles, and the recommended procedures for auditing \*s files. .H 2 "Protection" \*(s) relies on the capabilities of the \*p operble to modify the \*s files only through the use of .I delta and, possibly, .I rmdel and .I cdc. The project-dependent interface the file (called the .I x-file, see Section 4) and, upon completion of processing, remove the old file and rename the .I x-file .I checksum is the only portion of the file which is of interest below. .P It is important to note that because \*s files are \g the .I admin command). This user is termed the .I "\*s administrator" for that project. Because other users of \*s do not haveating system for most of the protection mechanisms required to prevent unauthorized changes to \*s files (i.e., changes made by  program, as its name implies, must be custom-built for each project. .H 2 "Format" \*(s) files are composed of lines of \*a tex. If the old file has more than one link, removing it and renaming the .I x-file would break the link. Rather than process such *a files, they may be processed by various \*p commands, such as .I ed\^ (1), .I grep\^ (1), and .I cat\^ (1). This is very conv the same privileges and permissions as the \*s administrator, they are not able to execute directly those commands that requirenon-\*s commands). The only protection features provided directly by \*s are the .I "release lock" flag, the .I "release floor" t\*F .FS Previous versions of SCCS up to and including Version 3 used non-ASCII files. Therefore, files created by earlier versifiles, \*s commands produce an error message. All \*s files .I must have names that begin with ``s\*.''. .P When only one user uenient in those instances in which an \*s file must be modified manually (e.g., when the time and date of a delta was recorded i write permission in the directory containing the \*s files. Therefore, a project-dependent program is required to provide an inand .I "ceiling" flags, and the .I "user list" (see Section 5.1.3). .P New \*s files created by the .I admin command are given mons of SCCS are incompatible with the current version of SCCS. .FE arranged in six parts, as follows: .VL 20 3 .LI Checksum A lises \*s, the real and effective user \*ks are the same, and that user \*k owns the directories containing \*s files\*F. .FS Prevncorrectly because the system clock was set incorrectly), or when it is desired to simply ``look'' at the file. .P .I \ \(rh\ \ terface to the .I get, .I delta, and, if desired, .I rmdel and .I cdc commands. .P The interface program must be owned by the \*ode 444 (read only). It is recommended that this mode .I not be changed, as it prevents any direct modification of the files by ne containing the ``logical'' sum of all the characters of the file (\c .I not including this checksum itself). .LI Delta~Table iously, the Operating System under which SCCS executed allowed for only 256 unique user IDs. This presented the situation in whi Extreme care should be exercised when modifying \*s files with non-\*s commands. .R .H 2 "Auditing" On rare occasions, perhaps s administrator, and must have the .I set~user~\*k~on~execution bit on (see .I chmod\^ (1)), so that the effective user \*k is tnon-\*s commands. It is further recommended that the directories containing \*s files be given mode 755, which allows only the .Information about each delta, such as its type, its \*i, date and time of creation, and commentary. .LI User~Names List of loginch several users needed to share user IDs (and thus shared identical file permissions). The Operating System currently in use (Vdue to an operating system or hardware malfunction, an \*s file, or portions of it (i.e., one or more ``blocks'') can be destroyhe user \*k of the administrator. This program's function is to invoke the desired \*s command and to cause it to .I inherit theI owner of the directory to modify its contents. .P \*(s) files should be kept in directories that contain only \*s files and an names and/or group \*ks of users who are allowed to modify the file by adding or removing deltas. .LI Flags Indicators that conersion 7 of UNIX) allows for 65,536 unique user IDs, and it is recommended that each user have a unique user ID. .FE Therefore, A0 ( ) *!+",#-$.%/ &0 'ed. \*(s) commands (like most \*p commands) issue an error message when a file does not exist. In addition, \*s commands use theor greater than 9999. -8 "bad a argument" You did not follow the 'a' keyletter with a name. -9 "too many 'a' keyletters" You supodically execute the .I ls\^ (1) command on that directory, and compare the outputs of the most current and the previous executi and you specified the 't' keyletter, but you did not supply the name of the text file from which to take commentary. -18 "d notusr/lib/help/ad 644 152 2  .I checksum stored in the \*s file to determine whether a file has been .I corrupted since it was last accessed (possibly by haplied more than ten 'a' keyletters. If you really need to, do more admins. -10 "bad e argument" You did not follow the 'e' keyleons. Any file whose name appears in the previous output but not in the current one has been removed by some means. .P Whenever a allowed with n" You are trying to delete flags from a non-existent but being-created SCCS file. You can only do this to old fil 10060 3142671160 6712 ving lost one or more blocks, or by having been modified with, for example, .I ed\^ (1)). .I No \*s command will process a corrutter with a name. -11 "too many e keyletters" You supplied more than ten 'e' keyletters. If you really need to, do more admins.  file has been corrupted, the manner in which the file is restored depends upon the extent of the corruption. If damage is extenes. -19 "file ... exists" You are trying to create the named SCCS file, but it already exists. -20 "file ... does not exist" Youpted \*s file except the .I admin command with the .B \(emh or .B \(emz keyletters, as described below. .P .ne 8 It is recommend-12 "value after ... flag" You supplied a 'd' keyletter to delete the flag named, but you followed the flag with a value. This isive, the best solution is to contact the local \*p operations group to request a restoral of the file from a backup copy. In th are trying to modify the named file, but it does not exist. -21 "... illegal data on line ..." The named line in the file you sed that \*s files be audited (checked) for possible corruptions on a regular basis. The simplest and fastest way to perform an as not allowed. -13 "value after ... flag" You supplied an 'f' keyletter to add the flag named, and you also supplied a value fore case of minor damage, repair through use of the editor .I ed\^ (1) may be possible. In the latter case, after such repair, theupplied for the 'i' or 't' keyletter begins with the SCCS control character (ASCII 001). It is illegal to input such data to SCC* * Messages for SCCS admin command. * -1 "d has no argument" You did not supply the one-letter flagname to be deleted. -2 "flagudit is to execute the .I admin command with the .B \(emh keyletter on all \*s files: .DS 1 admin \(emh s\*.file1 s\*.file2  the flag. However, the named flag cannot be assigned a value. -14 "no default sid" You are trying to add the 'd' flag (default  following command must be executed: .DS 1 admin \(emz s\*.file .DE The purpose of this is to recompute the checksum to bring S. -22 "floor not numeric" The value you specified for the floor flag is not a number. Check for typos. -23 "floor out out of ra ... has no value" On 'f' keyletter, the flagname supplied should have been given a value, but you did not supply one. -3 "unkno\fB.\|.\|.\fP or admin \(emh directory1 directory2 \fB.\|.\|.\fP .DE .ne 5 If the new checksum of any file is not equal to SID) to the SCCS file, but you did not supply an SID for it. This flag must have an SID. -15 "more than one file" You are tryingit into agreement with the actual contents of the file. After this command is executed on a file, any corruption which may have nge" The value you specified for the floor flag is either less than 1 or greater than 9999. -24 "ceiling not numeric" The value wn flag" You supplied a flag (on 'd' or 'f' keyletter) which admin does not recognize. -4 "flag twice" A flag was specified twicthe checksum in the first line of that file, the message: .DS 1 corrupted file (co6) .DE is produced for that file. This process to create more than one SCCS file, and you supplied the 'i' keyletter. You can only create one file when you supply the 'i' keyexisted in that file will no longer be detectable. .HU "REFERENCES" .RL .LI Bell Laboratories, .I "Documents for Use with the \*you specified for the ceiling flag is not a number. Check for typos. -25 "ceiling out out of range" The value you specified for e. -5 "f has no argument" You did not name a flag when you specified the 'f' keyletter. -6 "r arg not numeric" You supplied a no continues until all the files have been examined. When examining directories (as in the second example above), the process justletter. -16 "r only allowed with i" You specified the 'r' keyletter for an SCCS file without also specifying the 'i' keyletter. (p) Time-Sharing System." .LE .TC 1 1 1 0 "\fBSource Code Control System\fP" "\fBUser's Guide\fP" .sp .I "January 1980" air, thethe ceiling flag is either less than 1 or greater than 9999. -26 "directory named with `i' keyletter" The name specified for then-numeric value for the 'r' argument. -7 "r out of range" You supplied a value for the 'r' argument which is either less than 1  described will not detect .I missing files. A simple way to detect whether .I any files are missing from a directory is to periThe 'r' keyletter may not be specified except with the 'i' keyletter. -17 "t has no argument" You were creating a new SCCS file, following command must be executed: .DS 1 admin \(emz s\*.file .DE The purpose of this is to recompute the checksum to bring B0 ( ) *!+",#-$.%/ &0 ' SCCS file name was a directory. Only one SCCS file is allowed to be specified with the `-i' keyletter. -27 "bad list format" Th 1210 3142671160 6667 ile created would not be accessible by other SCCS commands. -30 illegal use of `y' or `m' keyletter The `y' and `m' keyletters f exist" The SID you specified in one of the arguments to comb does not exist in the named SCCS-file. -4 "nothing to do" The arguem support group. -4 "non-numeric limit" The argument supplied to bdiff to specify the segmentation limit bdiff is to use is note format for the list of locked releases is syntactically incorrect. The correct format for a list is: ::= | or "admin" may only be used in conjunction with the `i' or `n' keyletters, i.e. when creating a new SCCS file. Use "cdc" to chausr/lib/help/cm 644 152 2  numeric. Only numeric characters may appear in this argument. -5 "cannot execute ..." The named program could not be executed b, ::= REL_NO | ``a'' where REL_NO is considered to be the first component in a _SCCS __IDentificationusr/lib/help/bd 644 152 2  4173 3142671160 6715 y bdiff. It may be unexecutable, or it may have been removed. Contact SCCS support personnel for further assistance. -6 "... fai string (SID). -28 "element in list out of range" An element contained in the list for ``locking'' or ``unlocking'' releases is * * Message for comb SCCS command * -1 "p-file exists" Someone is in the process of making a delta on the named SCCS file. Comb  2060 3142671160 6674 led" The named program terminated with an error. It may have discovered an error condition or may have been interrupted. Contactout of range. That means its value is probably greater than 9999, the maximum release number. -29 directory `...' specified as `may only be used when no one else is modifying the named SCCS file. -2 "can't have both -p and -c" The '-p' and '-c' key letter  SCCS support personnel for further assistance. ument supplied to bdiff to specify the segmentation limit bdiff is to use is not...' keyletter value The value specified with the named keyletter argument is a directory. This is not allowed since the SCCS farguments specify mutually exclusive conditions. Therefore, they may not be specified on the same command line. -3 "SID doesn't* * Messages common to more than one SCCS command. * -1 "unknown key letter" You supplied a keyletter which the command does not numeric. Only numeric characters may appear in this argument. -5 "cannot execute ..." The named program could not be executed bile created would not be accessible by other SCCS commands. -30 illegal use of `y' or `m' keyletter The `y' and `m' keyletters f exist" The SID you specified in one of the arguments to comb does not exist in the named SCCS-file. -4 "nothing to do" The argu* * Messages for bdiff. * -1 "arg count" You invoked bdiff with either too few or too many arguments. -2 "both files standard in recognize. -2 "key letter twice" You supplied a keyletter more than once. -3 "missing file arg" You left off the name of the fiy bdiff. It may be unexecutable, or it may have been removed. Contact SCCS support personnel for further assistance. -6 "... faior "admin" may only be used in conjunction with the `i' or `n' keyletters, i.e. when creating a new SCCS file. Use "cdc" to chament specified to comb would result in no changes made to the named SCCS-file. Therefore, it can't do anything to the named SCCput" You supplied a name of '-' for both file-name arguments to bdiff. Since '-' means to read the standard input, you are requele to be processed. -4 "cannot create lock file" There are two known reasons why this can occur. 1) Someone else is updating thled" The named program terminated with an error. It may have discovered an error condition or may have been interrupted. Contactnge comments or MR numbers of an existing file. reater than 9999, the maximum release number. -29 directory `...' specified as `S-file. be used when no one else is modifying the named SCCS file. -2 "can't have both -p and -c" The '-p' and '-c' key letter sting that bdiff read it for both its inputs. That would lead to highly grungeular randomness. -3 "cannot fork, try again" Bdiffe SCCS file (or the p-file). You'll have to wait until they're through, and try again. 2) You do not have write permission iusr/lib/help/cb 644 152 2 ...' keyletter value The value specified with the named keyletter argument is a directory. This is not allowed since the SCCS farguments specify mutually exclusive conditions. Therefore, they may not be specified on the same command line. -3 "SID doesn't could not fork to invoke 'diff'. This is a system problem which may go away, so try again. If it doesn't, report it to the systC0 ( ) *!+",#-$.%/ &0 'n the directory where the SCCS file resides. If this is so, you are not allowed to create any files (including the ``lockntation. 2. Try to write(I) to anyone logged in as "adm". 3. Contact your PWB/UNIX counsellor. 4. File an MR (see System Adminisrror, only a warning. -8 "value after ... arg" You had something after the indicated keyletter argument and you weren't supposedBranch number " nnnn S :S: Sequence number " nnnn * * Synopsis of SCCS commands * -delta delta [-r] [-s] [-n] [-g] [-m] [-y] [-p] file ... -get  file'') in that directory. If it is neither of the two reasons and the problem persists, contact your Source Code Administrtrator for instructions). -val val - val [-s] [-r] [-m] [-y] file ... -vc vc [-a] [-t] [-c] [-s] [keyw to. -9 "User ID not in password file ..." You are apparently running on a system on which you do not have a login (via a data l S :D: Date delta created " :Dy:/:Dm:/:Dd: S :Dy: Year delta created " get [-r] [-c] [-i] [-x] [-a] [-k] [-e] [-l

] [-p] [-m] [-n] [-s] [-b] [-g] [-t] file ..ator (SCA). -5 "bad date/time" The date/time must be a legitimate date/time in the form "YY[MM[DD[HH[MM[SS]]]]]". The program kord=value ... keyword=value] -prs prs [-d] [-r] [-e] [-l] [-a] file ... (do 'help prs_kywds' for description oink of some type). SCCS will not allow you to make changes to a file if your user ID is not located in the password file. you  nn S :Dm: Month delta created " nn S :Dd: Day delta created . -admin admin [-n] [-i] [-r] [-t] [-f>] ... [-d] ... [-a] ... [-e] ... [-m] [-y] [-h] [-z] file ... -help help [arg] (When all else fails eound). If this message came from delta then you just tryed to make a delta without any keywords. If this message came from get  SCCS File Value Format Keyword Data Item Section Type Type :Dt: rror, only a warning. -8 "value after ... arg" You had something after the indicated keyletter argument and you weren't supposedted " nn S :Tm: Minutes delta created " nn S :Ts: Sxecute "help stuck".) -what what file ... -comb comb [-o] [-s] [-p] [-c] file ... -bdiff bdiff file1 file2 [numargthen your source code administrator blew it. Complain to him/her. If this message came from admin, you blew it. -7 "No id keywo Whole delta line Delta Table all delta line info S :DL: Delta line stats " :Li:/:Ld:/:Lu:  to. -9 "User ID not in password file ..." You are apparently running on a system on which you do not have a login (via a data leconds delta created " nn S :P: Pgmr who created delta " logname ] [-s] -cdc cdc -rSID [-m] [-y] file ... -rmdel rmdel -rSID file ... -sccsdiff sccsdiff old-spec new-spec [prds" No SCCS identification keywords were substituted for. You may not have any keywords in the file, in which case you can igno S :Li: Lines ins by delta " nnnnn S :Ld: Lines del by delta " usr/lib/help/cmds 644 152 2  S :DS: Delta seq number " nnnn S :DP: Pred delta seq number " r-args] sccsfile ... -stuck First, if you know the value of the system error number (errno), you can either look up a descriptiore this warning. If this message came from delta then you just made a delta without any keywords. If this message came from get  nnnnn S :Lu: Lines unc by delta " nnnnn S :DT: Delta type  12467 3142671160 7271  nnnn S :DI: Deltas inc,exc,ignored " :Dn:/:Dx:/:Dg: S :Dn: Deltas included n of it in INTRO(II), or execute "help err" (e.g., if the error number is 1 execute "help err1"). If you don't know the then the last time you made a delta you changed the lines on which they appeared. It's a little late to be telling you that you  " D or R S :I: SID " :R:.:L:.:B:.:S: S :R: Release number" :DS: :DS: ... S :Dx: Deltas excluded " :DS: :DS: ... S :Dg: Deltas ignored error number, or you don't understand what's going on - Try the following, in order: 1. Make sure the answer isn't in the documemessed up the last time you made a delta, but this is the best we can do for now, and it's better than nothing. This isn't an e " nnnn S :L: Level number " nnnn S :B: D0 ( ) *!+",#-$.%/ &0 ' " :DS: :DS: ... S :MR: MR numbers " text M :C: Cot your local UNIX support group immediately! (Try a "date" command.) (This error is produced whenever the creation date of the n Comments text M :BD: Body Body text M :GB: Gott file" to see who is allowed. See your project administrator to get your login name or group ID on the list. -15 "release ... <* * Messages from routines in 'com' directory of sccs. * -1 "not an SCCS file" A file that you think is an SCCS file does not bemments " text M :UN: User names User Names text ewest delta in the SCCS file is newer than the current date. This will happen whenever the date is accidently set wrong. This en body " text M :W: form of _w_h_a_t(I) str N/A :Z::M:\t:I: ... (floor)" Either the release you specified or else the default release is lower than the lowest allowable release (the floorgin with the characters "s.". -3 "more than one link" SCCS files may only have one name (link). This is because the delta progra M :FL: Flag List Flags desc of all flags set M :Y: Type flag " moderror will also occur if a delta was created while the clock was set ahead - but less than a year - and has since been corrected S :A: form of _w_h_a_t(I) str N/A :Z::Y: :M: :I::Z: S :Z: _w_h_a_t(I) str construct ). If you're not sure what's wrong see your SCCS administrator. -16 "release ... > ... (ceiling)" Either the release you specifm unlinks the old file and then links to the new file. -4 "format error at line ..." FIRST OF ALL, ARE YOU SURE THAT THE NAMED ule type S :MF: MR valid flag " yes or no S :MP: MR valid pgm. ". In this case the current time is correct, but the date of the delta is wrong.) -11 "Clock may be set wrong!" The time of day m N/A @(#) S :F: File name N/A file name S :PN: Pathname ied or else the default release is higher than the highest allowable release (the ceiling). If you're not sure what's wrong seeFILE IS A RELEASE 4 SCCS FILE? (see PIB 77-05). The format of the SCCS file is logically invalid. The error was discovered at  text S :KF: Kywd err/warn flag " yes or no S :BF: Branch flag ay be set wrong. Check the current time with the "date" command. If it is wrong, contact your local UNIX support group immediate N/A pathname S dy Body text M :GB: Gott your SCCS administrator. -17 "bad p-file format" The p-file is messed up. Get your local source code administrator to fix it. -the stated line. See if you can find the problem with the prs command. If not, do a "help stuck". -5 "premature eof" The SCCS  " yes or no S :J: Joint edit flag " yes or no S :LK: Locly! (This message is produced whenever the difference between the current date and the creation date of the newest delta in the en body " text M :W: form of _w_h_a_t(I) str N/A :Z::M:\t:I:18 "line too long" Don't type so much on a line. -19 "response too long" A response can't be so long. Try typing less (maybe youfile ended in a strange place. Its probably a goner. You can try "help stuck", but chances are you're going to have to go to a ked releases " :R: ... S :Q: User defined keyword " text SCCS file is greater than one year.) -12 "bad range" In a delta list, the two limits of a range of deltas were not in ascending usr/lib/help/co 644 152 2  can reference some other document). -20 "cannot fork; try again" The system is busy; you'll have to try again later. -21 "too mbackup copy. -6 "corrupted file" The computed hash count of the input SCCS file did not check with the stored hash count. The f S :M: Module name flag " module name S :FB: Floor boundary " order. -13 "delta list syntax" A list of deltas was syntatically erroneous. The correct syntax is: ::= | , ::= | - ::= | . -14 "not authorized to make deltas"nst editing The specified release (or possibly all releases) for the SCCS file have been locked using the _l flag of admin. Do long. -8 "invalid sid" The specified sid is syntactically incorrect. -10 "clock set wrong!!!" The time of day is wrong. Contac :I: S :ND: Null delta flag " yes or no S :FD: Descriptive text  Your login name or group ID is not on the list of users who are allowed to add deltas to this file. You can execute "prs -d:UN:E0 ( ) *!+",#-$.%/ &0 ' a 'prs -d:LK: s.filename' to see a list of locked releases (_a means "all"). onse can't be so long. Try typing less (maybe youause of the segmentation problem which is caused by limited system work space, the SCCS file that delta created may occupy an in -e, or supplied the wrong SID. -3 "invalid sid in p-file" Get your local source code administrator to fix up the p-file. -4 "ditable, or it may have been removed. Contact SCCS support personnel for further assistance. -13 "... failed, re-trying, segmentat can reference some other document). -20 "cannot fork; try again" The system is busy; you'll have to try again later. -21 "too mordinate amount of file space. To reduce the size of the SCCS file, the user may want to remove the delta just created and retrff failed" The program delta uses to determine what changed failed, and the delta is not made. Contact SCCS support personnel f* * Default file (file of last resort) * -26 "can't open ..." The file couldn't be opened for reading. Either it doesn't exist ion = ..." The named program, used by delta to determine what has changed in the SCCS file, has failed. The most likely cause iany MRs" You can't enter so many MRs. Sorry. -22 "out of space" Your MRs took up too much memory. Type less. -23 ... locked agaiy when the system is more lightly loaded (and hopefully more work space is available). If no subsequent delta has been made, theor further assistance. -5 "internal error in delta/enter()" Report this to your local SCCS support personnel immediately. -6 "inor it isn't readable. specified appropriately. Also steps 1 and 3 may require that you specify a SID, depending on your situats that the files to be compared by the named program are being segmented into chunks which are too large. Therefore, delta re-tnst editing The specified release (or possibly all releases) for the SCCS file have been locked using the _l flag of admin. Do procedure for doing this would be: 1. get -k s.file 2. rmdel -rSID s.file 3. get -e -g s.file 4. delta s.file where, of coternal error in delta/enter()" Report this to your local SCCS support personnel immediately. -7 "internal error in delta/enter()ion. ate amount of file space. To reduce the size of the SCCS file, the user may want to remove the delta just created and retrries with smaller chunks. (However, the smallest chunk it will try is 500 lines. If this fails, it gives up hope and terminatesusr/lib/help/de 644 152 2 urse, SID and file are specified appropriately. Also steps 1 and 3 may require that you specify a SID, depending on your situat" Report this to your local SCCS support personnel immediately. -8 "MRs not allowed" You specified MRs, but the file being procey when the system is more lightly loaded (and hopefully more work space is available). If no subsequent delta has be  processing of the SCCS file.) Do a "help de17" for more information. -14 "leading SOH char in line ... of file ... not allowed" 6405 3142671160 6706 ion. ate amount of file space. To reduce the size of the SCCS file, the user may want to remove the delta just created and retrssed doesn't allow them. -9 "invalid MRs" The MR validation program returned a non-zero status to delta. This indicates that onusr/lib/help/ge 644 152 2  The ASCII character SOH (binary 001) is in the first position of a line. This character is not allowed in the first position fy when the system is more lightly loaded (and hopefully more work space is available). If no subsequent delta has been made, thee or more of the MRs specified are invalid. -10 "MRs required" No MRs were specified, but the file being processed requires them 3756 3142671160 6717 or any line of text in an SCCS file. However, it may be used if it is escaped. -15 "ambiguous `r' keyletter value" Which delta usr/lib/help/default 644 152 2 . -11 "cannot fork, try again" Delta could not fork to invoke the program it uses to determine what has changed in the SCCS file(SID) do you want to make? Look at the p-file, pick one, and specify it with the `-r' keyletter. -16 When delta reads arguments -1 "missing -r argument" You must specify an SID when you are listed more than once in the p-file. -2 "login name or SID specifi 226 3142671160 7715 . This is a system problem which may go away, so try again. If it doesn't, report it to the system support group. -12 "cannot exfrom the standard input it will not prompt for comments or MRs, so these values must be supplied with the file argument. -17 Beced not in p-file" Either your login name, or the SID you specified, is not listed in the p-file. You probably forgot to do a getecute ..." The named program, used by delta to determine what changed in the SCCS file, could not be executed. It may be unexecuF0 ( ) *!+",#-$.%/ &0 '* * Messages for get command of SCCS. * -3 "e not allowed with m" You can't use both the -e and -m arguments on the same get comSID of the SCCS file. -2 "curdir failed" Try the command again. If the situation repeats, notify your Source Code Administratoris making deltas to this file too? -19 "release locked against editing" The release retrieved by `get' for editing purposes (getYou either don't own the file you are trying to process or your login-name is not the same as the one that created the delta. On* * Messages for help command. * -1 "not found" No helpful information associated with your argument was found. If you're sure ymand. -4 "writable `...' exists" For safety's sake, SCCS won't overwrite an existing g-file if it's writable. If you don't need  or PWB/UNIX Project Administrator for further assistence. -3 "cannot change directory" Try the command again. If the situation -e ) is locked against further editing. "prs -d:LK:" on the SCCS file tells you which releases are locked. The `admin' command ly the creator of a delta (or your SCCS administrator, who owns the file) can rmdel or cdc a delta. -5 "not a 'leaf' delta" You ou've got it right, do a "help stuck". -2 "argument too long" Dost thou jest? Wilst thou mock HELP?? Please limit your blitherinthe g-file, remove it and rerun the get command. -5 "nonexistent sid" The specified sid does not exist in the given file. Check  repeats, notify your Source Code Administrator or PWB/UNIX Project Administrator for further assistence. 1. e `adm is used to lock and unlock releases. -20 "curdir failed" Re-check what you did. Re-try the command. If the problem persists, care attempting to remove a delta which is not the newest (most recent) delta in its branch of the delta tree. Only the latest mags in arguments to less than fifty (50) characters. tact your local UNIX administrator. -22 "r out of range" The release numberfor typos. -9 "... already included" You mentioned the same delta twice with an -i and/or an -x argument. -10 "... already excluusr/lib/help/rc 644 152 2 ontact your local UNIX administrator. -21 "cannot change directory" If you know the directory name, then check to see if it exisy be removed. -6 "MRs not allowed" Chghist has determined that MR numbers cannot be specified for the SCCS file since the file d specified with the -r keyletter is out of range. This means the number was greater than 9999 or less than 1. e `adm ded" You mentioned the same delta twice with an -x and/or an -i argument. -11 "internal error in get/enter()" ``Lasciate ogni sp 4325 3142671160 6721 ts. Re-try the command. If the problem persists, contact your local UNIX administrator. -22 "r out of range" The release numberoes not have a 'v' flag. -7 "invalid MRs" One of the MR numbers you entered in response to a prompt by cdc is invalid, as determusr/lib/help/prs 644 152 2 eranza, voi ch'entrate'' This shouldn't have happened!! Do a "help stuck". -17 "being edited: `...'" You can't do a get with an  specified with the -r keyletter is out of range. This means the number was greater than 9999 or less than 1. e `admin' command ined by the validation program specified in the 'v' flag of the SCCS file. -8 "MRs required" Chghist has determined that MR numb 752 3142671160 7101 -e argument because someone else already did and hasn't made a delta yet. If that someone else is really you, you can regeneratusr/lib/help/he 644 152 2 ers are required for the SCCS file it is processing (the file has a 'v' flag), but none were supplied. -9 "delta specified has de a new file to be edited, if necessary, by using the -k argument. If you want to cancel the reservation entirely, see your SCC* * Messages for SCCS rmdel-cdc commands. * -1 "missing r" You did not specify the 'r' keyletter when you invoked rmdel or cdc.  465 3142671160 6672 elivered MR" The delta your are processing with 'rmdel' or 'cdc' contains an MR number entry which has been marked 'delivered'. S administrator, and tell him/her you want the p-file edited. The data in quotes is from the p-file. -18 "being edited: `...'" This argument is always required. -2 "file ... does not exist" You named a file to be processed and it does not exist. -3 "nonexYou cannot rmdel or cdc such a delta, as that would be in violation of a Change Management Prime Directive. See your SCCS admini* * Diagnostic messages for the 'prs' command * -1 "nonexistent sid" You specified an SID, via the r keyletter, which is not an Someone else has done a get with an -e argument. This can't hurt what you're doing, but isn't it nice to know that someone else istent sid" You specified an SID, via the r keyletter, which is not an SID of the SCCS file. -4 "you are neither owner nor ..." G0 ( ) *!+",#-$.%/ &0 'strator for further information. -10 "bad invocation" You invoked 'rmdel' or 'cdc' by some name other than (n)rmdel or (n)cdc (y...' unwritable" The file exists, but the effective user doesn't have write permission. It is also possible that one or more dirr (a program bug can also generate this error). (If required, a core dump will be produced if the file "dump.core" exists in thusr/lib/help/ut 644 152 2 ou have a link to it). The program's execution depends on being invoked by one of these names only. -11 "r has no sid" You speciectories in the path aren't executable. -7 "`...' unreadable or unwritable" The file exists, but the effective user either doesne current directory.) NAL: ..." This error is most likely due to an intermittent hardware error. You should report this to your  4026 3142671160 6743 fied the 'r' keyletter but did not specify the SID of the delta to be processed. Both are required. -12 "being edited -- sid is 't have read permission, or write permission, or both. It is also possible that one or more directories in the path aren't execu* * Messages for unget and sact. * -1 "SID must be specified ..." You have two or more entries in the p-file (by executing _g_local UNIX support group immediately, since others may be getting the same error and it is useful to discover a pattern if one ein p-file" Someone is in the process of making a delta based upon the same delta (sid) you specified with the 'r' keyletter. Thitable. -8 "write error" The file which caused the write error is as large as a file can be (currently 1M bytes). -9 "out of space_t -_e more than once for the same SCCS file). You must use the -_r keyletter and specify the SID for the new delta you no xists. After reporting it, if you rerun the command it will probably not recur. If it won't go away contact your PWB counsellos is indicated by the presence of the specified sid in an entry of the p-file for the named SCCS file. Removal of the delta spece" There's no more dynamic memory left. Better go to "help stuck". -10 "no space!" The file system (on which the file which causlonger wish to make. -2 "login name not in p-file ..." You have not done a get for editing of the named SCCS file. -3 "specifiedr (a program bug can also generate this error). (If required, a core dump will be produced if the file "dump.core" exists in th* * Messages for PWB utilities. * -1 "directory `...' nonexistent" -2 "directory `...' unwritable" The effective user (probably ified is prohibited because its removal would interfere with other work in progress. se names only. -11 "r has no sid" You specied the error is being written) is out of space. Very serious!! Contact someone in your local UNIX Support Group immediately! A SID not in p-file ..." You have specified a SID using the -r keyletter which is either not in the p-file at all or is in the p-usr/lib/help/vc 644 152 2 you) doesn't have write permission in the directory. Do a "ls -ld ..." to check the modes. -3 "no file" The system's table of ofied the 'r' keyletter but did not specify the SID of the delta to be processed. Both are required. -12 "being edited -- sid is lso, if you can remove any files please do so. -11 "errno = ..., function = `...'" An unusual and unexpected error occured. Try file but is not associated with your logname. be specified ..." You have two or more entries in the p-file (by executing _g_ 4561 3142671160 6727 pen files is full, and temporarily no more opens can be accepted. If this error recurs, report it to your local UNIX support groin p-file" Someone is in the process of making a delta based upon the same delta (sid) you specified with the 'r' keyletter. Thi"help stuck". -12 "SIGNAL: ..." This error is most likely due to an intermittent hardware error. You should report this to your e_t -_e more than once for the same SCCS file). You must use the -_r keyletter and specify the SID for the new delta you no up. -4 "`...' nonexistent" The file does not exist. Check for typos. -5 "`...' unreadable" The file probably exists, but the efusr/lib/help/un 644 152 2 local UNIX support group immediately, since others may be getting the same error and it is useful to discover a pattern if one elonger wish to make. -2 "login name not in p-file ..." You have not done a get for editing of the named SCCS file. -3 "specifiedfective user doesn't have read permission. It is also possible that one or more directories in the path aren't executable. -6 "` 1057 3142671160 6736 xists. After reporting it, if you rerun the command it will probably not recur. If it won't go away contact your PWB counsello SID not in p-file ..." You have specified a SID using the -r keyletter which is either not in the p-file at all or is in the p-H0 ( ) *!+",#-$.%/ &0 '* * Messages for the vc command. * -1 "unknown command on line ..." The line given begins with a control character, but the comm no matching right parenthesis or a parenthesis was found where it was not expected. -12 "invalid operator on line ..." An unrecand is not a legal one. -2 "`...' never used" The given keyword name was never used in any replacements. This is only a warning.ognized operator was found. The legal operators are `!=', `=', `<', and `>'. -14 "non-numerical value on line ..." On the indica -3 "`...' never declared" The given keyword name never occured in a `dcl' statement. If you did declare it, check for typos. Thted line an attempt was made to compare a string which contains non-numeric characters with another string using the `<' or `>'is is only a warning. -4 "`If' with no matching `end'" There is a missing `end' statement, or an extra `if' statement. -5 "`...' operator. -15 "err statement on line ..." The user has put an `err' statement on the given line. -16 "out of space [line ...]"  declared twice on line ..." The named keyword has been redeclared on the indicated line. -6 "out of space" A maximum of 40 keyThe indicated line requires too many replacements. Currently, only 32 replacements per line are allowed. -17 "syntax on line ...words per invocation of vc are allowed. This limit has been exceeded. -7 "unmatched `:' on line ..." On the given line there is " The equal sign has been left out of an `asg' statement, or the right side of an `asg' statement is missing. -18 "syntax on linno control character to indicate the end of the keyword name. -8 "keyword name too long on line ..." On the indicated line a kee ..." The syntax for the `if' statement on the indicated line is incorrect. An `&' or an `|' occurred in the wrong place, or weyword name exceeds nine characters. -9 "invalid keyword name on line ..." On the indicated line the keyword name does not start re not found when they were expected. -19 "syntax on line ..." There is something strange about the indicated line. -20 "`...' nwith an alphabetic character, or does not contain only alphanumeric characters. -10 "`end' without matching `if' on line ..." Thever assigned a value" The given keyword name was never used in an assignment statement. This is only a warning. tax on line ...ere is an extra `end' statement or a missing `if' statement. -11 "parenthesis error on line ..." A left parenthesis occured with" The equal sign has been left out of an `asg' statement, or the right side of an `asg' statement is missing. -18 "syntax on linI0 ( ) *!+",#-$.%/ &0 'J0 ( ) *!+",#-$.%/ &0 'K0 ( ) *!+",#-$.%/ &0 'L0 ( ) *!+",#-$.%/ &0 '