1.\" $NetBSD: ypmatch.1,v 1.18 2012/03/04 11:54:57 wiz Exp $ 2.\" 3.\" Copyright (c) 1993 Winning Strategies, Inc. 4.\" All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: 9.\" 1. Redistributions of source code must retain the above copyright 10.\" notice, this list of conditions and the following disclaimer. 11.\" 2. Redistributions in binary form must reproduce the above copyright 12.\" notice, this list of conditions and the following disclaimer in the 13.\" documentation and/or other materials provided with the distribution. 14.\" 3. All advertising materials mentioning features or use of this software 15.\" must display the following acknowledgement: 16.\" This product includes software developed by Winning Strategies, Inc. 17.\" 4. The name of the author may not be used to endorse or promote products 18.\" derived from this software without specific prior written permission 19.\" 20.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 21.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 22.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 23.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 24.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 25.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 26.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 27.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 28.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 29.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 30.\" 31.Dd March 2, 2012 32.Dt YPMATCH 1 33.Os 34.Sh NAME 35.Nm ypmatch 36.Nd print the values of one or more keys in a NIS database 37.Sh SYNOPSIS 38.Nm 39.Op Fl ktz 40.Op Fl b Ar num_retry 41.Op Fl d Ar domainname 42.Ar key ... 43.Ar mapname 44.Nm 45.Fl x 46.Sh DESCRIPTION 47.Nm 48prints out the values of one or more keys from the 49.Tn NIS 50database specified by 51.Ar mapname , 52which may be a map name or a map nickname. 53.Pp 54The options are as follows: 55.Bl -tag -width indent 56.It Fl b Ar num_retry 57Do not wait infinite time for the ypserver to come up. 58Retry only the specified number of times. 59See 60.Xr yp_setbindtries 3 61for explanation. 62The valid range is limited from 0 to 65535 by this program. 63.It Fl d Ar domainname 64Specify a domain other than the default domain. 65.It Fl k 66Print the map key followed by a colon, before printing key value. 67This option is useful with maps in which the values are null or the key 68is not part of the value. 69.It Fl t 70Inhibit translation of map nicknames 71to their corresponding map names. 72.It Fl x 73Display the map nickname table, found in 74.Pa /var/yp/nicknames . 75A built-in default translation table is used if 76.Pa /var/yp/nicknames 77does not exist (see 78.Xr nicknames 5 79for details). 80.It Fl z 81Append a NUL character at the end of the key when doing the lookup. 82This is useful for mail.aliases maps, which include a trailing NUL in 83the keys. 84.El 85.Sh SEE ALSO 86.Xr domainname 1 , 87.Xr ypcat 1 , 88.Xr ypwhich 1 , 89.Xr yp_setbindtries 3 , 90.Xr nicknames 5 , 91.Xr nis 8 , 92.Xr ypbind 8 , 93.Xr yppoll 8 , 94.Xr ypset 8 95.Sh AUTHORS 96.An Theo De Raadt 97.An Greywolf 98