1*93d36fc9SDavid van Moolenbroek.\" $NetBSD: rcp.1,v 1.22 2012/03/22 07:58:17 wiz Exp $ 2*93d36fc9SDavid van Moolenbroek.\" 3*93d36fc9SDavid van Moolenbroek.\" Copyright (c) 1983, 1990, 1993 4*93d36fc9SDavid van Moolenbroek.\" The Regents of the University of California. All rights reserved. 5*93d36fc9SDavid van Moolenbroek.\" 6*93d36fc9SDavid van Moolenbroek.\" Redistribution and use in source and binary forms, with or without 7*93d36fc9SDavid van Moolenbroek.\" modification, are permitted provided that the following conditions 8*93d36fc9SDavid van Moolenbroek.\" are met: 9*93d36fc9SDavid van Moolenbroek.\" 1. Redistributions of source code must retain the above copyright 10*93d36fc9SDavid van Moolenbroek.\" notice, this list of conditions and the following disclaimer. 11*93d36fc9SDavid van Moolenbroek.\" 2. Redistributions in binary form must reproduce the above copyright 12*93d36fc9SDavid van Moolenbroek.\" notice, this list of conditions and the following disclaimer in the 13*93d36fc9SDavid van Moolenbroek.\" documentation and/or other materials provided with the distribution. 14*93d36fc9SDavid van Moolenbroek.\" 3. Neither the name of the University nor the names of its contributors 15*93d36fc9SDavid van Moolenbroek.\" may be used to endorse or promote products derived from this software 16*93d36fc9SDavid van Moolenbroek.\" without specific prior written permission. 17*93d36fc9SDavid van Moolenbroek.\" 18*93d36fc9SDavid van Moolenbroek.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 19*93d36fc9SDavid van Moolenbroek.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 20*93d36fc9SDavid van Moolenbroek.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 21*93d36fc9SDavid van Moolenbroek.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 22*93d36fc9SDavid van Moolenbroek.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 23*93d36fc9SDavid van Moolenbroek.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 24*93d36fc9SDavid van Moolenbroek.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 25*93d36fc9SDavid van Moolenbroek.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 26*93d36fc9SDavid van Moolenbroek.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 27*93d36fc9SDavid van Moolenbroek.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 28*93d36fc9SDavid van Moolenbroek.\" SUCH DAMAGE. 29*93d36fc9SDavid van Moolenbroek.\" 30*93d36fc9SDavid van Moolenbroek.\" @(#)rcp.1 8.1 (Berkeley) 5/31/93 31*93d36fc9SDavid van Moolenbroek.\" 32*93d36fc9SDavid van Moolenbroek.Dd March 8, 2005 33*93d36fc9SDavid van Moolenbroek.Dt RCP 1 34*93d36fc9SDavid van Moolenbroek.Os 35*93d36fc9SDavid van Moolenbroek.Sh NAME 36*93d36fc9SDavid van Moolenbroek.Nm rcp 37*93d36fc9SDavid van Moolenbroek.Nd remote file copy 38*93d36fc9SDavid van Moolenbroek.Sh SYNOPSIS 39*93d36fc9SDavid van Moolenbroek.Nm 40*93d36fc9SDavid van Moolenbroek.Op Fl 46p 41*93d36fc9SDavid van Moolenbroek.Ar file1 file2 42*93d36fc9SDavid van Moolenbroek.Nm 43*93d36fc9SDavid van Moolenbroek.Op Fl 46pr 44*93d36fc9SDavid van Moolenbroek.Ar file ... 45*93d36fc9SDavid van Moolenbroek.Ar directory 46*93d36fc9SDavid van Moolenbroek.Sh DESCRIPTION 47*93d36fc9SDavid van Moolenbroek.Nm 48*93d36fc9SDavid van Moolenbroekcopies files between machines. 49*93d36fc9SDavid van MoolenbroekEach 50*93d36fc9SDavid van Moolenbroek.Ar file 51*93d36fc9SDavid van Moolenbroekor 52*93d36fc9SDavid van Moolenbroek.Ar directory 53*93d36fc9SDavid van Moolenbroekargument is either a remote file name of the 54*93d36fc9SDavid van Moolenbroekform 55*93d36fc9SDavid van Moolenbroek.Dq rname@rhost:path , 56*93d36fc9SDavid van Moolenbroekor a local file name (containing no 57*93d36fc9SDavid van Moolenbroek.Sq \&: 58*93d36fc9SDavid van Moolenbroek(colon) characters, 59*93d36fc9SDavid van Moolenbroekor a 60*93d36fc9SDavid van Moolenbroek.Sq / 61*93d36fc9SDavid van Moolenbroek(slash) before any 62*93d36fc9SDavid van Moolenbroek.Sq \&: 63*93d36fc9SDavid van Moolenbroek(colon) characters). 64*93d36fc9SDavid van Moolenbroek.Pp 65*93d36fc9SDavid van MoolenbroekThe 66*93d36fc9SDavid van Moolenbroek.Ar rhost 67*93d36fc9SDavid van Moolenbroekcan be an IPv4 or an IPv6 address string. 68*93d36fc9SDavid van MoolenbroekSince IPv6 addresses already contain 69*93d36fc9SDavid van Moolenbroek.Sq \&: 70*93d36fc9SDavid van Moolenbroek(colon) characters, 71*93d36fc9SDavid van Moolenbroekan IPv6 address string must be enclosed between 72*93d36fc9SDavid van Moolenbroek.Sq \&[ 73*93d36fc9SDavid van Moolenbroek(left square bracket) and 74*93d36fc9SDavid van Moolenbroek.Sq \&] 75*93d36fc9SDavid van Moolenbroek(right square bracket) characters. 76*93d36fc9SDavid van MoolenbroekOtherwise, the first occurrence of a 77*93d36fc9SDavid van Moolenbroek.Sq \&: 78*93d36fc9SDavid van Moolenbroek(colon) character would be 79*93d36fc9SDavid van Moolenbroekinterpreted as the separator between the 80*93d36fc9SDavid van Moolenbroek.Ar rhost 81*93d36fc9SDavid van Moolenbroekand the 82*93d36fc9SDavid van Moolenbroek.Ar path . 83*93d36fc9SDavid van MoolenbroekFor example, 84*93d36fc9SDavid van Moolenbroek.Pp 85*93d36fc9SDavid van Moolenbroek.Dl [2001:DB8::800:200C:417A]:tmp/file 86*93d36fc9SDavid van Moolenbroek.Pp 87*93d36fc9SDavid van MoolenbroekOptions: 88*93d36fc9SDavid van Moolenbroek.Bl -tag -width flag 89*93d36fc9SDavid van Moolenbroek.It Fl 4 90*93d36fc9SDavid van MoolenbroekUse IPv4 addresses only. 91*93d36fc9SDavid van Moolenbroek.It Fl 6 92*93d36fc9SDavid van MoolenbroekUse IPv6 addresses only. 93*93d36fc9SDavid van Moolenbroek.It Fl p 94*93d36fc9SDavid van MoolenbroekThe 95*93d36fc9SDavid van Moolenbroek.Fl p 96*93d36fc9SDavid van Moolenbroekoption causes 97*93d36fc9SDavid van Moolenbroek.Nm 98*93d36fc9SDavid van Moolenbroekto attempt to preserve (duplicate) in its copies the modification 99*93d36fc9SDavid van Moolenbroektimes and modes of the source files, ignoring the 100*93d36fc9SDavid van Moolenbroek.Ar umask . 101*93d36fc9SDavid van MoolenbroekBy default, the mode and owner of 102*93d36fc9SDavid van Moolenbroek.Ar file2 103*93d36fc9SDavid van Moolenbroekare preserved if it already existed; otherwise the mode of the source file 104*93d36fc9SDavid van Moolenbroekmodified by the 105*93d36fc9SDavid van Moolenbroek.Xr umask 2 106*93d36fc9SDavid van Moolenbroekon the destination host is used. 107*93d36fc9SDavid van Moolenbroek.It Fl r 108*93d36fc9SDavid van MoolenbroekIf any of the source files are directories, 109*93d36fc9SDavid van Moolenbroek.Nm 110*93d36fc9SDavid van Moolenbroekcopies each subtree rooted at that name; in this case 111*93d36fc9SDavid van Moolenbroekthe destination must be a directory. 112*93d36fc9SDavid van Moolenbroek.El 113*93d36fc9SDavid van Moolenbroek.Pp 114*93d36fc9SDavid van MoolenbroekIf 115*93d36fc9SDavid van Moolenbroek.Ar path 116*93d36fc9SDavid van Moolenbroekis not a full path name, it is interpreted relative to 117*93d36fc9SDavid van Moolenbroekthe login directory of the specified user 118*93d36fc9SDavid van Moolenbroek.Ar ruser 119*93d36fc9SDavid van Moolenbroekon 120*93d36fc9SDavid van Moolenbroek.Ar rhost , 121*93d36fc9SDavid van Moolenbroekor your current user name if no other remote user name is specified. 122*93d36fc9SDavid van MoolenbroekA 123*93d36fc9SDavid van Moolenbroek.Ar path 124*93d36fc9SDavid van Moolenbroekon a remote host may be quoted (using \e, ", or \(aa) 125*93d36fc9SDavid van Moolenbroekso that the metacharacters are interpreted remotely. 126*93d36fc9SDavid van Moolenbroek.Pp 127*93d36fc9SDavid van Moolenbroek.Nm 128*93d36fc9SDavid van Moolenbroekdoes not prompt for passwords; it performs remote execution 129*93d36fc9SDavid van Moolenbroekvia 130*93d36fc9SDavid van Moolenbroek.Xr rsh 1 , 131*93d36fc9SDavid van Moolenbroekand requires the same authorization. 132*93d36fc9SDavid van Moolenbroek.Pp 133*93d36fc9SDavid van Moolenbroek.Nm 134*93d36fc9SDavid van Moolenbroekhandles third party copies, where neither source nor target files 135*93d36fc9SDavid van Moolenbroekare on the current machine. 136*93d36fc9SDavid van Moolenbroek.Sh SEE ALSO 137*93d36fc9SDavid van Moolenbroek.Xr cp 1 , 138*93d36fc9SDavid van Moolenbroek.Xr ftp 1 , 139*93d36fc9SDavid van Moolenbroek.Xr rcmd 1 , 140*93d36fc9SDavid van Moolenbroek.Xr rlogin 1 , 141*93d36fc9SDavid van Moolenbroek.Xr rsh 1 , 142*93d36fc9SDavid van Moolenbroek.Xr rcmd 3 , 143*93d36fc9SDavid van Moolenbroek.Xr hosts.equiv 5 , 144*93d36fc9SDavid van Moolenbroek.Xr rhosts 5 , 145*93d36fc9SDavid van Moolenbroek.Xr environ 7 146*93d36fc9SDavid van Moolenbroek.Sh HISTORY 147*93d36fc9SDavid van MoolenbroekThe 148*93d36fc9SDavid van Moolenbroek.Nm 149*93d36fc9SDavid van Moolenbroekutility appeared in 150*93d36fc9SDavid van Moolenbroek.Bx 4.2 . 151*93d36fc9SDavid van MoolenbroekThe version of 152*93d36fc9SDavid van Moolenbroek.Nm 153*93d36fc9SDavid van Moolenbroekdescribed here 154*93d36fc9SDavid van Moolenbroekhas been reimplemented with Kerberos in 155*93d36fc9SDavid van Moolenbroek.Bx 4.3 Reno . 156*93d36fc9SDavid van Moolenbroek.Sh BUGS 157*93d36fc9SDavid van MoolenbroekDoesn't detect all cases where the target of a copy might 158*93d36fc9SDavid van Moolenbroekbe a file in cases where only a directory should be legal. 159*93d36fc9SDavid van Moolenbroek.Pp 160*93d36fc9SDavid van MoolenbroekIs confused by any output generated by commands in a 161*93d36fc9SDavid van Moolenbroek.Pa \&.login , 162*93d36fc9SDavid van Moolenbroek.Pa \&.profile , 163*93d36fc9SDavid van Moolenbroekor 164*93d36fc9SDavid van Moolenbroek.Pa \&.cshrc 165*93d36fc9SDavid van Moolenbroekfile on the remote host. 166*93d36fc9SDavid van Moolenbroek.Pp 167*93d36fc9SDavid van MoolenbroekThe destination user and hostname may have to be specified as 168*93d36fc9SDavid van Moolenbroek.Dq rhost.rname 169*93d36fc9SDavid van Moolenbroekwhen the destination machine is running the 170*93d36fc9SDavid van Moolenbroek.Bx 4.2 171*93d36fc9SDavid van Moolenbroekversion of 172*93d36fc9SDavid van Moolenbroek.Nm . 173