GNU Make-3.81 Manual

Total Page:16

File Type:pdf, Size:1020Kb

GNU Make-3.81 Manual GNU Make GNU Make A Program for Directing Recompilation GNU make Version 3.81 April 2006 Richard M. Stallman, Roland McGrath, Paul D. Smith This file documents the GNU make utility, which determines automatically which pieces of a large program need to be recompiled, and issues the commands to recompile them. This is Edition 0.70, last updated 1 April 2006, of The GNU Make Manual, for GNU make version 3.81. Copyright c 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2002, 2003, 2004, 2005, 2006 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, with the Front-Cover Texts being \A GNU Manual," and with the Back-Cover Texts as in (a) below. A copy of the license is included in the section entitled \GNU Free Documentation License." (a) The FSF's Back-Cover Text is: \You have freedom to copy and modify this GNU Manual, like GNU software. Copies published by the Free Software Foundation raise funds for GNU development." Published by the Free Software Foundation 51 Franklin St. { Fifth Floor Boston, MA 02110-1301 USA ISBN 1-882114-83-5 Cover art by Etienne Suvasa. i Short Contents 1 Overview of make :::::::::::::::::::::::::::::::::::::::::::::::::::: 1 2 An Introduction to Makefiles ::::::::::::::::::::::::::::::::::::::::::: 3 3 Writing Makefiles :::::::::::::::::::::::::::::::::::::::::::::::::::: 9 4 Writing Rules :::::::::::::::::::::::::::::::::::::::::::::::::::::: 19 5 Writing the Commands in Rules ::::::::::::::::::::::::::::::::::::::: 37 6 How to Use Variables :::::::::::::::::::::::::::::::::::::::::::::::: 51 7 Conditional Parts of Makefiles ::::::::::::::::::::::::::::::::::::::::: 63 8 Functions for Transforming Text ::::::::::::::::::::::::::::::::::::::: 67 9 How to Run make ::::::::::::::::::::::::::::::::::::::::::::::::::: 81 10 Using Implicit Rules ::::::::::::::::::::::::::::::::::::::::::::::::: 91 11 Using make to Update Archive Files ::::::::::::::::::::::::::::::::::: 107 12 Features of GNU make :::::::::::::::::::::::::::::::::::::::::::::: 111 13 Incompatibilities and Missing Features ::::::::::::::::::::::::::::::::: 115 14 Makefile Conventions ::::::::::::::::::::::::::::::::::::::::::::::: 117 A Quick Reference ::::::::::::::::::::::::::::::::::::::::::::::::::: 129 B Errors Generated by Make ::::::::::::::::::::::::::::::::::::::::::: 135 C Complex Makefile Example :::::::::::::::::::::::::::::::::::::::::: 139 D GNU Free Documentation License :::::::::::::::::::::::::::::::::::: 145 Index of Concepts ::::::::::::::::::::::::::::::::::::::::::::::::::::: 153 Index of Functions, Variables, & Directives ::::::::::::::::::::::::::::::::: 161 iii Table of Contents 1 Overview of make::::::::::::::::::::::::::::::::::::::::::::::: 1 1.1 How to Read This Manual ::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 1 1.2 Problems and Bugs :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 1 2 An Introduction to Makefiles ::::::::::::::::::::::::::::::::: 3 2.1 What a Rule Looks Like ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 3 2.2 A Simple Makefile ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 3 2.3 How make Processes a Makefile :::::::::::::::::::::::::::::::::::::::::::::::::::: 5 2.4 Variables Make Makefiles Simpler :::::::::::::::::::::::::::::::::::::::::::::::::: 5 2.5 Letting make Deduce the Commands ::::::::::::::::::::::::::::::::::::::::::::::: 6 2.6 Another Style of Makefile :::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 7 2.7 Rules for Cleaning the Directory ::::::::::::::::::::::::::::::::::::::::::::::::::: 7 3 Writing Makefiles:::::::::::::::::::::::::::::::::::::::::::::: 9 3.1 What Makefiles Contain ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 9 3.2 What Name to Give Your Makefile::::::::::::::::::::::::::::::::::::::::::::::::: 9 3.3 Including Other Makefiles :::::::::::::::::::::::::::::::::::::::::::::::::::::::: 10 3.4 The Variable MAKEFILES:::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 11 3.5 The Variable MAKEFILE_LIST ::::::::::::::::::::::::::::::::::::::::::::::::::::: 11 3.6 Other Special Variables::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 12 3.7 How Makefiles Are Remade::::::::::::::::::::::::::::::::::::::::::::::::::::::: 13 3.8 Overriding Part of Another Makefile :::::::::::::::::::::::::::::::::::::::::::::: 14 3.9 How make Reads a Makefile::::::::::::::::::::::::::::::::::::::::::::::::::::::: 15 3.10 Secondary Expansion:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 16 4 Writing Rules::::::::::::::::::::::::::::::::::::::::::::::::: 19 4.1 Rule Syntax :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 19 4.2 Types of Prerequisites :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 20 4.3 Using Wildcard Characters in File Names::::::::::::::::::::::::::::::::::::::::: 20 4.3.1 Wildcard Examples:::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 20 4.3.2 Pitfalls of Using Wildcards :::::::::::::::::::::::::::::::::::::::::::::::::: 21 4.3.3 The Function wildcard:::::::::::::::::::::::::::::::::::::::::::::::::::::: 21 4.4 Searching Directories for Prerequisites :::::::::::::::::::::::::::::::::::::::::::: 22 4.4.1 VPATH: Search Path for All Prerequisites ::::::::::::::::::::::::::::::::::::: 22 4.4.2 The vpath Directive ::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 23 4.4.3 How Directory Searches are Performed ::::::::::::::::::::::::::::::::::::::: 24 4.4.4 Writing Shell Commands with Directory Search :::::::::::::::::::::::::::::: 24 4.4.5 Directory Search and Implicit Rules:::::::::::::::::::::::::::::::::::::::::: 25 4.4.6 Directory Search for Link Libraries :::::::::::::::::::::::::::::::::::::::::: 25 4.5 Phony Targets ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 25 4.6 Rules without Commands or Prerequisites :::::::::::::::::::::::::::::::::::::::: 27 4.7 Empty Target Files to Record Events ::::::::::::::::::::::::::::::::::::::::::::: 28 4.8 Special Built-in Target Names :::::::::::::::::::::::::::::::::::::::::::::::::::: 28 4.9 Multiple Targets in a Rule:::::::::::::::::::::::::::::::::::::::::::::::::::::::: 30 4.10 Multiple Rules for One Target ::::::::::::::::::::::::::::::::::::::::::::::::::: 31 4.11 Static Pattern Rules::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 31 4.11.1 Syntax of Static Pattern Rules:::::::::::::::::::::::::::::::::::::::::::::: 32 iv GNU make 4.11.2 Static Pattern Rules versus Implicit Rules :::::::::::::::::::::::::::::::::: 33 4.12 Double-Colon Rules ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 33 4.13 Generating Prerequisites Automatically:::::::::::::::::::::::::::::::::::::::::: 34 5 Writing the Commands in Rules :::::::::::::::::::::::::::: 37 5.1 Command Syntax :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 37 5.1.1 Splitting Command Lines :::::::::::::::::::::::::::::::::::::::::::::::::::: 37 5.1.2 Using Variables in Commands ::::::::::::::::::::::::::::::::::::::::::::::: 39 5.2 Command Echoing ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 39 5.3 Command Execution ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 39 5.3.1 Choosing the Shell::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 40 5.4 Parallel Execution :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 41 5.5 Errors in Commands ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 42 5.6 Interrupting or Killing make :::::::::::::::::::::::::::::::::::::::::::::::::::::: 43 5.7 Recursive Use of make :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 43 5.7.1 How the MAKE Variable Works ::::::::::::::::::::::::::::::::::::::::::::::: 44 5.7.2 Communicating Variables to a Sub-make ::::::::::::::::::::::::::::::::::::: 44 5.7.3 Communicating Options to a Sub-make :::::::::::::::::::::::::::::::::::::: 46 5.7.4 The `--print-directory' Option ::::::::::::::::::::::::::::::::::::::::::: 47 5.8 Defining Canned Command Sequences :::::::::::::::::::::::::::::::::::::::::::: 47 5.9 Using Empty Commands ::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 48 6 How to Use Variables :::::::::::::::::::::::::::::::::::::::: 51 6.1 Basics of Variable References ::::::::::::::::::::::::::::::::::::::::::::::::::::: 51 6.2 The Two Flavors of Variables::::::::::::::::::::::::::::::::::::::::::::::::::::: 52 6.3 Advanced Features for Reference to Variables ::::::::::::::::::::::::::::::::::::: 53 6.3.1 Substitution References :::::::::::::::::::::::::::::::::::::::::::::::::::::: 54 6.3.2 Computed Variable Names::::::::::::::::::::::::::::::::::::::::::::::::::: 54 6.4 How Variables Get Their Values :::::::::::::::::::::::::::::::::::::::::::::::::: 56 6.5 Setting Variables ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 56 6.6 Appending More Text to Variables ::::::::::::::::::::::::::::::::::::::::::::::: 57 6.7 The override Directive :::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 58 6.8 Defining Variables Verbatim :::::::::::::::::::::::::::::::::::::::::::::::::::::: 59 6.9 Variables from the Environment :::::::::::::::::::::::::::::::::::::::::::::::::: 60 6.10 Target-specific Variable Values :::::::::::::::::::::::::::::::::::::::::::::::::: 60 6.11 Pattern-specific Variable Values :::::::::::::::::::::::::::::::::::::::::::::::::
Recommended publications
  • SQL Wildcard Operators
    SSQQLL -- WWIILLDDCCAARRDD OOPPEERRAATTOORRSS http://www.tutorialspoint.com/sql/sql-wildcards.htm Copyright © tutorialspoint.com We already have discussed SQL LIKE operator, which is used to compare a value to similar values using wildcard operators. SQL supports following two wildcard operators in conjunction with the LIKE operator: Wildcards Description The percent sign Matches one or more characters. Note that MS Access uses the asterisk ∗ wildcard character instead of the percent sign wildcard character. The underscore _ Matches one character. Note that MS Access uses a question mark ? instead of the underscore _ to match any one character. The percent sign represents zero, one, or multiple characters. The underscore represents a single number or character. The symbols can be used in combinations. Syntax: The basic syntax of '%' and '_' is as follows: SELECT FROM table_name WHERE column LIKE 'XXXX%' or SELECT FROM table_name WHERE column LIKE '%XXXX%' or SELECT FROM table_name WHERE column LIKE 'XXXX_' or SELECT FROM table_name WHERE column LIKE '_XXXX' or SELECT FROM table_name WHERE column LIKE '_XXXX_' You can combine N number of conditions using AND or OR operators. Here, XXXX could be any numeric or string value. Example: Here are number of examples showing WHERE part having different LIKE clause with '%' and '_' operators: Statement Description WHERE SALARY LIKE Finds any values that start with 200 '200%' WHERE SALARY LIKE Finds any values that have 200 in any position '%200%' WHERE SALARY LIKE Finds any values that have 00
    [Show full text]
  • Mastering Powershellpowershell
    CopyrightCopyright © 2009 BBS Technologies ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems except as permitted under Section 107 or 108 of the 1976 United States Copyright Act without the prior written permission of the publisher. For permission to use material from the text please contact Idera at [email protected]. Microsoft® Windows PowerShell® and Microsoft® SQL Server® are registered trademarks of Microsoft Corporation in the United Stated and other countries. All other trademarks are the property of their respective owners. AboutAbout thethe AuthorAuthor Dr. Tobias Weltner is one of the most visible PowerShell MVPs in Europe. He has published more than 80 books on Windows and Scripting Techniques with Microsoft Press and other publishers, is a regular speaker at conferences and road shows and does high level PowerShell and Scripting trainings for companies throughout Europe. He created the powershell.com website and community in an effort to help people adopt and use PowerShell more efficiently. As software architect, he created a number of award-winning scripting tools such as SystemScripter (VBScript), the original PowerShell IDE and PowerShell Plus, a comprehensive integrated PowerShell development system. AcknowledgmentsAcknowledgments First and foremost, I’d like to thank my family who is always a source of inspiration and encouragement. A special thanks to Idera, Rick Pleczko, David Fargo, Richard Giles, Conley Smith and David Twamley for helping to bring this book to the English speaking world.
    [Show full text]
  • Visual Basic 6.0 Internet Programming:Table of Contents
    To access the contents, click the chapter and section titles. Visual Basic 6.0 Internet Programming (Publisher: John Wiley & Sons, Inc.) Author(s): Carl Franklin ISBN: 0471314986 Publication Date: 02/01/99 Brief Full Advanced Search Search this book: Search Tips FOREWORD CHAPTER 1—THE INTERNET Attack of the Buzzwords! Protocols and Data Protocol Stacks and the OSI Model TCP/IP Names and Addresses Ports Name Resolution Sockets The TCP/IP Model CHAPTER 2—WINSOCK PROGRAMMING Introduction Why Not Use the Winsock API? Installing the Software Loading DSSOCK32.OCX into Visual Basic DSSOCK.BAS SocketConnect IsDotAddress ParseString Getting Started with dsSocket Making a Sockets Connection What’s Going On Here? SocketID and the Socket Property Closing the Connection Handling Multiple Connections on the Server Side Sending Data Receiving Data LineMode, EOLChar, and DataSize The Simple Approach A New Twist Splitting Up the Process with Flags A Slight Variation Event Driven = No Loops Which Approach Is Better? Error Handling Winsock Errors Error-Handling Techniques Minimal Error Trapping Debug.Print Error Trapping Message Dialog Reporting Error Log Reporting UDP—User Datagram Protocol Terminal—A Winsock Terminal Program Epilogue CHAPTER 3—SIMPLE PROTOCOLS Introduction NTP (Network Time Protocol) WHOIS FINGER SetTime Application Epilogue CHAPTER 4—USENET NEWS Introduction NNTP MessageIDs vs. Message Numbers NNTP Versions NNTP Commands Sample Conversation The WILDMAT Format Server Responses Usenet Article Format VB Programming Technique String Parsing
    [Show full text]
  • Regular Expressions
    APPENDIX A Regular Expressions This appendix explains regular expressions and how to use them in Cisco NX-OS software commands. It also provides details for composing regular expressions. This appendix has the following sections: • General Concepts About Regular Expressions • Cisco Regular Expression Pattern Matching Characters • Single-Character Patterns • Multiple-Character Patterns • Multipliers • Alternation • Anchoring • Parentheses for Recall • Regular Expression Examples • General Concepts About Regular Expressions A regular expression is entered as part of a command and is a pattern made up of symbols, letters, and numbers that represent an input string for matching (or sometimes not matching). Matching the string to the specified pattern is called pattern matching. Pattern matching either succeeds or fails. If a regular expression can match two different parts of an input string, it will match the earliest part first. Cisco configurations uses regular expression pattern matching in several implementations. The following is a list of some of these implementations: • BGP IP AS-path and X.29 access lists • Modem (or chat) and system scripts • X.25 route substitute destination feature • Protocol translation ruleset scripts • Cisco Regular Expression Pattern Matching Characters Table A-1 summarizes the basic Cisco regular expression characters and their functions. Cisco NX-OS Unicast Routing Command Reference, Release 4.0 OL-14973-01 A-1 Appendix A Regular Expressions Table A-1 Cisco Regular Expression Characters Regular Expression Character Function Examples . Matches any single character. 0.0 matches 0x0 and 020. For example, t..t matches strings such as test, text, and tart. \ Matches the character following the 172\.1\.. matches 172.1.10.10 but not backslash.
    [Show full text]
  • CLI Maintenance Guide
    ARX CLI Maintenance Guide 810-0045-00 Publication Date This manual was published on September 24, 2012. Legal Notices Copyright Copyright 2006-9/24/12, F5 Networks, Inc. All rights reserved. F5 Networks, Inc. (F5) believes the information it furnishes to be accurate and reliable. However, F5 assumes no responsibility for the use of this information, nor any infringement of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent, copyright, or other intellectual property right of F5 except as specifically described by applicable user licenses. F5 reserves the right to change specifications at any time without notice. Trademarks 3DNS, Access Policy Manager, Acopia, Acopia Networks, Advanced Client Authentication, Advanced Routing, APM, Application Security Manager, ARX, AskF5, ASM, BIG-IP, Cloud Extender, CloudFucious, Clustered Multiprocessing, CMP, COHESION, Data Manager, DevCentral, DevCentral [DESIGN], DSI, DNS Express, DSC, Edge Client, Edge Gateway, Edge Portal, ELEVATE, EM, Enterprise Manager, ENGAGE, F5, F5 [DESIGN], F5 Management Pack, F5 Networks, F5 World, Fast Application Proxy, Fast Cache, FirePass, Global Traffic Manager, GTM, GUARDIAN, IBR, Intelligent Browser Referencing, Intelligent Compression, IPv6 Gateway, iApps, iControl, iHealth, iQuery, iRules, iRules OnDemand, iSession, IT agility. Your way., L7 Rate Shaping, LC, Link Controller, Local Traffic Manager, LTM, Message Security Module, MSM, Netcelera, OneConnect, OpenBloX, OpenBloX [DESIGN],
    [Show full text]
  • Windows Powershell Best Practices Windows Powershell Best Practices
    Windows PowerShell Best Practices Windows PowerShell Best Practices Expert recommendations, pragmatically applied Automate system administration using Windows PowerShell best practices—and optimize your operational efficiency. With this About the Author practical guide, Windows PowerShell expert and instructor Ed Ed Wilson, MCSE, CISSP, is a well-known Wilson delivers field-tested tips, real-world examples, and candid scripting expert and author of “Hey Windows Scripting Guy!”—one of the most popular advice culled from administrators across a range of business and blogs on Microsoft TechNet. He’s written technical scenarios. If you’re an IT professional with Windows several books on Windows scripting PowerShell experience, this book is ideal. for Microsoft Press, including Windows PowerShell 2.0 Best Practices and Windows PowerShell Scripting Guide. Discover how to: PowerShell • Use Windows PowerShell to automate Active Directory tasks • Explore available WMI classes and methods with CIM cmdlets • Identify and track scripting opportunities to avoid duplication • Use functions to encapsulate business logic and reuse code • Design your script’s best input method and output destination • Test scripts by checking their syntax and performance • Choose the most suitable method for running remote commands • Manage software services with Desired State Configuration Wilson BEST PRACTICES microsoft.com/mspress ISBN 978-0-7356-6649-8 U.S.A. $59.99 55999 Canada $68.99 [Recommended] 9 780735 666498 Operating Systems/Windows Server Celebrating 30 years! Ed Wilson 666498_Win_PowerShell_Best_Practices.indd 1 4/11/14 10:30 AM Windows PowerShell Best Practices Ed Wilson 666498_book.indb 1 12/20/13 10:50 AM Published with the authorization of Microsoft Corporation by: O’Reilly Media, Inc.
    [Show full text]
  • Google Spreadsheets Wildcard Search
    Google Spreadsheets Wildcard Search Worthless and transeunt Forest never misshape stormily when Tim lops his ineptness. Wyatt still proportions hooly while awesome Benny liquidise that rhubarbs. French tenant his heatedness sop staringly or gelidly after Milton cribbing and crucifying offhand, inferential and chelate. Jul 0 200 Wildcard search time be used as placeholder for our sequence of. How we Use Wildcard Characters in Google Sheets Functions. List of Advanced Search Operators for SEO Cheat Sheet. 1 Specify the ready you will help for values with wildcard into deception Find. Using wildcard characters in searches Excel Microsoft Support. What truck the clock mesh on Facebook when searching a name? IF statement and boolean operators IBM Knowledge Center. You can also defend a formula to find outlook duplicate this in your spreadsheets. Using COUNTIF COUNTIFS in Google Sheets to Sort. Asterisk in most computer software the asterisk symbol as is translated as 'wildcard' As department name suggests wildcards are placeholders which day be replaced by any low or phrase. SEARCHB Docs Editors Help Google Support. VLOOKUP and Wildcards Excel University. How To improve Text Within Text control Excel FunctionFriday. Google sheets query multiple criteria. Google Sheets Importrange Error Loading Data. I am looking up use of same formula or variation of finish my sheets and do. Remove The moon Card bracket From The Asterisk. How urgent you use wildcards in knowing's IF Function with this method you plan easily. If you try to search for a regular expression cut it doesn't work reluctant to. What honor the asterisk do in Google Search Web Applications.
    [Show full text]
  • GNU Make-4.1 Manual
    GNU Make GNU Make A Program for Directing Recompilation GNU make Version 4.1 October 2014 Richard M. Stallman, Roland McGrath, Paul D. Smith This file documents the GNU make utility, which determines automatically which pieces of a large program need to be recompiled, and issues the commands to recompile them. This is Edition 0.73, last updated 5 October 2014, of The GNU Make Manual, for GNU make version 4.1. Copyright c 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, with the Front-Cover Texts being \A GNU Manual," and with the Back-Cover Texts as in (a) below. A copy of the license is included in the section entitled \GNU Free Documentation License." (a) The FSF's Back-Cover Text is: \You have the freedom to copy and modify this GNU manual. Buying copies from the FSF supports it in developing GNU and promoting software freedom." Published by the Free Software Foundation 51 Franklin St. { Fifth Floor Boston, MA 02110-1301 USA ISBN 1-882114-83-3 Cover art by Etienne Suvasa. i Short Contents 1 Overview of make :::::::::::::::::::::::::::::::::::::::::::::::::::: 1 2 An Introduction to Makefiles ::::::::::::::::::::::::::::::::::::::::::: 3 3 Writing Makefiles ::::::::::::::::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • Datalight ROM-DOS User's Guide
    Datalight ROM-DOS User’s Guide Created: April 2005 Datalight ROM-DOS User’s Guide Copyright © 1999-2005 by Datalight, Inc . Portions copyright © GpvNO 2005 All Rights Reserved. Datalight, Inc. assumes no liability for the use or misuse of this software. Liability for any warranties implied or stated is limited to the original purchaser only and to the recording medium (disk) only, not the information encoded on it. U.S. Government Restricted Rights. Use, duplication, reproduction, or transfer of this commercial product and accompanying documentation is restricted in accordance with FAR 12.212 and DFARS 227.7202 and by a license agreement. THE SOFTWARE DESCRIBED HEREIN, TOGETHER WITH THIS DOCUMENT, ARE FURNISHED UNDER A SEPARATE SOFTWARE OEM LICENSE AGREEMENT AND MAY BE USED OR COPIED ONLY IN ACCORDANCE WITH THE TERMS AND CONDITIONS OF THAT AGREEMENT. Datalight and ROM-DOS are registered trademarks of Datalight, Inc. FlashFX ® is a trademark of Datalight, Inc. All other product names are trademarks of their respective holders. Part Number: 3010-0200-0716 Contents Chapter 1, ROM-DOS Introduction..............................................................................................1 About ROM-DOS ......................................................................................................................1 Conventions Used in this Manual .......................................................................................1 Terminology Used in this Manual ......................................................................................1
    [Show full text]
  • Regular Expressions
    Regular Expressions Most text editing applications include Find and Replace features, although these can only replace a specific text string in the current document or selection by alternative text. For example, you could find every instance of the word cat and replace it by dog. Most software has a Match Entire Word option, preventing, for example the changing of catwalk to dogwalk. Some applications also accommodate a wildcard character, such as an * (asterisk). If you then search for c*t you’ll be able, for example, to replace both cot and cat by dog, should that be required. Unfortunately, things can get confused if the wildcard character itself is contained in the text. Other programs support the Global Regular Expression Parser (GREP), which accommodates a much greater manipulation of text. For example, if you have a database of names as tab-delimited text you can change their form from Mr. Fred James Bloggs to BLOGGS, FJ. A regular expression contains a search pattern of characters that’s compared with the target text, usually an entire document or the currently selected text. An appropriate replacement pattern is then applied. Expression Elements A regular expression is defined using combinations of the following:- Literal characters Each of these match the corresponding character in the text itself. All ASCII letters and numbers are in this category. So if you include the letter a in your regular expression it matches any occurance of a in the text. Metacharacters Each of these have special properties, allowing various kind of characters to be identified. Typically, they consist of punctuation characters and special character strings.
    [Show full text]
  • Manipulating Data with PROC SQL
    SUGI 30 Tutorials Paper 261-30 Manipulating Data with PROC SQL Kirk Paul Lafler, Software Intelligence Corporation ABSTRACT PROC SQL is a popular database language with numerous extensions for working with numeric and character data including an assortment of operators, functions, and predicates. This paper presents coding techniques that perform text case conversions, concatenation of two or more character strings, pattern and phonetic matching operations, updates to data in a table, and other useful coding techniques for SAS and PROC SQL users. INTRODUCTION PROC SQL provides numerous arithmetic, statistical, and summary functions to manipulate numeric data. With one numeric data type to represent numeric data, the NUMERIC or NUM column definition is automatically assigned a default length of 8 bytes, even if the column is created with a numeric length less than 8 bytes. PROC SQL also provides numerous functions and operators to manipulate character data including words, text, and codes using the CHARACTER or CHAR data type. The CHARACTER or CHAR data type allows ASCII or EBCDIC character sets and stores fixed-length character strings consisting of a maximum of 32K characters. The PROC SQL user has a vast array of functions and operators that can make the task of working with numeric and character data considerably easier. This paper will illustrate how columns based on the numeric and character data types are defined; how string functions, pattern matching, phonetic matching techniques, and a variety of other techniques are used with numeric and character data. DATA USED IN EXAMPLES The data used in all the examples in this paper consists of a selection of movies that I’ve viewed over the years.
    [Show full text]
  • GNU Make a Program for Directing Recompilation Edition 0.48, for Make Version 3.73 Beta
    GNU Make A Program for Directing Recompilation Edition 0.48, for make Version 3.73 Beta. April 1995 Richard M. Stallman and Roland McGrath Copyright c 1988, '89, '90, '91, '92, '93, '94, '95 Free Software Founda- tion, Inc. Published by the Free Software Foundation 675 Massachusetts Avenue, Cambridge, MA 02139 USA Printed copies are available for $20 each. ISBN 1-882114-50-7 Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modi®ed versions of this manual under the conditions for verbatim copying, provided that the en- tire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this manual into another language, under the above conditions for modi®ed versions, except that this permission notice may be stated in a translation ap- proved by the Free Software Foundation. Cover art by Etienne Suvasa. GNU Make 1 Overview of make ............................. 517 1.1 How to Read This Manual ............................. 517 1.2 Problems and Bugs .................................... 518 2 An Introduction to Make®les ............... 519 2.1 What a Rule Looks Like ............................... 519 2.2 A Simple Make®le ..................................... 520 2.3 How make Processes a Make®le ........................ 521 2.4 Variables Make Make®les Simpler ..................... 522 2.5 Letting make Deduce the Commands ................... 523 2.6 Another Style of Make®le .............................. 524 2.7 Rules for Cleaning the Directory ....................... 525 3 Writing Make®les ...........................
    [Show full text]