apply.1 (348238dbd42306d9fb5d89ab393b840572cfeb0f) | apply.1 (1578c22e92c5d2b7e09d64127665539a92359af5) |
---|---|
1.\" Copyright (c) 1983, 1990, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 14 unchanged lines hidden (view full) --- 23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26.\" SUCH DAMAGE. 27.\" 28.\" @(#)apply.1 8.2 (Berkeley) 4/4/94 29.\" $FreeBSD$ 30.\" | 1.\" Copyright (c) 1983, 1990, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 14 unchanged lines hidden (view full) --- 23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26.\" SUCH DAMAGE. 27.\" 28.\" @(#)apply.1 8.2 (Berkeley) 4/4/94 29.\" $FreeBSD$ 30.\" |
31.Dd December 13, 2006 | 31.Dd January 28, 2022 |
32.Dt APPLY 1 33.Os 34.Sh NAME 35.Nm apply 36.Nd apply a command to a set of arguments 37.Sh SYNOPSIS 38.Nm 39.Op Fl a Ar c 40.Op Fl d | 32.Dt APPLY 1 33.Os 34.Sh NAME 35.Nm apply 36.Nd apply a command to a set of arguments 37.Sh SYNOPSIS 38.Nm 39.Op Fl a Ar c 40.Op Fl d |
41.Op Fl # | 41.Op Cm - Ns Ar # |
42.Ar command argument ... 43.Sh DESCRIPTION 44The 45.Nm 46utility runs the named 47.Ar command 48on each 49argument --- 11 unchanged lines hidden (view full) --- 61following unused 62.Ar argument . 63In this case, the largest digit number of arguments are discarded for 64each execution of 65.Ar command . 66.Pp 67The options are as follows: 68.Bl -tag -width indent | 42.Ar command argument ... 43.Sh DESCRIPTION 44The 45.Nm 46utility runs the named 47.Ar command 48on each 49argument --- 11 unchanged lines hidden (view full) --- 61following unused 62.Ar argument . 63In this case, the largest digit number of arguments are discarded for 64each execution of 65.Ar command . 66.Pp 67The options are as follows: 68.Bl -tag -width indent |
69.It Fl # | 69.It Cm - Ns Ar # |
70Normally arguments are taken singly; the optional number | 70Normally arguments are taken singly; the optional number |
71.Fl # | 71.Ar # |
72specifies the number of arguments to be passed to 73.Ar command . 74If the number is zero, 75.Ar command 76is run, without arguments, once for each 77.Ar argument . 78.Pp 79If any sequences of --- 61 unchanged lines hidden --- | 72specifies the number of arguments to be passed to 73.Ar command . 74If the number is zero, 75.Ar command 76is run, without arguments, once for each 77.Ar argument . 78.Pp 79If any sequences of --- 61 unchanged lines hidden --- |