Deleted Added
full compact
touch.1 (230979) touch.1 (233648)
1.\" Copyright (c) 1991, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" This code is derived from software contributed to Berkeley by
5.\" the Institute of Electrical and Electronics Engineers, Inc.
6.\"
7.\" Redistribution and use in source and binary forms, with or without
8.\" modification, are permitted provided that the following conditions

--- 15 unchanged lines hidden (view full) ---

24.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29.\" SUCH DAMAGE.
30.\"
31.\" @(#)touch.1 8.3 (Berkeley) 4/28/95
1.\" Copyright (c) 1991, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" This code is derived from software contributed to Berkeley by
5.\" the Institute of Electrical and Electronics Engineers, Inc.
6.\"
7.\" Redistribution and use in source and binary forms, with or without
8.\" modification, are permitted provided that the following conditions

--- 15 unchanged lines hidden (view full) ---

24.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29.\" SUCH DAMAGE.
30.\"
31.\" @(#)touch.1 8.3 (Berkeley) 4/28/95
32.\" $FreeBSD: head/usr.bin/touch/touch.1 230979 2012-02-04 13:37:31Z jh $
32.\" $FreeBSD: head/usr.bin/touch/touch.1 233648 2012-03-29 05:02:12Z eadler $
33.\"
34.Dd February 4, 2012
35.Dt TOUCH 1
36.Os
37.Sh NAME
38.Nm touch
39.Nd change file access and modification times
40.Sh SYNOPSIS

--- 5 unchanged lines hidden (view full) ---

46.Ar
47.Sh DESCRIPTION
48The
49.Nm
50utility sets the modification and access times of files.
51If any file does not exist, it is created with default permissions.
52.Pp
53By default,
33.\"
34.Dd February 4, 2012
35.Dt TOUCH 1
36.Os
37.Sh NAME
38.Nm touch
39.Nd change file access and modification times
40.Sh SYNOPSIS

--- 5 unchanged lines hidden (view full) ---

46.Ar
47.Sh DESCRIPTION
48The
49.Nm
50utility sets the modification and access times of files.
51If any file does not exist, it is created with default permissions.
52.Pp
53By default,
54.Nm
54.Nm
55changes both modification and access times. The
56.Fl a
55changes both modification and access times. The
56.Fl a
57and
57and
58.Fl m
59flags may be used to select the access time or the modification time
60individually.
61Selecting both is equivalent to the default.
62By default, the timestamps are set to the current time.
58.Fl m
59flags may be used to select the access time or the modification time
60individually.
61Selecting both is equivalent to the default.
62By default, the timestamps are set to the current time.
63The
63The
64.Fl t
65flag explicitly specifies a different time, and the
66.Fl r
67flag specifies to set the times those of the specified file.
64.Fl t
65flag explicitly specifies a different time, and the
66.Fl r
67flag specifies to set the times those of the specified file.
68The
68The
69.Fl A
70flag adjusts the values by a specified amount.
71.Pp
72The following options are available:
73.Bl -tag -width Ds
69.Fl A
70flag adjusts the values by a specified amount.
71.Pp
72The following options are available:
73.Bl -tag -width Ds
74.It Fl A
74.It Fl A
75Adjust the access and modification time stamps for the file by the
76specified value.
77This flag is intended for use in modifying files with incorrectly set
78time stamps.
79.Pp
80The argument is of the form
81.Dq [-][[hh]mm]SS
82where each pair of letters represents the following:

--- 7 unchanged lines hidden (view full) ---

90.It Ar mm
91The number of minutes, from 00 to 59.
92.It Ar SS
93The number of seconds, from 00 to 59.
94.El
95.Pp
96The
97.Fl A
75Adjust the access and modification time stamps for the file by the
76specified value.
77This flag is intended for use in modifying files with incorrectly set
78time stamps.
79.Pp
80The argument is of the form
81.Dq [-][[hh]mm]SS
82where each pair of letters represents the following:

--- 7 unchanged lines hidden (view full) ---

90.It Ar mm
91The number of minutes, from 00 to 59.
92.It Ar SS
93The number of seconds, from 00 to 59.
94.El
95.Pp
96The
97.Fl A
98flag implies the
98flag implies the
99.Fl c
100flag: if any file specified does not exist, it will be silently ignored.
101.It Fl a
102Change the access time of the file.
103The modification time of the file is not changed unless the
104.Fl m
105flag is also specified.
106.It Fl c

--- 108 unchanged lines hidden ---
99.Fl c
100flag: if any file specified does not exist, it will be silently ignored.
101.It Fl a
102Change the access time of the file.
103The modification time of the file is not changed unless the
104.Fl m
105flag is also specified.
106.It Fl c

--- 108 unchanged lines hidden ---