Deleted Added
full compact
xstr.1 (79755) xstr.1 (95124)
1.\" Copyright (c) 1980, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.
9.\" 2. Redistributions in binary form must reproduce the above copyright
10.\" notice, this list of conditions and the following disclaimer in the
11.\" documentation and/or other materials provided with the distribution.
12.\" 3. All advertising materials mentioning features or use of this software
13.\" must display the following acknowledgement:
14.\" This product includes software developed by the University of
15.\" California, Berkeley and its contributors.
16.\" 4. Neither the name of the University nor the names of its contributors
17.\" may be used to endorse or promote products derived from this software
18.\" without specific prior written permission.
19.\"
20.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)xstr.1 8.2 (Berkeley) 12/30/93
1.\" Copyright (c) 1980, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.
9.\" 2. Redistributions in binary form must reproduce the above copyright
10.\" notice, this list of conditions and the following disclaimer in the
11.\" documentation and/or other materials provided with the distribution.
12.\" 3. All advertising materials mentioning features or use of this software
13.\" must display the following acknowledgement:
14.\" This product includes software developed by the University of
15.\" California, Berkeley and its contributors.
16.\" 4. Neither the name of the University nor the names of its contributors
17.\" may be used to endorse or promote products derived from this software
18.\" without specific prior written permission.
19.\"
20.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)xstr.1 8.2 (Berkeley) 12/30/93
33.\" $FreeBSD: head/usr.bin/xstr/xstr.1 79755 2001-07-15 08:06:20Z dd $
33.\" $FreeBSD: head/usr.bin/xstr/xstr.1 95124 2002-04-20 12:18:28Z charnier $
34.\"
35.Dd December 30, 1993
36.Dt XSTR 1
37.Os
38.Sh NAME
39.Nm xstr
40.Nd "extract strings from C programs to implement shared strings"
41.Sh SYNOPSIS
42.Nm
43.Op Fl c
44.Op Fl
45.Op Fl v
46.Op Ar file
47.Sh DESCRIPTION
34.\"
35.Dd December 30, 1993
36.Dt XSTR 1
37.Os
38.Sh NAME
39.Nm xstr
40.Nd "extract strings from C programs to implement shared strings"
41.Sh SYNOPSIS
42.Nm
43.Op Fl c
44.Op Fl
45.Op Fl v
46.Op Ar file
47.Sh DESCRIPTION
48.Nm Xstr
49maintains a file
48The
49.Nm
50utility maintains a file
50.Pa strings
51into which strings in component parts of a large program are hashed.
52These strings are replaced with references to this common area.
53This serves to implement shared constant strings, most useful if they
54are also read-only.
55.Pp
56Available options:
57.Bl -tag -width Ds
58.It Fl
51.Pa strings
52into which strings in component parts of a large program are hashed.
53These strings are replaced with references to this common area.
54This serves to implement shared constant strings, most useful if they
55are also read-only.
56.Pp
57Available options:
58.Bl -tag -width Ds
59.It Fl
59.Nm Xstr
60reads from the standard input.
60Read from the standard input.
61.It Fl c
61.It Fl c
62.Nm Xstr
63will extract the strings from the C source
62Extract the strings from the C source
64.Ar file
65or the standard input
66.Pq Fl ,
67replacing
68string references by expressions of the form (&xstr[number])
69for some number.
70An appropriate declaration of
71.Nm
72is prepended to the file.
73The resulting C text is placed in the file
74.Pa x.c ,
75to then be compiled.
76The strings from this file are placed in the
77.Pa strings
78data base if they are not there already.
79Repeated strings and strings which are suffixes of existing strings
80do not cause changes to the data base.
81.It Fl v
82Verbose mode.
83.El
84.Pp
85After all components of a large program have been compiled a file
86.Pa xs.c
87declaring the common
88.Nm
89space can be created by a command of the form
90.Bd -literal -offset indent
91xstr
92.Ed
93.Pp
94The file
95.Pa xs.c
96should then be compiled and loaded with the rest
97of the program.
98If possible, the array can be made read-only (shared) saving
99space and swap overhead.
100.Pp
63.Ar file
64or the standard input
65.Pq Fl ,
66replacing
67string references by expressions of the form (&xstr[number])
68for some number.
69An appropriate declaration of
70.Nm
71is prepended to the file.
72The resulting C text is placed in the file
73.Pa x.c ,
74to then be compiled.
75The strings from this file are placed in the
76.Pa strings
77data base if they are not there already.
78Repeated strings and strings which are suffixes of existing strings
79do not cause changes to the data base.
80.It Fl v
81Verbose mode.
82.El
83.Pp
84After all components of a large program have been compiled a file
85.Pa xs.c
86declaring the common
87.Nm
88space can be created by a command of the form
89.Bd -literal -offset indent
90xstr
91.Ed
92.Pp
93The file
94.Pa xs.c
95should then be compiled and loaded with the rest
96of the program.
97If possible, the array can be made read-only (shared) saving
98space and swap overhead.
99.Pp
101.Nm Xstr
102can also be used on a single file.
100The
101.Nm
102utility can also be used on a single file.
103A command
104.Bd -literal -offset indent
105xstr name
106.Ed
107.Pp
108creates files
109.Pa x.c
110and
111.Pa xs.c
112as before, without using or affecting any
113.Pa strings
114file in the same directory.
115.Pp
116It may be useful to run
117.Nm
118after the C preprocessor if any macro definitions yield strings
119or if there is conditional code which contains strings
120which may not, in fact, be needed.
121An appropriate command sequence for running
122.Nm
123after the C preprocessor is:
124.Pp
125.Bd -literal -offset indent -compact
126cc \-E name.c | xstr \-c \-
127cc \-c x.c
128mv x.o name.o
129.Ed
130.Pp
103A command
104.Bd -literal -offset indent
105xstr name
106.Ed
107.Pp
108creates files
109.Pa x.c
110and
111.Pa xs.c
112as before, without using or affecting any
113.Pa strings
114file in the same directory.
115.Pp
116It may be useful to run
117.Nm
118after the C preprocessor if any macro definitions yield strings
119or if there is conditional code which contains strings
120which may not, in fact, be needed.
121An appropriate command sequence for running
122.Nm
123after the C preprocessor is:
124.Pp
125.Bd -literal -offset indent -compact
126cc \-E name.c | xstr \-c \-
127cc \-c x.c
128mv x.o name.o
129.Ed
130.Pp
131.Nm Xstr
132does not touch the file
131The
132.Nm
133utility does not touch the file
133.Pa strings
134unless new items are added, thus
135.Xr make 1
136can avoid remaking
137.Pa xs.o
138unless truly necessary.
139.Sh FILES
140.Bl -tag -width /tmp/xsxx* -compact
141.It Pa strings
142Data base of strings
143.It Pa x.c
144Massaged C source
145.It Pa xs.c
146C source for definition of array `xstr'
147.It Pa /tmp/xs*
148Temp file when `xstr name' doesn't touch
149.Pa strings
150.El
151.Sh SEE ALSO
152.Xr mkstr 1
153.Sh BUGS
154If a string is a suffix of another string in the data base,
155but the shorter string is seen first by
156.Nm
157both strings will be placed in the data base, when just
158placing the longer one there will do.
159.Sh HISTORY
160The
161.Nm
162command appeared in
163.Bx 3.0 .
134.Pa strings
135unless new items are added, thus
136.Xr make 1
137can avoid remaking
138.Pa xs.o
139unless truly necessary.
140.Sh FILES
141.Bl -tag -width /tmp/xsxx* -compact
142.It Pa strings
143Data base of strings
144.It Pa x.c
145Massaged C source
146.It Pa xs.c
147C source for definition of array `xstr'
148.It Pa /tmp/xs*
149Temp file when `xstr name' doesn't touch
150.Pa strings
151.El
152.Sh SEE ALSO
153.Xr mkstr 1
154.Sh BUGS
155If a string is a suffix of another string in the data base,
156but the shorter string is seen first by
157.Nm
158both strings will be placed in the data base, when just
159placing the longer one there will do.
160.Sh HISTORY
161The
162.Nm
163command appeared in
164.Bx 3.0 .