1#!/bin/sh -
2
3#-
4# Copyright (c) 1991, 1993
5#	The Regents of the University of California.  All rights reserved.
6#
7# This code is derived from software contributed to Berkeley by
8# Kenneth Almquist.
9#
10# Redistribution and use in source and binary forms, with or without
11# modification, are permitted provided that the following conditions
12# are met:
13# 1. Redistributions of source code must retain the above copyright
14#    notice, this list of conditions and the following disclaimer.
15# 2. Redistributions in binary form must reproduce the above copyright
16#    notice, this list of conditions and the following disclaimer in the
17#    documentation and/or other materials provided with the distribution.
18# 3. Neither the name of the University nor the names of its contributors
19#    may be used to endorse or promote products derived from this software
20#    without specific prior written permission.
21#
22# THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25# ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32# SUCH DAMAGE.
33
34#
35# This file lists all the builtin commands.  The first column is the name
36# of a C routine.
37# The -j flag specifies that this command is to be excluded from systems
38# without job control.
39# The -n flag specifies that this command can safely be run in the same
40# process when it is the only command in a command substitution.  Some
41# commands have special logic defined in safe_builtin().
42# The -s flag specifies that this is a POSIX 'special built-in' command.
43# The rest of the line specifies the command name or names used to run the
44# command.  The entry for bltincmd, which is run when the user does not specify
45# a command, must come first.
46#
47# NOTE: bltincmd must come first!
48
49bltincmd -n	builtin
50aliascmd	alias
51bgcmd -j	bg
52bindcmd		bind
53breakcmd	-s break -s continue
54cdcmd		cd chdir
55commandcmd -n	command
56dotcmd		-s .
57echocmd -n	echo
58evalcmd		-s eval
59execcmd		-s exec
60exitcmd		-s exit
61letcmd		let
62exportcmd	-s export -s readonly
63#exprcmd		expr
64falsecmd -n	false
65fgcmd -j	fg
66freebsd_wordexpcmd	freebsd_wordexp
67getoptscmd	getopts
68hashcmd		hash
69histcmd		fc
70jobidcmd -n	jobid
71jobscmd -n	jobs
72killcmd -n	kill
73localcmd	local
74printfcmd -n	printf
75pwdcmd -n	pwd
76readcmd		read
77returncmd	-s return
78setcmd		-s set
79setvarcmd	setvar
80shiftcmd	-s shift
81testcmd -n	test [
82timescmd -n	-s times
83trapcmd		-s trap
84truecmd -n	-s : true
85typecmd -n	type
86ulimitcmd	ulimit
87umaskcmd	umask
88unaliascmd	unalias
89unsetcmd	-s unset
90waitcmd		wait
91wordexpcmd	wordexp
92