Your browser does not allow storing cookies. We recommend enabling them.

PreviousNextUp[Front page] [Index]

Escaped Tokens for Regex Syntax Egrep

  • \0n..n

    The literal byte with octal value n..n.

  • \0

    The NULL byte.

  • \[1-9]..x

    The literal byte with decimal value [1-9]..x.

  • \xn..n or \0xn..n

    The literal byte with hexadecimal value n..n.

  • \<

    Match the empty string at the beginning of a word.

  • \>

    Match the empty string at the end of a word.

  • \b

    Match the empty string at a word boundary.

  • \B

    Match the empty string provided it is not at a word boundary.

  • \w

    Match a word-constituent character, equivalent to [a:zA:Z0:9-].

  • \W

    Match a non-word-constituent character.

  • \a

    Literal alarm character.

  • \e

    Literal escape character.

  • \f

    Literal line feed.

  • \n

    Literal new line, equivalent to C's \n so it can be more than one character long.

  • \r

    Literal carriage return.

  • \t

    Literal tab.

All other escaped characters denote the literal character itself.

PreviousNextUp[Front page] [Index]




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now