O'Reilly logo

Mac OS X Tiger in a Nutshell by Jason McIntosh, Chuck Toporek, Chris Stone, Andy Lester

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Name

ntptimeset

Synopsis

ntptimeset [-l] [-d]... [-v] [-s] [-c filename] [-u] [-S integer] [-V integer]
[-t timeout] [-H] [-a key_id] [-e delay]

Synchronizes the system clock in a manner similar to ntpdate, but in a way that attempts to compensate for current, possibly degraded, network conditions.

Options

-a

Enable secure authentication with the key specified by the given identifier.

-c

Specify the location of the configuration file. Defaults to /etc/ntp.conf.

-d

Enable debugging output.

-e

Specify the delay, in seconds, caused by authentication. Normally this is negligible.

-H

Simulate poor network conditions by dropping a proportion of network packets.

-l

Enable logging to syslog.

-s

Set the system clock. Otherwise, ntptimeset merely reports the clock's offset.

-S

Specify a minimum number of servers that must respond. Defaults to 3.

-t

Specify the time, in seconds, spent waiting for a server response. Defaults to 1.

-u

Use an unprivileged client port.

-v

Enable verbose output.

-V

Specify a minimum number of servers that must respond with a valid time. Defaults to 1.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required