mirror of
https://github.com/freebsd/freebsd-src
synced 2024-10-15 12:54:27 +00:00
Fix even more spelling errors in some more man pages.
This commit is contained in:
parent
62bdf2b7c6
commit
a5ed710ccd
Notes:
svn2git
2020-12-20 02:59:44 +00:00
svn path=/head/; revision=13750
|
@ -121,7 +121,7 @@ speaker device file
|
|||
If one of these variables is set to a locale ending in
|
||||
.Ql KOI8-R ,
|
||||
characters with the high-order bit set are being interpreted as
|
||||
cyrillic characters. In all other cases, they are being interpreted
|
||||
Cyrillic characters. In all other cases, they are being interpreted
|
||||
as belonging to the
|
||||
.Ql ISO_8859-1
|
||||
character set.
|
||||
|
|
|
@ -36,14 +36,14 @@
|
|||
.Os
|
||||
.Sh NAME
|
||||
.Nm caesar
|
||||
.Nd decrypt caesar cyphers
|
||||
.Nd decrypt caesar ciphers
|
||||
.Sh SYNOPSIS
|
||||
.Nm caesar
|
||||
.Op Ar rotation
|
||||
.Sh DESCRIPTION
|
||||
The
|
||||
.Nm caesar
|
||||
utility attempts to decrypt caesar cyphers using English letter frequency
|
||||
utility attempts to decrypt caesar ciphers using English letter frequency
|
||||
statistics.
|
||||
.Nm Caesar
|
||||
reads from the standard input and writes to the standard output.
|
||||
|
|
|
@ -5,7 +5,7 @@
|
|||
.\" this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp
|
||||
.\" ----------------------------------------------------------------------------
|
||||
.\"
|
||||
.\" $Id$
|
||||
.\" $Id: config_open.3,v 1.1 1994/11/13 20:47:44 phk Exp $
|
||||
.\"
|
||||
.Dd November 13, 1994
|
||||
.Dt config_open 3
|
||||
|
@ -35,7 +35,7 @@ is '#' are comments which are discarded.
|
|||
.It
|
||||
If continuation-lines are enabled, any line starting with a
|
||||
.Sq isspace()
|
||||
character is joined to the preceeding line and blank lines are discarded.
|
||||
character is joined to the preceding line and blank lines are discarded.
|
||||
.It
|
||||
An entry starts at the first
|
||||
.Sq !isspace()
|
||||
|
|
|
@ -151,7 +151,7 @@ returns the integer file descriptor associated with the named
|
|||
see
|
||||
.Xr open 2 .
|
||||
.Pp
|
||||
Sample code which searchs a directory for entry ``name'' is:
|
||||
Sample code which searches a directory for entry ``name'' is:
|
||||
.Bd -literal -offset indent
|
||||
len = strlen(name);
|
||||
dirp = opendir(".");
|
||||
|
|
|
@ -122,7 +122,7 @@ string has within BSD.
|
|||
.Sh BUGS
|
||||
The function
|
||||
.Fn getnetgrent
|
||||
returns pointers to dynamically allocated data areas that are free'd when
|
||||
returns pointers to dynamically allocated data areas that are freed when
|
||||
the function
|
||||
.Fn endnetgrent
|
||||
is called.
|
||||
|
|
|
@ -54,7 +54,7 @@ particular formula employed is
|
|||
r(n+1) = (a * r(n) + c) mod m
|
||||
where the default values are
|
||||
for the multiplicand a = 0xfdeece66d = 25214903917 and
|
||||
the addend c = 0xb = 11. The modul is always fixed at m = 2 ** 48.
|
||||
the addend c = 0xb = 11. The modulo is always fixed at m = 2 ** 48.
|
||||
r(n) is called the seed of the random number generator.
|
||||
.Pp
|
||||
For all the six generator routines described next, the first
|
||||
|
|
|
@ -151,7 +151,7 @@ in the local user's home directory is checked to see if the request for
|
|||
service is allowed.
|
||||
.Pp
|
||||
If this file does not exist, is not a regular file, is owned by anyone
|
||||
other than the user or the super-user, or is writeable by anyone other
|
||||
other than the user or the super-user, or is writable by anyone other
|
||||
than the owner, the check automatically fails.
|
||||
Zero is returned if the machine name is listed in the
|
||||
.Dq Pa hosts.equiv
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
.\" $Id$
|
||||
.\" $Id: catopen.3,v 1.1 1995/03/30 12:47:24 jkh Exp $
|
||||
.\"
|
||||
.\" Copyright (c) 1994 Winning Strategies, Inc.
|
||||
.\" All rights reserved.
|
||||
|
@ -70,7 +70,7 @@ is set to indicate the error.
|
|||
.Sh ERRORS
|
||||
.Bl -tag -width Er
|
||||
.It Bq Er ENOMEM
|
||||
Insufficient memory is availiable.
|
||||
Insufficient memory is available.
|
||||
.El
|
||||
.Sh SEE ALSO
|
||||
.Xr catclose 3 ,
|
||||
|
|
|
@ -808,7 +808,7 @@ A return value of zero means that the mapping does not exist
|
|||
or that
|
||||
the
|
||||
.SM RPC
|
||||
system failured to contact the remote
|
||||
system failed to contact the remote
|
||||
.B portmap
|
||||
service. In the latter case, the global variable
|
||||
.B rpc_createerr(\|)
|
||||
|
@ -1487,7 +1487,7 @@ This routine returns
|
|||
.SM NULL
|
||||
if it fails.
|
||||
.IP
|
||||
This allows the user to specify the maximun packet size for sending and
|
||||
This allows the user to specify the maximum packet size for sending and
|
||||
receiving
|
||||
.SM UDP\s0-based
|
||||
.SM RPC messages.
|
||||
|
|
|
@ -51,7 +51,7 @@ rstat: RPC: Port mapper failure - RPC: Timed out
|
|||
.IP
|
||||
The remote host is not running the portmapper (see
|
||||
.BR portmap(8c) ),
|
||||
and cannot accomodate any RPC-based services. The host may be down.
|
||||
and cannot accommodate any RPC-based services. The host may be down.
|
||||
.SH "SEE ALSO"
|
||||
.BR portmap (8c),
|
||||
.BR rstat_svc (8c)
|
||||
|
|
|
@ -48,7 +48,7 @@ The standard
|
|||
library provides a simple and efficient buffered stream
|
||||
.Tn I/O
|
||||
interface.
|
||||
Input and ouput is mapped into logical data streams
|
||||
Input and output is mapped into logical data streams
|
||||
and the physical
|
||||
.Tn I/O
|
||||
characteristics are concealed. The functions and macros are listed
|
||||
|
@ -69,7 +69,7 @@ The position indicator is maintained by subsequent reads, writes
|
|||
and positioning requests. All input occurs as if the characters
|
||||
were read by successive calls to the
|
||||
.Xr fgetc 3
|
||||
function; all ouput takes place as if all characters were
|
||||
function; all output takes place as if all characters were
|
||||
read by successive calls to the
|
||||
.Xr fputc 3
|
||||
function.
|
||||
|
@ -77,7 +77,7 @@ function.
|
|||
A file is disassociated from a stream by
|
||||
.Em closing
|
||||
the file.
|
||||
Ouput streams are flushed (any unwritten buffer contents are transferred
|
||||
Output streams are flushed (any unwritten buffer contents are transferred
|
||||
to the host environment) before the stream is disassociated from the file.
|
||||
The value of a pointer to a
|
||||
.Dv FILE
|
||||
|
|
|
@ -124,7 +124,7 @@ returns an
|
|||
.Dv EOF
|
||||
when the argument list is exhausted, or a non-recognized
|
||||
option is encountered.
|
||||
The interpretation of options in the argument list may be cancelled
|
||||
The interpretation of options in the argument list may be canceled
|
||||
by the option
|
||||
.Ql --
|
||||
(double dash) which causes
|
||||
|
|
|
@ -118,7 +118,7 @@ and scan it for flags.
|
|||
Flags are single letters, uppercase means on, lowercase means off.
|
||||
.Bl -tag -width indent
|
||||
.It A
|
||||
``abort'' malloc will coredump the process, rather that tollerate failure.
|
||||
``abort'' malloc will coredump the process, rather than tolerate failure.
|
||||
This is a very handy debugging aid, since the core file will represent the
|
||||
time of failure,
|
||||
rather than when the NULL pointer was accessed.
|
||||
|
@ -138,12 +138,12 @@ This can substantially aid in compacting memory.
|
|||
|
||||
.It Z
|
||||
``zero'' fill some junk into the area allocated (see ``J''),
|
||||
except for the exact length the user asked for, which is zerod.
|
||||
except for the exact length the user asked for, which is zeroed.
|
||||
|
||||
.El
|
||||
.Pp
|
||||
The ``J'' and ``Z'' is mostly for testing and debugging,
|
||||
if a program changes behaviour if either of these options are used,
|
||||
if a program changes behavior if either of these options are used,
|
||||
it is buggy.
|
||||
.Sh RETURN VALUES
|
||||
The
|
||||
|
@ -177,7 +177,7 @@ attached to a 20bit binary challenged computer built with discrete germanium
|
|||
transistors, and it has since graduated to handle primary storage rather than
|
||||
secondary.
|
||||
.Pp
|
||||
The main difference from other malloc implementations are belived to be that
|
||||
The main difference from other malloc implementations are believed to be that
|
||||
the free pages are not accessed until allocated.
|
||||
Most malloc implementations will store a data structure containing a,
|
||||
possibly double-, linked list in the free chunks of memory, used to tie
|
||||
|
@ -188,4 +188,4 @@ likely paged out, pages get faulted into primary memory, just to see what
|
|||
lies after them in the list.
|
||||
.Pp
|
||||
On systems which are paging, this can make a factor five in difference on the
|
||||
pagefaults of a process.
|
||||
page-faults of a process.
|
||||
|
|
|
@ -53,7 +53,7 @@ lexicographically compares the null-terminated strings
|
|||
.Fa s1
|
||||
and
|
||||
.Fa s2
|
||||
according to the current locale collation if any, otherwith call
|
||||
according to the current locale collation if any, otherwise call
|
||||
.Fa strcmp ,
|
||||
and returns an integer greater than, equal to, or less than 0,
|
||||
according as
|
||||
|
|
|
@ -48,14 +48,14 @@
|
|||
.Sh DESCRIPTION
|
||||
The
|
||||
.Fn strxfrm
|
||||
function transform null-terminating string pointed by
|
||||
function transforms a null-terminated string pointed to by
|
||||
.Fa src
|
||||
according to the current locale collation if any,
|
||||
then copied not more than
|
||||
then copies not more than
|
||||
.Fa n-1
|
||||
characters of the result string into
|
||||
characters of the resulting string into
|
||||
.Fa dst ,
|
||||
ending it whith null character and return result length.
|
||||
terminating it with a null character and then returns the resulting length.
|
||||
Comparing two strings using
|
||||
.Fn strcmp
|
||||
after
|
||||
|
@ -64,7 +64,7 @@ is equal to comparing
|
|||
two original strings with
|
||||
.Fn strcoll .
|
||||
.Sh BUGS
|
||||
Sometimes biheviour of this function is unpredicatable.
|
||||
Sometimes the behavior of this function is unpredictable.
|
||||
.Sh SEE ALSO
|
||||
.Xr setlocale 3 ,
|
||||
.Xr strcmp 3 ,
|
||||
|
|
|
@ -344,7 +344,7 @@ syscall is assembled to
|
|||
.Fn _thread_sys_fcntl
|
||||
and
|
||||
.Fn fcntl
|
||||
is implemented as a function which disables thread resheduling, locks
|
||||
is implemented as a function which disables thread rescheduling, locks
|
||||
.Va fd
|
||||
for read and write, then calls
|
||||
.Fn _thread_sys_fcntl .
|
||||
|
@ -352,7 +352,7 @@ Before returning,
|
|||
.Fn fcntl
|
||||
unlocks
|
||||
.Va fd
|
||||
and enables thread resheduling.
|
||||
and enables thread rescheduling.
|
||||
.Sh RETURN VALUES
|
||||
Upon successful completion, the value returned depends on
|
||||
.Fa cmd
|
||||
|
|
|
@ -75,7 +75,7 @@ The
|
|||
.Fn getpgrp
|
||||
function conforms to IEEE Std 1003.1-1988
|
||||
.Pq Dq Tn POSIX .
|
||||
.Sh COMPATABILITY
|
||||
.Sh COMPATIBILITY
|
||||
This version of
|
||||
.Fn getpgrp
|
||||
differs from past Berkeley versions by not taking a
|
||||
|
|
|
@ -85,7 +85,7 @@ Pipes are really a special case of the
|
|||
call and, in fact, are implemented as such in the system.
|
||||
.Pp
|
||||
The bidirectional nature of this implementation of pipes is not
|
||||
portable to older systems, so it is reccomended to use the convention
|
||||
portable to older systems, so it is recommended to use the convention
|
||||
for using the endpoints in the traditional manner when using a
|
||||
pipe in one direction.
|
||||
.Sh RETURN VALUES
|
||||
|
|
|
@ -23,7 +23,7 @@
|
|||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id$
|
||||
.\" $Id: semctl.2,v 1.1 1995/10/03 19:17:17 joerg Exp $
|
||||
.\"
|
||||
.Dd September 12, 1995
|
||||
.Dt SEMCTL 2
|
||||
|
@ -88,11 +88,11 @@ or
|
|||
or it must have superuser privileges.
|
||||
.It IPC_RMID
|
||||
Immediately removes the semaphore set from the system. The calling
|
||||
process's effictive uid must equal the semaphore set's
|
||||
process's effective uid must equal the semaphore set's
|
||||
.Fa sem_perm.uid
|
||||
or
|
||||
.Fa sem_perm.cuid ,
|
||||
or the process must have superuser priviliges.
|
||||
or the process must have superuser privileges.
|
||||
.It Dv GETVAL
|
||||
Return the value of semaphore number
|
||||
.Fa semnum .
|
||||
|
|
|
@ -23,7 +23,7 @@
|
|||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id$
|
||||
.\" $Id: semop.2,v 1.1 1995/10/03 19:17:19 joerg Exp $
|
||||
.\"
|
||||
.Dd September 22, 1995
|
||||
.Dt SEMOP 2
|
||||
|
@ -114,7 +114,7 @@ value, one of the following happens:
|
|||
.\" XXX a *second* sublist?
|
||||
.Bl -bullet
|
||||
.It
|
||||
If IPC_NOWAIT was specifed, then
|
||||
If IPC_NOWAIT was specified, then
|
||||
.Fn semop
|
||||
returns immediately with a return value of EAGAIN.
|
||||
.It
|
||||
|
|
|
@ -23,7 +23,7 @@
|
|||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id$
|
||||
.\" $Id: shmat.2,v 1.1 1995/10/03 19:17:20 joerg Exp $
|
||||
.\"
|
||||
.Dd August 2, 1995
|
||||
.Dt SHMAT 2
|
||||
|
@ -42,7 +42,7 @@
|
|||
.Fn "shmdt" "void *addr"
|
||||
.Sh DESCRIPTION
|
||||
.Fn Shmat
|
||||
attaches the shared memory segment identifed by
|
||||
attaches the shared memory segment identified by
|
||||
.Fa shmid
|
||||
to the calling process's address space. The address where the segment
|
||||
is attached is determined as follows:
|
||||
|
@ -59,7 +59,7 @@ kernel.
|
|||
.It
|
||||
If
|
||||
.Fa addr
|
||||
is nonzero and SHM_RND is not specifed in
|
||||
is nonzero and SHM_RND is not specified in
|
||||
.Fa flag ,
|
||||
the segment is attached the specified address.
|
||||
.It
|
||||
|
|
|
@ -23,7 +23,7 @@
|
|||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id$
|
||||
.\" $Id: shmctl.2,v 1.1 1995/10/03 19:17:21 joerg Exp $
|
||||
.\"
|
||||
.Dd July 17, 1995
|
||||
.Dt SHMCTL 2
|
||||
|
@ -76,13 +76,13 @@ to succeed, the calling process's effective uid must match
|
|||
.Fa shm_perm.uid
|
||||
or
|
||||
.Fa shm_perm.cuid ,
|
||||
or the process must have superuser privilges.
|
||||
or the process must have superuser privileges.
|
||||
.\" .It Dv SHM_LOCK
|
||||
.\" Locks the segment in memory. The calling process must have
|
||||
.\" superuser privileges. Not implemented in FreeBSD.
|
||||
.\" .It Dv SHM_UNLOCK
|
||||
.\" Unlocks the segment from memory. The calling process must
|
||||
.\" have superuser priviliges. Not implemented in FreeBSD.
|
||||
.\" have superuser privileges. Not implemented in FreeBSD.
|
||||
.El
|
||||
.Pp
|
||||
The
|
||||
|
|
|
@ -23,7 +23,7 @@
|
|||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $Id$
|
||||
.\" $Id: shmget.2,v 1.1 1995/10/03 19:17:21 joerg Exp $
|
||||
.\"
|
||||
.Dd July 3, 1995
|
||||
.Dt SHMGET 2
|
||||
|
@ -116,7 +116,7 @@ will fail if:
|
|||
.\"
|
||||
.It Bq Er EINVAL
|
||||
Size specified is greater than the size of the previously existing segment.
|
||||
Size specified is less than the system imposed minumum, or greater than
|
||||
Size specified is less than the system imposed minimum, or greater than
|
||||
the system imposed maximum.
|
||||
.It Bq Er ENOENT
|
||||
No shared memory segment was found matching
|
||||
|
|
|
@ -258,7 +258,7 @@ depend on the time stamps being contiguous (in calls to
|
|||
Applying
|
||||
.Xr fstat
|
||||
to a socket (and thus to a pipe)
|
||||
returns a zero'd buffer,
|
||||
returns a zeroed buffer,
|
||||
except for the blocksize field,
|
||||
and a unique device and inode number.
|
||||
.Sh STANDARDS
|
||||
|
|
|
@ -10,7 +10,7 @@
|
|||
.Op options
|
||||
.Sh DESCRIPTION
|
||||
.Nm Comcontrol
|
||||
is used to examine and modify some of the special characterstics
|
||||
is used to examine and modify some of the special characteristics
|
||||
of the specified sio device.
|
||||
If no arguments other than the device are specified,
|
||||
it prints the settings of all controllable characteristics.
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
.\".Os BSD 4
|
||||
.Sh NAME
|
||||
.Nm fdisk
|
||||
.Nd DOS partition maintainance program
|
||||
.Nd DOS partition maintenance program
|
||||
.Sh SYNOPSIS
|
||||
.Nm
|
||||
.Op Fl i
|
||||
|
@ -136,7 +136,7 @@ When you are done with a partition,
|
|||
.Nm
|
||||
will display it and ask if it is correct.
|
||||
.Nm
|
||||
will then procede to the next entry.
|
||||
will then proceed to the next entry.
|
||||
.Pp
|
||||
Getting the
|
||||
.Em cyl, sector,
|
||||
|
@ -176,7 +176,7 @@ The automatic calculation of starting cylinder etc. uses
|
|||
a set of figures that represent what the BIOS thinks is the
|
||||
geometry of the drive.
|
||||
These figures are by default taken from the incore disklabel,
|
||||
but the program initially gives you an oportunity to change them.
|
||||
but the program initially gives you an opportunity to change them.
|
||||
This allows the user to create a bootblock that can work with drives
|
||||
that use geometry translation under the BIOS.
|
||||
.Pp
|
||||
|
|
|
@ -10,7 +10,7 @@
|
|||
.Op options
|
||||
.Sh DESCRIPTION
|
||||
.Nm Comcontrol
|
||||
is used to examine and modify some of the special characterstics
|
||||
is used to examine and modify some of the special characteristics
|
||||
of the specified sio device.
|
||||
If no arguments other than the device are specified,
|
||||
it prints the settings of all controllable characteristics.
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
.\".Os BSD 4
|
||||
.Sh NAME
|
||||
.Nm fdisk
|
||||
.Nd DOS partition maintainance program
|
||||
.Nd DOS partition maintenance program
|
||||
.Sh SYNOPSIS
|
||||
.Nm
|
||||
.Op Fl i
|
||||
|
@ -136,7 +136,7 @@ When you are done with a partition,
|
|||
.Nm
|
||||
will display it and ask if it is correct.
|
||||
.Nm
|
||||
will then procede to the next entry.
|
||||
will then proceed to the next entry.
|
||||
.Pp
|
||||
Getting the
|
||||
.Em cyl, sector,
|
||||
|
@ -176,7 +176,7 @@ The automatic calculation of starting cylinder etc. uses
|
|||
a set of figures that represent what the BIOS thinks is the
|
||||
geometry of the drive.
|
||||
These figures are by default taken from the incore disklabel,
|
||||
but the program initially gives you an oportunity to change them.
|
||||
but the program initially gives you an opportunity to change them.
|
||||
This allows the user to create a bootblock that can work with drives
|
||||
that use geometry translation under the BIOS.
|
||||
.Pp
|
||||
|
|
Loading…
Reference in a new issue