Fix all the spelling mistakes I could find in the man pages for words

that have at least 3 characters.

MFC after:	1 week
Thanks to:	Music band ``Chingon''
		for keeping me company while searching for these.
This commit is contained in:
Giorgos Keramidas 2005-07-31 03:30:48 +00:00
parent 48c912e4ce
commit 6fb9b618f5
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=148580
38 changed files with 60 additions and 60 deletions

View File

@ -250,7 +250,7 @@ String data can be set or accessed as wide character strings
or normal or normal
.Va char .Va char
strings. strings.
The funtions that use wide character strings are suffixed with The functions that use wide character strings are suffixed with
.Cm _w . .Cm _w .
Note that these are different representations of the same data: Note that these are different representations of the same data:
For example, if you store a narrow string and read the corresponding For example, if you store a narrow string and read the corresponding

View File

@ -194,7 +194,7 @@ the
.Fn archive_read_data_block .Fn archive_read_data_block
function avoids copying data and allows you to correctly handle function avoids copying data and allows you to correctly handle
sparse files, as supported by some archive formats. sparse files, as supported by some archive formats.
The library gaurantees that offsets will increase and that blocks The library guarantees that offsets will increase and that blocks
will not overlap. will not overlap.
Note that the blocks returned from this function can be much larger Note that the blocks returned from this function can be much larger
than the block size read from disk, due to compression than the block size read from disk, due to compression
@ -272,7 +272,7 @@ Complete the archive and invoke the close callback.
.It Fn archive_read_finish .It Fn archive_read_finish
Invokes Invokes
.Fn archive_read_close .Fn archive_read_close
if it was not invoked maually, then release all resources. if it was not invoked manually, then release all resources.
.El .El
.Pp .Pp
Note that the library determines most of the relevant information about Note that the library determines most of the relevant information about
@ -341,7 +341,7 @@ on success.
On failure, the callback should invoke On failure, the callback should invoke
.Fn archive_set_error .Fn archive_set_error
to register an error code and message and to register an error code and message and
regurn return
.Cm ARCHIVE_FATAL. .Cm ARCHIVE_FATAL.
.Sh EXAMPLE .Sh EXAMPLE
The following illustrates basic usage of the library. The following illustrates basic usage of the library.

View File

@ -79,11 +79,11 @@
.Sh DESCRIPTION .Sh DESCRIPTION
The The
.Nm libautofs .Nm libautofs
libarary provides a "mostly" stable interface to the library provides a "mostly" stable interface to the
.Xr autofs 9 .Xr autofs 9
file system. file system.
.Pp .Pp
The inteface to The interface to
.Xr autofs 9 .Xr autofs 9
is managed via handles of type is managed via handles of type
.Fa autoh_t .Fa autoh_t
@ -172,7 +172,7 @@ return the inode associated with the request
return the directory inode associated with the request return the directory inode associated with the request
.Fa req . .Fa req .
.It Fn autoreq_getaux .It Fn autoreq_getaux
return the auxilliray data associated with the request return the auxiliary data associated with the request
.Fa req . .Fa req .
.It Fn autoreq_getoffset .It Fn autoreq_getoffset
return the offset request associated with the request return the offset request associated with the request
@ -197,16 +197,16 @@ inode to
this is typically unused. this is typically unused.
.It Fn autoreq_seterrno .It Fn autoreq_seterrno
set the error returned to the application sending the request, typically set the error returned to the application sending the request, typically
this is left alone, or set to ENOENT if the request is for a non-existant this is left alone, or set to ENOENT if the request is for a non-existent
name. name.
The default error is no error. The default error is no error.
Meaning the application will see Meaning the application will see
a successful return. a successful return.
.It Fn autoreq_setaux .It Fn autoreq_setaux
used to set the auxilliray data for a request, currently used to set used to set the auxiliary data for a request, currently used to set
the dirent structures for serving a readdir request. the dirent structures for serving a readdir request.
Default is no Default is no
auxilliary data. auxiliary data.
.It Fn autoreq_seteof .It Fn autoreq_seteof
used to set the eof flag for readdir requests (default is not eof.) used to set the eof flag for readdir requests (default is not eof.)
.El .El

View File

@ -85,7 +85,7 @@ of the type, specified in the
.Fa type .Fa type
argument and containing the number of addresses specified in the argument and containing the number of addresses specified in the
.Fa segments .Fa segments
argumment. argument.
When the type is When the type is
.Dv IPV6_RTHDR_TYPE_0 .Dv IPV6_RTHDR_TYPE_0
the number of segments must be from 0 through 127. the number of segments must be from 0 through 127.

View File

@ -64,7 +64,7 @@ set to
.Dv ACL_NEXT_ENTRY .Dv ACL_NEXT_ENTRY
when there has not been either an initial successful call to when there has not been either an initial successful call to
.Fn acl_get_entry , .Fn acl_get_entry ,
or a previous successfull call to or a previous successful call to
.Fn acl_create_entry , .Fn acl_create_entry ,
.Fn acl_delete_entry , .Fn acl_delete_entry ,
.Fn acl_dup , .Fn acl_dup ,
@ -79,7 +79,7 @@ then the result is unspecified.
.Sh RETURN VALUES .Sh RETURN VALUES
If the If the
.Fn acl_get_entry .Fn acl_get_entry
function successfully obtains an ACL entry, a value of 1 is returned. function successfuly obtains an ACL entry, a value of 1 is returned.
If the ACL has no ACL entries, the If the ACL has no ACL entries, the
.Fn acl_get_entry .Fn acl_get_entry
returns a value of 0. returns a value of 0.

View File

@ -165,7 +165,7 @@ To join this list, see the
.Fx .Fx
POSIX.1e implementation page POSIX.1e implementation page
for more information. for more information.
However, the resemblence of these APIs to the POSIX APIs is only loose, However, the resemblance of these APIs to the POSIX APIs is only loose,
as the POSIX APIs were unable to express many notions required for as the POSIX APIs were unable to express many notions required for
flexible and extensible access control. flexible and extensible access control.
.Sh HISTORY .Sh HISTORY

View File

@ -89,7 +89,7 @@ The
.Fn mac_prepare_ifnet_label , .Fn mac_prepare_ifnet_label ,
and and
.Fn mac_prepare_process_label .Fn mac_prepare_process_label
functions are equivilent to invocations of functions are equivalent to invocations of
.Fn mac_prepare_type .Fn mac_prepare_type
with arguments of with arguments of
.Qq file , .Qq file ,

View File

@ -115,7 +115,7 @@ The sequences
are supposed to provide alternate are supposed to provide alternate
representations. representations.
.Pp .Pp
Additionly %OB implemented Additionally %OB implemented
to represent alternative months names to represent alternative months names
(used standalone, without day mentioned). (used standalone, without day mentioned).
.It Cm %e .It Cm %e

View File

@ -489,7 +489,7 @@ may contain any of the following bits OR'ed together:
Block upcalls from happening. Block upcalls from happening.
The thread is in some critical section. The thread is in some critical section.
.It Dv KMF_NOCOMPLETED , KMF_DONE , KMF_BOUND .It Dv KMF_NOCOMPLETED , KMF_DONE , KMF_BOUND
This thread should be considerred to be permanently bound to This thread should be considered to be permanently bound to
its KSE, and treated much like a non-threaded process would be. its KSE, and treated much like a non-threaded process would be.
It is a It is a
.Dq "long term" .Dq "long term"
@ -497,7 +497,7 @@ version of
.Dv KMF_NOUPCALL .Dv KMF_NOUPCALL
in some ways. in some ways.
.It Dv KMF_WAITSIGEVENT .It Dv KMF_WAITSIGEVENT
Implement charactersitics needed for the signal delivery thread. Implement characteristics needed for the signal delivery thread.
.El .El
.\" .\"
.Ss Thread Mailboxes .Ss Thread Mailboxes

View File

@ -51,7 +51,7 @@ When no IEEE 802
address is available for the node field, a random multicast address is address is available for the node field, a random multicast address is
generated for each invocation of the system call. generated for each invocation of the system call.
According to the algorithm of generating time-based UUIDs, this will also According to the algorithm of generating time-based UUIDs, this will also
force a new random clock sequence, thereby increasing the likelyhood for force a new random clock sequence, thereby increasing the likelihood for
the identifier to be unique. the identifier to be unique.
.Pp .Pp
When multiple identifiers are to be generated, the When multiple identifiers are to be generated, the

View File

@ -152,7 +152,7 @@ ThinkLight Button
.It Li 512 .It Li 512
Screen Expand (Fn + F8) Screen Expand (Fn + F8)
.It Li 1024 .It Li 1024
Brighness Up/Down Button Brightness Up/Down Button
.It Li 2048 .It Li 2048
Volume Up/Down/Mute Button Volume Up/Down/Mute Button
.El .El

View File

@ -46,7 +46,7 @@ It may also work on other models as well.
The driver consists of three functionalities. The driver consists of three functionalities.
The first is to detect hotkey events and take corresponding actions, The first is to detect hotkey events and take corresponding actions,
which include changing LCD luminance and speaker mute state. which include changing LCD luminance and speaker mute state.
The second role is to notify occurences of the event by way of The second role is to notify occurrences of the event by way of
.Xr devctl 4 .Xr devctl 4
and eventually to and eventually to
.Xr devd 8 . .Xr devd 8 .

View File

@ -163,10 +163,10 @@ Look for conflicts with other devices.
The driver couldn't allocate the interrupt it wanted. The driver couldn't allocate the interrupt it wanted.
Look for conflicts, although sharing interrupts for PC Card is normal. Look for conflicts, although sharing interrupts for PC Card is normal.
.It ep0: No connectors! .It ep0: No connectors!
The driver querried the hardware for what ethernet attachment were The driver queried the hardware for what ethernet attachment were
present, but the hardware reported none that the driver recognized. present, but the hardware reported none that the driver recognized.
.It ep0: Unable to get Ethernet address! .It ep0: Unable to get Ethernet address!
The driver was unabel to read the ethernet address from the EEPROM. The driver was unable to read the ethernet address from the EEPROM.
This is likely the result of the card being wedged. This is likely the result of the card being wedged.
.It ep0: if_alloc() failed .It ep0: if_alloc() failed
The driver was unable to allocate a ifnet structure. The driver was unable to allocate a ifnet structure.

View File

@ -119,7 +119,7 @@ seconds
will result in no more than one value being read or written every will result in no more than one value being read or written every
.Ar n .Ar n
seconds. seconds.
Single byte read/write opeations will take at least Single byte read/write operations will take at least
.Ar n .Ar n
seconds to complete. seconds to complete.
.Pp .Pp

View File

@ -81,7 +81,7 @@ as
Accessing Accessing
.Tn SONIC .Tn SONIC
card data structures and registers as 32 bit values card data structures and registers as 32 bit values
makes code endianess independent. makes code endianness independent.
The The
.Tn SONIC .Tn SONIC
is however always in big-endian mode so it is necessary to is however always in big-endian mode so it is necessary to

View File

@ -125,7 +125,7 @@ call and whether the
.Vt "struct openpromio" .Vt "struct openpromio"
is used to pass in or return data, is used to pass in or return data,
.Va oprom_array .Va oprom_array
either contains an integer refereing to a node or a string refering to a either contains an integer referring to a node or a string referring to a
property name or property value. property name or property value.
The maximum size of The maximum size of
.Va oprom_array .Va oprom_array

View File

@ -43,7 +43,7 @@ to attach to the CS4231 audio device.
Speaker output is enabled by default. Speaker output is enabled by default.
SBus based SBus based
.Tn UltraSPARC .Tn UltraSPARC
workstations have no internel CD-ROM audio input capability. workstations have no internal CD-ROM audio input capability.
.Sh HARDWARE .Sh HARDWARE
The The
.Nm .Nm

View File

@ -93,7 +93,7 @@ set via the read-only sysctl
.Pp .Pp
The sysctl The sysctl
.Va debug.witness.watch .Va debug.witness.watch
specifies the level of witness involvment in the system. specifies the level of witness involvement in the system.
A value of 1 specifies that witness is enabled. A value of 1 specifies that witness is enabled.
A value of 0 specifies that witness is disabled. A value of 0 specifies that witness is disabled.
This sysctl can be written to in order to This sysctl can be written to in order to

View File

@ -85,7 +85,7 @@ This action changes the permissions of
.Ar devname . .Ar devname .
The The
.Ar arg .Ar arg
paramater must be a parameter must be a
.Ar mode .Ar mode
as explained in as explained in
.Xr chmod 1 . .Xr chmod 1 .

View File

@ -1006,7 +1006,7 @@ A reference count of requests for this particular membership.
.It Fn if_alloc .It Fn if_alloc
Allocate and initialize Allocate and initialize
.Vt "struct ifnet" . .Vt "struct ifnet" .
Initalization includes the allocation of an interface index and may Initialization includes the allocation of an interface index and may
include the allocation of a include the allocation of a
.Fa type .Fa type
specific structure in specific structure in

View File

@ -1,6 +1,6 @@
.\" .\"
.\" Copyright (c) 2001 Andrew R. Reiter .\" Copyright (c) 2001 Andrew R. Reiter
.\" Copyritht (c) 2004 Joerg Wunsch .\" Copyright (c) 2004 Joerg Wunsch
.\" All rights reserved. .\" All rights reserved.
.\" .\"
.\" Redistribution and use in source and binary forms, with or without .\" Redistribution and use in source and binary forms, with or without

View File

@ -23,7 +23,7 @@ The
.Nm .Nm
utility reads a file from stdin and writes it to stdout, converting each utility reads a file from stdin and writes it to stdout, converting each
byte to its decimal or hexadecimal representation on the fly. byte to its decimal or hexadecimal representation on the fly.
The byte values are seperated by a comma. The byte values are separated by a comma.
This also means that the last byte value is not followed by a comma. This also means that the last byte value is not followed by a comma.
By default the byte values are printed in decimal, but when the By default the byte values are printed in decimal, but when the
.Fl x .Fl x

View File

@ -213,7 +213,7 @@ Parenthesized expressions have extra indentation added to
indicate the nesting, unless indicate the nesting, unless
.Fl \&lp .Fl \&lp
is in effect is in effect
or the contination indent is exactly half of the main indent. or the continuation indent is exactly half of the main indent.
.Fl \&ci .Fl \&ci
defaults to the same value as defaults to the same value as
.Fl i . .Fl i .
@ -411,7 +411,7 @@ If the output file is not specified, the default is standard output,
rather than formatting in place. rather than formatting in place.
.It Fl ut , nut .It Fl ut , nut
Enables (disables) the use of tab characters in the output. Enables (disables) the use of tab characters in the output.
Tabs are assumed to be aligned on columns divisble by 8. Tabs are assumed to be aligned on columns divisible by 8.
The default is The default is
.Fl ut . .Fl ut .
.It Fl v , \&nv .It Fl v , \&nv

View File

@ -44,7 +44,7 @@ utility acquires an exclusive lock on a
.Ar file , .Ar file ,
creating it if necessary, creating it if necessary,
.Bf Em .Bf Em
and removing the file on exit unless explictly told not to. and removing the file on exit unless explicitly told not to.
.Ef .Ef
While holding the lock, it executes a While holding the lock, it executes a
.Ar command .Ar command

View File

@ -628,7 +628,7 @@ variable from the environment,
all sequences of a backslash and one of space or tab all sequences of a backslash and one of space or tab
are replaced just with their second character are replaced just with their second character
without causing a word break. without causing a word break.
Any other occurences of a backslash are retained. Any other occurrences of a backslash are retained.
Groups of unquoted space, tab and newline characters cause word Groups of unquoted space, tab and newline characters cause word
breaking. breaking.
.It Va MFLAGS .It Va MFLAGS

View File

@ -289,7 +289,7 @@ for particular uses, i.e., data, socket structures, etc.
.It Ic vmstat .It Ic vmstat
Take over the entire display and show a (rather crowded) compendium Take over the entire display and show a (rather crowded) compendium
of statistics related to virtual memory usage, process scheduling, of statistics related to virtual memory usage, process scheduling,
device interrupts, system name translation cacheing, disk device interrupts, system name translation caching, disk
.Tn I/O .Tn I/O
etc. etc.
.Pp .Pp

View File

@ -27,7 +27,7 @@ It does this by stopping and restarting the process being monitored via
The options are as follows: The options are as follows:
.Bl -tag -width indent .Bl -tag -width indent
.It Fl f .It Fl f
Trace decendants of the original traced process created by Trace descendants of the original traced process created by
.Xr fork 2 , .Xr fork 2 ,
.Xr vfork 2 , .Xr vfork 2 ,
etc. etc.

View File

@ -198,7 +198,7 @@ option is specified, or the
.Fl C .Fl C
or or
.Fl p .Fl p
option is used in conjuction with the option is used in conjunction with the
.Fl s .Fl s
option, temporary files named option, temporary files named
.Pa INS@XXXX , .Pa INS@XXXX ,

View File

@ -76,8 +76,8 @@ and connect to the Internet.
.Pp .Pp
In the server mode, In the server mode,
.Nm .Nm
opens an RFCOMM socket and listens for incomming connections from remote clients. opens an RFCOMM socket and listens for incoming connections from remote clients.
Once the new incomming connection is accepted, Once the new incoming connection is accepted,
.Nm .Nm
forks and executes forks and executes
.Xr ppp 8 .Xr ppp 8
@ -278,7 +278,7 @@ The RFCOMM server will listen on local address
.Li 00:01:02:03:04:05 .Li 00:01:02:03:04:05
and channel and channel
.Li 1 . .Li 1 .
Once the incomming connection has been accepted, Once the incoming connection has been accepted,
.Nm .Nm
will execute will execute
.Xr ppp 8 .Xr ppp 8

View File

@ -43,7 +43,7 @@ The
daemon keeps track of the Bluetooth services registered on the host daemon keeps track of the Bluetooth services registered on the host
and responds to Service Discovery inquiries from the remote Bluetooth devices. and responds to Service Discovery inquiries from the remote Bluetooth devices.
.Pp .Pp
In order to use any service remote Bluetooth device need to send Sevice In order to use any service remote Bluetooth device need to send Service
Search and Service Attribute or Service Search Attribute request over Search and Service Attribute or Service Search Attribute request over
Bluetooth L2CAP connection on SDP PSM (0x0001). Bluetooth L2CAP connection on SDP PSM (0x0001).
The The
@ -108,7 +108,7 @@ In case of multiple Bluetooth devices connected to the same host it is
possible to specify which services should be possible to specify which services should be
.Dq bound .Dq bound
to which Bluetooth device. to which Bluetooth device.
Such assigment should be done at service registration time. Such assignment should be done at service registration time.
.Pp .Pp
Access rights on the control socket define which application can register, Access rights on the control socket define which application can register,
remove or change the service. remove or change the service.

View File

@ -170,7 +170,7 @@ Each of these functions takes the following arguments:
.It Fa cookie .It Fa cookie
is the node specific command cookie, is the node specific command cookie,
.It Fa opcode .It Fa opcode
is the node specific code for the operation to performa, is the node specific code for the operation to perform,
.It Fa arg .It Fa arg
is a pointer to the message itself. is a pointer to the message itself.
This message must start with a This message must start with a
@ -208,7 +208,7 @@ and waits for a matching response.
All three functions take the same arguments as the All three functions take the same arguments as the
.Fn ng_output* .Fn ng_output*
functions. functions.
The functions return the reponse message in a buffer allocated by The functions return the response message in a buffer allocated by
.Xr malloc 3 .Xr malloc 3
or NULL in case of an error. or NULL in case of an error.
The maximum size of the response buffer can be The maximum size of the response buffer can be
@ -223,14 +223,14 @@ hook through which to send the data, a pointer to the message buffer and
the size of the message. the size of the message.
It returns -1 if an error happens. It returns -1 if an error happens.
.Ss ASYNCHRONOUS CONTROL AND DATA MESSAGES .Ss ASYNCHRONOUS CONTROL AND DATA MESSAGES
A module can register functions to asynchronuosly receive control and data A module can register functions to asynchronously receive control and data
message. message.
.Pp .Pp
The function The function
.Fn ng_register_cookie .Fn ng_register_cookie
registers a control message receive function. registers a control message receive function.
If a control message is If a control message is
received, that is not consumed by the dialog functions, the list of registerred received, that is not consumed by the dialog functions, the list of registered
control message receive functions is scanned. control message receive functions is scanned.
If the cookie in the received If the cookie in the received
message is the same as the message is the same as the
@ -256,7 +256,7 @@ to the same cookie and node id.
A control message registration can be undone by calling A control message registration can be undone by calling
.Fn ng_unregister_cookie .Fn ng_unregister_cookie
with the return value of the registration call. with the return value of the registration call.
If an error occures while registering, If an error occurs while registering,
.Fn ng_register_cookie .Fn ng_register_cookie
returns NULL. returns NULL.
.Pp .Pp
@ -275,7 +275,7 @@ The message should be treated as read-only.
A data message registration can be undone by calling A data message registration can be undone by calling
.Fn ng_unregister_hook .Fn ng_unregister_hook
with the return value of the registration call. with the return value of the registration call.
If an error occures while registering, If an error occurs while registering,
.Fn ng_register_hook .Fn ng_register_hook
returns NULL. returns NULL.
.Pp .Pp
@ -348,7 +348,7 @@ is not NULL, the function checks, that the peer node's type is
.Fa type . .Fa type .
The function skips intermediate tee nodes (see The function skips intermediate tee nodes (see
.Xr ng_tee 4 ) . .Xr ng_tee 4 ) .
It returns the node id of the peer node or 0 if an error occurres or the It returns the node id of the peer node or 0 if an error occurs or the
types do not match. types do not match.
.Ss CHANGING THE GRAPH .Ss CHANGING THE GRAPH
A number of functions can be used to create or destroy nodes and hooks. A number of functions can be used to create or destroy nodes and hooks.

View File

@ -406,7 +406,7 @@ The number of outgoing calls allowed within the time period specified by
.Em budget-calloutperiod . .Em budget-calloutperiod .
(optional) (optional)
.It Li budget-calloutsfile .It Li budget-calloutsfile
A path/filename to which the number of successfull callouts are written. A path/filename to which the number of successful callouts are written.
The contents of the file is preserved when it exists during startup of isdnd. The contents of the file is preserved when it exists during startup of isdnd.
The format of this file is: start time, last update time, number of calls. The format of this file is: start time, last update time, number of calls.
(optional) (optional)
@ -415,7 +415,7 @@ If set to
.Em on .Em on
rotate budget-calloutsfile every night when an attempt is made to update rotate budget-calloutsfile every night when an attempt is made to update
the file on a new day. the file on a new day.
The statistics for the previous day are witten to The statistics for the previous day are written to
a file with the filename specified by budget-calloutsfile to which a hyphen a file with the filename specified by budget-calloutsfile to which a hyphen
and the new day's (!) day of month number is appended. and the new day's (!) day of month number is appended.
(optional) (optional)

View File

@ -135,7 +135,7 @@ The output format in this case is somewhat remniscent of
.Xr comm 1 , .Xr comm 1 ,
having "in first spec only", "in second spec only", and "different" having "in first spec only", "in second spec only", and "different"
columns, prefixed by zero, one and two TAB characters respectively. columns, prefixed by zero, one and two TAB characters respectively.
Each entry in the "different" column occupies two lines, one from each specfication. Each entry in the "different" column occupies two lines, one from each specification.
.It Fl K Ar keywords .It Fl K Ar keywords
Add the specified (whitespace or comma separated) Add the specified (whitespace or comma separated)
.Ar keywords .Ar keywords

View File

@ -80,7 +80,7 @@ The
.Pa .INF .Pa .INF
file is typically required since only it contains device file is typically required since only it contains device
identification data such as PCI vendor and device IDs or PCMCIA identification data such as PCI vendor and device IDs or PCMCIA
indentifier strings. identifier strings.
The The
.Pa .INF .Pa .INF
file may be optionally omitted however, file may be optionally omitted however,

View File

@ -227,7 +227,7 @@ server is maintaining state.
These should include all configured These should include all configured
peer associations as well as those peers whose stratum is such that peer associations as well as those peers whose stratum is such that
they are considered by the server to be possible future they are considered by the server to be possible future
synchonization candidates. synchronization candidates.
.It Ic peers .It Ic peers
Obtains a list of peers for which the server is maintaining Obtains a list of peers for which the server is maintaining
state, along with a summary of that state. state, along with a summary of that state.

View File

@ -245,7 +245,7 @@ When this is completed, pppd will commence passing data packets
The \fIdemand\fR option implies the \fIpersist\fR option. If this The \fIdemand\fR option implies the \fIpersist\fR option. If this
behaviour is not desired, use the \fInopersist\fR option after the behaviour is not desired, use the \fInopersist\fR option after the
\fIdemand\fR option. The \fIidle\fR and \fIholdoff\fR \fIdemand\fR option. The \fIidle\fR and \fIholdoff\fR
options are also useful in conjuction with the \fIdemand\fR option. options are also useful in conjunction with the \fIdemand\fR option.
.TP .TP
.B domain \fId .B domain \fId
Append the domain name \fId\fR to the local host name for authentication Append the domain name \fId\fR to the local host name for authentication
@ -378,7 +378,7 @@ send before it rejects the options.
The default value is 3. The default value is 3.
.TP .TP
.B ipxcp-max-terminate \fIn .B ipxcp-max-terminate \fIn
Set the maximum nuber of IPXCP terminate request frames before the Set the maximum number of IPXCP terminate request frames before the
local system considers that the peer is not listening to them. local system considers that the peer is not listening to them.
The The
default value is 3. default value is 3.

View File

@ -220,7 +220,7 @@ from any host but the one specified.
If the hostname is given as If the hostname is given as
.Ql @ , .Ql @ ,
the local hostname will be used. the local hostname will be used.
As for program specifications, multiple comma-seprarated As for program specifications, multiple comma-separated
values may be specified for hostname specifications. values may be specified for hostname specifications.
.Pp .Pp
A A

View File

@ -135,7 +135,7 @@ or hex string enclosed in quotation marks.
SSID scan technique; 0 (default) or 1. SSID scan technique; 0 (default) or 1.
Technique 0 scans for the SSID using a broadcast Probe Request Technique 0 scans for the SSID using a broadcast Probe Request
frame while 1 uses a directed Probe Request frame. frame while 1 uses a directed Probe Request frame.
Access points that cloak themself by not braodcasting their SSID Access points that cloak themselves by not broadcasting their SSID
require technique 1, but beware that this scheme can cause scanning require technique 1, but beware that this scheme can cause scanning
to take longer to complete. to take longer to complete.
.It Va bssid .It Va bssid