Fix even more spelling errors in some more man pages.

This commit is contained in:
Mike Pritchard 1996-01-30 16:34:52 +00:00
parent 62bdf2b7c6
commit a5ed710ccd
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=13750
28 changed files with 55 additions and 55 deletions

View File

@ -121,7 +121,7 @@ speaker device file
If one of these variables is set to a locale ending in
.Ql KOI8-R ,
characters with the high-order bit set are being interpreted as
cyrillic characters. In all other cases, they are being interpreted
Cyrillic characters. In all other cases, they are being interpreted
as belonging to the
.Ql ISO_8859-1
character set.

View File

@ -36,14 +36,14 @@
.Os
.Sh NAME
.Nm caesar
.Nd decrypt caesar cyphers
.Nd decrypt caesar ciphers
.Sh SYNOPSIS
.Nm caesar
.Op Ar rotation
.Sh DESCRIPTION
The
.Nm caesar
utility attempts to decrypt caesar cyphers using English letter frequency
utility attempts to decrypt caesar ciphers using English letter frequency
statistics.
.Nm Caesar
reads from the standard input and writes to the standard output.

View File

@ -5,7 +5,7 @@
.\" this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp
.\" ----------------------------------------------------------------------------
.\"
.\" $Id$
.\" $Id: config_open.3,v 1.1 1994/11/13 20:47:44 phk Exp $
.\"
.Dd November 13, 1994
.Dt config_open 3
@ -35,7 +35,7 @@ is '#' are comments which are discarded.
.It
If continuation-lines are enabled, any line starting with a
.Sq isspace()
character is joined to the preceeding line and blank lines are discarded.
character is joined to the preceding line and blank lines are discarded.
.It
An entry starts at the first
.Sq !isspace()

View File

@ -151,7 +151,7 @@ returns the integer file descriptor associated with the named
see
.Xr open 2 .
.Pp
Sample code which searchs a directory for entry ``name'' is:
Sample code which searches a directory for entry ``name'' is:
.Bd -literal -offset indent
len = strlen(name);
dirp = opendir(".");

View File

@ -122,7 +122,7 @@ string has within BSD.
.Sh BUGS
The function
.Fn getnetgrent
returns pointers to dynamically allocated data areas that are free'd when
returns pointers to dynamically allocated data areas that are freed when
the function
.Fn endnetgrent
is called.

View File

@ -54,7 +54,7 @@ particular formula employed is
r(n+1) = (a * r(n) + c) mod m
where the default values are
for the multiplicand a = 0xfdeece66d = 25214903917 and
the addend c = 0xb = 11. The modul is always fixed at m = 2 ** 48.
the addend c = 0xb = 11. The modulo is always fixed at m = 2 ** 48.
r(n) is called the seed of the random number generator.
.Pp
For all the six generator routines described next, the first

View File

@ -151,7 +151,7 @@ in the local user's home directory is checked to see if the request for
service is allowed.
.Pp
If this file does not exist, is not a regular file, is owned by anyone
other than the user or the super-user, or is writeable by anyone other
other than the user or the super-user, or is writable by anyone other
than the owner, the check automatically fails.
Zero is returned if the machine name is listed in the
.Dq Pa hosts.equiv

View File

@ -1,4 +1,4 @@
.\" $Id$
.\" $Id: catopen.3,v 1.1 1995/03/30 12:47:24 jkh Exp $
.\"
.\" Copyright (c) 1994 Winning Strategies, Inc.
.\" All rights reserved.
@ -70,7 +70,7 @@ is set to indicate the error.
.Sh ERRORS
.Bl -tag -width Er
.It Bq Er ENOMEM
Insufficient memory is availiable.
Insufficient memory is available.
.El
.Sh SEE ALSO
.Xr catclose 3 ,

View File

@ -808,7 +808,7 @@ A return value of zero means that the mapping does not exist
or that
the
.SM RPC
system failured to contact the remote
system failed to contact the remote
.B portmap
service. In the latter case, the global variable
.B rpc_createerr(\|)
@ -1487,7 +1487,7 @@ This routine returns
.SM NULL
if it fails.
.IP
This allows the user to specify the maximun packet size for sending and
This allows the user to specify the maximum packet size for sending and
receiving
.SM UDP\s0-based
.SM RPC messages.

View File

@ -51,7 +51,7 @@ rstat: RPC: Port mapper failure - RPC: Timed out
.IP
The remote host is not running the portmapper (see
.BR portmap(8c) ),
and cannot accomodate any RPC-based services. The host may be down.
and cannot accommodate any RPC-based services. The host may be down.
.SH "SEE ALSO"
.BR portmap (8c),
.BR rstat_svc (8c)

View File

@ -48,7 +48,7 @@ The standard
library provides a simple and efficient buffered stream
.Tn I/O
interface.
Input and ouput is mapped into logical data streams
Input and output is mapped into logical data streams
and the physical
.Tn I/O
characteristics are concealed. The functions and macros are listed
@ -69,7 +69,7 @@ The position indicator is maintained by subsequent reads, writes
and positioning requests. All input occurs as if the characters
were read by successive calls to the
.Xr fgetc 3
function; all ouput takes place as if all characters were
function; all output takes place as if all characters were
read by successive calls to the
.Xr fputc 3
function.
@ -77,7 +77,7 @@ function.
A file is disassociated from a stream by
.Em closing
the file.
Ouput streams are flushed (any unwritten buffer contents are transferred
Output streams are flushed (any unwritten buffer contents are transferred
to the host environment) before the stream is disassociated from the file.
The value of a pointer to a
.Dv FILE

View File

@ -124,7 +124,7 @@ returns an
.Dv EOF
when the argument list is exhausted, or a non-recognized
option is encountered.
The interpretation of options in the argument list may be cancelled
The interpretation of options in the argument list may be canceled
by the option
.Ql --
(double dash) which causes

View File

@ -118,7 +118,7 @@ and scan it for flags.
Flags are single letters, uppercase means on, lowercase means off.
.Bl -tag -width indent
.It A
``abort'' malloc will coredump the process, rather that tollerate failure.
``abort'' malloc will coredump the process, rather than tolerate failure.
This is a very handy debugging aid, since the core file will represent the
time of failure,
rather than when the NULL pointer was accessed.
@ -138,12 +138,12 @@ This can substantially aid in compacting memory.
.It Z
``zero'' fill some junk into the area allocated (see ``J''),
except for the exact length the user asked for, which is zerod.
except for the exact length the user asked for, which is zeroed.
.El
.Pp
The ``J'' and ``Z'' is mostly for testing and debugging,
if a program changes behaviour if either of these options are used,
if a program changes behavior if either of these options are used,
it is buggy.
.Sh RETURN VALUES
The
@ -177,7 +177,7 @@ attached to a 20bit binary challenged computer built with discrete germanium
transistors, and it has since graduated to handle primary storage rather than
secondary.
.Pp
The main difference from other malloc implementations are belived to be that
The main difference from other malloc implementations are believed to be that
the free pages are not accessed until allocated.
Most malloc implementations will store a data structure containing a,
possibly double-, linked list in the free chunks of memory, used to tie
@ -188,4 +188,4 @@ likely paged out, pages get faulted into primary memory, just to see what
lies after them in the list.
.Pp
On systems which are paging, this can make a factor five in difference on the
pagefaults of a process.
page-faults of a process.

View File

@ -53,7 +53,7 @@ lexicographically compares the null-terminated strings
.Fa s1
and
.Fa s2
according to the current locale collation if any, otherwith call
according to the current locale collation if any, otherwise call
.Fa strcmp ,
and returns an integer greater than, equal to, or less than 0,
according as

View File

@ -48,14 +48,14 @@
.Sh DESCRIPTION
The
.Fn strxfrm
function transform null-terminating string pointed by
function transforms a null-terminated string pointed to by
.Fa src
according to the current locale collation if any,
then copied not more than
then copies not more than
.Fa n-1
characters of the result string into
characters of the resulting string into
.Fa dst ,
ending it whith null character and return result length.
terminating it with a null character and then returns the resulting length.
Comparing two strings using
.Fn strcmp
after
@ -64,7 +64,7 @@ is equal to comparing
two original strings with
.Fn strcoll .
.Sh BUGS
Sometimes biheviour of this function is unpredicatable.
Sometimes the behavior of this function is unpredictable.
.Sh SEE ALSO
.Xr setlocale 3 ,
.Xr strcmp 3 ,

View File

@ -344,7 +344,7 @@ syscall is assembled to
.Fn _thread_sys_fcntl
and
.Fn fcntl
is implemented as a function which disables thread resheduling, locks
is implemented as a function which disables thread rescheduling, locks
.Va fd
for read and write, then calls
.Fn _thread_sys_fcntl .
@ -352,7 +352,7 @@ Before returning,
.Fn fcntl
unlocks
.Va fd
and enables thread resheduling.
and enables thread rescheduling.
.Sh RETURN VALUES
Upon successful completion, the value returned depends on
.Fa cmd

View File

@ -75,7 +75,7 @@ The
.Fn getpgrp
function conforms to IEEE Std 1003.1-1988
.Pq Dq Tn POSIX .
.Sh COMPATABILITY
.Sh COMPATIBILITY
This version of
.Fn getpgrp
differs from past Berkeley versions by not taking a

View File

@ -85,7 +85,7 @@ Pipes are really a special case of the
call and, in fact, are implemented as such in the system.
.Pp
The bidirectional nature of this implementation of pipes is not
portable to older systems, so it is reccomended to use the convention
portable to older systems, so it is recommended to use the convention
for using the endpoints in the traditional manner when using a
pipe in one direction.
.Sh RETURN VALUES

View File

@ -23,7 +23,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $Id$
.\" $Id: semctl.2,v 1.1 1995/10/03 19:17:17 joerg Exp $
.\"
.Dd September 12, 1995
.Dt SEMCTL 2
@ -88,11 +88,11 @@ or
or it must have superuser privileges.
.It IPC_RMID
Immediately removes the semaphore set from the system. The calling
process's effictive uid must equal the semaphore set's
process's effective uid must equal the semaphore set's
.Fa sem_perm.uid
or
.Fa sem_perm.cuid ,
or the process must have superuser priviliges.
or the process must have superuser privileges.
.It Dv GETVAL
Return the value of semaphore number
.Fa semnum .

View File

@ -23,7 +23,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $Id$
.\" $Id: semop.2,v 1.1 1995/10/03 19:17:19 joerg Exp $
.\"
.Dd September 22, 1995
.Dt SEMOP 2
@ -114,7 +114,7 @@ value, one of the following happens:
.\" XXX a *second* sublist?
.Bl -bullet
.It
If IPC_NOWAIT was specifed, then
If IPC_NOWAIT was specified, then
.Fn semop
returns immediately with a return value of EAGAIN.
.It

View File

@ -23,7 +23,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $Id$
.\" $Id: shmat.2,v 1.1 1995/10/03 19:17:20 joerg Exp $
.\"
.Dd August 2, 1995
.Dt SHMAT 2
@ -42,7 +42,7 @@
.Fn "shmdt" "void *addr"
.Sh DESCRIPTION
.Fn Shmat
attaches the shared memory segment identifed by
attaches the shared memory segment identified by
.Fa shmid
to the calling process's address space. The address where the segment
is attached is determined as follows:
@ -59,7 +59,7 @@ kernel.
.It
If
.Fa addr
is nonzero and SHM_RND is not specifed in
is nonzero and SHM_RND is not specified in
.Fa flag ,
the segment is attached the specified address.
.It

View File

@ -23,7 +23,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $Id$
.\" $Id: shmctl.2,v 1.1 1995/10/03 19:17:21 joerg Exp $
.\"
.Dd July 17, 1995
.Dt SHMCTL 2
@ -76,13 +76,13 @@ to succeed, the calling process's effective uid must match
.Fa shm_perm.uid
or
.Fa shm_perm.cuid ,
or the process must have superuser privilges.
or the process must have superuser privileges.
.\" .It Dv SHM_LOCK
.\" Locks the segment in memory. The calling process must have
.\" superuser privileges. Not implemented in FreeBSD.
.\" .It Dv SHM_UNLOCK
.\" Unlocks the segment from memory. The calling process must
.\" have superuser priviliges. Not implemented in FreeBSD.
.\" have superuser privileges. Not implemented in FreeBSD.
.El
.Pp
The

View File

@ -23,7 +23,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $Id$
.\" $Id: shmget.2,v 1.1 1995/10/03 19:17:21 joerg Exp $
.\"
.Dd July 3, 1995
.Dt SHMGET 2
@ -116,7 +116,7 @@ will fail if:
.\"
.It Bq Er EINVAL
Size specified is greater than the size of the previously existing segment.
Size specified is less than the system imposed minumum, or greater than
Size specified is less than the system imposed minimum, or greater than
the system imposed maximum.
.It Bq Er ENOENT
No shared memory segment was found matching

View File

@ -258,7 +258,7 @@ depend on the time stamps being contiguous (in calls to
Applying
.Xr fstat
to a socket (and thus to a pipe)
returns a zero'd buffer,
returns a zeroed buffer,
except for the blocksize field,
and a unique device and inode number.
.Sh STANDARDS

View File

@ -10,7 +10,7 @@
.Op options
.Sh DESCRIPTION
.Nm Comcontrol
is used to examine and modify some of the special characterstics
is used to examine and modify some of the special characteristics
of the specified sio device.
If no arguments other than the device are specified,
it prints the settings of all controllable characteristics.

View File

@ -3,7 +3,7 @@
.\".Os BSD 4
.Sh NAME
.Nm fdisk
.Nd DOS partition maintainance program
.Nd DOS partition maintenance program
.Sh SYNOPSIS
.Nm
.Op Fl i
@ -136,7 +136,7 @@ When you are done with a partition,
.Nm
will display it and ask if it is correct.
.Nm
will then procede to the next entry.
will then proceed to the next entry.
.Pp
Getting the
.Em cyl, sector,
@ -176,7 +176,7 @@ The automatic calculation of starting cylinder etc. uses
a set of figures that represent what the BIOS thinks is the
geometry of the drive.
These figures are by default taken from the incore disklabel,
but the program initially gives you an oportunity to change them.
but the program initially gives you an opportunity to change them.
This allows the user to create a bootblock that can work with drives
that use geometry translation under the BIOS.
.Pp

View File

@ -10,7 +10,7 @@
.Op options
.Sh DESCRIPTION
.Nm Comcontrol
is used to examine and modify some of the special characterstics
is used to examine and modify some of the special characteristics
of the specified sio device.
If no arguments other than the device are specified,
it prints the settings of all controllable characteristics.

View File

@ -3,7 +3,7 @@
.\".Os BSD 4
.Sh NAME
.Nm fdisk
.Nd DOS partition maintainance program
.Nd DOS partition maintenance program
.Sh SYNOPSIS
.Nm
.Op Fl i
@ -136,7 +136,7 @@ When you are done with a partition,
.Nm
will display it and ask if it is correct.
.Nm
will then procede to the next entry.
will then proceed to the next entry.
.Pp
Getting the
.Em cyl, sector,
@ -176,7 +176,7 @@ The automatic calculation of starting cylinder etc. uses
a set of figures that represent what the BIOS thinks is the
geometry of the drive.
These figures are by default taken from the incore disklabel,
but the program initially gives you an oportunity to change them.
but the program initially gives you an opportunity to change them.
This allows the user to create a bootblock that can work with drives
that use geometry translation under the BIOS.
.Pp