Remove duplicate words.

This commit is contained in:
Dima Dorfman 2001-06-24 01:34:38 +00:00
parent bdd87f4f44
commit a910f192bb
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=78686
24 changed files with 27 additions and 27 deletions

View File

@ -1686,7 +1686,7 @@ value may optionally be followed by one of
.Dq m .Dq m
or or
.Dq h .Dq h
to explicitly specify seconds, minutes or or hours. to explicitly specify seconds, minutes or hours.
If none is supplied, If none is supplied,
.Dq s .Dq s
is assumed. is assumed.

View File

@ -133,7 +133,7 @@ and the database already contains an entry for
that entry is not replaced. that entry is not replaced.
Otherwise the entry is replaced or inserted. Otherwise the entry is replaced or inserted.
.Fn dbm_store .Fn dbm_store
normally returns returns zero but returns 1 if the entry could not be normally returns zero but returns 1 if the entry could not be
inserted (because inserted (because
.Fa flags .Fa flags
is is

View File

@ -278,7 +278,7 @@ they returned upon all errors except
and and
.Er ETXTBSY . .Er ETXTBSY .
This was inferior to the traditional error handling, This was inferior to the traditional error handling,
since it it breaks the ignoring of errors for path prefixes since it breaks the ignoring of errors for path prefixes
and only improves the handling of the unusual ambiguous error and only improves the handling of the unusual ambiguous error
.Er EFAULT .Er EFAULT
and the unusual error and the unusual error

View File

@ -55,7 +55,7 @@ MIB variable
.Dq Li kern.bootfile . .Dq Li kern.bootfile .
.Sh RETURN VALUES .Sh RETURN VALUES
If the call succeeds a string giving the pathname is returned. If it If the call succeeds a string giving the pathname is returned. If it
fails, a a null pointer is returned and an error code is fails, a null pointer is returned and an error code is
placed in the global location placed in the global location
.Va errno . .Va errno .
.Sh SEE ALSO .Sh SEE ALSO

View File

@ -47,7 +47,7 @@ least
ACL entries. A pointer to the working storage is returned. The working ACL entries. A pointer to the working storage is returned. The working
storage allocated to contain the ACL is freed by a call to storage allocated to contain the ACL is freed by a call to
.Xr acl_free 3 . .Xr acl_free 3 .
When the area is first allocated, it shall contain an an ACL that contains When the area is first allocated, it shall contain an ACL that contains
no ACL entries. no ACL entries.
.Pp .Pp
This function may cause memory to be allocated. The caller should free any This function may cause memory to be allocated. The caller should free any

View File

@ -91,7 +91,7 @@ For
.Fn cbc_crypt , .Fn cbc_crypt ,
the parameter the parameter
.Fa ivec .Fa ivec
is the the 8-byte initialization is the 8-byte initialization
vector for the chaining. vector for the chaining.
It is updated to the next initialization It is updated to the next initialization
vector upon return. vector upon return.

View File

@ -171,7 +171,7 @@ library are the main clients of these four routines.
takes a server netname and a takes a server netname and a
.Tn DES .Tn DES
key, and decrypts the key by key, and decrypts the key by
using the the public key of the the server and the secret key using the public key of the server and the secret key
associated with the effective uid of the calling process. It associated with the effective uid of the calling process. It
is the inverse of is the inverse of
.Fn key_encryptsession . .Fn key_encryptsession .

View File

@ -282,7 +282,7 @@ The filter returns under the same conditions as aio_error.
.Pp .Pp
Alternatively, a kevent structure may be initialized, with Alternatively, a kevent structure may be initialized, with
.Va ident .Va ident
containing the descriptor of the the kqueue, and the containing the descriptor of the kqueue, and the
address of the kevent structure placed in the address of the kevent structure placed in the
.Va aio_lio_opcode .Va aio_lio_opcode
field of the AIO request. However, this approach will not work on field of the AIO request. However, this approach will not work on

View File

@ -87,7 +87,7 @@ If it begins with an underscore
then the then the
.Tn DES .Tn DES
Extended Format Extended Format
is used in interpreting both the the key and the salt, as outlined below. is used in interpreting both the key and the salt, as outlined below.
.It Modular .It Modular
If it begins with the string If it begins with the string
.Dq $digit$ .Dq $digit$
@ -108,7 +108,7 @@ a CPU second and MD5 to do about 62 crypts a CPU second.
The The
.Ar key .Ar key
is divided into groups of 8 characters (the last group is null-padded) is divided into groups of 8 characters (the last group is null-padded)
and the low-order 7 bits of each each character (56 bits per group) are and the low-order 7 bits of each character (56 bits per group) are
used to form the used to form the
.Tn DES .Tn DES
key as follows: key as follows:

View File

@ -154,7 +154,7 @@ The
.Va type , .Va type ,
and and
.Va service .Va service
arguments must be be set to appropriate values as defined in the arguments must be set to appropriate values as defined in the
TACACS+ protocol specification. The TACACS+ protocol specification. The
.Aq taclib.h .Aq taclib.h
header file contains symbolic constants for these values. header file contains symbolic constants for these values.

View File

@ -165,7 +165,7 @@ Boot flags:
.Bl -tag -width "-CXX" -compact .Bl -tag -width "-CXX" -compact
.It Fl a .It Fl a
during kernel initialization, during kernel initialization,
ask for the device to mount as as the root file system. ask for the device to mount as the root file system.
.It Fl C .It Fl C
boot from CDROM. boot from CDROM.
.It Fl c .It Fl c

View File

@ -287,7 +287,7 @@ Set or get the status of the
.Dq header complete .Dq header complete
flag. flag.
Set to zero if the link level source address should be filled in automatically Set to zero if the link level source address should be filled in automatically
by the the interface output routine. Set to one if the link level source by the interface output routine. Set to one if the link level source
address will be written, as provided, to the wire. This flag is initialized address will be written, as provided, to the wire. This flag is initialized
to zero by default. to zero by default.
.It Dv BIOCSSEESENT .It Dv BIOCSSEESENT

View File

@ -57,7 +57,7 @@ internal actions according to the settings found there.
.Pp .Pp
The The
.Pa /etc/make.conf .Pa /etc/make.conf
file is included from the the appropriate file is included from the appropriate
.Pa Makefile .Pa Makefile
which specifies the default settings for all the available options. which specifies the default settings for all the available options.
Options need only be specified in Options need only be specified in
@ -262,7 +262,7 @@ For example,
KERNEL=MINE DEBUG GENERIC OTHERMACHINE KERNEL=MINE DEBUG GENERIC OTHERMACHINE
.Ed .Ed
.Pp .Pp
will build the the kernels specified by the config files will build the kernels specified by the config files
.Pa MINE , DEBUG , GENERIC , .Pa MINE , DEBUG , GENERIC ,
and and
.Pa OTHERMACHINE , .Pa OTHERMACHINE ,

View File

@ -114,7 +114,7 @@ for the default value.
.It Va pccard_ifconfig .It Va pccard_ifconfig
.Pq Vt str .Pq Vt str
List of arguments to be passed to ifconfig(8) at boot time or on List of arguments to be passed to ifconfig(8) at boot time or on
insertion of of the card (e.g. "inet 192.168.1.1 netmask 255.255.255.0" insertion of the card (e.g. "inet 192.168.1.1 netmask 255.255.255.0"
for a fixed address or "DHCP" for a DHCP client). for a fixed address or "DHCP" for a DHCP client).
.It Va pccard_beep .It Va pccard_beep
.Pq Vt integer .Pq Vt integer

View File

@ -132,11 +132,11 @@ this stage. See
and and
.Ev BATCH . .Ev BATCH .
.It Ar build .It Ar build
Build the the port. This is the same as calling the Build the port. This is the same as calling the
.Ar all .Ar all
target. target.
.It Ar install .It Ar install
Install the the port and register it with the package system. This Install the port and register it with the package system. This
is all you really need to do. is all you really need to do.
.El .El
.Pp .Pp

View File

@ -112,7 +112,7 @@ of work by the hacker to cleanup after himself, so most hackers do install
backdoors. This gives you a convienient way to detect the hacker. Making backdoors. This gives you a convienient way to detect the hacker. Making
it impossible for a hacker to install a backdoor may actually be detrimental it impossible for a hacker to install a backdoor may actually be detrimental
to your security because it will not close off the hole the hacker found to to your security because it will not close off the hole the hacker found to
break in in the first place. break in the first place.
.Pp .Pp
Security remedies should always be implemented with a multi-layered Security remedies should always be implemented with a multi-layered
.Sq onion peel .Sq onion peel

View File

@ -185,7 +185,7 @@ with
.Em tunefs -n enable /filesystem. .Em tunefs -n enable /filesystem.
(Note: In 5.x softupdates can be turned on using the -U option to newfs). (Note: In 5.x softupdates can be turned on using the -U option to newfs).
Softupdates drastically improves meta-data performance, mainly file Softupdates drastically improves meta-data performance, mainly file
creation and deletion. We recommend turning softupdates on on all of your creation and deletion. We recommend turning softupdates on all of your
filesystems. There are two downsides to softupdates that you should be filesystems. There are two downsides to softupdates that you should be
aware of: First, softupdates guarantees filesystem consistency in the aware of: First, softupdates guarantees filesystem consistency in the
case of a crash but could very easily be several seconds (even a minute!) case of a crash but could very easily be several seconds (even a minute!)

View File

@ -52,7 +52,7 @@ these namespaces:
.Dv EXTATTR_NAMESPACE_USER , .Dv EXTATTR_NAMESPACE_USER ,
.Dv EXTATTR_NAMESPACE_SYSTEM . .Dv EXTATTR_NAMESPACE_SYSTEM .
The semantics of these attributes are intended to be as follows: user The semantics of these attributes are intended to be as follows: user
attribute data is protected according the the normal discretionary attribute data is protected according the normal discretionary
and mandatory protections associated with the data in the file or and mandatory protections associated with the data in the file or
directory; system attribute data is protected such that appropriate directory; system attribute data is protected such that appropriate
privilege is required to directly access or manipulate these attributes. privilege is required to directly access or manipulate these attributes.

View File

@ -160,7 +160,7 @@ It is the current directory if the name passed in doesn't start with /
and we have not gone through any symlinks with an absolute path, and and we have not gone through any symlinks with an absolute path, and
the root otherwise. the root otherwise.
.Pp .Pp
In this case, it is is only used by lookup(), and should not be In this case, it is only used by lookup(), and should not be
considered valid after a call to namei(). considered valid after a call to namei().
.Pp .Pp
If SAVESTART is set, this is set to the same as ni_dvp, with an extra If SAVESTART is set, this is set to the same as ni_dvp, with an extra

View File

@ -87,7 +87,7 @@ Using the
or or
.Fl U Ar user .Fl U Ar user
flags, you may also display the current resource settings modified flags, you may also display the current resource settings modified
by the the appropriate login class resource limit entries from by the appropriate login class resource limit entries from
the the
.Xr login.conf 5 .Xr login.conf 5
login capabilities database. login capabilities database.

View File

@ -59,7 +59,7 @@ the configuration file
.Sh ENVIRONMENT .Sh ENVIRONMENT
.Bl -tag -width /var/db/locate.database -compact .Bl -tag -width /var/db/locate.database -compact
.It Pa LOCATE_CONFIG .It Pa LOCATE_CONFIG
path to the the configuration file path to the configuration file
.El .El
.Sh SEE ALSO .Sh SEE ALSO
.Xr locate 1 , .Xr locate 1 ,

View File

@ -137,7 +137,7 @@ Terminal name to translate.
.Pp .Pp
If no terminal specified with the If no terminal specified with the
.Fl t .Fl t
option, then the terminal name to to translate will be taken from the option, then the terminal name to translate will be taken from the
environment variable environment variable
.Ev TERM . .Ev TERM .
.Sh FILES .Sh FILES

View File

@ -491,7 +491,7 @@ If the file
.Pa .fakeid .Pa .fakeid
exists in the home directory of the identified user, report the username exists in the home directory of the identified user, report the username
found in that file instead of the real username. found in that file instead of the real username.
If the the username found in If the username found in
.Pa .fakeid .Pa .fakeid
is that of an existing user, is that of an existing user,
then the real username is reported. then the real username is reported.

View File

@ -161,7 +161,7 @@ default configuration file
.It Pa /etc/pccard.conf .It Pa /etc/pccard.conf
user configuration file user configuration file
.It Pa /var/run/pccardd.pid .It Pa /var/run/pccardd.pid
process id of of the currently running process id of the currently running
.Nm .Nm
.El .El
.Sh SEE ALSO .Sh SEE ALSO