Expand contractions.
This commit is contained in:
parent
bceab447de
commit
36a142c455
@ -337,6 +337,6 @@ A
|
|||||||
command appeared in
|
command appeared in
|
||||||
.At v1 .
|
.At v1 .
|
||||||
.Sh BUGS
|
.Sh BUGS
|
||||||
There's no
|
There is no
|
||||||
.Ar perm
|
.Ar perm
|
||||||
option for the naughty bits.
|
option for the naughty bits.
|
||||||
|
@ -87,7 +87,7 @@ Choose only from potentially offensive aphorisms.
|
|||||||
Please, please, please request a potentially offensive fortune if and
|
Please, please, please request a potentially offensive fortune if and
|
||||||
only if you believe, deep down in your heart, that you are willing
|
only if you believe, deep down in your heart, that you are willing
|
||||||
to be offended.
|
to be offended.
|
||||||
(And that if you are not willing, you'll just quit using
|
(And that if you are not willing, you will just quit using
|
||||||
.Fl o
|
.Fl o
|
||||||
rather than give us
|
rather than give us
|
||||||
grief about it, okay?)
|
grief about it, okay?)
|
||||||
@ -154,7 +154,7 @@ will pick out 90% of its fortunes from
|
|||||||
.Em funny
|
.Em funny
|
||||||
(the
|
(the
|
||||||
.Dq 10% not-funny
|
.Dq 10% not-funny
|
||||||
is unnecessary, since 10% is all that's left).
|
is unnecessary, since 10% is all that is left).
|
||||||
The
|
The
|
||||||
.Fl e
|
.Fl e
|
||||||
option says to consider all files equal;
|
option says to consider all files equal;
|
||||||
|
@ -384,7 +384,7 @@ Vendor-specific attributes used by Joerg Schilling's
|
|||||||
implementation.
|
implementation.
|
||||||
.It Cm SCHILY.acl.access , Cm SCHILY.acl.default
|
.It Cm SCHILY.acl.access , Cm SCHILY.acl.default
|
||||||
Stores the access and default ACLs as textual strings in a format
|
Stores the access and default ACLs as textual strings in a format
|
||||||
that's an extension of the format specified by POSIX.1e draft 17.
|
that is an extension of the format specified by POSIX.1e draft 17.
|
||||||
In particular, each user or group access specification can include a fourth
|
In particular, each user or group access specification can include a fourth
|
||||||
colon-separated field with the numeric UID or GID.
|
colon-separated field with the numeric UID or GID.
|
||||||
This allows ACLs to be restored on systems that may not have complete
|
This allows ACLs to be restored on systems that may not have complete
|
||||||
@ -570,7 +570,7 @@ The header contains a list of fragment offset/length pairs.
|
|||||||
If more than four such entries are required, the header is
|
If more than four such entries are required, the header is
|
||||||
extended as necessary with
|
extended as necessary with
|
||||||
.Dq extra
|
.Dq extra
|
||||||
header extensions (an older format that's no longer used), or
|
header extensions (an older format that is no longer used), or
|
||||||
.Dq sparse
|
.Dq sparse
|
||||||
extensions.
|
extensions.
|
||||||
.It "V"
|
.It "V"
|
||||||
|
@ -324,7 +324,7 @@ does not exist
|
|||||||
.Pp
|
.Pp
|
||||||
Names consist of one or more characters.
|
Names consist of one or more characters.
|
||||||
Names may contain any character
|
Names may contain any character
|
||||||
except `:', but it's usually best to restrict them to the printable
|
except `:', but it is usually best to restrict them to the printable
|
||||||
characters and avoid use of graphics like `#', `=', `%', `@', etc.
|
characters and avoid use of graphics like `#', `=', `%', `@', etc.
|
||||||
Types
|
Types
|
||||||
are single characters used to separate capability names from their
|
are single characters used to separate capability names from their
|
||||||
|
@ -121,7 +121,7 @@ Find
|
|||||||
.Fa item
|
.Fa item
|
||||||
in
|
in
|
||||||
.Fa sl ,
|
.Fa sl ,
|
||||||
returning NULL if it's not found.
|
returning NULL if it is not found.
|
||||||
.El
|
.El
|
||||||
.Sh SEE ALSO
|
.Sh SEE ALSO
|
||||||
.Xr free 3 ,
|
.Xr free 3 ,
|
||||||
|
@ -118,7 +118,7 @@ element of
|
|||||||
.Fa tzname
|
.Fa tzname
|
||||||
to a pointer to an
|
to a pointer to an
|
||||||
.Tn ASCII
|
.Tn ASCII
|
||||||
string that's the time zone abbreviation to be
|
string that is the time zone abbreviation to be
|
||||||
used with
|
used with
|
||||||
.Fn localtime Ns 's
|
.Fn localtime Ns 's
|
||||||
return value.
|
return value.
|
||||||
|
@ -95,7 +95,7 @@ The
|
|||||||
structure is defined as follows:
|
structure is defined as follows:
|
||||||
.\"
|
.\"
|
||||||
.\" I fiddled with the spaces a bit to make it fit well when viewed
|
.\" I fiddled with the spaces a bit to make it fit well when viewed
|
||||||
.\" with nroff, but otherwise it's straight from sys/shm.h
|
.\" with nroff, but otherwise it is straight from sys/shm.h
|
||||||
.\"
|
.\"
|
||||||
.Bd -literal
|
.Bd -literal
|
||||||
struct shmid_ds {
|
struct shmid_ds {
|
||||||
|
@ -73,7 +73,7 @@ The
|
|||||||
.Fn ascftime
|
.Fn ascftime
|
||||||
function is almost identical to
|
function is almost identical to
|
||||||
.Xr strftime 3 ,
|
.Xr strftime 3 ,
|
||||||
with the only exception that there's no parameter to tell about the
|
with the only exception that there is no parameter to tell about the
|
||||||
maximal buffer length, and the
|
maximal buffer length, and the
|
||||||
.Fa format
|
.Fa format
|
||||||
parameter defaults to
|
parameter defaults to
|
||||||
|
@ -319,5 +319,5 @@ though.
|
|||||||
.Pp
|
.Pp
|
||||||
Due to emphasis on
|
Due to emphasis on
|
||||||
compactness and simplicity,
|
compactness and simplicity,
|
||||||
it's not strikingly fast.
|
it is not strikingly fast.
|
||||||
It does give special attention to handling simple cases quickly.
|
It does give special attention to handling simple cases quickly.
|
||||||
|
@ -429,7 +429,7 @@ If
|
|||||||
has been set with
|
has been set with
|
||||||
.Fn el_set ,
|
.Fn el_set ,
|
||||||
then this is done automatically.
|
then this is done automatically.
|
||||||
Otherwise, it's the responsibility of the application to call
|
Otherwise, it is the responsibility of the application to call
|
||||||
.Fn el_resize
|
.Fn el_resize
|
||||||
on the appropriate occasions.
|
on the appropriate occasions.
|
||||||
.It Fn el_line
|
.It Fn el_line
|
||||||
@ -511,7 +511,7 @@ Clear the history.
|
|||||||
.Xc
|
.Xc
|
||||||
Define functions to perform various history operations.
|
Define functions to perform various history operations.
|
||||||
.Fa ptr
|
.Fa ptr
|
||||||
is the argument given to a function when it's invoked.
|
is the argument given to a function when it is invoked.
|
||||||
.It Dv H_FIRST
|
.It Dv H_FIRST
|
||||||
Return the first element in the history.
|
Return the first element in the history.
|
||||||
.It Dv H_LAST
|
.It Dv H_LAST
|
||||||
|
@ -341,7 +341,7 @@ The
|
|||||||
and
|
and
|
||||||
.Fn fetchPutHTTP
|
.Fn fetchPutHTTP
|
||||||
functions implement the HTTP/1.1 protocol.
|
functions implement the HTTP/1.1 protocol.
|
||||||
With a little luck, there's
|
With a little luck, there is
|
||||||
even a chance that they comply with RFC2616 and RFC2617.
|
even a chance that they comply with RFC2616 and RFC2617.
|
||||||
.Pp
|
.Pp
|
||||||
If the
|
If the
|
||||||
@ -641,7 +641,7 @@ examples of this are
|
|||||||
.Fn fetchListFTP
|
.Fn fetchListFTP
|
||||||
and FTP proxy support.
|
and FTP proxy support.
|
||||||
.Pp
|
.Pp
|
||||||
There's no way to select a proxy at run-time other than setting the
|
There is no way to select a proxy at run-time other than setting the
|
||||||
.Ev HTTP_PROXY
|
.Ev HTTP_PROXY
|
||||||
or
|
or
|
||||||
.Ev FTP_PROXY
|
.Ev FTP_PROXY
|
||||||
|
@ -111,7 +111,7 @@ On failure, the error code from the server.
|
|||||||
The
|
The
|
||||||
.Fn ftpErrno
|
.Fn ftpErrno
|
||||||
function returns the server failure code for the last operation (useful for
|
function returns the server failure code for the last operation (useful for
|
||||||
seeing more about what happened if you're familiar with FTP error codes).
|
seeing more about what happened if you are familiar with FTP error codes).
|
||||||
The
|
The
|
||||||
.Fn ftpErrString
|
.Fn ftpErrString
|
||||||
function returns a human readable version of the supplied server failure code.
|
function returns a human readable version of the supplied server failure code.
|
||||||
@ -255,6 +255,6 @@ extensions from Jean-Marc Zucconi.
|
|||||||
and
|
and
|
||||||
.An Jean-Marc Zucconi
|
.An Jean-Marc Zucconi
|
||||||
.Sh BUGS
|
.Sh BUGS
|
||||||
I'm sure you can get this thing's internal state machine confused if
|
I am sure you can get this thing's internal state machine confused if
|
||||||
you really work at it, but so far it's proven itself pretty robust in
|
you really work at it, but so far it has proven itself pretty robust in
|
||||||
all my tests.
|
all my tests.
|
||||||
|
@ -412,7 +412,7 @@ blank the display if the argument
|
|||||||
.Va blank
|
.Va blank
|
||||||
\*(Ne 0.
|
\*(Ne 0.
|
||||||
This can be done to shut off the screen during display updates that
|
This can be done to shut off the screen during display updates that
|
||||||
the user should first see when it's done.
|
the user should first see when it is done.
|
||||||
.Ss Program termination and signal processing
|
.Ss Program termination and signal processing
|
||||||
It is important to call
|
It is important to call
|
||||||
.Fn VGLEnd
|
.Fn VGLEnd
|
||||||
|
@ -92,7 +92,7 @@ omitted, standard mailbox assumed.
|
|||||||
.Sh FILES
|
.Sh FILES
|
||||||
.Bl -tag -width ".Pa /var/mail/user" -compact
|
.Bl -tag -width ".Pa /var/mail/user" -compact
|
||||||
.It Pa /var/run/utmp
|
.It Pa /var/run/utmp
|
||||||
to find out who's logged on and on what terminals
|
to find out who is logged on and on what terminals
|
||||||
.It Pa /var/mail/user
|
.It Pa /var/mail/user
|
||||||
standard mailbox
|
standard mailbox
|
||||||
.El
|
.El
|
||||||
|
@ -173,7 +173,7 @@ If the
|
|||||||
.Fl d
|
.Fl d
|
||||||
option is given,
|
option is given,
|
||||||
.Nm
|
.Nm
|
||||||
will report on the child processes creation of a new netgraph socket, it's
|
will report on the child processes creation of a new netgraph socket, its
|
||||||
service offer and the invocation of the
|
service offer and the invocation of the
|
||||||
.Xr ppp 8
|
.Xr ppp 8
|
||||||
program.
|
program.
|
||||||
|
@ -70,7 +70,7 @@ to run in the foreground.
|
|||||||
.It Fl r
|
.It Fl r
|
||||||
Causes
|
Causes
|
||||||
.Nm
|
.Nm
|
||||||
to issue a coldStart TRAP on all ATM interfaces it's able to open and exit.
|
to issue a coldStart TRAP on all ATM interfaces it is able to open and exit.
|
||||||
.El
|
.El
|
||||||
.Sh NOTES
|
.Sh NOTES
|
||||||
This daemon does not fully conform to the ATM Forum ILMI specifications.
|
This daemon does not fully conform to the ATM Forum ILMI specifications.
|
||||||
|
@ -133,7 +133,7 @@ Set his system name for the authentication protocol.
|
|||||||
For CHAP, this
|
For CHAP, this
|
||||||
will only be used as a hint, causing a warning message if remote did
|
will only be used as a hint, causing a warning message if remote did
|
||||||
supply a different name.
|
supply a different name.
|
||||||
For PAP, it's the name remote must use to
|
For PAP, it is the name remote must use to
|
||||||
authenticate himself (in connection with his secret).
|
authenticate himself (in connection with his secret).
|
||||||
.It Va myauthsecret Ns Li = Ns Ar secret
|
.It Va myauthsecret Ns Li = Ns Ar secret
|
||||||
Set my secret (key, password) for use in the authentication phase.
|
Set my secret (key, password) for use in the authentication phase.
|
||||||
@ -151,7 +151,7 @@ needs to authenticate.
|
|||||||
.It Va hisauthkey Ns Li = Ns Va secret
|
.It Va hisauthkey Ns Li = Ns Va secret
|
||||||
Same as above.
|
Same as above.
|
||||||
.It Va callin
|
.It Va callin
|
||||||
Require remote to authenticate himself only when he's calling in, but
|
Require remote to authenticate himself only when he is calling in, but
|
||||||
not when we are caller.
|
not when we are caller.
|
||||||
This is required for some peers that do not
|
This is required for some peers that do not
|
||||||
implement the authentication protocols symmetrically (like Ascend
|
implement the authentication protocols symmetrically (like Ascend
|
||||||
|
@ -391,7 +391,7 @@ The original 82c168 PNIC chip has built in NWAY support which is
|
|||||||
used on certain early LinkSys LNE100TX and Matrox FastNIC cards,
|
used on certain early LinkSys LNE100TX and Matrox FastNIC cards,
|
||||||
however it is horribly broken and difficult to use reliably.
|
however it is horribly broken and difficult to use reliably.
|
||||||
Consequently, autonegotiation is not currently supported for this
|
Consequently, autonegotiation is not currently supported for this
|
||||||
chipset: the driver defaults the NIC to 10baseT half duplex, and it's
|
chipset: the driver defaults the NIC to 10baseT half duplex, and it is
|
||||||
up to the operator to manually select a different mode if necessary.
|
up to the operator to manually select a different mode if necessary.
|
||||||
(Later cards use an external MII transceiver to implement NWAY
|
(Later cards use an external MII transceiver to implement NWAY
|
||||||
autonegotiation and work correctly.)
|
autonegotiation and work correctly.)
|
||||||
|
@ -269,7 +269,7 @@ long word is assumed.
|
|||||||
.Sy Warning :
|
.Sy Warning :
|
||||||
since there is no delimiter between expressions, strange
|
since there is no delimiter between expressions, strange
|
||||||
things may happen.
|
things may happen.
|
||||||
It's best to enclose each expression in parentheses.
|
It is best to enclose each expression in parentheses.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Cm set
|
.Cm set
|
||||||
.Li \&$ Ns Ar variable
|
.Li \&$ Ns Ar variable
|
||||||
|
@ -170,10 +170,10 @@ Whistle Communications Corp.
|
|||||||
.Sh BUGS
|
.Sh BUGS
|
||||||
This is an attempt to provide a clean way for user mode processes
|
This is an attempt to provide a clean way for user mode processes
|
||||||
to implement various IP tricks like address translation, but it
|
to implement various IP tricks like address translation, but it
|
||||||
could be cleaner, and it's too dependent on
|
could be cleaner, and it is too dependent on
|
||||||
.Xr ipfw 8 .
|
.Xr ipfw 8 .
|
||||||
.Pp
|
.Pp
|
||||||
It's questionable whether incoming fragments should be reassembled
|
It is questionable whether incoming fragments should be reassembled
|
||||||
before being diverted.
|
before being diverted.
|
||||||
For example, if only some fragments of a
|
For example, if only some fragments of a
|
||||||
packet destined for another machine do not get routed through the
|
packet destined for another machine do not get routed through the
|
||||||
|
@ -312,7 +312,7 @@ whenever these problems occur, but otherwise there is no problem with
|
|||||||
recovering from these conditions.
|
recovering from these conditions.
|
||||||
.Pp
|
.Pp
|
||||||
The NIC memory access to 3Com and Novell cards is much slower than it is on
|
The NIC memory access to 3Com and Novell cards is much slower than it is on
|
||||||
WD/SMC cards; it's less than 1MB/second on 8bit boards and less than 2MB/second
|
WD/SMC cards; it is less than 1MB/second on 8bit boards and less than 2MB/second
|
||||||
on the 16bit cards.
|
on the 16bit cards.
|
||||||
This can lead to ring-buffer overruns resulting in
|
This can lead to ring-buffer overruns resulting in
|
||||||
dropped packets during heavy network traffic.
|
dropped packets during heavy network traffic.
|
||||||
|
@ -258,8 +258,8 @@ interface. portno defaults to 5556.
|
|||||||
|
|
||||||
Type 'getsyms' after connection to load kld symbols.
|
Type 'getsyms' after connection to load kld symbols.
|
||||||
|
|
||||||
If you're debugging a local system, you can use 'kldsyms' instead
|
If you are debugging a local system, you can use 'kldsyms' instead
|
||||||
to load the kld symbols. That's a less obnoxious interface.
|
to load the kld symbols. That is a less obnoxious interface.
|
||||||
(gdb) trf
|
(gdb) trf
|
||||||
0xc21bd378 in ?? ()
|
0xc21bd378 in ?? ()
|
||||||
.Ed
|
.Ed
|
||||||
|
@ -112,7 +112,7 @@ and its length via
|
|||||||
If the device does not support returning the WEP key or the user is not
|
If the device does not support returning the WEP key or the user is not
|
||||||
root then the key may be returned as all zeros.
|
root then the key may be returned as all zeros.
|
||||||
Technically this is a
|
Technically this is a
|
||||||
valid key, but it's the kind of key an idiot would put on his luggage so
|
valid key, but it is the kind of key an idiot would put on his luggage so
|
||||||
we use it as a special value.
|
we use it as a special value.
|
||||||
Generally, only four WEP keys are allowed, but some devices support more.
|
Generally, only four WEP keys are allowed, but some devices support more.
|
||||||
If so, the first four (0-3) are
|
If so, the first four (0-3) are
|
||||||
|
@ -47,7 +47,7 @@ and to utilize different I2C controllers.
|
|||||||
I2C is an acronym for Inter Integrated Circuit bus.
|
I2C is an acronym for Inter Integrated Circuit bus.
|
||||||
The I2C bus was developed
|
The I2C bus was developed
|
||||||
in the early 1980's by Philips semiconductors.
|
in the early 1980's by Philips semiconductors.
|
||||||
It's purpose was to provide an
|
Its purpose was to provide an
|
||||||
easy way to connect a CPU to peripheral chips in a TV-set.
|
easy way to connect a CPU to peripheral chips in a TV-set.
|
||||||
.Pp
|
.Pp
|
||||||
The BUS physically consists of 2 active wires and a ground connection.
|
The BUS physically consists of 2 active wires and a ground connection.
|
||||||
|
@ -317,7 +317,7 @@ and AH authenticates encapsulating
|
|||||||
packet, not the encapsulated
|
packet, not the encapsulated
|
||||||
(inner)
|
(inner)
|
||||||
packet
|
packet
|
||||||
(so for the receiving kernel there's no sign of authenticity).
|
(so for the receiving kernel there is no sign of authenticity).
|
||||||
The issue will be solved when we revamp our policy engine to keep all the
|
The issue will be solved when we revamp our policy engine to keep all the
|
||||||
packet decapsulation history.
|
packet decapsulation history.
|
||||||
.Pp
|
.Pp
|
||||||
|
@ -150,7 +150,7 @@ Erase the pencil mark and reboot.
|
|||||||
.Xr ifconfig 8
|
.Xr ifconfig 8
|
||||||
.Sh STANDARDS
|
.Sh STANDARDS
|
||||||
are great.
|
are great.
|
||||||
There's so many to choose from.
|
There is so many to choose from.
|
||||||
.Sh BUGS
|
.Sh BUGS
|
||||||
Support for the 3Com 3C1 is not working.
|
Support for the 3Com 3C1 is not working.
|
||||||
Support for the 3CCFEM556 Fast Ethernet cards has not been tested.
|
Support for the 3CCFEM556 Fast Ethernet cards has not been tested.
|
||||||
|
@ -102,7 +102,7 @@ the lower 16Mb of physical memory.
|
|||||||
The
|
The
|
||||||
.Nm
|
.Nm
|
||||||
driver assumes the memory it allocates is within the lower 16Mb range.
|
driver assumes the memory it allocates is within the lower 16Mb range.
|
||||||
This is not a very valid assumption but there's nothing that can be done
|
This is not a very valid assumption but there is nothing that can be done
|
||||||
about it yet.
|
about it yet.
|
||||||
For shared memory NICs this is not relevant.
|
For shared memory NICs this is not relevant.
|
||||||
.It "lnc%d: Device timeout -- Resetting"
|
.It "lnc%d: Device timeout -- Resetting"
|
||||||
|
@ -201,7 +201,7 @@ with anecdotal reports of limited success coming from testers with
|
|||||||
early-revision SCO media.
|
early-revision SCO media.
|
||||||
In theory, the basic SVR4 ABI should be constant
|
In theory, the basic SVR4 ABI should be constant
|
||||||
across the set of vendors who produce SVR4 operating systems, but in
|
across the set of vendors who produce SVR4 operating systems, but in
|
||||||
practice that's probably not the case.
|
practice that is probably not the case.
|
||||||
If necessary, future work can
|
If necessary, future work can
|
||||||
either implement additional
|
either implement additional
|
||||||
.Xr kld 4
|
.Xr kld 4
|
||||||
|
@ -201,7 +201,7 @@ is disabled, over the (single) PPP link.
|
|||||||
.Pp
|
.Pp
|
||||||
Typically when the controlling entity receives an unexpected packet on the
|
Typically when the controlling entity receives an unexpected packet on the
|
||||||
.Dv bypass
|
.Dv bypass
|
||||||
hook it responds either by dropping the frame (if it's not ready for
|
hook it responds either by dropping the frame (if it is not ready for
|
||||||
the protocol) or with an LCP protocol reject (if it does not recognize
|
the protocol) or with an LCP protocol reject (if it does not recognize
|
||||||
or expect the protocol).
|
or expect the protocol).
|
||||||
.Sh MULTILINK OPERATION
|
.Sh MULTILINK OPERATION
|
||||||
|
@ -93,7 +93,7 @@ struct ngpppoestat {
|
|||||||
This generic message returns is a human-readable version of the node status.
|
This generic message returns is a human-readable version of the node status.
|
||||||
(not yet)
|
(not yet)
|
||||||
.It Dv NGM_PPPOE_CONNECT
|
.It Dv NGM_PPPOE_CONNECT
|
||||||
Tell a nominated newly created hook that it's session should enter
|
Tell a nominated newly created hook that its session should enter
|
||||||
the state machine in a manner to become a client.
|
the state machine in a manner to become a client.
|
||||||
It must be newly created and
|
It must be newly created and
|
||||||
a service name can be given as an argument.
|
a service name can be given as an argument.
|
||||||
@ -104,7 +104,7 @@ This command uses the
|
|||||||
.Dv ngpppoe_init_data
|
.Dv ngpppoe_init_data
|
||||||
structure shown below.
|
structure shown below.
|
||||||
.It Dv NGM_PPPOE_LISTEN
|
.It Dv NGM_PPPOE_LISTEN
|
||||||
Tell a nominated newly created hook that it's session should enter
|
Tell a nominated newly created hook that its session should enter
|
||||||
the state machine in a manner to become a server listener.
|
the state machine in a manner to become a server listener.
|
||||||
The argument
|
The argument
|
||||||
given is the name of the service to listen on behalf of
|
given is the name of the service to listen on behalf of
|
||||||
@ -118,7 +118,7 @@ This command uses the
|
|||||||
.Dv ngpppoe_init_data
|
.Dv ngpppoe_init_data
|
||||||
structure shown below.
|
structure shown below.
|
||||||
.It Dv NGM_PPPOE_OFFER
|
.It Dv NGM_PPPOE_OFFER
|
||||||
Tell a nominated newly created hook that it's session should enter
|
Tell a nominated newly created hook that its session should enter
|
||||||
the state machine in a manner to become a server.
|
the state machine in a manner to become a server.
|
||||||
The argument given is the name of the service to offer.
|
The argument given is the name of the service to offer.
|
||||||
A zero length service
|
A zero length service
|
||||||
|
@ -464,7 +464,7 @@ Since VGA's
|
|||||||
might have up to eight simultaneously loaded fonts, they can take
|
might have up to eight simultaneously loaded fonts, they can take
|
||||||
CH_SET4, CH_SET5, CH_SET6, or CH_SET7, too.
|
CH_SET4, CH_SET5, CH_SET6, or CH_SET7, too.
|
||||||
.Pp
|
.Pp
|
||||||
Note that there's a dependence between the font size
|
Note that there is a dependence between the font size
|
||||||
and a possible screen height
|
and a possible screen height
|
||||||
(in character rows),
|
(in character rows),
|
||||||
depending on the video adaptor used:
|
depending on the video adaptor used:
|
||||||
@ -568,7 +568,7 @@ being set to
|
|||||||
.Pp
|
.Pp
|
||||||
.Em VGA color palette interface
|
.Em VGA color palette interface
|
||||||
.Pp
|
.Pp
|
||||||
Only on VGA adaptors, there's a color palette register at the output.
|
Only on VGA adaptors, there is a color palette register at the output.
|
||||||
It is responsible for the red, green and blue output voltage provided
|
It is responsible for the red, green and blue output voltage provided
|
||||||
for each of the 256 internal color codes, each lying in the range of
|
for each of the 256 internal color codes, each lying in the range of
|
||||||
0 through 63 (with 63 representing the brightest value for a base color).
|
0 through 63 (with 63 representing the brightest value for a base color).
|
||||||
@ -598,7 +598,7 @@ struct vgapel {
|
|||||||
.Pp
|
.Pp
|
||||||
.Bl -tag -width 20n -offset indent -compact
|
.Bl -tag -width 20n -offset indent -compact
|
||||||
.It VGAPCVTID
|
.It VGAPCVTID
|
||||||
returns information if the current compiled in driver is pcvt and it's
|
returns information if the current compiled in driver is pcvt and its
|
||||||
major and minor revision numbers.
|
major and minor revision numbers.
|
||||||
the call is taking a pointer to the
|
the call is taking a pointer to the
|
||||||
following structure as argument:
|
following structure as argument:
|
||||||
@ -617,7 +617,7 @@ struct pcvtid {
|
|||||||
.Pp
|
.Pp
|
||||||
.Bl -tag -width 20n -offset indent -compact
|
.Bl -tag -width 20n -offset indent -compact
|
||||||
.It VGAPCVTINFO
|
.It VGAPCVTINFO
|
||||||
returns information if the current compiled in driver is pcvt and it's
|
returns information if the current compiled in driver is pcvt and its
|
||||||
compile time options.
|
compile time options.
|
||||||
the call is taking a pointer to the following
|
the call is taking a pointer to the following
|
||||||
structure as argument:
|
structure as argument:
|
||||||
|
@ -154,7 +154,7 @@ When
|
|||||||
is set to
|
is set to
|
||||||
.Dq YES ,
|
.Dq YES ,
|
||||||
this must also be set to the number of days old that a file's access
|
this must also be set to the number of days old that a file's access
|
||||||
and modification times must be before it's deleted.
|
and modification times must be before it is deleted.
|
||||||
.It Va daily_clean_disks_verbose
|
.It Va daily_clean_disks_verbose
|
||||||
.Pq Vt bool
|
.Pq Vt bool
|
||||||
Set to
|
Set to
|
||||||
@ -176,7 +176,7 @@ is set to
|
|||||||
When
|
When
|
||||||
.Va daily_clean_tmps_enable
|
.Va daily_clean_tmps_enable
|
||||||
is set, this must also be set to the number of days old that a file's access
|
is set, this must also be set to the number of days old that a file's access
|
||||||
and modification times must be before it's deleted.
|
and modification times must be before it is deleted.
|
||||||
.It Va daily_clean_tmps_ignore
|
.It Va daily_clean_tmps_ignore
|
||||||
.Pq Vt str
|
.Pq Vt str
|
||||||
Set to the list of files that should not be deleted when
|
Set to the list of files that should not be deleted when
|
||||||
|
@ -122,7 +122,7 @@ to pass through all packets.
|
|||||||
Note, however, that using this option
|
Note, however, that using this option
|
||||||
may open a small window of opportunity during booting where your
|
may open a small window of opportunity during booting where your
|
||||||
firewall passes all packets.
|
firewall passes all packets.
|
||||||
Still, it's a good option to use
|
Still, it is a good option to use
|
||||||
while getting up to speed with
|
while getting up to speed with
|
||||||
.Fx
|
.Fx
|
||||||
firewalling.
|
firewalling.
|
||||||
@ -384,7 +384,7 @@ add 05000 deny log ip from any to any frag
|
|||||||
add 06000 deny all from any to any
|
add 06000 deny all from any to any
|
||||||
.Ed
|
.Ed
|
||||||
.Sh PORT BINDING INTERNAL AND EXTERNAL SERVICES
|
.Sh PORT BINDING INTERNAL AND EXTERNAL SERVICES
|
||||||
We've mentioned multi-homing hosts and binding services to internal or
|
We have mentioned multi-homing hosts and binding services to internal or
|
||||||
external addresses but we have not really explained it.
|
external addresses but we have not really explained it.
|
||||||
When you have a
|
When you have a
|
||||||
host with multiple IP addresses assigned to it, you can bind services run
|
host with multiple IP addresses assigned to it, you can bind services run
|
||||||
|
@ -236,7 +236,7 @@ with the addition that the length of the data mapped is provided via
|
|||||||
.Fa mapsize .
|
.Fa mapsize .
|
||||||
.It Vt bus_dmasync_op_t
|
.It Vt bus_dmasync_op_t
|
||||||
Memory synchronization operation specifier.
|
Memory synchronization operation specifier.
|
||||||
Bus DMA requires explicit synchronization of memory with it's device
|
Bus DMA requires explicit synchronization of memory with its device
|
||||||
visible mapping in order to guarantee memory coherency.
|
visible mapping in order to guarantee memory coherency.
|
||||||
The
|
The
|
||||||
.Vt bus_dmasync_op_t
|
.Vt bus_dmasync_op_t
|
||||||
|
@ -324,7 +324,7 @@ The system defines an advisory macro
|
|||||||
.Dv MINCLSIZE ,
|
.Dv MINCLSIZE ,
|
||||||
which is the smallest amount of data to put into an
|
which is the smallest amount of data to put into an
|
||||||
.Vt mbuf cluster .
|
.Vt mbuf cluster .
|
||||||
It's equal to the sum of
|
It is equal to the sum of
|
||||||
.Dv MLEN
|
.Dv MLEN
|
||||||
and
|
and
|
||||||
.Dv MHLEN .
|
.Dv MHLEN .
|
||||||
@ -710,7 +710,7 @@ just adds
|
|||||||
.Vt mbufs
|
.Vt mbufs
|
||||||
to the
|
to the
|
||||||
.Vt mbuf chain .
|
.Vt mbuf chain .
|
||||||
It's safe to set
|
It is safe to set
|
||||||
.Fa offset
|
.Fa offset
|
||||||
beyond the current
|
beyond the current
|
||||||
.Vt mbuf chain
|
.Vt mbuf chain
|
||||||
|
@ -126,7 +126,7 @@ and processes the request in chunks of maximal the size of this
|
|||||||
buffer.
|
buffer.
|
||||||
Note that the buffer handling below is very simplified and
|
Note that the buffer handling below is very simplified and
|
||||||
will not work (the buffer pointer is not being advanced in case of a
|
will not work (the buffer pointer is not being advanced in case of a
|
||||||
partial read), it's just here to demonstrate the
|
partial read), it is just here to demonstrate the
|
||||||
.Nm
|
.Nm
|
||||||
handling.
|
handling.
|
||||||
.Bd -literal
|
.Bd -literal
|
||||||
|
@ -68,7 +68,7 @@ The file system tests are based on examining the return from a
|
|||||||
.Xr stat 2
|
.Xr stat 2
|
||||||
system call.
|
system call.
|
||||||
The program checks to see if the file is empty,
|
The program checks to see if the file is empty,
|
||||||
or if it's some sort of special file.
|
or if it is some sort of special file.
|
||||||
Any known file types appropriate to the system you are running on
|
Any known file types appropriate to the system you are running on
|
||||||
(sockets, symbolic links, or named pipes (FIFOs) on those systems that
|
(sockets, symbolic links, or named pipes (FIFOs) on those systems that
|
||||||
implement them)
|
implement them)
|
||||||
|
@ -257,7 +257,7 @@ The default is
|
|||||||
Enables (disables) special
|
Enables (disables) special
|
||||||
.Ic else-if
|
.Ic else-if
|
||||||
processing.
|
processing.
|
||||||
If it's enabled, an
|
If it is enabled, an
|
||||||
.Ic if
|
.Ic if
|
||||||
following an
|
following an
|
||||||
.Ic else
|
.Ic else
|
||||||
@ -390,7 +390,7 @@ appear in your program that are defined by
|
|||||||
\- nothing will be
|
\- nothing will be
|
||||||
harmed if you miss a few, but the program will not be formatted as nicely as
|
harmed if you miss a few, but the program will not be formatted as nicely as
|
||||||
it should.
|
it should.
|
||||||
This sounds like a painful thing to have to do, but it's really
|
This sounds like a painful thing to have to do, but it is really
|
||||||
a symptom of a problem in C:
|
a symptom of a problem in C:
|
||||||
.Ic typedef
|
.Ic typedef
|
||||||
causes a syntactic change in the
|
causes a syntactic change in the
|
||||||
|
@ -147,7 +147,7 @@ considered definitive tape positions).
|
|||||||
Print (and clear) error status information about this device.
|
Print (and clear) error status information about this device.
|
||||||
For every normal
|
For every normal
|
||||||
operation (e.g., a read or a write) and every control operation (e.g,, a
|
operation (e.g., a read or a write) and every control operation (e.g,, a
|
||||||
rewind), the driver stores up the last command executed and it's associated
|
rewind), the driver stores up the last command executed and it is associated
|
||||||
status and any residual counts (if any).
|
status and any residual counts (if any).
|
||||||
This command retrieves and prints this
|
This command retrieves and prints this
|
||||||
information.
|
information.
|
||||||
|
@ -268,7 +268,7 @@ sequence to the length of
|
|||||||
If
|
If
|
||||||
.Ar n
|
.Ar n
|
||||||
has a leading zero, it is interpreted as an octal value, otherwise,
|
has a leading zero, it is interpreted as an octal value, otherwise,
|
||||||
it's interpreted as a decimal value.
|
it is interpreted as a decimal value.
|
||||||
.El
|
.El
|
||||||
.Sh ENVIRONMENT
|
.Sh ENVIRONMENT
|
||||||
The
|
The
|
||||||
|
@ -88,7 +88,7 @@ home, the message will go to the right place.
|
|||||||
.Pp
|
.Pp
|
||||||
The traditional protocol for writing to someone is that the string
|
The traditional protocol for writing to someone is that the string
|
||||||
.Ql \-o ,
|
.Ql \-o ,
|
||||||
either at the end of a line or on a line by itself, means that it's the
|
either at the end of a line or on a line by itself, means that it is the
|
||||||
other person's turn to talk.
|
other person's turn to talk.
|
||||||
The string
|
The string
|
||||||
.Ql oo
|
.Ql oo
|
||||||
|
@ -114,7 +114,7 @@ intuitively expected.
|
|||||||
If a job falls into a time interval that disappears
|
If a job falls into a time interval that disappears
|
||||||
(for example, during the switch from
|
(for example, during the switch from
|
||||||
standard time) to daylight saving time or is
|
standard time) to daylight saving time or is
|
||||||
duplicated (for example, during the reverse switch), then it's handled
|
duplicated (for example, during the reverse switch), then it is handled
|
||||||
in one of two ways:
|
in one of two ways:
|
||||||
.Pp
|
.Pp
|
||||||
The first case is for the jobs that run every at hour of a time interval
|
The first case is for the jobs that run every at hour of a time interval
|
||||||
|
@ -290,10 +290,10 @@ are extensions.
|
|||||||
.Sh AUTHORS
|
.Sh AUTHORS
|
||||||
.An Paul Vixie Aq paul@vix.com
|
.An Paul Vixie Aq paul@vix.com
|
||||||
.Sh BUGS
|
.Sh BUGS
|
||||||
If you're in one of the 70-odd countries that observe Daylight
|
If you are in one of the 70-odd countries that observe Daylight
|
||||||
Savings Time, jobs scheduled during the rollback or advance will be
|
Savings Time, jobs scheduled during the rollback or advance will be
|
||||||
affected.
|
affected.
|
||||||
In general, it's not a good idea to schedule jobs during
|
In general, it is not a good idea to schedule jobs during
|
||||||
this period.
|
this period.
|
||||||
.Pp
|
.Pp
|
||||||
For US timezones (except parts of IN, AZ, and HI) the time shift occurs at
|
For US timezones (except parts of IN, AZ, and HI) the time shift occurs at
|
||||||
|
@ -130,7 +130,7 @@ differences unless you choose context diffs.
|
|||||||
The
|
The
|
||||||
.Nm
|
.Nm
|
||||||
utility will source scripts that you specify right before
|
utility will source scripts that you specify right before
|
||||||
it starts the comparison, and after it's done running.
|
it starts the comparison, and after it is done running.
|
||||||
The easiest way to handle this is to place the path
|
The easiest way to handle this is to place the path
|
||||||
to the script(s) in the appropriate variables in your
|
to the script(s) in the appropriate variables in your
|
||||||
.Pa .mergemasterrc
|
.Pa .mergemasterrc
|
||||||
|
@ -325,7 +325,7 @@ changed with
|
|||||||
option).
|
option).
|
||||||
The first half of the attempts (default is two) are made with
|
The first half of the attempts (default is two) are made with
|
||||||
the reply address set to standard multicast address, mtrace.mcast.net
|
the reply address set to standard multicast address, mtrace.mcast.net
|
||||||
(224.0.1.32) with the ttl set to 32 more than what's needed to pass the
|
(224.0.1.32) with the ttl set to 32 more than what is needed to pass the
|
||||||
thresholds seen so far along the path to the receiver.
|
thresholds seen so far along the path to the receiver.
|
||||||
For each
|
For each
|
||||||
additional attempt, the ttl is increased by another 32 each time up to
|
additional attempt, the ttl is increased by another 32 each time up to
|
||||||
|
@ -145,7 +145,7 @@ If used with argument
|
|||||||
.Dq Ar list ,
|
.Dq Ar list ,
|
||||||
the current VGA DAC palette entries are listed.
|
the current VGA DAC palette entries are listed.
|
||||||
Each entry contains
|
Each entry contains
|
||||||
the table index, values for red, green, and blue, and if there's a
|
the table index, values for red, green, and blue, and if there is a
|
||||||
known name for this entry, the color name.
|
known name for this entry, the color name.
|
||||||
Trailing empty table
|
Trailing empty table
|
||||||
slots (RGB values all zero) are omitted.
|
slots (RGB values all zero) are omitted.
|
||||||
|
@ -426,7 +426,7 @@ The advantage of using
|
|||||||
.Cm @unexec
|
.Cm @unexec
|
||||||
over a deinstallation script is that you can use the
|
over a deinstallation script is that you can use the
|
||||||
.Dq special sequence expansion
|
.Dq special sequence expansion
|
||||||
to get at files regardless of where they've
|
to get at files regardless of where they have
|
||||||
been potentially redirected (see
|
been potentially redirected (see
|
||||||
.Fl p ) .
|
.Fl p ) .
|
||||||
.It Cm @mode Ar mode
|
.It Cm @mode Ar mode
|
||||||
@ -434,7 +434,7 @@ Set default permission for all subsequently extracted files to
|
|||||||
.Ar mode .
|
.Ar mode .
|
||||||
Format is the same as that used by the
|
Format is the same as that used by the
|
||||||
.Cm chmod
|
.Cm chmod
|
||||||
command (well, considering that it's later handed off to it, that's
|
command (well, considering that it is later handed off to it, that is
|
||||||
no surprise).
|
no surprise).
|
||||||
Use without an arg to set back to default (extraction)
|
Use without an arg to set back to default (extraction)
|
||||||
permissions.
|
permissions.
|
||||||
@ -467,7 +467,7 @@ trying to document some particularly hairy sequence that
|
|||||||
may trip someone up later.
|
may trip someone up later.
|
||||||
.It Cm @ignore
|
.It Cm @ignore
|
||||||
Used internally to tell extraction to ignore the next file (do not
|
Used internally to tell extraction to ignore the next file (do not
|
||||||
copy it anywhere), as it's used for some special purpose.
|
copy it anywhere), as it is used for some special purpose.
|
||||||
.It Cm @ignore_inst
|
.It Cm @ignore_inst
|
||||||
Similar to
|
Similar to
|
||||||
.Cm @ignore ,
|
.Cm @ignore ,
|
||||||
|
@ -48,7 +48,7 @@ Normally,
|
|||||||
.Em PPP
|
.Em PPP
|
||||||
is implemented as a part of the kernel (e.g., as managed by
|
is implemented as a part of the kernel (e.g., as managed by
|
||||||
.Xr pppd 8 )
|
.Xr pppd 8 )
|
||||||
and it's thus somewhat hard to debug and/or modify its behaviour.
|
and it is thus somewhat hard to debug and/or modify its behaviour.
|
||||||
However, in this implementation
|
However, in this implementation
|
||||||
.Em PPP
|
.Em PPP
|
||||||
is done as a user process with the help of the
|
is done as a user process with the help of the
|
||||||
@ -184,7 +184,7 @@ This mode is equivalent to
|
|||||||
.Fl auto
|
.Fl auto
|
||||||
mode except that
|
mode except that
|
||||||
.Nm
|
.Nm
|
||||||
will bring the link back up any time it's dropped for any reason.
|
will bring the link back up any time it is dropped for any reason.
|
||||||
.It Fl interactive
|
.It Fl interactive
|
||||||
This is a no-op, and gives the same behaviour as if none of the above
|
This is a no-op, and gives the same behaviour as if none of the above
|
||||||
modes have been specified.
|
modes have been specified.
|
||||||
@ -347,7 +347,7 @@ into synchronous mode.
|
|||||||
.It Supports PPP over ISDN.
|
.It Supports PPP over ISDN.
|
||||||
If
|
If
|
||||||
.Nm
|
.Nm
|
||||||
is given a raw B-channel i4b device to open as a link, it's able to talk
|
is given a raw B-channel i4b device to open as a link, it is able to talk
|
||||||
to the
|
to the
|
||||||
.Xr isdnd 8
|
.Xr isdnd 8
|
||||||
daemon to establish an ISDN connection.
|
daemon to establish an ISDN connection.
|
||||||
@ -436,7 +436,7 @@ as the user id that invoked
|
|||||||
.Nm .
|
.Nm .
|
||||||
Refer to the
|
Refer to the
|
||||||
.Sq ID0
|
.Sq ID0
|
||||||
logging facility if you're interested in what exactly is done as user id
|
logging facility if you are interested in what exactly is done as user id
|
||||||
zero.
|
zero.
|
||||||
.Sh GETTING STARTED
|
.Sh GETTING STARTED
|
||||||
When you first run
|
When you first run
|
||||||
@ -447,7 +447,7 @@ you may need to deal with some initial configuration details.
|
|||||||
Your kernel must {include} a tunnel device (the GENERIC kernel includes
|
Your kernel must {include} a tunnel device (the GENERIC kernel includes
|
||||||
one by default).
|
one by default).
|
||||||
If it does not, or if you require more than one tun
|
If it does not, or if you require more than one tun
|
||||||
interface, you'll need to rebuild your kernel with the following line in
|
interface, you will need to rebuild your kernel with the following line in
|
||||||
your kernel configuration file:
|
your kernel configuration file:
|
||||||
.Pp
|
.Pp
|
||||||
.Dl pseudo-device tun N
|
.Dl pseudo-device tun N
|
||||||
@ -589,7 +589,7 @@ connection, try turning CTS/RTS off with
|
|||||||
.Dq set ctsrts off .
|
.Dq set ctsrts off .
|
||||||
If you need to do this, check the
|
If you need to do this, check the
|
||||||
.Dq set accmap
|
.Dq set accmap
|
||||||
description below too - you'll probably need to
|
description below too - you will probably need to
|
||||||
.Dq set accmap 000a0000 .
|
.Dq set accmap 000a0000 .
|
||||||
.Pp
|
.Pp
|
||||||
Usually, parity is set to
|
Usually, parity is set to
|
||||||
@ -599,7 +599,7 @@ and this is
|
|||||||
default.
|
default.
|
||||||
Parity is a rather archaic error checking mechanism that is no
|
Parity is a rather archaic error checking mechanism that is no
|
||||||
longer used because modern modems do their own error checking, and most
|
longer used because modern modems do their own error checking, and most
|
||||||
link-layer protocols (that's what
|
link-layer protocols (that is what
|
||||||
.Nm
|
.Nm
|
||||||
is) use much more reliable checking mechanisms.
|
is) use much more reliable checking mechanisms.
|
||||||
Parity has a relatively
|
Parity has a relatively
|
||||||
@ -663,7 +663,7 @@ PPp ON awfulhak> # We've authenticated
|
|||||||
PPP ON awfulhak> # We've agreed IP numbers
|
PPP ON awfulhak> # We've agreed IP numbers
|
||||||
.Ed
|
.Ed
|
||||||
.Pp
|
.Pp
|
||||||
If it does not, it's probable that the peer is waiting for your end to
|
If it does not, it is probable that the peer is waiting for your end to
|
||||||
start negotiating.
|
start negotiating.
|
||||||
To force
|
To force
|
||||||
.Nm
|
.Nm
|
||||||
@ -868,7 +868,7 @@ ppp ON awfulhak> load MyISP
|
|||||||
.Pp
|
.Pp
|
||||||
Note, no action is taken by
|
Note, no action is taken by
|
||||||
.Nm
|
.Nm
|
||||||
after a section is loaded, whether it's the result of passing a label on
|
after a section is loaded, whether it is the result of passing a label on
|
||||||
the command line or using the
|
the command line or using the
|
||||||
.Dq load
|
.Dq load
|
||||||
command.
|
command.
|
||||||
@ -1480,7 +1480,7 @@ Do not forget to send a
|
|||||||
.Dv HUP
|
.Dv HUP
|
||||||
signal to
|
signal to
|
||||||
.Xr inetd 8
|
.Xr inetd 8
|
||||||
after you've updated
|
after you have updated
|
||||||
.Pa /etc/inetd.conf .
|
.Pa /etc/inetd.conf .
|
||||||
Here, we use a label named
|
Here, we use a label named
|
||||||
.Dq ppp-in .
|
.Dq ppp-in .
|
||||||
@ -1515,7 +1515,7 @@ To enable PAP, add the following line:
|
|||||||
enable PAP
|
enable PAP
|
||||||
.Ed
|
.Ed
|
||||||
.Pp
|
.Pp
|
||||||
You'll also need to create the following entry in
|
You will also need to create the following entry in
|
||||||
.Pa /etc/ppp/ppp.secret :
|
.Pa /etc/ppp/ppp.secret :
|
||||||
.Bd -literal -offset indent
|
.Bd -literal -offset indent
|
||||||
MyAuthName MyAuthPasswd
|
MyAuthName MyAuthPasswd
|
||||||
@ -1549,7 +1549,7 @@ ui-gate:
|
|||||||
add 10.0.2.0/24 HISADDR
|
add 10.0.2.0/24 HISADDR
|
||||||
.Ed
|
.Ed
|
||||||
.Pp
|
.Pp
|
||||||
Again, if you're enabling PAP, you'll also need this in the
|
Again, if you are enabling PAP, you will also need this in the
|
||||||
.Pa /etc/ppp/ppp.conf
|
.Pa /etc/ppp/ppp.conf
|
||||||
profile:
|
profile:
|
||||||
.Bd -literal -offset indent
|
.Bd -literal -offset indent
|
||||||
@ -1557,7 +1557,7 @@ profile:
|
|||||||
set authkey MyAuthKey
|
set authkey MyAuthKey
|
||||||
.Ed
|
.Ed
|
||||||
.Pp
|
.Pp
|
||||||
We're assigning the address of 10.0.4.1 to ui-gate, and the address
|
We are assigning the address of 10.0.4.1 to ui-gate, and the address
|
||||||
10.0.4.2 to awfulhak.
|
10.0.4.2 to awfulhak.
|
||||||
To open the connection, just type
|
To open the connection, just type
|
||||||
.Pp
|
.Pp
|
||||||
@ -1629,7 +1629,7 @@ on the server:
|
|||||||
deny deflate pred1
|
deny deflate pred1
|
||||||
.Ed
|
.Ed
|
||||||
.Pp
|
.Pp
|
||||||
ensuring that you've put the requisite entry in
|
ensuring that you have put the requisite entry in
|
||||||
.Pa /etc/ppp/ppp.secret
|
.Pa /etc/ppp/ppp.secret
|
||||||
(MSCHAPv2 is challenge based, so
|
(MSCHAPv2 is challenge based, so
|
||||||
.Xr passwd 5
|
.Xr passwd 5
|
||||||
@ -1833,7 +1833,7 @@ If no rule in a defined set of rules matches a packet, that packet will
|
|||||||
be discarded (blocked).
|
be discarded (blocked).
|
||||||
If there are no rules in a given filter, the packet will be permitted.
|
If there are no rules in a given filter, the packet will be permitted.
|
||||||
.It
|
.It
|
||||||
It's possible to filter based on the payload of UDP frames where those
|
It is possible to filter based on the payload of UDP frames where those
|
||||||
frames contain a
|
frames contain a
|
||||||
.Em PROTO_IP
|
.Em PROTO_IP
|
||||||
.Em PPP
|
.Em PPP
|
||||||
@ -1925,7 +1925,7 @@ For IPv4,
|
|||||||
.Nm
|
.Nm
|
||||||
uses IPCP to negotiate IP addresses.
|
uses IPCP to negotiate IP addresses.
|
||||||
Each side of the connection
|
Each side of the connection
|
||||||
specifies the IP address that it's willing to use, and if the requested
|
specifies the IP address that it is willing to use, and if the requested
|
||||||
IP address is acceptable then
|
IP address is acceptable then
|
||||||
.Nm
|
.Nm
|
||||||
returns an ACK to the requester.
|
returns an ACK to the requester.
|
||||||
@ -2016,10 +2016,10 @@ The above example means:
|
|||||||
.Pp
|
.Pp
|
||||||
.Bl -bullet -compact
|
.Bl -bullet -compact
|
||||||
.It
|
.It
|
||||||
I'd like to use 192.244.177.38 as my address if it is possible, but I'll
|
I would like to use 192.244.177.38 as my address if it is possible, but I will
|
||||||
also accept any IP address between 192.244.177.0 and 192.244.177.255.
|
also accept any IP address between 192.244.177.0 and 192.244.177.255.
|
||||||
.It
|
.It
|
||||||
I'd like to make him use 192.244.177.2 as his own address, but I'll also
|
I would like to make him use 192.244.177.2 as his own address, but I will also
|
||||||
permit him to use any IP address between 192.244.176.0 and
|
permit him to use any IP address between 192.244.176.0 and
|
||||||
192.244.191.255.
|
192.244.191.255.
|
||||||
.It
|
.It
|
||||||
@ -2031,7 +2031,7 @@ preferred IP address and will obey the remote peers selection.
|
|||||||
When using zero, no routing table entries will be made until a connection
|
When using zero, no routing table entries will be made until a connection
|
||||||
is established.
|
is established.
|
||||||
.It
|
.It
|
||||||
192.244.177.2/0 means that I'll accept/permit any IP address but I'll
|
192.244.177.2/0 means that I will accept/permit any IP address but I will
|
||||||
suggest that 192.244.177.2 be used first.
|
suggest that 192.244.177.2 be used first.
|
||||||
.El
|
.El
|
||||||
.Pp
|
.Pp
|
||||||
@ -2124,7 +2124,7 @@ Expect nothing.
|
|||||||
Send ATZ.
|
Send ATZ.
|
||||||
.It
|
.It
|
||||||
Expect OK.
|
Expect OK.
|
||||||
If that's not received within the 4 second timeout, send ATZ
|
If that is not received within the 4 second timeout, send ATZ
|
||||||
and expect OK.
|
and expect OK.
|
||||||
.It
|
.It
|
||||||
Send ATDTxxxxxxx where xxxxxxx is the next number in the phone list from
|
Send ATDTxxxxxxx where xxxxxxx is the next number in the phone list from
|
||||||
@ -2150,7 +2150,7 @@ This login "chat" string means:
|
|||||||
Set the timeout to 15 seconds.
|
Set the timeout to 15 seconds.
|
||||||
.It
|
.It
|
||||||
Expect "login:".
|
Expect "login:".
|
||||||
If it's not received, send a carriage return and expect
|
If it is not received, send a carriage return and expect
|
||||||
"login:" again.
|
"login:" again.
|
||||||
.It
|
.It
|
||||||
Send "awfulhak"
|
Send "awfulhak"
|
||||||
@ -2180,7 +2180,7 @@ logging is enabled, the actual password is not logged;
|
|||||||
is logged instead.
|
is logged instead.
|
||||||
.Pp
|
.Pp
|
||||||
Login scripts vary greatly between ISPs.
|
Login scripts vary greatly between ISPs.
|
||||||
If you're setting one up for the first time,
|
If you are setting one up for the first time,
|
||||||
.Em ENABLE CHAT LOGGING
|
.Em ENABLE CHAT LOGGING
|
||||||
so that you can see if your script is behaving as you expect.
|
so that you can see if your script is behaving as you expect.
|
||||||
.It
|
.It
|
||||||
@ -2196,7 +2196,7 @@ set speed 115200
|
|||||||
.Pp
|
.Pp
|
||||||
Cuad0 is the first serial port on
|
Cuad0 is the first serial port on
|
||||||
.Fx .
|
.Fx .
|
||||||
If you're running
|
If you are running
|
||||||
.Nm
|
.Nm
|
||||||
on
|
on
|
||||||
.Ox ,
|
.Ox ,
|
||||||
@ -3005,7 +3005,7 @@ the UDP wrapper.
|
|||||||
The UDP frame payload must not be compressed in any way, otherwise
|
The UDP frame payload must not be compressed in any way, otherwise
|
||||||
.Nm
|
.Nm
|
||||||
will not be able to interpret it.
|
will not be able to interpret it.
|
||||||
It's therefore recommended that you
|
It is therefore recommended that you
|
||||||
.Ic disable vj pred1 deflate
|
.Ic disable vj pred1 deflate
|
||||||
and
|
and
|
||||||
.Ic deny vj pred1 deflate
|
.Ic deny vj pred1 deflate
|
||||||
@ -3390,7 +3390,7 @@ section is always checked first (even though it is only ever automatically
|
|||||||
loaded at startup).
|
loaded at startup).
|
||||||
.Dq allow users
|
.Dq allow users
|
||||||
commands are cumulative in a given section, but users allowed in any given
|
commands are cumulative in a given section, but users allowed in any given
|
||||||
section override users allowed in the default section, so it's possible to
|
section override users allowed in the default section, so it is possible to
|
||||||
allow users access to everything except a given label by specifying default
|
allow users access to everything except a given label by specifying default
|
||||||
users in the
|
users in the
|
||||||
.Sq default
|
.Sq default
|
||||||
@ -3658,7 +3658,7 @@ This is replaced with the peers IP number.
|
|||||||
.It Li HISADDR6
|
.It Li HISADDR6
|
||||||
This is replaced with the peers IPv6 number.
|
This is replaced with the peers IPv6 number.
|
||||||
.It Li INTERFACE
|
.It Li INTERFACE
|
||||||
This is replaced with the name of the interface that's in use.
|
This is replaced with the name of the interface that is in use.
|
||||||
.It Li IPOCTETSIN
|
.It Li IPOCTETSIN
|
||||||
This is replaced with the number of IP bytes received since the connection
|
This is replaced with the number of IP bytes received since the connection
|
||||||
was established.
|
was established.
|
||||||
@ -3762,7 +3762,7 @@ Clone the specified link, creating one or more new links according to the
|
|||||||
argument(s).
|
argument(s).
|
||||||
This command must be used from the
|
This command must be used from the
|
||||||
.Dq link
|
.Dq link
|
||||||
command below unless you've only got a single link (in which case that
|
command below unless you have only got a single link (in which case that
|
||||||
link becomes the default).
|
link becomes the default).
|
||||||
Links may be removed using the
|
Links may be removed using the
|
||||||
.Dq remove
|
.Dq remove
|
||||||
@ -3838,8 +3838,8 @@ and is provided for backwards compatibility.
|
|||||||
.It down Op Ar lcp|ccp
|
.It down Op Ar lcp|ccp
|
||||||
Bring the relevant layer down ungracefully, as if the underlying layer
|
Bring the relevant layer down ungracefully, as if the underlying layer
|
||||||
had become unavailable.
|
had become unavailable.
|
||||||
It's not considered polite to use this command on
|
It is not considered polite to use this command on
|
||||||
a Finite State Machine that's in the OPEN state.
|
a Finite State Machine that is in the OPEN state.
|
||||||
If no arguments are
|
If no arguments are
|
||||||
supplied, the entire link is closed (or if no context is given, all links
|
supplied, the entire link is closed (or if no context is given, all links
|
||||||
are terminated).
|
are terminated).
|
||||||
@ -4044,7 +4044,7 @@ IPCP is already open, it will be renegotiated and the network
|
|||||||
interface will be reconfigured.
|
interface will be reconfigured.
|
||||||
.Pp
|
.Pp
|
||||||
It is probably not good practice to re-open the PPP state machines
|
It is probably not good practice to re-open the PPP state machines
|
||||||
like this as it's possible that the peer will not behave correctly.
|
like this as it is possible that the peer will not behave correctly.
|
||||||
It
|
It
|
||||||
.Em is
|
.Em is
|
||||||
however useful as a way of forcing the CCP or VJ dictionaries to be reset.
|
however useful as a way of forcing the CCP or VJ dictionaries to be reset.
|
||||||
@ -4281,7 +4281,7 @@ in the CHAP response packet.
|
|||||||
.Pp
|
.Pp
|
||||||
When configuring
|
When configuring
|
||||||
.Nm
|
.Nm
|
||||||
in this manner, it's expected that the host challenge is a series of ASCII
|
in this manner, it is expected that the host challenge is a series of ASCII
|
||||||
digits or characters.
|
digits or characters.
|
||||||
An encryption device or Secure ID card is usually
|
An encryption device or Secure ID card is usually
|
||||||
required to calculate the secret appropriate for the given challenge.
|
required to calculate the secret appropriate for the given challenge.
|
||||||
@ -4319,7 +4319,7 @@ percent or less of the total bundle bandwidth for
|
|||||||
.Ar period
|
.Ar period
|
||||||
seconds, a
|
seconds, a
|
||||||
.Ar demand-dial
|
.Ar demand-dial
|
||||||
link will be brought down as long as it's not the last active link.
|
link will be brought down as long as it is not the last active link.
|
||||||
.Pp
|
.Pp
|
||||||
Bundle throughput is measured as the maximum of inbound and outbound
|
Bundle throughput is measured as the maximum of inbound and outbound
|
||||||
traffic.
|
traffic.
|
||||||
@ -4469,7 +4469,7 @@ that has been opened:
|
|||||||
.Bl -tag -width XXX -offset XXX
|
.Bl -tag -width XXX -offset XXX
|
||||||
.It Terminal Devices
|
.It Terminal Devices
|
||||||
Carrier is checked one second after the login script is complete.
|
Carrier is checked one second after the login script is complete.
|
||||||
If it's not set,
|
If it is not set,
|
||||||
.Nm
|
.Nm
|
||||||
assumes that this is because the device does not support carrier (which
|
assumes that this is because the device does not support carrier (which
|
||||||
is true for most
|
is true for most
|
||||||
@ -4481,13 +4481,13 @@ As ptys do not support the TIOCMGET ioctl, the tty device will switch all
|
|||||||
carrier detection off when it detects that the device is a pty.
|
carrier detection off when it detects that the device is a pty.
|
||||||
.It ISDN (i4b) Devices
|
.It ISDN (i4b) Devices
|
||||||
Carrier is checked once per second for 6 seconds.
|
Carrier is checked once per second for 6 seconds.
|
||||||
If it's not set after
|
If it is not set after
|
||||||
the sixth second, the connection attempt is considered to have failed and
|
the sixth second, the connection attempt is considered to have failed and
|
||||||
the device is closed.
|
the device is closed.
|
||||||
Carrier is always required for i4b devices.
|
Carrier is always required for i4b devices.
|
||||||
.It PPPoE (netgraph) Devices
|
.It PPPoE (netgraph) Devices
|
||||||
Carrier is checked once per second for 5 seconds.
|
Carrier is checked once per second for 5 seconds.
|
||||||
If it's not set after
|
If it is not set after
|
||||||
the fifth second, the connection attempt is considered to have failed and
|
the fifth second, the connection attempt is considered to have failed and
|
||||||
the device is closed.
|
the device is closed.
|
||||||
Carrier is always required for PPPoE devices.
|
Carrier is always required for PPPoE devices.
|
||||||
@ -5036,7 +5036,7 @@ This is useful if the peer wants
|
|||||||
to re-establish a link using the same IP number as was previously
|
to re-establish a link using the same IP number as was previously
|
||||||
allocated (thus maintaining any existing tcp or udp connections).
|
allocated (thus maintaining any existing tcp or udp connections).
|
||||||
.Pp
|
.Pp
|
||||||
If the peer requests an IP number that's either outside
|
If the peer requests an IP number that is either outside
|
||||||
of this range or is already in use,
|
of this range or is already in use,
|
||||||
.Nm
|
.Nm
|
||||||
will suggest a random unused IP number from the range.
|
will suggest a random unused IP number from the range.
|
||||||
@ -5226,7 +5226,7 @@ If any arguments are given,
|
|||||||
.Nm
|
.Nm
|
||||||
will
|
will
|
||||||
.Em insist
|
.Em insist
|
||||||
on using MPPE and will close the link if it's rejected by the peer (Note;
|
on using MPPE and will close the link if it is rejected by the peer (Note;
|
||||||
this behaviour can be overridden by a configured RADIUS server).
|
this behaviour can be overridden by a configured RADIUS server).
|
||||||
.Pp
|
.Pp
|
||||||
The first argument specifies the number of bits that
|
The first argument specifies the number of bits that
|
||||||
@ -5282,7 +5282,7 @@ is specified.
|
|||||||
The default MTU is 1500.
|
The default MTU is 1500.
|
||||||
At negotiation time,
|
At negotiation time,
|
||||||
.Nm
|
.Nm
|
||||||
will accept whatever MRU the peer requests (assuming it's
|
will accept whatever MRU the peer requests (assuming it is
|
||||||
not less than 296 bytes or greater than the assigned maximum).
|
not less than 296 bytes or greater than the assigned maximum).
|
||||||
If the MTU is set,
|
If the MTU is set,
|
||||||
.Nm
|
.Nm
|
||||||
@ -5393,7 +5393,7 @@ as it is not known when the commands in
|
|||||||
.Pa ppp.conf
|
.Pa ppp.conf
|
||||||
are executed.
|
are executed.
|
||||||
.It set radius Op Ar config-file
|
.It set radius Op Ar config-file
|
||||||
This command enables RADIUS support (if it's compiled in).
|
This command enables RADIUS support (if it is compiled in).
|
||||||
.Ar config-file
|
.Ar config-file
|
||||||
refers to the radius client configuration file as described in
|
refers to the radius client configuration file as described in
|
||||||
.Xr radius.conf 5 .
|
.Xr radius.conf 5 .
|
||||||
@ -5584,7 +5584,7 @@ encryption.
|
|||||||
.It RAD_MICROSOFT_MS_MPPE_RECV_KEY
|
.It RAD_MICROSOFT_MS_MPPE_RECV_KEY
|
||||||
If this
|
If this
|
||||||
.Dv RAD_VENDOR_MICROSOFT
|
.Dv RAD_VENDOR_MICROSOFT
|
||||||
vendor specific attribute is supplied, it's value is used as the master
|
vendor specific attribute is supplied, it is value is used as the master
|
||||||
key for decryption of incoming data.
|
key for decryption of incoming data.
|
||||||
When clients are authenticated using
|
When clients are authenticated using
|
||||||
MSCHAPv2, the RADIUS server MUST provide this attribute if inbound MPPE is
|
MSCHAPv2, the RADIUS server MUST provide this attribute if inbound MPPE is
|
||||||
@ -5592,7 +5592,7 @@ to function.
|
|||||||
.It RAD_MICROSOFT_MS_MPPE_SEND_KEY
|
.It RAD_MICROSOFT_MS_MPPE_SEND_KEY
|
||||||
If this
|
If this
|
||||||
.Dv RAD_VENDOR_MICROSOFT
|
.Dv RAD_VENDOR_MICROSOFT
|
||||||
vendor specific attribute is supplied, it's value is used as the master
|
vendor specific attribute is supplied, it is value is used as the master
|
||||||
key for encryption of outgoing data.
|
key for encryption of outgoing data.
|
||||||
When clients are authenticated using
|
When clients are authenticated using
|
||||||
MSCHAPv2, the RADIUS server MUST provide this attribute if outbound MPPE is
|
MSCHAPv2, the RADIUS server MUST provide this attribute if outbound MPPE is
|
||||||
@ -5986,7 +5986,7 @@ Use
|
|||||||
.Dq set ?\&
|
.Dq set ?\&
|
||||||
and
|
and
|
||||||
.Dq show ?\&
|
.Dq show ?\&
|
||||||
to get online information about what's available.
|
to get online information about what is available.
|
||||||
.It
|
.It
|
||||||
The following URLs contain useful information:
|
The following URLs contain useful information:
|
||||||
.Bl -bullet -compact
|
.Bl -bullet -compact
|
||||||
|
@ -99,7 +99,7 @@ utility uses the same access control mechanism as
|
|||||||
.Xr ypserv 8 . )
|
.Xr ypserv 8 . )
|
||||||
.Pp
|
.Pp
|
||||||
The server then
|
The server then
|
||||||
checks the 'old' password supplied by the user to make sure it's
|
checks the 'old' password supplied by the user to make sure it is
|
||||||
valid, then performs some sanity checks on the updated information (these
|
valid, then performs some sanity checks on the updated information (these
|
||||||
include checking for embedded control characters, colons or invalid shells).
|
include checking for embedded control characters, colons or invalid shells).
|
||||||
Once it is satisfied that the update request is valid, the server modifies
|
Once it is satisfied that the update request is valid, the server modifies
|
||||||
|
@ -241,7 +241,7 @@ format has changed as well (since user ids are now 32 bits).
|
|||||||
.An Chris G. Demetriou Aq cgd@postgres.berkeley.edu
|
.An Chris G. Demetriou Aq cgd@postgres.berkeley.edu
|
||||||
.Sh BUGS
|
.Sh BUGS
|
||||||
The number of options to this program is absurd, especially considering
|
The number of options to this program is absurd, especially considering
|
||||||
that there's not much logic behind their lettering.
|
that there is not much logic behind their lettering.
|
||||||
.Pp
|
.Pp
|
||||||
The field labels should be more consistent.
|
The field labels should be more consistent.
|
||||||
.Pp
|
.Pp
|
||||||
|
@ -76,7 +76,7 @@ systems.
|
|||||||
It also contains some extra intelligence
|
It also contains some extra intelligence
|
||||||
for running as a replacement for
|
for running as a replacement for
|
||||||
.Xr init 8
|
.Xr init 8
|
||||||
when it's invoked by the
|
when it is invoked by the
|
||||||
.Fx
|
.Fx
|
||||||
installation boot procedure.
|
installation boot procedure.
|
||||||
It
|
It
|
||||||
@ -315,7 +315,7 @@ installation interactively at least once and take careful notes as to
|
|||||||
what the slice names will be, then and only then hardwiring them into
|
what the slice names will be, then and only then hardwiring them into
|
||||||
the script.
|
the script.
|
||||||
.Pp
|
.Pp
|
||||||
For example, let's say you have a SCSI disk on which you've created a new
|
For example, let's say you have a SCSI disk on which you have created a new
|
||||||
.Fx
|
.Fx
|
||||||
partition in slice 2 (your DOS partition residing in slice 1).
|
partition in slice 2 (your DOS partition residing in slice 1).
|
||||||
The slice name would be
|
The slice name would be
|
||||||
@ -711,7 +711,7 @@ The netmask for the selected host interface (non-optional).
|
|||||||
.It _ftpPath
|
.It _ftpPath
|
||||||
The fully qualified URL of the FTP site containing the
|
The fully qualified URL of the FTP site containing the
|
||||||
.Fx
|
.Fx
|
||||||
distribution you're interested in, e.g.\&
|
distribution you are interested in, e.g.\&
|
||||||
.Ar ftp://ftp.FreeBSD.org/pub/FreeBSD/ .
|
.Ar ftp://ftp.FreeBSD.org/pub/FreeBSD/ .
|
||||||
.El
|
.El
|
||||||
.It mediaSetFTPActive
|
.It mediaSetFTPActive
|
||||||
@ -752,7 +752,7 @@ the installation media.
|
|||||||
.It ufs
|
.It ufs
|
||||||
full /path to directory containing the
|
full /path to directory containing the
|
||||||
.Fx
|
.Fx
|
||||||
distribution you're
|
distribution you are
|
||||||
interested in.
|
interested in.
|
||||||
.El
|
.El
|
||||||
.It mediaSetNFS
|
.It mediaSetNFS
|
||||||
@ -783,7 +783,7 @@ The netmask for the selected host interface (non-optional).
|
|||||||
full hostname:/path specification for directory containing
|
full hostname:/path specification for directory containing
|
||||||
the
|
the
|
||||||
.Fx
|
.Fx
|
||||||
distribution you're interested in.
|
distribution you are interested in.
|
||||||
.El
|
.El
|
||||||
.It mediaSetFTPUserPass
|
.It mediaSetFTPUserPass
|
||||||
.Pp
|
.Pp
|
||||||
@ -849,7 +849,7 @@ Execute an arbitrary command with
|
|||||||
The name of the command to execute.
|
The name of the command to execute.
|
||||||
When running
|
When running
|
||||||
from a boot floppy, very minimal expectations should
|
from a boot floppy, very minimal expectations should
|
||||||
be made as to what's available until/unless a relatively
|
be made as to what is available until/unless a relatively
|
||||||
full system installation has just been done.
|
full system installation has just been done.
|
||||||
.El
|
.El
|
||||||
.It tcpMenuSelect
|
.It tcpMenuSelect
|
||||||
|
@ -76,7 +76,7 @@ systems.
|
|||||||
It also contains some extra intelligence
|
It also contains some extra intelligence
|
||||||
for running as a replacement for
|
for running as a replacement for
|
||||||
.Xr init 8
|
.Xr init 8
|
||||||
when it's invoked by the
|
when it is invoked by the
|
||||||
.Fx
|
.Fx
|
||||||
installation boot procedure.
|
installation boot procedure.
|
||||||
It
|
It
|
||||||
@ -315,7 +315,7 @@ installation interactively at least once and take careful notes as to
|
|||||||
what the slice names will be, then and only then hardwiring them into
|
what the slice names will be, then and only then hardwiring them into
|
||||||
the script.
|
the script.
|
||||||
.Pp
|
.Pp
|
||||||
For example, let's say you have a SCSI disk on which you've created a new
|
For example, let's say you have a SCSI disk on which you have created a new
|
||||||
.Fx
|
.Fx
|
||||||
partition in slice 2 (your DOS partition residing in slice 1).
|
partition in slice 2 (your DOS partition residing in slice 1).
|
||||||
The slice name would be
|
The slice name would be
|
||||||
@ -711,7 +711,7 @@ The netmask for the selected host interface (non-optional).
|
|||||||
.It _ftpPath
|
.It _ftpPath
|
||||||
The fully qualified URL of the FTP site containing the
|
The fully qualified URL of the FTP site containing the
|
||||||
.Fx
|
.Fx
|
||||||
distribution you're interested in, e.g.\&
|
distribution you are interested in, e.g.\&
|
||||||
.Ar ftp://ftp.FreeBSD.org/pub/FreeBSD/ .
|
.Ar ftp://ftp.FreeBSD.org/pub/FreeBSD/ .
|
||||||
.El
|
.El
|
||||||
.It mediaSetFTPActive
|
.It mediaSetFTPActive
|
||||||
@ -752,7 +752,7 @@ the installation media.
|
|||||||
.It ufs
|
.It ufs
|
||||||
full /path to directory containing the
|
full /path to directory containing the
|
||||||
.Fx
|
.Fx
|
||||||
distribution you're
|
distribution you are
|
||||||
interested in.
|
interested in.
|
||||||
.El
|
.El
|
||||||
.It mediaSetNFS
|
.It mediaSetNFS
|
||||||
@ -783,7 +783,7 @@ The netmask for the selected host interface (non-optional).
|
|||||||
full hostname:/path specification for directory containing
|
full hostname:/path specification for directory containing
|
||||||
the
|
the
|
||||||
.Fx
|
.Fx
|
||||||
distribution you're interested in.
|
distribution you are interested in.
|
||||||
.El
|
.El
|
||||||
.It mediaSetFTPUserPass
|
.It mediaSetFTPUserPass
|
||||||
.Pp
|
.Pp
|
||||||
@ -849,7 +849,7 @@ Execute an arbitrary command with
|
|||||||
The name of the command to execute.
|
The name of the command to execute.
|
||||||
When running
|
When running
|
||||||
from a boot floppy, very minimal expectations should
|
from a boot floppy, very minimal expectations should
|
||||||
be made as to what's available until/unless a relatively
|
be made as to what is available until/unless a relatively
|
||||||
full system installation has just been done.
|
full system installation has just been done.
|
||||||
.El
|
.El
|
||||||
.It tcpMenuSelect
|
.It tcpMenuSelect
|
||||||
|
@ -237,7 +237,7 @@ for further descriptions of both the
|
|||||||
and
|
and
|
||||||
.Em level
|
.Em level
|
||||||
keywords and their significance.
|
keywords and their significance.
|
||||||
It's preferred that selections be made on
|
It is preferred that selections be made on
|
||||||
.Em facility
|
.Em facility
|
||||||
rather than
|
rather than
|
||||||
.Em program ,
|
.Em program ,
|
||||||
@ -383,7 +383,7 @@ flowing quickly), this can be achieved by exiting after just one line of
|
|||||||
input.
|
input.
|
||||||
If necessary, a script wrapper can be written to this effect.
|
If necessary, a script wrapper can be written to this effect.
|
||||||
.Pp
|
.Pp
|
||||||
Unless the command is a full pipeline, it's probably useful to
|
Unless the command is a full pipeline, it is probably useful to
|
||||||
start the command with
|
start the command with
|
||||||
.Em exec
|
.Em exec
|
||||||
so that the invoking shell process does not wait for the command to
|
so that the invoking shell process does not wait for the command to
|
||||||
|
@ -106,7 +106,7 @@ the maps are always readable and writable only by root for security
|
|||||||
reasons.
|
reasons.
|
||||||
Technically this is only necessary for the password
|
Technically this is only necessary for the password
|
||||||
maps, but since the data in the other maps can be found in
|
maps, but since the data in the other maps can be found in
|
||||||
other world-readable files anyway, it does not hurt and it's considered
|
other world-readable files anyway, it does not hurt and it is considered
|
||||||
good general practice.
|
good general practice.
|
||||||
.Pp
|
.Pp
|
||||||
The
|
The
|
||||||
|
@ -98,7 +98,7 @@ of years representable by
|
|||||||
values.
|
values.
|
||||||
.It Fl s
|
.It Fl s
|
||||||
Limit time values stored in output files to values that are the same
|
Limit time values stored in output files to values that are the same
|
||||||
whether they're taken to be signed or unsigned.
|
whether they are taken to be signed or unsigned.
|
||||||
You can use this option to generate SVVS-compatible files.
|
You can use this option to generate SVVS-compatible files.
|
||||||
.It Fl y Ar command
|
.It Fl y Ar command
|
||||||
Use the given
|
Use the given
|
||||||
@ -114,7 +114,7 @@ Leading and trailing white space on input lines is ignored.
|
|||||||
An unquoted sharp character (#) in the input introduces a comment which extends
|
An unquoted sharp character (#) in the input introduces a comment which extends
|
||||||
to the end of the line the sharp character appears on.
|
to the end of the line the sharp character appears on.
|
||||||
White space characters and sharp characters may be enclosed in double quotes
|
White space characters and sharp characters may be enclosed in double quotes
|
||||||
(") if they're to be used as part of a field.
|
(") if they are to be used as part of a field.
|
||||||
Any line that is blank (after comment stripping) is ignored.
|
Any line that is blank (after comment stripping) is ignored.
|
||||||
Non-blank lines are expected to be of one of three types:
|
Non-blank lines are expected to be of one of three types:
|
||||||
rule lines, zone lines, and link lines.
|
rule lines, zone lines, and link lines.
|
||||||
|
Loading…
Reference in New Issue
Block a user