Expand contractions.

This commit is contained in:
ru 2005-02-13 23:45:54 +00:00
parent 2896c0ddcb
commit 6b6b8c04f6
55 changed files with 129 additions and 129 deletions

View File

@ -337,6 +337,6 @@ A
command appeared in
.At v1 .
.Sh BUGS
There's no
There is no
.Ar perm
option for the naughty bits.

View File

@ -87,7 +87,7 @@ Choose only from potentially offensive aphorisms.
Please, please, please request a potentially offensive fortune if and
only if you believe, deep down in your heart, that you are willing
to be offended.
(And that if you are not willing, you'll just quit using
(And that if you are not willing, you will just quit using
.Fl o
rather than give us
grief about it, okay?)
@ -154,7 +154,7 @@ will pick out 90% of its fortunes from
.Em funny
(the
.Dq 10% not-funny
is unnecessary, since 10% is all that's left).
is unnecessary, since 10% is all that is left).
The
.Fl e
option says to consider all files equal;

View File

@ -384,7 +384,7 @@ Vendor-specific attributes used by Joerg Schilling's
implementation.
.It Cm SCHILY.acl.access , Cm SCHILY.acl.default
Stores the access and default ACLs as textual strings in a format
that's an extension of the format specified by POSIX.1e draft 17.
that is an extension of the format specified by POSIX.1e draft 17.
In particular, each user or group access specification can include a fourth
colon-separated field with the numeric UID or GID.
This allows ACLs to be restored on systems that may not have complete
@ -570,7 +570,7 @@ The header contains a list of fragment offset/length pairs.
If more than four such entries are required, the header is
extended as necessary with
.Dq extra
header extensions (an older format that's no longer used), or
header extensions (an older format that is no longer used), or
.Dq sparse
extensions.
.It "V"

View File

@ -324,7 +324,7 @@ does not exist
.Pp
Names consist of one or more characters.
Names may contain any character
except `:', but it's usually best to restrict them to the printable
except `:', but it is usually best to restrict them to the printable
characters and avoid use of graphics like `#', `=', `%', `@', etc.
Types
are single characters used to separate capability names from their

View File

@ -121,7 +121,7 @@ Find
.Fa item
in
.Fa sl ,
returning NULL if it's not found.
returning NULL if it is not found.
.El
.Sh SEE ALSO
.Xr free 3 ,

View File

@ -118,7 +118,7 @@ element of
.Fa tzname
to a pointer to an
.Tn ASCII
string that's the time zone abbreviation to be
string that is the time zone abbreviation to be
used with
.Fn localtime Ns 's
return value.

View File

@ -95,7 +95,7 @@ The
structure is defined as follows:
.\"
.\" I fiddled with the spaces a bit to make it fit well when viewed
.\" with nroff, but otherwise it's straight from sys/shm.h
.\" with nroff, but otherwise it is straight from sys/shm.h
.\"
.Bd -literal
struct shmid_ds {

View File

@ -73,7 +73,7 @@ The
.Fn ascftime
function is almost identical to
.Xr strftime 3 ,
with the only exception that there's no parameter to tell about the
with the only exception that there is no parameter to tell about the
maximal buffer length, and the
.Fa format
parameter defaults to

View File

@ -319,5 +319,5 @@ though.
.Pp
Due to emphasis on
compactness and simplicity,
it's not strikingly fast.
it is not strikingly fast.
It does give special attention to handling simple cases quickly.

View File

@ -429,7 +429,7 @@ If
has been set with
.Fn el_set ,
then this is done automatically.
Otherwise, it's the responsibility of the application to call
Otherwise, it is the responsibility of the application to call
.Fn el_resize
on the appropriate occasions.
.It Fn el_line
@ -511,7 +511,7 @@ Clear the history.
.Xc
Define functions to perform various history operations.
.Fa ptr
is the argument given to a function when it's invoked.
is the argument given to a function when it is invoked.
.It Dv H_FIRST
Return the first element in the history.
.It Dv H_LAST

View File

@ -341,7 +341,7 @@ The
and
.Fn fetchPutHTTP
functions implement the HTTP/1.1 protocol.
With a little luck, there's
With a little luck, there is
even a chance that they comply with RFC2616 and RFC2617.
.Pp
If the
@ -641,7 +641,7 @@ examples of this are
.Fn fetchListFTP
and FTP proxy support.
.Pp
There's no way to select a proxy at run-time other than setting the
There is no way to select a proxy at run-time other than setting the
.Ev HTTP_PROXY
or
.Ev FTP_PROXY

View File

@ -111,7 +111,7 @@ On failure, the error code from the server.
The
.Fn ftpErrno
function returns the server failure code for the last operation (useful for
seeing more about what happened if you're familiar with FTP error codes).
seeing more about what happened if you are familiar with FTP error codes).
The
.Fn ftpErrString
function returns a human readable version of the supplied server failure code.
@ -255,6 +255,6 @@ extensions from Jean-Marc Zucconi.
and
.An Jean-Marc Zucconi
.Sh BUGS
I'm sure you can get this thing's internal state machine confused if
you really work at it, but so far it's proven itself pretty robust in
I am sure you can get this thing's internal state machine confused if
you really work at it, but so far it has proven itself pretty robust in
all my tests.

View File

@ -412,7 +412,7 @@ blank the display if the argument
.Va blank
\*(Ne 0.
This can be done to shut off the screen during display updates that
the user should first see when it's done.
the user should first see when it is done.
.Ss Program termination and signal processing
It is important to call
.Fn VGLEnd

View File

@ -92,7 +92,7 @@ omitted, standard mailbox assumed.
.Sh FILES
.Bl -tag -width ".Pa /var/mail/user" -compact
.It Pa /var/run/utmp
to find out who's logged on and on what terminals
to find out who is logged on and on what terminals
.It Pa /var/mail/user
standard mailbox
.El

View File

@ -173,7 +173,7 @@ If the
.Fl d
option is given,
.Nm
will report on the child processes creation of a new netgraph socket, it's
will report on the child processes creation of a new netgraph socket, its
service offer and the invocation of the
.Xr ppp 8
program.

View File

@ -70,7 +70,7 @@ to run in the foreground.
.It Fl r
Causes
.Nm
to issue a coldStart TRAP on all ATM interfaces it's able to open and exit.
to issue a coldStart TRAP on all ATM interfaces it is able to open and exit.
.El
.Sh NOTES
This daemon does not fully conform to the ATM Forum ILMI specifications.

View File

@ -133,7 +133,7 @@ Set his system name for the authentication protocol.
For CHAP, this
will only be used as a hint, causing a warning message if remote did
supply a different name.
For PAP, it's the name remote must use to
For PAP, it is the name remote must use to
authenticate himself (in connection with his secret).
.It Va myauthsecret Ns Li = Ns Ar secret
Set my secret (key, password) for use in the authentication phase.
@ -151,7 +151,7 @@ needs to authenticate.
.It Va hisauthkey Ns Li = Ns Va secret
Same as above.
.It Va callin
Require remote to authenticate himself only when he's calling in, but
Require remote to authenticate himself only when he is calling in, but
not when we are caller.
This is required for some peers that do not
implement the authentication protocols symmetrically (like Ascend

View File

@ -391,7 +391,7 @@ The original 82c168 PNIC chip has built in NWAY support which is
used on certain early LinkSys LNE100TX and Matrox FastNIC cards,
however it is horribly broken and difficult to use reliably.
Consequently, autonegotiation is not currently supported for this
chipset: the driver defaults the NIC to 10baseT half duplex, and it's
chipset: the driver defaults the NIC to 10baseT half duplex, and it is
up to the operator to manually select a different mode if necessary.
(Later cards use an external MII transceiver to implement NWAY
autonegotiation and work correctly.)

View File

@ -269,7 +269,7 @@ long word is assumed.
.Sy Warning :
since there is no delimiter between expressions, strange
things may happen.
It's best to enclose each expression in parentheses.
It is best to enclose each expression in parentheses.
.It Xo
.Cm set
.Li \&$ Ns Ar variable

View File

@ -170,10 +170,10 @@ Whistle Communications Corp.
.Sh BUGS
This is an attempt to provide a clean way for user mode processes
to implement various IP tricks like address translation, but it
could be cleaner, and it's too dependent on
could be cleaner, and it is too dependent on
.Xr ipfw 8 .
.Pp
It's questionable whether incoming fragments should be reassembled
It is questionable whether incoming fragments should be reassembled
before being diverted.
For example, if only some fragments of a
packet destined for another machine do not get routed through the

View File

@ -312,7 +312,7 @@ whenever these problems occur, but otherwise there is no problem with
recovering from these conditions.
.Pp
The NIC memory access to 3Com and Novell cards is much slower than it is on
WD/SMC cards; it's less than 1MB/second on 8bit boards and less than 2MB/second
WD/SMC cards; it is less than 1MB/second on 8bit boards and less than 2MB/second
on the 16bit cards.
This can lead to ring-buffer overruns resulting in
dropped packets during heavy network traffic.

View File

@ -258,8 +258,8 @@ interface. portno defaults to 5556.
Type 'getsyms' after connection to load kld symbols.
If you're debugging a local system, you can use 'kldsyms' instead
to load the kld symbols. That's a less obnoxious interface.
If you are debugging a local system, you can use 'kldsyms' instead
to load the kld symbols. That is a less obnoxious interface.
(gdb) trf
0xc21bd378 in ?? ()
.Ed

View File

@ -112,7 +112,7 @@ and its length via
If the device does not support returning the WEP key or the user is not
root then the key may be returned as all zeros.
Technically this is a
valid key, but it's the kind of key an idiot would put on his luggage so
valid key, but it is the kind of key an idiot would put on his luggage so
we use it as a special value.
Generally, only four WEP keys are allowed, but some devices support more.
If so, the first four (0-3) are

View File

@ -47,7 +47,7 @@ and to utilize different I2C controllers.
I2C is an acronym for Inter Integrated Circuit bus.
The I2C bus was developed
in the early 1980's by Philips semiconductors.
It's purpose was to provide an
Its purpose was to provide an
easy way to connect a CPU to peripheral chips in a TV-set.
.Pp
The BUS physically consists of 2 active wires and a ground connection.

View File

@ -317,7 +317,7 @@ and AH authenticates encapsulating
packet, not the encapsulated
(inner)
packet
(so for the receiving kernel there's no sign of authenticity).
(so for the receiving kernel there is no sign of authenticity).
The issue will be solved when we revamp our policy engine to keep all the
packet decapsulation history.
.Pp

View File

@ -150,7 +150,7 @@ Erase the pencil mark and reboot.
.Xr ifconfig 8
.Sh STANDARDS
are great.
There's so many to choose from.
There is so many to choose from.
.Sh BUGS
Support for the 3Com 3C1 is not working.
Support for the 3CCFEM556 Fast Ethernet cards has not been tested.

View File

@ -102,7 +102,7 @@ the lower 16Mb of physical memory.
The
.Nm
driver assumes the memory it allocates is within the lower 16Mb range.
This is not a very valid assumption but there's nothing that can be done
This is not a very valid assumption but there is nothing that can be done
about it yet.
For shared memory NICs this is not relevant.
.It "lnc%d: Device timeout -- Resetting"

View File

@ -201,7 +201,7 @@ with anecdotal reports of limited success coming from testers with
early-revision SCO media.
In theory, the basic SVR4 ABI should be constant
across the set of vendors who produce SVR4 operating systems, but in
practice that's probably not the case.
practice that is probably not the case.
If necessary, future work can
either implement additional
.Xr kld 4

View File

@ -201,7 +201,7 @@ is disabled, over the (single) PPP link.
.Pp
Typically when the controlling entity receives an unexpected packet on the
.Dv bypass
hook it responds either by dropping the frame (if it's not ready for
hook it responds either by dropping the frame (if it is not ready for
the protocol) or with an LCP protocol reject (if it does not recognize
or expect the protocol).
.Sh MULTILINK OPERATION

View File

@ -93,7 +93,7 @@ struct ngpppoestat {
This generic message returns is a human-readable version of the node status.
(not yet)
.It Dv NGM_PPPOE_CONNECT
Tell a nominated newly created hook that it's session should enter
Tell a nominated newly created hook that its session should enter
the state machine in a manner to become a client.
It must be newly created and
a service name can be given as an argument.
@ -104,7 +104,7 @@ This command uses the
.Dv ngpppoe_init_data
structure shown below.
.It Dv NGM_PPPOE_LISTEN
Tell a nominated newly created hook that it's session should enter
Tell a nominated newly created hook that its session should enter
the state machine in a manner to become a server listener.
The argument
given is the name of the service to listen on behalf of
@ -118,7 +118,7 @@ This command uses the
.Dv ngpppoe_init_data
structure shown below.
.It Dv NGM_PPPOE_OFFER
Tell a nominated newly created hook that it's session should enter
Tell a nominated newly created hook that its session should enter
the state machine in a manner to become a server.
The argument given is the name of the service to offer.
A zero length service

View File

@ -464,7 +464,7 @@ Since VGA's
might have up to eight simultaneously loaded fonts, they can take
CH_SET4, CH_SET5, CH_SET6, or CH_SET7, too.
.Pp
Note that there's a dependence between the font size
Note that there is a dependence between the font size
and a possible screen height
(in character rows),
depending on the video adaptor used:
@ -568,7 +568,7 @@ being set to
.Pp
.Em VGA color palette interface
.Pp
Only on VGA adaptors, there's a color palette register at the output.
Only on VGA adaptors, there is a color palette register at the output.
It is responsible for the red, green and blue output voltage provided
for each of the 256 internal color codes, each lying in the range of
0 through 63 (with 63 representing the brightest value for a base color).
@ -598,7 +598,7 @@ struct vgapel {
.Pp
.Bl -tag -width 20n -offset indent -compact
.It VGAPCVTID
returns information if the current compiled in driver is pcvt and it's
returns information if the current compiled in driver is pcvt and its
major and minor revision numbers.
the call is taking a pointer to the
following structure as argument:
@ -617,7 +617,7 @@ struct pcvtid {
.Pp
.Bl -tag -width 20n -offset indent -compact
.It VGAPCVTINFO
returns information if the current compiled in driver is pcvt and it's
returns information if the current compiled in driver is pcvt and its
compile time options.
the call is taking a pointer to the following
structure as argument:

View File

@ -154,7 +154,7 @@ When
is set to
.Dq YES ,
this must also be set to the number of days old that a file's access
and modification times must be before it's deleted.
and modification times must be before it is deleted.
.It Va daily_clean_disks_verbose
.Pq Vt bool
Set to
@ -176,7 +176,7 @@ is set to
When
.Va daily_clean_tmps_enable
is set, this must also be set to the number of days old that a file's access
and modification times must be before it's deleted.
and modification times must be before it is deleted.
.It Va daily_clean_tmps_ignore
.Pq Vt str
Set to the list of files that should not be deleted when

View File

@ -122,7 +122,7 @@ to pass through all packets.
Note, however, that using this option
may open a small window of opportunity during booting where your
firewall passes all packets.
Still, it's a good option to use
Still, it is a good option to use
while getting up to speed with
.Fx
firewalling.
@ -384,7 +384,7 @@ add 05000 deny log ip from any to any frag
add 06000 deny all from any to any
.Ed
.Sh PORT BINDING INTERNAL AND EXTERNAL SERVICES
We've mentioned multi-homing hosts and binding services to internal or
We have mentioned multi-homing hosts and binding services to internal or
external addresses but we have not really explained it.
When you have a
host with multiple IP addresses assigned to it, you can bind services run

View File

@ -236,7 +236,7 @@ with the addition that the length of the data mapped is provided via
.Fa mapsize .
.It Vt bus_dmasync_op_t
Memory synchronization operation specifier.
Bus DMA requires explicit synchronization of memory with it's device
Bus DMA requires explicit synchronization of memory with its device
visible mapping in order to guarantee memory coherency.
The
.Vt bus_dmasync_op_t

View File

@ -324,7 +324,7 @@ The system defines an advisory macro
.Dv MINCLSIZE ,
which is the smallest amount of data to put into an
.Vt mbuf cluster .
It's equal to the sum of
It is equal to the sum of
.Dv MLEN
and
.Dv MHLEN .
@ -710,7 +710,7 @@ just adds
.Vt mbufs
to the
.Vt mbuf chain .
It's safe to set
It is safe to set
.Fa offset
beyond the current
.Vt mbuf chain

View File

@ -126,7 +126,7 @@ and processes the request in chunks of maximal the size of this
buffer.
Note that the buffer handling below is very simplified and
will not work (the buffer pointer is not being advanced in case of a
partial read), it's just here to demonstrate the
partial read), it is just here to demonstrate the
.Nm
handling.
.Bd -literal

View File

@ -68,7 +68,7 @@ The file system tests are based on examining the return from a
.Xr stat 2
system call.
The program checks to see if the file is empty,
or if it's some sort of special file.
or if it is some sort of special file.
Any known file types appropriate to the system you are running on
(sockets, symbolic links, or named pipes (FIFOs) on those systems that
implement them)

View File

@ -257,7 +257,7 @@ The default is
Enables (disables) special
.Ic else-if
processing.
If it's enabled, an
If it is enabled, an
.Ic if
following an
.Ic else
@ -390,7 +390,7 @@ appear in your program that are defined by
\- nothing will be
harmed if you miss a few, but the program will not be formatted as nicely as
it should.
This sounds like a painful thing to have to do, but it's really
This sounds like a painful thing to have to do, but it is really
a symptom of a problem in C:
.Ic typedef
causes a syntactic change in the

View File

@ -147,7 +147,7 @@ considered definitive tape positions).
Print (and clear) error status information about this device.
For every normal
operation (e.g., a read or a write) and every control operation (e.g,, a
rewind), the driver stores up the last command executed and it's associated
rewind), the driver stores up the last command executed and it is associated
status and any residual counts (if any).
This command retrieves and prints this
information.

View File

@ -268,7 +268,7 @@ sequence to the length of
If
.Ar n
has a leading zero, it is interpreted as an octal value, otherwise,
it's interpreted as a decimal value.
it is interpreted as a decimal value.
.El
.Sh ENVIRONMENT
The

View File

@ -88,7 +88,7 @@ home, the message will go to the right place.
.Pp
The traditional protocol for writing to someone is that the string
.Ql \-o ,
either at the end of a line or on a line by itself, means that it's the
either at the end of a line or on a line by itself, means that it is the
other person's turn to talk.
The string
.Ql oo

View File

@ -114,7 +114,7 @@ intuitively expected.
If a job falls into a time interval that disappears
(for example, during the switch from
standard time) to daylight saving time or is
duplicated (for example, during the reverse switch), then it's handled
duplicated (for example, during the reverse switch), then it is handled
in one of two ways:
.Pp
The first case is for the jobs that run every at hour of a time interval

View File

@ -290,10 +290,10 @@ are extensions.
.Sh AUTHORS
.An Paul Vixie Aq paul@vix.com
.Sh BUGS
If you're in one of the 70-odd countries that observe Daylight
If you are in one of the 70-odd countries that observe Daylight
Savings Time, jobs scheduled during the rollback or advance will be
affected.
In general, it's not a good idea to schedule jobs during
In general, it is not a good idea to schedule jobs during
this period.
.Pp
For US timezones (except parts of IN, AZ, and HI) the time shift occurs at

View File

@ -130,7 +130,7 @@ differences unless you choose context diffs.
The
.Nm
utility will source scripts that you specify right before
it starts the comparison, and after it's done running.
it starts the comparison, and after it is done running.
The easiest way to handle this is to place the path
to the script(s) in the appropriate variables in your
.Pa .mergemasterrc

View File

@ -325,7 +325,7 @@ changed with
option).
The first half of the attempts (default is two) are made with
the reply address set to standard multicast address, mtrace.mcast.net
(224.0.1.32) with the ttl set to 32 more than what's needed to pass the
(224.0.1.32) with the ttl set to 32 more than what is needed to pass the
thresholds seen so far along the path to the receiver.
For each
additional attempt, the ttl is increased by another 32 each time up to

View File

@ -145,7 +145,7 @@ If used with argument
.Dq Ar list ,
the current VGA DAC palette entries are listed.
Each entry contains
the table index, values for red, green, and blue, and if there's a
the table index, values for red, green, and blue, and if there is a
known name for this entry, the color name.
Trailing empty table
slots (RGB values all zero) are omitted.

View File

@ -426,7 +426,7 @@ The advantage of using
.Cm @unexec
over a deinstallation script is that you can use the
.Dq special sequence expansion
to get at files regardless of where they've
to get at files regardless of where they have
been potentially redirected (see
.Fl p ) .
.It Cm @mode Ar mode
@ -434,7 +434,7 @@ Set default permission for all subsequently extracted files to
.Ar mode .
Format is the same as that used by the
.Cm chmod
command (well, considering that it's later handed off to it, that's
command (well, considering that it is later handed off to it, that is
no surprise).
Use without an arg to set back to default (extraction)
permissions.
@ -467,7 +467,7 @@ trying to document some particularly hairy sequence that
may trip someone up later.
.It Cm @ignore
Used internally to tell extraction to ignore the next file (do not
copy it anywhere), as it's used for some special purpose.
copy it anywhere), as it is used for some special purpose.
.It Cm @ignore_inst
Similar to
.Cm @ignore ,

View File

@ -48,7 +48,7 @@ Normally,
.Em PPP
is implemented as a part of the kernel (e.g., as managed by
.Xr pppd 8 )
and it's thus somewhat hard to debug and/or modify its behaviour.
and it is thus somewhat hard to debug and/or modify its behaviour.
However, in this implementation
.Em PPP
is done as a user process with the help of the
@ -184,7 +184,7 @@ This mode is equivalent to
.Fl auto
mode except that
.Nm
will bring the link back up any time it's dropped for any reason.
will bring the link back up any time it is dropped for any reason.
.It Fl interactive
This is a no-op, and gives the same behaviour as if none of the above
modes have been specified.
@ -347,7 +347,7 @@ into synchronous mode.
.It Supports PPP over ISDN.
If
.Nm
is given a raw B-channel i4b device to open as a link, it's able to talk
is given a raw B-channel i4b device to open as a link, it is able to talk
to the
.Xr isdnd 8
daemon to establish an ISDN connection.
@ -436,7 +436,7 @@ as the user id that invoked
.Nm .
Refer to the
.Sq ID0
logging facility if you're interested in what exactly is done as user id
logging facility if you are interested in what exactly is done as user id
zero.
.Sh GETTING STARTED
When you first run
@ -447,7 +447,7 @@ you may need to deal with some initial configuration details.
Your kernel must {include} a tunnel device (the GENERIC kernel includes
one by default).
If it does not, or if you require more than one tun
interface, you'll need to rebuild your kernel with the following line in
interface, you will need to rebuild your kernel with the following line in
your kernel configuration file:
.Pp
.Dl pseudo-device tun N
@ -589,7 +589,7 @@ connection, try turning CTS/RTS off with
.Dq set ctsrts off .
If you need to do this, check the
.Dq set accmap
description below too - you'll probably need to
description below too - you will probably need to
.Dq set accmap 000a0000 .
.Pp
Usually, parity is set to
@ -599,7 +599,7 @@ and this is
default.
Parity is a rather archaic error checking mechanism that is no
longer used because modern modems do their own error checking, and most
link-layer protocols (that's what
link-layer protocols (that is what
.Nm
is) use much more reliable checking mechanisms.
Parity has a relatively
@ -663,7 +663,7 @@ PPp ON awfulhak> # We've authenticated
PPP ON awfulhak> # We've agreed IP numbers
.Ed
.Pp
If it does not, it's probable that the peer is waiting for your end to
If it does not, it is probable that the peer is waiting for your end to
start negotiating.
To force
.Nm
@ -868,7 +868,7 @@ ppp ON awfulhak> load MyISP
.Pp
Note, no action is taken by
.Nm
after a section is loaded, whether it's the result of passing a label on
after a section is loaded, whether it is the result of passing a label on
the command line or using the
.Dq load
command.
@ -1480,7 +1480,7 @@ Do not forget to send a
.Dv HUP
signal to
.Xr inetd 8
after you've updated
after you have updated
.Pa /etc/inetd.conf .
Here, we use a label named
.Dq ppp-in .
@ -1515,7 +1515,7 @@ To enable PAP, add the following line:
enable PAP
.Ed
.Pp
You'll also need to create the following entry in
You will also need to create the following entry in
.Pa /etc/ppp/ppp.secret :
.Bd -literal -offset indent
MyAuthName MyAuthPasswd
@ -1549,7 +1549,7 @@ ui-gate:
add 10.0.2.0/24 HISADDR
.Ed
.Pp
Again, if you're enabling PAP, you'll also need this in the
Again, if you are enabling PAP, you will also need this in the
.Pa /etc/ppp/ppp.conf
profile:
.Bd -literal -offset indent
@ -1557,7 +1557,7 @@ profile:
set authkey MyAuthKey
.Ed
.Pp
We're assigning the address of 10.0.4.1 to ui-gate, and the address
We are assigning the address of 10.0.4.1 to ui-gate, and the address
10.0.4.2 to awfulhak.
To open the connection, just type
.Pp
@ -1629,7 +1629,7 @@ on the server:
deny deflate pred1
.Ed
.Pp
ensuring that you've put the requisite entry in
ensuring that you have put the requisite entry in
.Pa /etc/ppp/ppp.secret
(MSCHAPv2 is challenge based, so
.Xr passwd 5
@ -1833,7 +1833,7 @@ If no rule in a defined set of rules matches a packet, that packet will
be discarded (blocked).
If there are no rules in a given filter, the packet will be permitted.
.It
It's possible to filter based on the payload of UDP frames where those
It is possible to filter based on the payload of UDP frames where those
frames contain a
.Em PROTO_IP
.Em PPP
@ -1925,7 +1925,7 @@ For IPv4,
.Nm
uses IPCP to negotiate IP addresses.
Each side of the connection
specifies the IP address that it's willing to use, and if the requested
specifies the IP address that it is willing to use, and if the requested
IP address is acceptable then
.Nm
returns an ACK to the requester.
@ -2016,10 +2016,10 @@ The above example means:
.Pp
.Bl -bullet -compact
.It
I'd like to use 192.244.177.38 as my address if it is possible, but I'll
I would like to use 192.244.177.38 as my address if it is possible, but I will
also accept any IP address between 192.244.177.0 and 192.244.177.255.
.It
I'd like to make him use 192.244.177.2 as his own address, but I'll also
I would like to make him use 192.244.177.2 as his own address, but I will also
permit him to use any IP address between 192.244.176.0 and
192.244.191.255.
.It
@ -2031,7 +2031,7 @@ preferred IP address and will obey the remote peers selection.
When using zero, no routing table entries will be made until a connection
is established.
.It
192.244.177.2/0 means that I'll accept/permit any IP address but I'll
192.244.177.2/0 means that I will accept/permit any IP address but I will
suggest that 192.244.177.2 be used first.
.El
.Pp
@ -2124,7 +2124,7 @@ Expect nothing.
Send ATZ.
.It
Expect OK.
If that's not received within the 4 second timeout, send ATZ
If that is not received within the 4 second timeout, send ATZ
and expect OK.
.It
Send ATDTxxxxxxx where xxxxxxx is the next number in the phone list from
@ -2150,7 +2150,7 @@ This login "chat" string means:
Set the timeout to 15 seconds.
.It
Expect "login:".
If it's not received, send a carriage return and expect
If it is not received, send a carriage return and expect
"login:" again.
.It
Send "awfulhak"
@ -2180,7 +2180,7 @@ logging is enabled, the actual password is not logged;
is logged instead.
.Pp
Login scripts vary greatly between ISPs.
If you're setting one up for the first time,
If you are setting one up for the first time,
.Em ENABLE CHAT LOGGING
so that you can see if your script is behaving as you expect.
.It
@ -2196,7 +2196,7 @@ set speed 115200
.Pp
Cuad0 is the first serial port on
.Fx .
If you're running
If you are running
.Nm
on
.Ox ,
@ -3005,7 +3005,7 @@ the UDP wrapper.
The UDP frame payload must not be compressed in any way, otherwise
.Nm
will not be able to interpret it.
It's therefore recommended that you
It is therefore recommended that you
.Ic disable vj pred1 deflate
and
.Ic deny vj pred1 deflate
@ -3390,7 +3390,7 @@ section is always checked first (even though it is only ever automatically
loaded at startup).
.Dq allow users
commands are cumulative in a given section, but users allowed in any given
section override users allowed in the default section, so it's possible to
section override users allowed in the default section, so it is possible to
allow users access to everything except a given label by specifying default
users in the
.Sq default
@ -3658,7 +3658,7 @@ This is replaced with the peers IP number.
.It Li HISADDR6
This is replaced with the peers IPv6 number.
.It Li INTERFACE
This is replaced with the name of the interface that's in use.
This is replaced with the name of the interface that is in use.
.It Li IPOCTETSIN
This is replaced with the number of IP bytes received since the connection
was established.
@ -3762,7 +3762,7 @@ Clone the specified link, creating one or more new links according to the
argument(s).
This command must be used from the
.Dq link
command below unless you've only got a single link (in which case that
command below unless you have only got a single link (in which case that
link becomes the default).
Links may be removed using the
.Dq remove
@ -3838,8 +3838,8 @@ and is provided for backwards compatibility.
.It down Op Ar lcp|ccp
Bring the relevant layer down ungracefully, as if the underlying layer
had become unavailable.
It's not considered polite to use this command on
a Finite State Machine that's in the OPEN state.
It is not considered polite to use this command on
a Finite State Machine that is in the OPEN state.
If no arguments are
supplied, the entire link is closed (or if no context is given, all links
are terminated).
@ -4044,7 +4044,7 @@ IPCP is already open, it will be renegotiated and the network
interface will be reconfigured.
.Pp
It is probably not good practice to re-open the PPP state machines
like this as it's possible that the peer will not behave correctly.
like this as it is possible that the peer will not behave correctly.
It
.Em is
however useful as a way of forcing the CCP or VJ dictionaries to be reset.
@ -4281,7 +4281,7 @@ in the CHAP response packet.
.Pp
When configuring
.Nm
in this manner, it's expected that the host challenge is a series of ASCII
in this manner, it is expected that the host challenge is a series of ASCII
digits or characters.
An encryption device or Secure ID card is usually
required to calculate the secret appropriate for the given challenge.
@ -4319,7 +4319,7 @@ percent or less of the total bundle bandwidth for
.Ar period
seconds, a
.Ar demand-dial
link will be brought down as long as it's not the last active link.
link will be brought down as long as it is not the last active link.
.Pp
Bundle throughput is measured as the maximum of inbound and outbound
traffic.
@ -4469,7 +4469,7 @@ that has been opened:
.Bl -tag -width XXX -offset XXX
.It Terminal Devices
Carrier is checked one second after the login script is complete.
If it's not set,
If it is not set,
.Nm
assumes that this is because the device does not support carrier (which
is true for most
@ -4481,13 +4481,13 @@ As ptys do not support the TIOCMGET ioctl, the tty device will switch all
carrier detection off when it detects that the device is a pty.
.It ISDN (i4b) Devices
Carrier is checked once per second for 6 seconds.
If it's not set after
If it is not set after
the sixth second, the connection attempt is considered to have failed and
the device is closed.
Carrier is always required for i4b devices.
.It PPPoE (netgraph) Devices
Carrier is checked once per second for 5 seconds.
If it's not set after
If it is not set after
the fifth second, the connection attempt is considered to have failed and
the device is closed.
Carrier is always required for PPPoE devices.
@ -5036,7 +5036,7 @@ This is useful if the peer wants
to re-establish a link using the same IP number as was previously
allocated (thus maintaining any existing tcp or udp connections).
.Pp
If the peer requests an IP number that's either outside
If the peer requests an IP number that is either outside
of this range or is already in use,
.Nm
will suggest a random unused IP number from the range.
@ -5226,7 +5226,7 @@ If any arguments are given,
.Nm
will
.Em insist
on using MPPE and will close the link if it's rejected by the peer (Note;
on using MPPE and will close the link if it is rejected by the peer (Note;
this behaviour can be overridden by a configured RADIUS server).
.Pp
The first argument specifies the number of bits that
@ -5282,7 +5282,7 @@ is specified.
The default MTU is 1500.
At negotiation time,
.Nm
will accept whatever MRU the peer requests (assuming it's
will accept whatever MRU the peer requests (assuming it is
not less than 296 bytes or greater than the assigned maximum).
If the MTU is set,
.Nm
@ -5393,7 +5393,7 @@ as it is not known when the commands in
.Pa ppp.conf
are executed.
.It set radius Op Ar config-file
This command enables RADIUS support (if it's compiled in).
This command enables RADIUS support (if it is compiled in).
.Ar config-file
refers to the radius client configuration file as described in
.Xr radius.conf 5 .
@ -5584,7 +5584,7 @@ encryption.
.It RAD_MICROSOFT_MS_MPPE_RECV_KEY
If this
.Dv RAD_VENDOR_MICROSOFT
vendor specific attribute is supplied, it's value is used as the master
vendor specific attribute is supplied, it is value is used as the master
key for decryption of incoming data.
When clients are authenticated using
MSCHAPv2, the RADIUS server MUST provide this attribute if inbound MPPE is
@ -5592,7 +5592,7 @@ to function.
.It RAD_MICROSOFT_MS_MPPE_SEND_KEY
If this
.Dv RAD_VENDOR_MICROSOFT
vendor specific attribute is supplied, it's value is used as the master
vendor specific attribute is supplied, it is value is used as the master
key for encryption of outgoing data.
When clients are authenticated using
MSCHAPv2, the RADIUS server MUST provide this attribute if outbound MPPE is
@ -5986,7 +5986,7 @@ Use
.Dq set ?\&
and
.Dq show ?\&
to get online information about what's available.
to get online information about what is available.
.It
The following URLs contain useful information:
.Bl -bullet -compact

View File

@ -99,7 +99,7 @@ utility uses the same access control mechanism as
.Xr ypserv 8 . )
.Pp
The server then
checks the 'old' password supplied by the user to make sure it's
checks the 'old' password supplied by the user to make sure it is
valid, then performs some sanity checks on the updated information (these
include checking for embedded control characters, colons or invalid shells).
Once it is satisfied that the update request is valid, the server modifies

View File

@ -241,7 +241,7 @@ format has changed as well (since user ids are now 32 bits).
.An Chris G. Demetriou Aq cgd@postgres.berkeley.edu
.Sh BUGS
The number of options to this program is absurd, especially considering
that there's not much logic behind their lettering.
that there is not much logic behind their lettering.
.Pp
The field labels should be more consistent.
.Pp

View File

@ -76,7 +76,7 @@ systems.
It also contains some extra intelligence
for running as a replacement for
.Xr init 8
when it's invoked by the
when it is invoked by the
.Fx
installation boot procedure.
It
@ -315,7 +315,7 @@ installation interactively at least once and take careful notes as to
what the slice names will be, then and only then hardwiring them into
the script.
.Pp
For example, let's say you have a SCSI disk on which you've created a new
For example, let's say you have a SCSI disk on which you have created a new
.Fx
partition in slice 2 (your DOS partition residing in slice 1).
The slice name would be
@ -711,7 +711,7 @@ The netmask for the selected host interface (non-optional).
.It _ftpPath
The fully qualified URL of the FTP site containing the
.Fx
distribution you're interested in, e.g.\&
distribution you are interested in, e.g.\&
.Ar ftp://ftp.FreeBSD.org/pub/FreeBSD/ .
.El
.It mediaSetFTPActive
@ -752,7 +752,7 @@ the installation media.
.It ufs
full /path to directory containing the
.Fx
distribution you're
distribution you are
interested in.
.El
.It mediaSetNFS
@ -783,7 +783,7 @@ The netmask for the selected host interface (non-optional).
full hostname:/path specification for directory containing
the
.Fx
distribution you're interested in.
distribution you are interested in.
.El
.It mediaSetFTPUserPass
.Pp
@ -849,7 +849,7 @@ Execute an arbitrary command with
The name of the command to execute.
When running
from a boot floppy, very minimal expectations should
be made as to what's available until/unless a relatively
be made as to what is available until/unless a relatively
full system installation has just been done.
.El
.It tcpMenuSelect

View File

@ -76,7 +76,7 @@ systems.
It also contains some extra intelligence
for running as a replacement for
.Xr init 8
when it's invoked by the
when it is invoked by the
.Fx
installation boot procedure.
It
@ -315,7 +315,7 @@ installation interactively at least once and take careful notes as to
what the slice names will be, then and only then hardwiring them into
the script.
.Pp
For example, let's say you have a SCSI disk on which you've created a new
For example, let's say you have a SCSI disk on which you have created a new
.Fx
partition in slice 2 (your DOS partition residing in slice 1).
The slice name would be
@ -711,7 +711,7 @@ The netmask for the selected host interface (non-optional).
.It _ftpPath
The fully qualified URL of the FTP site containing the
.Fx
distribution you're interested in, e.g.\&
distribution you are interested in, e.g.\&
.Ar ftp://ftp.FreeBSD.org/pub/FreeBSD/ .
.El
.It mediaSetFTPActive
@ -752,7 +752,7 @@ the installation media.
.It ufs
full /path to directory containing the
.Fx
distribution you're
distribution you are
interested in.
.El
.It mediaSetNFS
@ -783,7 +783,7 @@ The netmask for the selected host interface (non-optional).
full hostname:/path specification for directory containing
the
.Fx
distribution you're interested in.
distribution you are interested in.
.El
.It mediaSetFTPUserPass
.Pp
@ -849,7 +849,7 @@ Execute an arbitrary command with
The name of the command to execute.
When running
from a boot floppy, very minimal expectations should
be made as to what's available until/unless a relatively
be made as to what is available until/unless a relatively
full system installation has just been done.
.El
.It tcpMenuSelect

View File

@ -237,7 +237,7 @@ for further descriptions of both the
and
.Em level
keywords and their significance.
It's preferred that selections be made on
It is preferred that selections be made on
.Em facility
rather than
.Em program ,
@ -383,7 +383,7 @@ flowing quickly), this can be achieved by exiting after just one line of
input.
If necessary, a script wrapper can be written to this effect.
.Pp
Unless the command is a full pipeline, it's probably useful to
Unless the command is a full pipeline, it is probably useful to
start the command with
.Em exec
so that the invoking shell process does not wait for the command to

View File

@ -106,7 +106,7 @@ the maps are always readable and writable only by root for security
reasons.
Technically this is only necessary for the password
maps, but since the data in the other maps can be found in
other world-readable files anyway, it does not hurt and it's considered
other world-readable files anyway, it does not hurt and it is considered
good general practice.
.Pp
The

View File

@ -98,7 +98,7 @@ of years representable by
values.
.It Fl s
Limit time values stored in output files to values that are the same
whether they're taken to be signed or unsigned.
whether they are taken to be signed or unsigned.
You can use this option to generate SVVS-compatible files.
.It Fl y Ar command
Use the given
@ -114,7 +114,7 @@ Leading and trailing white space on input lines is ignored.
An unquoted sharp character (#) in the input introduces a comment which extends
to the end of the line the sharp character appears on.
White space characters and sharp characters may be enclosed in double quotes
(") if they're to be used as part of a field.
(") if they are to be used as part of a field.
Any line that is blank (after comment stripping) is ignored.
Non-blank lines are expected to be of one of three types:
rule lines, zone lines, and link lines.