Remove whitespace at EOL.

This commit is contained in:
dd 2001-07-15 07:53:42 +00:00
parent 0d7bb1fec6
commit a145482cf6
437 changed files with 1754 additions and 1754 deletions

View File

@ -193,7 +193,7 @@ is only supported by few media changers. If it is not supported by a
device, using this command will usually result in a "Invalid Field in
CDB" error message on the console.
.Pp
If the
If the
.Fl c
flag is specified, the volume tag of the specified element is
cleared. If the

View File

@ -113,42 +113,42 @@ one or more of the following values:
.Pp
.Bl -tag -width 6n -compact -offset indent
.It Li 4000
(the set-user-ID-on-execution bit) Executable files with this bit set
(the set-user-ID-on-execution bit) Executable files with this bit set
will run with effective uid set to the uid of the file owner.
Directories with the set-user-id bit set will force all files and
sub-directories created in them to be owned by the directory owner
and not by the uid of the creating process, if the underlying file
system supports this feature: see
Directories with the set-user-id bit set will force all files and
sub-directories created in them to be owned by the directory owner
and not by the uid of the creating process, if the underlying file
system supports this feature: see
.Xr chmod 2
and the
and the
.Ar suiddir
option to
.Xr mount 8 .
.It Li 2000
(the set-group-ID-on-execution bit) Executable files with this bit set
will run with effective gid set to the gid of the file owner.
(the set-group-ID-on-execution bit) Executable files with this bit set
will run with effective gid set to the gid of the file owner.
.It Li 1000
(the sticky bit)
(the sticky bit)
When set on a directory, unprivileged users can delete and rename
only those files in the directory that are owned by them, regardless of
only those files in the directory that are owned by them, regardless of
the permissions on the directory. Under
.Fx ,
the sticky bit is
ignored for executable files and may only be set for directories (see
the sticky bit is
ignored for executable files and may only be set for directories (see
.Xr sticky 8 ) .
.It Li 0400
Allow read by owner.
.It Li 0200
Allow write by owner.
.It Li 0100
For files, allow execution by owner. For directories, allow the owner to
For files, allow execution by owner. For directories, allow the owner to
search in the directory.
.It Li 0040
Allow read by group members.
.It Li 0020
Allow write by group members.
.It Li 0010
For files, allow execution by group members. For directories, allow
For files, allow execution by group members. For directories, allow
group members to search in the directory.
.It Li 0004
Allow read by others.
@ -159,9 +159,9 @@ For files, allow execution by others. For directories allow others to
search in the directory.
.El
.Pp
For example, the absolute mode that permits read, write and execute by
the owner, read and execute by group members, read and execute by
others, and no set-uid or set-gid behaviour is 755
For example, the absolute mode that permits read, write and execute by
the owner, read and execute by group members, read and execute by
others, and no set-uid or set-gid behaviour is 755
(400+200+100+040+010+004+001).
.Pp
The symbolic mode is described by the following grammar:

View File

@ -128,7 +128,7 @@ Cause
to write a prompt to the standard error output before copying a file
that would overwrite an existing file.
If the response from the standard input begins with the character
.Sq Li y
.Sq Li y
or
.Sq Li Y ,
the file copy is attempted.
@ -168,12 +168,12 @@ ID are unchanged unless the
.Fl p
option was specified.
.Pp
In the second synopsis form,
.Ar target_directory
In the second synopsis form,
.Ar target_directory
must exist unless there is only one named
.Ar source_file
which is a directory and the
.Fl R
which is a directory and the
.Fl R
flag is specified.
.Pp
If the destination file does not exist, the mode of the source file is
@ -192,12 +192,12 @@ conditions must be fulfilled or both bits are removed.
.Pp
Appropriate permissions are required for file creation or overwriting.
.Pp
Symbolic links are always followed unless the
.Fl R
Symbolic links are always followed unless the
.Fl R
flag is set, in which case symbolic links are not followed, by default.
The
.Fl H
or
or
.Fl L
flags (in conjunction with the
.Fl R
@ -232,7 +232,7 @@ option is non-standard and its use in scripts is not recommended.
.Sh SEE ALSO
.Xr mv 1 ,
.Xr rcp 1 ,
.Xr umask 2 ,
.Xr umask 2 ,
.Xr fts 3 ,
.Xr symlink 7
.Sh STANDARDS

View File

@ -119,7 +119,7 @@ for it in the glossary.
Acknowledgements
.PP
Numerous people have provided good input about previous versions
of
of
.I csh
and aided in its debugging and in the debugging of its documentation.
I would especially like to thank Michael Ubell
@ -209,7 +209,7 @@ is to be read ``control-\fIx\fR'' and represents the striking of the \fIx\fR
key while the control key is held down.)
The mail program
then echoed the characters `EOT' and transmitted our message.
The characters `% ' were printed before and after the mail command
The characters `% ' were printed before and after the mail command
by the shell to indicate that input was needed.
.PP
After typing the `% ' prompt the shell was reading command input from
@ -292,7 +292,7 @@ rather than having a large number of hard to remember options.
.NH 2
Output to files
.PP
Commands that normally read input or write output on the terminal
Commands that normally read input or write output on the terminal
can also be executed with this input and/or output done to
a file.
.PP
@ -679,7 +679,7 @@ beginning are treated specially.
Neither `*' or `?' or the `[' `]' mechanism will match it.
This prevents accidental matching of the filenames `.' and `..'
in the working directory which have special meaning to the system,
as well as other files such as
as well as other files such as
.I \&.cshrc
which are not normally
visible.
@ -732,7 +732,7 @@ as it is used less frequently.
Quotation
.PP
We have already seen a number of metacharacters used by the shell.
These metacharacters pose a problem in that we cannot use them directly
These metacharacters pose a problem in that we cannot use them directly
as parts of words.
Thus the command
.DS
@ -742,7 +742,7 @@ will not echo the character `*'.
It will either echo an sorted list of filenames in the
current
.I "working directory,"
or print the message `No match' if there are
or print the message `No match' if there are
no files in the working directory.
.PP
The recommended mechanism for placing characters which are neither numbers,
@ -826,7 +826,7 @@ The shell also terminates when it gets an end-of-file printing `logout';
\s-2UNIX\s0 then logs you off the system.
Since this means that typing too many ^D's can accidentally log us off,
the shell has a mechanism for preventing this.
This
This
.I ignoreeof
option will be discussed in section 2.2.
.PP

View File

@ -49,7 +49,7 @@ We will later see what kinds of commands are usefully placed there.
For now we need not have this file and the shell does not complain about
its absence.
.PP
A
A
.I "login shell" ,
executed after you login to the system,
will, after it reads commands from
@ -131,7 +131,7 @@ processing my
.I \&.login
file and begin reading commands from the terminal, prompting for each with
`% '.
When I log off (by giving the
When I log off (by giving the
.I logout
command) the shell
will print `logout' and execute commands from the file `.logout'
@ -328,11 +328,11 @@ main()
printf("hello);
}
% cc !$
cc bug.c
cc bug.c
"bug.c", line 4: newline in string or char constant
"bug.c", line 5: syntax error
% ed !$
ed bug.c
ed bug.c
29
4s/);/"&/p
printf("hello");
@ -340,10 +340,10 @@ w
30
q
% !c
cc bug.c
cc bug.c
% a.out
hello% !e
ed bug.c
ed bug.c
30
4s/lo/lo\e\en/p
printf("hello\en");
@ -356,7 +356,7 @@ cc bug.c \-o bug
a.out: 2784+364+1028 = 4176b = 0x1050b
bug: 2784+364+1028 = 4176b = 0x1050b
% ls \-l !*
ls \-l a.out bug
ls \-l a.out bug
\(mirwxr\(mixr\(mix 1 bill 3932 Dec 19 09:41 a.out
\(mirwxr\(mixr\(mix 1 bill 3932 Dec 19 09:42 bug
% bug
@ -364,14 +364,14 @@ hello
% num bug.c | spp
spp: Command not found.
% ^spp^ssp
num bug.c | ssp
num bug.c | ssp
1 main()
3 {
4 printf("hello\en");
5 }
% !! | lpr
num bug.c | ssp | lpr
%
%
.DE
.KE
In this example we have a very simple C program which has a bug (or two)
@ -645,7 +645,7 @@ EOT
.DE
If the job did not terminate normally the `Done' message might say
something else like `Killed'.
If you want the
If you want the
terminations of background jobs to be reported at the time they occur
(possibly interrupting the output of other foreground jobs), you can set
the
@ -770,7 +770,7 @@ job \- identified by a `\-' in the output of
.I jobs.
When the current job terminates, the previous job becomes the current job.
When given, the argument is either `%\-' (indicating
the previous job); `%#', where # is the job number;
the previous job); `%#', where # is the job number;
`%pref' where pref is some unique prefix of the command name
and arguments of one of the jobs; or `%?' followed by some string found
in only one of the jobs.
@ -859,7 +859,7 @@ text editor might take a long time.
Stopped
% bg
[1] ed bigfile &
%
%
. . . some foreground commands
.ta 1.75i
[1] Stopped (tty input) ed bigfile
@ -868,7 +868,7 @@ ed bigfile
w
120000
q
%
%
.so tabs
.DE
So after the `s' command was issued, the `ed' job was stopped with ^Z

View File

@ -311,7 +311,7 @@ of the shell and some of its control structure follows:
# already in ~/backup
#
set noglob
foreach i ($argv)
foreach i ($argv)
if ($i !~ *.c) continue # not a .c file so do nothing
@ -339,7 +339,7 @@ for each of the values given between `(' and `)' with the named
variable, in this case `i' set to successive values in the list.
Within this loop we may use the command
.I break
to stop executing the loop
to stop executing the loop
and
.I continue
to prematurely terminate one iteration

View File

@ -139,7 +139,7 @@ Set the system's value for minutes west of
.Tn GMT .
.Ar minutes_west
specifies the number of minutes returned in
.Fa tz_minuteswest
.Fa tz_minuteswest
by future calls to
.Xr gettimeofday 2 .
.It Fl u
@ -150,7 +150,7 @@ Display or set the date in
Adjust (i.e., take the current date and display the result of the
adjustment; not actually set the date) the second, minute, hour, month
day, week day, month or year according to
.Ar val .
.Ar val .
If
.Ar val
is preceded with a plus or minus sign,
@ -225,7 +225,7 @@ An operand with a leading plus
sign signals a user-defined format string
which specifies the format in which to display the date and time.
The format string may contain any of the conversion specifications
described in the
described in the
.Xr strftime 3
manual page, as well as any arbitrary text.
A newline

View File

@ -58,7 +58,7 @@ convenience.
.Xr getdomainname 3
.Sh HISTORY
The
.Nm
.Nm
command appeared in
.Fx
1.1, based on a similar command in

View File

@ -223,7 +223,7 @@ The next line.
This is equivalent to
.Em +1
and may be repeated with cumulative effect.
.It +n
.It +n
The
.Em n Ns th
next line, where
@ -525,7 +525,7 @@ and
.Em V .
A newline alone in
.Ar command-list
is equivalent to a
is equivalent to a
.Em p
command.
.It (1,$)G/re/
@ -534,7 +534,7 @@ Interactively edit the addressed lines matching a regular expression
For each matching line,
the line is printed,
the current address is set,
and the user is prompted to enter a
and the user is prompted to enter a
.Ar command-list .
At the end of the
.Em G
@ -576,11 +576,11 @@ deleted or otherwise modified.
.It (.,.)l
Print the addressed lines unambiguously.
If a single line fills for than one screen (as might be the case
when viewing a binary file, for instance), a `--More--'
prompt is printed on the last line.
when viewing a binary file, for instance), a `--More--'
prompt is printed on the last line.
.Nm Ed
waits until the RETURN key is pressed
before displaying the next screen.
before displaying the next screen.
The current address is set to the last line
printed.
.It (.,.)m(.)
@ -870,7 +870,7 @@ printed with the
.Em h
(help) command.
.Pp
Since the
Since the
.Em g
(global) command masks any errors from failed searches and substitutions,
it can be used to perform conditional operations in scripts; e.g.,

View File

@ -42,7 +42,7 @@
.Sh DESCRIPTION
The
.Nm
utility evaluates
utility evaluates
.Ar expression
and writes the result on standard output.
.Pp
@ -55,8 +55,8 @@ Operators are listed below in order of increasing precedence.
Operators with equal precedence are grouped within { } symbols.
.Bl -tag -width indent
.It Ar expr1 Li | Ar expr2
Return the evaluation of
.Ar expr1
Return the evaluation of
.Ar expr1
if it is neither an empty string nor zero;
otherwise, returns the evaluation of
.Ar expr2 .
@ -66,7 +66,7 @@ Return the evaluation of
if neither expression evaluates to an empty string or zero;
otherwise, returns zero.
.It Ar expr1 Li "{=, >, >=, <, <=, !=}" Ar expr2
Return the results of integer comparison if both arguments are integers;
Return the results of integer comparison if both arguments are integers;
otherwise, returns the results of string comparison using the locale-specific
collation sequence.
The result of each comparison is 1 if the specified relation is true,
@ -76,23 +76,23 @@ Return the results of addition or subtraction of integer-valued arguments.
.It Ar expr1 Li "{*, /, %}" Ar expr2
Return the results of multiplication, integer division, or remainder of integer-valued arguments.
.It Ar expr1 Li : Ar expr2
The
The
.Dq \&:
operator matches
.Ar expr1
against
operator matches
.Ar expr1
against
.Ar expr2 ,
which must be a regular expression. The regular expression is anchored
to the beginning of the string with an implicit
to the beginning of the string with an implicit
.Dq ^ .
.Pp
If the match succeeds and the pattern contains at least one regular
expression subexpression
.Dq "\e(...\e)" ,
the string corresponding to
expression subexpression
.Dq "\e(...\e)" ,
the string corresponding to
.Dq "\e1"
is returned;
otherwise the matching operator returns the number of characters matched.
otherwise the matching operator returns the number of characters matched.
If the match fails and the pattern contains a regular expression subexpression
the null string is returned;
otherwise 0.
@ -101,7 +101,7 @@ otherwise 0.
Parentheses are used for grouping in the usual manner.
.Sh EXAMPLES
.Bl -enum
.It
.It
The following example adds one to the variable a.
.Dl a=`expr $a + 1`
.It

View File

@ -62,7 +62,7 @@ Trim off any domain information from the printed
name.
.El
.Sh SEE ALSO
.Xr gethostname 3 ,
.Xr gethostname 3 ,
.Xr rc.conf 5
.Sh HISTORY
The

View File

@ -92,7 +92,7 @@ Cause
.Nm
to write a prompt to standard error if the target file exists.
If the response from the standard input begins with the character
.Sq Li y
.Sq Li y
or
.Sq Li Y ,
then unlink the target file so that the link may occur.
@ -177,7 +177,7 @@ operation using the two passed arguments.
.Xr symlink 2 ,
.Xr symlink 7
.Sh COMPATIBILITY
The
The
.Fl h ,
.Fl i ,
.Fl n

View File

@ -149,7 +149,7 @@ name arguments, to commands which are not traversing a file tree.
.Pp
Except as noted below, commands follow symbolic links named as command
line arguments.
For example, if there were a symbolic link
For example, if there were a symbolic link
.Dq Li slink
which pointed to a file named
.Dq Li afile ,
@ -230,7 +230,7 @@ command is also an exception to this rule.
The
.Xr file 1
command does not follow symbolic links named as argument by default.
The
The
.Xr file 1
command does follow symbolic links named as argument if
.Fl L
@ -303,7 +303,7 @@ walk (where symbolic links referencing directories are followed).
As consistently as possible, you can make commands doing a file tree
walk follow any symbolic links named on the command line, regardless
of the type of file they reference, by specifying the
.Fl H
.Fl H
(for
.Dq half\-logical )
flag.

View File

@ -126,7 +126,7 @@ Display whiteouts when scanning directories.
Include directory entries whose names begin with a
dot (.).
.It Fl b
As
As
.Fl B ,
but use C escape codes whenever possible.
.It Fl c
@ -137,7 +137,7 @@ Directories are listed as plain files (not searched recursively).
Output is not sorted.
.It Fl g
This option is deprecated and is only available for compatibility
with
with
.Bx 4.3 ;
it was used to display the group name in the long
.Pq Fl l
@ -145,7 +145,7 @@ format output.
.It Fl i
For each file, print the file's file serial number (inode number).
.It Fl k
If the
If the
.Fl s
option is specified, print the file size allocation in kilobytes,
not blocks. This option overrides the environment variable BLOCKSIZE.

View File

@ -88,7 +88,7 @@ Cause
to write a prompt to standard error before moving a file that would
overwrite an existing file.
If the response from the standard input begins with the character
.Sq Li y
.Sq Li y
or
.Sq Li Y ,
the move is attempted.

View File

@ -182,7 +182,7 @@
.Nm Pax
will read, write, and list the members of an archive file,
and will copy directory hierarchies.
.Nm Pax
.Nm Pax
operation is independent of the specific archive format,
and supports a wide variety of different archive formats.
A list of supported archive formats can be found under the description of the
@ -216,7 +216,7 @@ and is written using single line buffering.
.Nm Pax
extracts the members of the archive file read from the
.Dv standard input ,
with pathnames matching the specified
with pathnames matching the specified
.Ar patterns .
The archive format and blocking is automatically determined on input.
When an extracted file is a directory, the entire file hierarchy
@ -229,16 +229,16 @@ option.
.It Fl w
.Em Write .
.Nm Pax
writes an archive containing the
writes an archive containing the
.Ar file
operands to
.Dv standard output
using the specified archive format.
When no
When no
.Ar file
operands are specified, a list of files to copy with one per line is read from
operands are specified, a list of files to copy with one per line is read from
.Dv standard input .
When a
When a
.Ar file
operand is also a directory, the entire file hierarchy rooted
at that directory will be included.
@ -249,7 +249,7 @@ copies the
.Ar file
operands to the destination
.Ar directory .
When no
When no
.Ar file
operands are specified, a list of files to copy with one per line is read from
the
@ -306,10 +306,10 @@ operand is used to select one or more pathnames of archive members.
Archive members are selected using the pattern matching notation described
by
.Xr fnmatch 3 .
When the
When the
.Ar pattern
operand is not supplied, all members of the archive will be selected.
When a
When a
.Ar pattern
matches a directory, the entire file hierarchy rooted at that directory will
be selected.
@ -347,11 +347,11 @@ If any intermediate directories are needed in order to extract an archive
member, these directories will be created as if
.Xr mkdir 2
was called with the bitwise inclusive
.Dv OR
.Dv OR
of
.Dv S_IRWXU , S_IRWXG ,
and
.Dv S_IRWXO
.Dv S_IRWXO
as the mode argument.
When the selected archive format supports the specification of linked
files and these files cannot be linked while the archive is being extracted,
@ -378,7 +378,7 @@ If an archive format is not specified with a
.Fl x
option, the format currently being used in the archive will be selected.
Any attempt to append to an archive in a format different from the
format already used in the archive will cause
format already used in the archive will cause
.Nm
to exit immediately
with a non-zero exit status.
@ -419,7 +419,7 @@ can be separated by
to indicate a product.
A specific archive device may impose additional restrictions on the size
of blocking it will support.
When blocking is not specified, the default
When blocking is not specified, the default
.Ar blocksize
is dependent on the specific archive format being used (see the
.Fl x
@ -473,7 +473,7 @@ If this line consists of a single period, the
file or archive member is processed with no modification to its name.
Otherwise, its name is replaced with the contents of the line.
.Nm Pax
will immediately exit with a non-zero exit status if
will immediately exit with a non-zero exit status if
.Dv <EOF>
is encountered when reading a response or if
.Pa /dev/tty
@ -498,7 +498,7 @@ No more than one archive member is matched for each
.Ar pattern .
When members of type directory are matched, the file hierarchy rooted at that
directory is also matched (unless
.Fl d
.Fl d
is also specified).
.It Fl o Ar options
Information to modify the algorithm for extracting or writing archive files
@ -520,7 +520,7 @@ and
.Cm p .
Multiple characteristics can be concatenated within the same string
and multiple
.Fl p
.Fl p
options can be specified.
The meaning of the specification characters are as follows:
.Bl -tag -width 2n
@ -535,10 +535,10 @@ This is intended to be used by
.Em root ,
someone with all the appropriate privileges, in order to preserve all
aspects of the files as they are recorded in the archive.
The
The
.Cm e
flag is the sum of the
.Cm o
.Cm o
and
.Cm p
flags.
@ -551,7 +551,7 @@ Preserve the user ID and group ID.
.Sq Preserve
the file mode bits.
This intended to be used by a
.Em user
.Em user
with regular privileges who wants to preserve all aspects of the file other
than the ownership.
The file times are preserved by default, but two other flags are offered to
@ -565,7 +565,7 @@ extracted file, subject to the permissions of the invoking
process.
Otherwise the attribute of the extracted file is determined as
part of the normal file creation action.
If neither the
If neither the
.Cm e
nor the
.Cm o
@ -573,7 +573,7 @@ specification character is specified, or the user ID and group ID are not
preserved for any reason,
.Nm
will not set the
.Dv S_ISUID
.Dv S_ISUID
.Em ( setuid )
and
.Dv S_ISGID
@ -671,7 +671,7 @@ the output has the format:
.Dl <ls -l listing> == <link name>
For pathnames representing a symbolic link, the output has the format:
.Dl <ls -l listing> => <link name>
Where <ls -l listing> is the output format specified by the
Where <ls -l listing> is the output format specified by the
.Xr ls 1
utility when used with the
.Fl l
@ -783,7 +783,7 @@ to indicate a product.
.Em Warning :
Only use this option when writing an archive to a device which supports
an end of file read condition based on last (or largest) write offset
(such as a regular file or a tape drive).
(such as a regular file or a tape drive).
The use of this option with a floppy or hard disk is not recommended.
.It Fl D
This option is the same as the
@ -814,7 +814,7 @@ of
will cause
.Nm
to attempt to recover from read errors forever.
The default
The default
.Ar limit
is a small positive number of retries.
.Pp
@ -832,7 +832,7 @@ name, or when starting with a
a numeric gid.
A '\\' can be used to escape the
.Cm # .
Multiple
Multiple
.Fl G
options may be supplied and checking stops with the first match.
.It Fl H
@ -845,12 +845,12 @@ Do not follow symbolic links, perform a physical file system traversal.
This is the default mode.
.It Fl T Ar [from_date][,to_date][/[c][m]]
Allow files to be selected based on a file modification or inode change
time falling within a specified time range of
time falling within a specified time range of
.Ar from_date
to
.Ar to_date
(the dates are inclusive).
If only a
If only a
.Ar from_date
is supplied, all files with a modification or inode change time
equal to or younger are selected.
@ -858,7 +858,7 @@ If only a
.Ar to_date
is supplied, all files with a modification or inode change time
equal to or older will be selected.
When the
When the
.Ar from_date
is equal to the
.Ar to_date ,
@ -867,7 +867,7 @@ time will be selected.
.Pp
When
.Nm
is in the
is in the
.Em write
or
.Em copy
@ -884,7 +884,7 @@ The
.Ar c
specifies the comparison of inode change time (the time when the file
inode was last changed; e.g. a change of owner, group, mode, etc).
When
When
.Ar c
and
.Ar m
@ -925,14 +925,14 @@ The minute field
is required, while the other fields are optional and must be added in the
following order:
.Dl Cm hh , dd , mm , yy .
The
The
.Cm ss
field may be added independently of the other fields.
Time ranges are relative to the current time, so
.Dl Fl T Ar 1234/cm
would select all files with a modification or inode change time
of 12:34 PM today or later.
Multiple
Multiple
.Fl T
time range can be supplied and checking stops with the first match.
.It Fl U Ar user
@ -943,14 +943,14 @@ name, or when starting with a
a numeric uid.
A '\\' can be used to escape the
.Cm # .
Multiple
Multiple
.Fl U
options may be supplied and checking stops with the first match.
.It Fl X
When traversing the file hierarchy specified by a pathname,
do not descend into directories that have a different device ID.
See the
.Li st_dev
.Li st_dev
field as described in
.Xr stat 2
for more information about device ID's.
@ -1005,7 +1005,7 @@ Then the
and
.Fl Z
options will be applied based on the final pathname.
Finally the
Finally the
.Fl v
option will write the names resulting from these modifications.
.Pp
@ -1021,13 +1021,13 @@ based only on the user specified pathnames as modified by the
.Fl D ,
.Fl G ,
.Fl T ,
and
and
.Fl U
options (the
.Fl D
option only applies during a copy operation).
Then any
.Fl s
.Fl s
and
.Fl i
options will modify in that order, the names of these selected files.
@ -1072,7 +1072,7 @@ directory hierarchy to
.Pp
The command:
.Dl pax -r -s ',^//*usr//*,,' -f a.pax
reads the archive
reads the archive
.Pa a.pax ,
with all files rooted in ``/usr'' into the archive extracted relative to the
current directory.
@ -1148,7 +1148,7 @@ will exit with one of the following values:
.Bl -tag -width 2n
.It 0
All files were processed successfully.
.It 1
.It 1
An error occurred.
.El
.Pp

View File

@ -69,7 +69,7 @@ the exit status to reflect an error.
The
.Fl f
option overrides any previous
.Fl i
.Fl i
options.
.It Fl i
Request confirmation before attempting to remove each file, regardless of
@ -78,7 +78,7 @@ terminal.
The
.Fl i
option overrides any previous
.Fl f
.Fl f
options.
.It Fl P
Overwrite regular files before deleting them.
@ -86,14 +86,14 @@ Files are overwritten three times, first with the byte pattern 0xff,
then 0x00, and then 0xff again, before they are deleted.
.It Fl R
Attempt to remove the file hierarchy rooted in each file argument.
The
The
.Fl R
option implies the
.Fl d
option.
If the
.Fl i
option is specified, the user is prompted for confirmation before
option is specified, the user is prompted for confirmation before
each directory's contents are processed (as well as before the attempt
is made to remove the directory).
If the user does not respond affirmatively, the file hierarchy rooted in
@ -179,7 +179,7 @@ utility differs from historical implementations in that the
.Fl f
option only masks attempts to remove non-existent files instead of
masking a large variety of errors.
The
The
.Fl v
option is non-standard and its use in scripts is not recommended.
.Pp

View File

@ -45,7 +45,7 @@
.Sh SYNOPSIS
.Nm
.Op Fl n | Fl e
.Ar args...
.Ar args...
.Sh DESCRIPTION
.Nm
prints its arguments on the standard output, separated by spaces.

View File

@ -113,7 +113,7 @@ is a named pipe
.Po Tn FIFO Pc .
.It Fl r Ar file
True if
.Ar file
.Ar file
exists and is readable.
.It Fl s Ar file
True if
@ -154,7 +154,7 @@ True if the length of
.Ar string
is zero.
.It Fl L Ar file
True if
True if
.Ar file
exists and is a symbolic link.
.It Fl O Ar file
@ -219,7 +219,7 @@ True if
.Ar \&s\&1
is not the null
string.
.It Ar \&n\&1 Fl \&eq Ar \&n\&2
.It Ar \&n\&1 Fl \&eq Ar \&n\&2
True if the integers
.Ar \&n\&1
and
@ -287,11 +287,11 @@ operator has higher precedence than the
.Fl o
operator.
.Sh GRAMMAR AMBIGUITY
The
The
.Nm
grammar is inherently ambiguous. In order to assure a degree of consistency,
the cases described in the
.St -p1003.2 ,
the cases described in the
.St -p1003.2 ,
section D11.2/4.62.4, standard
are evaluated consistently according to the rules specified in the
standards document. All other cases are subject to the ambiguity in the

View File

@ -44,7 +44,7 @@
.in +\\n(I\\n(IRu
.ti -\\n(I\\n(IRu
..
.\" Copyright (c) 1986 Ed James. All rights reserved.
.\" Copyright (c) 1986 Ed James. All rights reserved.
.\"
.TH ATC 6 "May 31, 1993"
.UC
@ -85,14 +85,14 @@ Same as
.B \-s.
.TP
.B \-p
Print the path to the special directory where
Print the path to the special directory where
.I atc
expects to find its private files. This is used during the
installation of the program.
.TP
.B "\-g game"
Play the named game. If the game listed is not one of the
ones printed from the
ones printed from the
.B \-l
option, the default game is played.
.TP
@ -104,37 +104,37 @@ Same as
Set the random seed. The purpose of this flag is questionable.
.SH GOALS
.LP
Your goal in
Your goal in
.I atc
is to keep the game going as long as possible.
is to keep the game going as long as possible.
There is no winning state, except to beat the times of other players.
You will need to: launch planes at airports (by instructing them to
increase their altitude); land planes at airports (by instructing them to
go to altitude zero when exactly over the airport); and maneuver planes
out of exit points.
out of exit points.
.LP
Several things will cause the end of the game.
Each plane has a destination (see information area), and
Each plane has a destination (see information area), and
sending a plane to the wrong destination is an error.
Planes can run out of fuel, or can collide. Collision is defined as
adjacency in any of the three dimensions. A plane leaving the arena
in any other way than through its destination exit is an error as well.
.LP
Scores are sorted in order of the number of planes safe. The other
statistics are provided merely for fun. There is no penalty for
statistics are provided merely for fun. There is no penalty for
taking longer than another player (except in the case of ties).
.LP
Suspending a game is not permitted. If you get a talk message, tough.
When was the last time an Air Traffic Controller got called away to
the phone?
the phone?
.SH "THE DISPLAY"
.LP
Depending on the terminal you run
Depending on the terminal you run
.I atc
on, the screen will be divided into 4 areas.
on, the screen will be divided into 4 areas.
It should be stressed that the terminal driver portion of the
game was designed to be reconfigurable, so the display format can vary
depending the version you are playing. The descriptions here are based
depending the version you are playing. The descriptions here are based
on the ASCII version
of the game. The game rules and input format, however,
should remain consistent.
@ -144,7 +144,7 @@ Control-L redraws the screen, should it become muddled.
The first screen area is the radar display, showing the relative locations
of the planes, airports, standard entry/exit points, radar
beacons, and "lines" which simply serve to aid you in guiding
the planes.
the planes.
.IP
Planes are shown as a single letter with an altitude. If
the numerical altitude is a single digit, then it represents
@ -154,7 +154,7 @@ planes and the jets. On ASCII terminals, prop planes are
represented by a upper case letter, jets by a lower case letter.
.IP
Airports are shown as a number and some indication of the direction
planes must be going to land at the airport.
planes must be going to land at the airport.
On ASCII terminals, this is one of '^', '>', '<', and 'v', to indicate
north (0 degrees), east (90), west (270) and south (180), respectively.
The planes will also
@ -164,9 +164,9 @@ Beacons are represented as circles or asterisks and a number.
Their purpose is to offer a place of easy reference to the plane pilots.
See 'the delay command' under the input section of this manual.
.IP
Entry/exit points are displayed as numbers along the border of the
Entry/exit points are displayed as numbers along the border of the
radar screen. Planes will enter the arena from these points without
warning. These points have a direction associated with them, and
warning. These points have a direction associated with them, and
planes will always enter the arena from this direction. On the
ASCII version of
.I atc,
@ -174,7 +174,7 @@ this direction is not displayed. It will become apparent
what this direction is as the game progresses.
.IP
Incoming planes will always enter at the same altitude: 7000 feet.
For a plane to successfully depart through an entry/exit point,
For a plane to successfully depart through an entry/exit point,
it must be flying at 9000 feet.
It is not necessary for the planes to be flying in any particular
direction when they leave the arena (yet).
@ -183,12 +183,12 @@ direction when they leave the arena (yet).
The second area of the display is the information area, which lists
the time (number of updates since start), and the number of planes you
have directed safely out of the arena.
Below this is a list of planes currently in the air, followed by a
Below this is a list of planes currently in the air, followed by a
blank line, and then a list of planes on the ground (at airports).
Each line lists the plane name and its current altitude,
Each line lists the plane name and its current altitude,
an optional asterisk indicating low fuel, the plane's destination,
and the plane's current command. Changing altitude is not considered
to be a command and is therefore not displayed. The following are
to be a command and is therefore not displayed. The following are
some possible information lines:
.IP
B4*A0: Circle @ b1
@ -200,11 +200,11 @@ feet. It is low on fuel (note the '*'). It's destination is
Airport #0.
The next command it expects
to do is circle when it reaches Beacon #1.
The second example shows a jet named 'g' at 7000 feet, destined for
The second example shows a jet named 'g' at 7000 feet, destined for
Exit #4. It is just now executing a turn to 225 degrees (South-West).
.SS "INPUT AREA"
.IP
The third area of the display is the input area. It is here that
The third area of the display is the input area. It is here that
your input is reflected. See the INPUT heading of this manual
for more details.
.SS "AUTHOR AREA"
@ -215,7 +215,7 @@ This area is used simply to give credit where credit is due. :-)
A command completion interface is built into
the game. At any time, typing '?' will list possible input characters.
Typing a backspace (your erase character) backs up, erasing the last part
of the command. When a command is complete, a return enters it, and
of the command. When a command is complete, a return enters it, and
any semantic checking is done at that time. If no errors are detected,
the command is sent to the appropriate plane. If an error is discovered
during the check, the offending statement will be underscored and a
@ -223,25 +223,25 @@ during the check, the offending statement will be underscored and a
.LP
The command syntax is broken into two parts:
.I "Immediate Only"
and
and
.I Delayable
commands.
.I "Immediate Only"
commands happen on the next
update.
update.
.I Delayable
commands also happen on the next update unless they
are followed by an optional predicate called the
.I Delay
are followed by an optional predicate called the
.I Delay
command.
.LP
In the following tables, the syntax
In the following tables, the syntax
.B [0\-9]
means any single digit, and
means any single digit, and
.B <dir>
refers to the keys around the 's' key, namely ``wedcxzaq''.
In absolute references, 'q' refers to North-West or 315 degrees, and 'w'
refers to North, or 0 degrees.
refers to North, or 0 degrees.
In relative references, 'q' refers to -45 degrees or 45 degrees left, and 'w'
refers to 0 degrees, or no change in direction.
.LP
@ -290,7 +290,7 @@ line of dashes if there is no command.
.RE
.B "\- u Unmark:"
.RS
Same as ignore, but if a delayed command is processed,
Same as ignore, but if a delayed command is processed,
the plane will become marked. This is useful if you want
to forget about a plane during part, but not all, of its
journey.
@ -383,11 +383,11 @@ The airport number.
.RE
.SS THE DELAY COMMAND
.LP
The
The
.B Delay
(a/@)
command may be appended to any
.B Delayable
command may be appended to any
.B Delayable
command. It allows the controller to instruct a plane to do an action
when the plane reaches a particular beacon (or other objects in future
versions).
@ -412,10 +412,10 @@ The beacon number.
.RE
.SS "MARKING, UNMARKING AND IGNORING"
.LP
Planes are
Planes are
.B marked
when they enter the arena. This means they are displayed in highlighted
mode on the radar display. A plane may also be either
mode on the radar display. A plane may also be either
.B unmarked
or
.B ignored.
@ -425,18 +425,18 @@ plane is drawn in unhighlighted mode, and a line of dashes is displayed in
the command field of the information area. The plane will remain this
way until a mark command has been issued. Any other command will be issued,
but the command line will return to a line of dashes when the command
is completed.
is completed.
.LP
An
.B ignored
plane is treated the same as an unmarked plane, except that it will
automatically switch to
automatically switch to
.B marked
status when a delayed command has been processed. This is useful if
you want to forget about a plane for a while, but its flight path has
not yet been completely set.
.LP
As with all of the commands, marking, unmarking and ignoring will take effect
As with all of the commands, marking, unmarking and ignoring will take effect
at the beginning of the next update. Do not be surprised if the plane does
not immediately switch to unhighlighted mode.
.SS EXAMPLES
@ -473,7 +473,7 @@ Planes flying at an altitude of 0 crash if they are not over an airport.
Planes waiting at airports can only be told to take off (climb in altitude).
.SH "NEW GAMES"
.LP
The
The
.B Game_List
file lists the currently available play fields. New field description
file names must be placed in this file to be 'playable'. If a player
@ -485,7 +485,7 @@ must be set. These variables are set with the syntax:
.IP
variable = number;
.LP
Variable may be one of:
Variable may be one of:
.B update,
indicating the number of seconds between forced updates;
.B newplane,
@ -509,7 +509,7 @@ line: [ (x1 y1) (x2 y2) ] ... ;
.LP
For beacons, a simple x, y coordinate pair is used (enclosed in parenthesis).
Airports and exits require a third value, a direction, which is one
of
of
.B wedcxzaq.
For airports, this is the direction that planes must be going to take
off and land, and for exits, this is the direction that planes will going
@ -518,7 +518,7 @@ when they
the arena. This may not seem intuitive, but as there is no restriction on
direction of exit, this is appropriate.
Lines are slightly different, since they need two coordinate pairs to
specify the line endpoints. These endpoints must be enclosed in
specify the line endpoints. These endpoints must be enclosed in
square brackets.
.LP
All statements are semi-colon (;) terminated. Multiple item statements
@ -528,8 +528,8 @@ and terminate with a newline.
The coordinates are between zero and width-1 and height-1
inclusive. All of the exit coordinates must lie on the borders, and
all of the beacons and airports must lie inside of the borders.
Line endpoints may be anywhere within the field, so long as
the lines are horizontal, vertical or
Line endpoints may be anywhere within the field, so long as
the lines are horizontal, vertical or
.B "exactly diagonal."
.SS "FIELD FILE EXAMPLE"
.RS
@ -564,7 +564,7 @@ line: [ ( 1 1 ) ( 6 6 ) ]
.RE
.SH FILES
.LP
Files are kept in a special directory. See the OPTIONS for a way to
Files are kept in a special directory. See the OPTIONS for a way to
print this path out.
.TP \w'/usr/share/games/atc/Game_List\ \ \ 'u
/var/games/atc_score
@ -583,7 +583,7 @@ of a game written for some unknown PC many years ago, maybe.
The screen sometimes refreshes after you have quit.
.LP
Yet Another Curses Bug was discovered during the development of this game.
If your curses library clrtobot.o is version 5.1 or earlier,
If your curses library clrtobot.o is version 5.1 or earlier,
you will have erase problems with the backspace operator in the input
window.

View File

@ -61,7 +61,7 @@ heavens...
One to bring good luck and simple feats of wonder,
Two to wash the lands and churn the waves asunder,
Three to rule the world and purge the skies with thunder.
.fi
.PP
In those times great wizards were known and their powers were beyond
@ -90,7 +90,7 @@ fleet of battlestars was reduced to a single ship.
throw <object> <direction>
! <shell esc>
.fi
.SH "IMPLIED OBJECTS"
.nf
@ -117,7 +117,7 @@ fleet of battlestars was reduced to a single ship.
>-: get
knife:
Taken.
.fi
.PP
Notice that the "shadow" of the next word stays around if you
@ -144,7 +144,7 @@ always printed in R, L, A, & B relative directions.
I wrote Battlestar in 1979 in order to experiment with the niceties of
the C Language.
Most interesting things that happen in the game are hardwired into the
code, so don't
code, so don't
send me any hate mail about it! Instead, enjoy art for art's sake!
.SH AUTHOR
David Riggle

View File

@ -45,7 +45,7 @@ If you have never played solitaire before, it is recommended
that you consult a solitaire instruction book. In
Canfield, tableau cards may be built on each other downward
in alternate colors. An entire pile must be moved as a unit
in building. Top cards of the piles are available
in building. Top cards of the piles are available
to be played on foundations, but never into empty spaces.
.PP
Spaces must be filled from the stock. The top card of
@ -64,8 +64,8 @@ available.
The command 'c' causes
.I canfield
to maintain card counting statistics
on the bottom of the screen.
When properly used this can greatly increase one's chances of
on the bottom of the screen.
When properly used this can greatly increase one's chances of
winning.
.PP
The rules for betting are somewhat less strict than
@ -114,5 +114,5 @@ It is impossible to cheat.
.SH AUTHORS
Originally written: Steve Levine
.br
Further random hacking by: Steve Feldman, Kirk McKusick,
Further random hacking by: Steve Feldman, Kirk McKusick,
Mikey Olson, and Eric Allman.

View File

@ -84,7 +84,7 @@ utility prints primes in ascending order, one per line, starting at or above
and continuing until, but not including
.B stop.
The
.B start
.B start
value must be at least 0 and not greater than
.B stop.\&
The
@ -114,7 +114,7 @@ The input line must not be longer than 255 characters.
.B \-h
Print the results in hexadecimal rather than decimal.
.SH DIAGNOSTICS
Out of range or invalid input results in `ouch' being
Out of range or invalid input results in `ouch' being
written to standard error.
.SH BUGS
.I Factor

View File

@ -154,7 +154,7 @@ fortune 90% funny 10% not-funny
.Pp
will pick out 90% of its fortunes from
.Em funny
(the
(the
.Dq 10% not-funny
is unnecessary, since 10% is all that's left).
The
@ -174,7 +174,7 @@ fortune 50% funny 50% not-funny
.It Pa /usr/games/fortune
.Pp
.It Pa /usr/share/games/fortune/*
the fortunes databases (those files ending
the fortunes databases (those files ending
.Dq -o
contain the
.Bf -symbolic

View File

@ -1,7 +1,7 @@
.\" Copyright (c) 1989, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
.\"
.\"
.\"
.\" This code is derived from software contributed to Berkeley by
.\" Ken Arnold.
.\"

View File

@ -98,7 +98,7 @@ Not all prosigns have corresponding characters. Use
for
.Em AS ,
.Ql @
for
for
.Em SK ,
.Ql *
for

View File

@ -31,7 +31,7 @@ They are:
.PP
.TP .5i
.B \-s
Invokes
Invokes
.I phantasia
without header information.
.TP .5i
@ -745,7 +745,7 @@ but bigger.
.TP 1.5i
.B Type six
.I priest
\- rests to maximum; adds
\- rests to maximum; adds
.B mana, brains;
and halves
.B sin.
@ -815,7 +815,7 @@ with a
and gives bearer first hit on all monsters.
.br
.I quicksilver
\- adds to
\- adds to
.B quickness.
.TP 1.5i
.B Type ten
@ -928,7 +928,7 @@ reaches
are converted to
.I gold.
.PP
Once a player is king, he/she may do certain things while in
Once a player is king, he/she may do certain things while in
the Lord's Chamber (0,0). These are exercised with the
.B decree
('0') option.
@ -980,7 +980,7 @@ The king collects the accrued taxes with this option.
.PP
The
.B king
may also
may also
.B teleport
anywhere for free by using the origin as a starting place.
.sh "Council of the Wise, Valar"
@ -1044,7 +1044,7 @@ who uses them.
are essentially immortal, but are actually given five lives.
If these are used up, the player is left to die, and becomes an
.B ex-valar.
A
A
.B valar
cannot
.I move, teleport,
@ -1174,7 +1174,7 @@ is always limited to a maximum of 99.
.I Books
bought at a
.B trading post
increase
increase
.B brains,
based upon the number bought.
It is unwise, however to buy more than 1/10 of one's

View File

@ -37,7 +37,7 @@ to generate
.It Fl V
The
.Fl V
option is for
option is for
.Nm
usage.
.It Fl i Ar string

View File

@ -42,5 +42,5 @@ pom \- display the phase of the moon
The
.I pom
utility displays the current phase of the moon.
Useful for selecting software completion target dates and predicting
Useful for selecting software completion target dates and predicting
managerial behavior.

View File

@ -63,7 +63,7 @@ players or the computer. They may re-enact one of the many
historical sea battles recorded in the game, or they can choose
a fictional battle.
.PP
As a sea captain in the
As a sea captain in the
.I Sail
Navy, the player has complete control over the workings of his ship.
He must order every maneuver, change the set of his sails, and judge the
@ -100,7 +100,7 @@ must calculate moves for each ship it controls, the
more ships the computer is playing, the slower the game will appear.
.PP
If a player joins a game in progress, he will synchronize
with the other players (a rather slow process for everyone), and
with the other players (a rather slow process for everyone), and
then he may play along with the rest.
.PP
To implement a multi-user game in Version 7 UNIX, which was the operating
@ -113,7 +113,7 @@ shared file. For example,
.I Sail
uses a temporary file named /tmp/#sailsink.21 for scenario 21, and
corresponding file names for the other scenarios. To provide exclusive
access to the temporary file,
access to the temporary file,
.I Sail
uses a technique stolen from an old game called "pubcaves" by Jeff Cohen.
Processes do a busy wait in the loop
@ -125,7 +125,7 @@ Processes do a busy wait in the loop
.br
.sp
until they are able to create a link to a file named "/tmp/#saillock.??".
The "??" correspond to the scenario number of the game. Since UNIX
The "??" correspond to the scenario number of the game. Since UNIX
guarantees that a link will point to only one file, the process that succeeds
in linking will have exclusive access to the temporary file.
.PP
@ -147,10 +147,10 @@ The most noticeable effect this communication has on the game is the
delay in moving. Suppose a player types a move for his ship and hits
return. What happens then? The player process saves up messages to
be written to the temporary file in a buffer. Every 7 seconds or so, the
player process gets exclusive access to the temporary file and writes
player process gets exclusive access to the temporary file and writes
out its buffer to the file. The driver, running asynchronously, must
read in the movement command, process it, and write out the results. This
takes two exclusive accesses to the temporary file. Finally, when the player
takes two exclusive accesses to the temporary file. Finally, when the player
process gets around to doing another 7 second update, the results of the
move are displayed on the screen. Hence, every movement requires four
exclusive accesses to the temporary file (anywhere from 7 to 21 seconds
@ -167,7 +167,7 @@ sail around quite quickly.
If the player types several movement commands between two 7 second updates,
only the last movement command typed will be seen by the driver. Movement
commands within the same update "overwrite" each other, in a sense.
.SH THE HISTORY OF SAIL
.SH THE HISTORY OF SAIL
I wrote the first version of
.I Sail
on a PDP 11/70 in the fall of 1980. Needless to say, the code was horrendous,
@ -177,7 +177,7 @@ tremendous rewrite from the top down, I got the first working version up by
1981. There were several annoying bugs concerning firing broadsides and
finding angles.
.I Sail
uses no floating point, by the way, so the direction routines are rather
uses no floating point, by the way, so the direction routines are rather
tricky.
Ed Wang rewrote my angle() routine in 1981 to be more correct (although
it still doesn't work perfectly), and he added code to let a player select
@ -207,7 +207,7 @@ result was very much cleaner and (?) faster. He added window movement
commands and find ship commands.
.SH HISTORICAL INFO
Old Square Riggers were very maneuverable ships capable of intricate
sailing. Their only disadvantage was an inability to sail very
sailing. Their only disadvantage was an inability to sail very
close to the wind. The design of a wooden ship allowed only for the
guns to bear to the left and right sides. A few guns of small
aspect (usually 6 or 9 pounders) could point forward, but their
@ -278,7 +278,7 @@ or boat actions. They could hit hard and get away fast.
Lastly, there were the corvettes, sloops, and brigs. These were smaller
ships mounting typically fewer than 20 guns. A corvette was only slightly
smaller than a frigate, so one might have up to 30 guns. Sloops were used
for carrying dispatches or passengers. Brigs were something you built for
for carrying dispatches or passengers. Brigs were something you built for
land-locked lakes.
.SH SAIL PARTICULARS
Ships in
@ -288,7 +288,7 @@ the ship, and the other represents the stern. Ships have nationalities
and numbers. The first ship of a nationality is number 0, the second
number 1, etc. Therefore, the first British ship in a game would be
printed as "b0". The second Brit would be "b1", and the fifth Don
would be "s4".
would be "s4".
.PP
Ships can set normal sails, called Battle Sails, or bend on extra canvas
called Full Sails. A ship under full sail is a beautiful sight indeed,
@ -322,7 +322,7 @@ be it 0,1,2,3,4, or 5. E.g., the "b0" captured by an American becomes the
The ultimate example is, of course, an exploding Brit captured by an
American: "#&".
.SH MOVEMENT
Movement is the most confusing part of
Movement is the most confusing part of
.I Sail
to many. Ships can head in 8 directions:
.nf
@ -339,15 +339,15 @@ at all for two turns, it will begin to drift. If a ship has begun to
drift, then it must move forward before it turns, if it plans to do
more than make a right or left turn, which is always possible.
.PP
Movement commands to
Movement commands to
.I Sail
are a string of forward moves and turns. An example is "l3". It will
turn a ship left and then move it ahead 3 spaces. In the drawing above,
the "b0" made 7 successive left turns. When
the "b0" made 7 successive left turns. When
.I Sail
prompts you for a move, it prints three characters of import. E.g.,
prompts you for a move, it prints three characters of import. E.g.,
.nf
move (7, 4):
move (7, 4):
.fi
The first number is the maximum number of moves you can make,
including turns. The second number is the maximum number of turns
@ -383,7 +383,7 @@ if you turn closer to the wind, you most likely won't be able to sail the
full allowance printed in the "move" prompt.
.PP
Old sailing captains had to keep an eye constantly on the wind. Captains
in
in
.I Sail
are no different. A ship's ability to move depends on its attitude to the
wind. The best angle possible is to have the wind off your quarter, that is,
@ -397,7 +397,7 @@ sail speeds are given first, and full sail speeds are given in parenthesis.
-^-3(6)
/|\\
| 4(7)
3(6)
3(6)
.fi
Pretend the bow of your ship (the "^") is pointing upward and the wind is
@ -436,7 +436,7 @@ The number of fouls and grapples you have are displayed on the upper
right of the screen.
.SH BOARDING
Boarding was a very costly venture in terms of human life. Boarding parties
may be formed in
may be formed in
.I Sail
to either board an enemy ship or to defend your own ship against attack.
Men organized as Defensive Boarding Parties fight twice as hard to save
@ -447,10 +447,10 @@ number of men sent.
.SH CREW QUALITY
The British seaman was world renowned for his sailing abilities. American
sailors, however, were actually the best seamen in the world. Because the
American Navy offered twice the wages of the Royal Navy, British seamen
American Navy offered twice the wages of the Royal Navy, British seamen
who liked the sea defected to America by the thousands.
.PP
In
In
.I Sail,
crew quality is quantized into 5 energy levels. "Elite" crews can outshoot
and outfight all other sailors. "Crack" crews are next. "Mundane" crews
@ -483,10 +483,10 @@ ship:
.nf
Load D! R!
Hull 9
Hull 9
Crew 4 4 2
Guns 4 4
Carr 2 2
Guns 4 4
Carr 2 2
Rigg 5 5 5 5
.fi
@ -508,14 +508,14 @@ mere opportunity to fire them does not guarantee any hits. Many factors
influence the destructive force of a broadside. First of all, and the chief
factor, is distance. It is harder to hit a ship at range ten than it is
to hit one sloshing alongside. Next is raking. Raking fire, as
mentioned before,
mentioned before,
can sometimes dismast a ship at range ten. Next, crew size and quality affects
the damage done by a broadside. The number of guns firing also bears on the
point,
so to speak. Lastly, weather affects the accuracy of a broadside. If the
seas are high (5 or 6), then the lower gunports of ships of the line can't
even be opened to run out the guns. This gives frigates and other flush
decked vessels an advantage in a storm. The scenario
decked vessels an advantage in a storm. The scenario
.I Pellew vs. The Droits de L'Homme
takes advantage of this peculiar circumstance.
.SH REPAIRS
@ -523,7 +523,7 @@ Repairs may be made to your Hull, Guns, and Rigging at the slow rate of
two points per three turns. The message "Repairs Completed" will be
printed if no more repairs can be made.
.SH PECULIARITIES OF COMPUTER SHIPS
Computer ships in
Computer ships in
.I Sail
follow all the rules above with a few exceptions. Computer ships never
repair damage. If they did, the players could never beat them. They
@ -536,7 +536,7 @@ A.I. distance function and a depth first search to find the maximum "score."
It seems to work fairly well, although I'll be the first to admit it isn't
perfect.
.SH HOW TO PLAY
Commands are given to
Commands are given to
.I Sail
by typing a single character. You will then be prompted for further
input. A brief summary of the commands follows.
@ -547,7 +547,7 @@ input. A brief summary of the commands follows.
'f' Fire broadsides if they bear
'l' Reload
'L' Unload broadsides (to change ammo)
'm' Move
'm' Move
'i' Print the closest ship
'I' Print all ships
'F' Find a particular ship or ships (e.g. "a?" for all Americans)
@ -572,7 +572,7 @@ input. A brief summary of the commands follows.
.fi
.br
.SH SCENARIOS
Here is a summary of the scenarios in
Here is a summary of the scenarios in
.I Sail:
.br
@ -868,7 +868,7 @@ has been a group effort.
.SH AUTHOR
Dave Riggle
.SH CO-AUTHOR
Ed Wang
Ed Wang
.SH REFITTING
Craig Leres
.SH CONSULTANTS

View File

@ -45,7 +45,7 @@ wump [-h] [-a arrows] [-b bats] [-p pits] [-r rooms] [-t tunnels]
.ft R
.SH DESCRIPTION
The game
.I wump
.I wump
is based on a fantasy game first presented in the pages of
.I "People's Computer Company"
in 1973.

View File

@ -72,7 +72,7 @@ The
.Fn gethostid
and
.Fn sethostid
syscalls appeared in
syscalls appeared in
.Bx 4.2
and were dropped in
.Bx 4.4 .

View File

@ -76,7 +76,7 @@ The
.Fn setruid
and
.Fn setrgid
syscalls appeared in
syscalls appeared in
.Bx 4.2
and were dropped in
.Bx 4.4 .

View File

@ -49,7 +49,7 @@
.Xr sigsuspend 2 .
.Pp
.Fn Sigpause
assigns
assigns
.Fa sigmask
to the set of masked signals
and then waits for a signal to arrive;

View File

@ -58,7 +58,7 @@ This interface is made obsolete by:
.Fn Sigsetmask
sets the current signal mask to the specified
.Fa mask .
Signals are blocked from delivery if the corresponding bit in
Signals are blocked from delivery if the corresponding bit in
.Fa mask
is a 1.
.Fn Sigblock

View File

@ -58,10 +58,10 @@ This interface is made obsolete by sigaction(2).
.Pp
The system defines a set of signals that may be delivered to a process.
Signal delivery resembles the occurrence of a hardware interrupt:
the signal is blocked from further occurrence, the current process
the signal is blocked from further occurrence, the current process
context is saved, and a new one is built. A process may specify a
.Em handler
to which a signal is delivered, or specify that a signal is to be
to which a signal is delivered, or specify that a signal is to be
.Em blocked
or
.Em ignored .
@ -78,7 +78,7 @@ Signal routines execute with the signal that caused their
invocation
.Em blocked ,
but other signals may yet occur.
A global
A global
.Em "signal mask"
defines the set of signals currently blocked from delivery
to a process. The signal mask for a process is initialized
@ -95,7 +95,7 @@ signals pending for the process. If the signal is not currently
.Em blocked
by the process then it is delivered to the process. When a signal
is delivered, the current state of the process is saved,
a new signal mask is calculated (as described below),
a new signal mask is calculated (as described below),
and the signal handler is invoked. The call to the handler
is arranged so that if the signal handling routine returns
normally the process will resume execution in the context
@ -111,7 +111,7 @@ or
.Xr sigsetmask 2
call is made).
This mask is formed by taking the current signal mask,
adding the signal to be delivered, and
adding the signal to be delivered, and
.Em or Ns 'ing
in the signal mask associated with the handler to be invoked.
.Pp
@ -129,7 +129,7 @@ the system will deliver the signal to the process on a
.Em "signal stack" ,
specified with
.Xr sigaltstack 2 .
If
If
.Fa ovec
is non-zero, the previous handling information for the signal
is returned to the user.
@ -241,7 +241,7 @@ Ignored signals remain ignored;
the signal mask remains the same;
signals that interrupt system calls continue to do so.
.Sh NOTES
The mask specified in
The mask specified in
.Fa vec
is not allowed to block
.Dv SIGKILL
@ -267,7 +267,7 @@ of the following occurs:
.It Bq Er EFAULT
Either
.Fa vec
or
or
.Fa ovec
points to memory that is not a valid part of the process
address space.
@ -309,7 +309,7 @@ struct sigcontext *scp;
Here
.Fa sig
is the signal number, into which the hardware faults and traps are
mapped as defined below.
mapped as defined below.
.Fa Code
is a parameter that is either a constant
as given below or, for compatibility mode faults, the code provided by

View File

@ -145,7 +145,7 @@ The search path is the path specified in the environment by
.Dq Ev PATH
variable.
If this variable isn't specified,
the default path is set according to the
the default path is set according to the
.Dv _PATH_DEFPATH
definition in
.Aq paths.h ,

View File

@ -1,7 +1,7 @@
.\"
.\" Copyright (c) 2001 Christopher G. Demetriou
.\" All rights reserved.
.\"
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
@ -17,7 +17,7 @@
.\" information about NetBSD.
.\" 4. The name of the author may not be used to endorse or promote products
.\" derived from this software without specific prior written permission.
.\"
.\"
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.

View File

@ -386,7 +386,7 @@ was set or
returned non-zero.
.It Dv GLOB_LIMIT
The flag
.Dv GLOB_MAXPATH
.Dv GLOB_MAXPATH
was provided, and the specified limit passed to
.Fn glob
in

View File

@ -1,6 +1,6 @@
.\" Copyright (C) 2000 Jason Evans <jasone@freebsd.org>.
.\" All rights reserved.
.\"
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
@ -12,7 +12,7 @@
.\" notice(s), this list of conditions and the following disclaimer in
.\" the documentation and/or other materials provided with the
.\" distribution.
.\"
.\"
.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER(S) ``AS IS'' AND ANY
.\" EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
@ -24,7 +24,7 @@
.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
.\" OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
.\" EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\"
.\" $FreeBSD$
.Dd February 15, 2000
.Dt SEM_DESTROY 3

View File

@ -1,6 +1,6 @@
.\" Copyright (C) 2000 Jason Evans <jasone@freebsd.org>.
.\" All rights reserved.
.\"
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
@ -12,7 +12,7 @@
.\" notice(s), this list of conditions and the following disclaimer in
.\" the documentation and/or other materials provided with the
.\" distribution.
.\"
.\"
.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER(S) ``AS IS'' AND ANY
.\" EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
@ -24,7 +24,7 @@
.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
.\" OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
.\" EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\"
.\" $FreeBSD$
.Dd February 15, 2000
.Dt SEM_GETVALUE 3

View File

@ -1,6 +1,6 @@
.\" Copyright (C) 2000 Jason Evans <jasone@freebsd.org>.
.\" All rights reserved.
.\"
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
@ -12,7 +12,7 @@
.\" notice(s), this list of conditions and the following disclaimer in
.\" the documentation and/or other materials provided with the
.\" distribution.
.\"
.\"
.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER(S) ``AS IS'' AND ANY
.\" EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
@ -24,7 +24,7 @@
.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
.\" OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
.\" EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\"
.\" $FreeBSD$
.Dd February 15, 2000
.Dt SEM_INIT 3

View File

@ -1,6 +1,6 @@
.\" Copyright (C) 2000 Jason Evans <jasone@freebsd.org>.
.\" All rights reserved.
.\"
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
@ -12,7 +12,7 @@
.\" notice(s), this list of conditions and the following disclaimer in
.\" the documentation and/or other materials provided with the
.\" distribution.
.\"
.\"
.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER(S) ``AS IS'' AND ANY
.\" EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
@ -24,14 +24,14 @@
.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
.\" OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
.\" EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\"
.\" $FreeBSD$
.Dd February 15, 2000
.Dt SEM_OPEN 3
.Os
.Sh NAME
.Nm sem_open ,
.Nm sem_close ,
.Nm sem_open ,
.Nm sem_close ,
.Nm sem_unlink
.Nd named semaphore operations
.Sh LIBRARY

View File

@ -1,6 +1,6 @@
.\" Copyright (C) 2000 Jason Evans <jasone@freebsd.org>.
.\" All rights reserved.
.\"
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
@ -12,7 +12,7 @@
.\" notice(s), this list of conditions and the following disclaimer in
.\" the documentation and/or other materials provided with the
.\" distribution.
.\"
.\"
.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER(S) ``AS IS'' AND ANY
.\" EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
@ -24,7 +24,7 @@
.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
.\" OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
.\" EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\"
.\" $FreeBSD$
.Dd February 15, 2000
.Dt SEM_POST 3

View File

@ -1,6 +1,6 @@
.\" Copyright (C) 2000 Jason Evans <jasone@freebsd.org>.
.\" All rights reserved.
.\"
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
@ -12,7 +12,7 @@
.\" notice(s), this list of conditions and the following disclaimer in
.\" the documentation and/or other materials provided with the
.\" distribution.
.\"
.\"
.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER(S) ``AS IS'' AND ANY
.\" EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
@ -24,13 +24,13 @@
.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
.\" OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
.\" EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\"
.\" $FreeBSD$
.Dd February 15, 2000
.Dt SEM_WAIT 3
.Os
.Sh NAME
.Nm sem_wait ,
.Nm sem_wait ,
.Nm sem_trywait
.Nd decrement (lock) a semaphore
.Sh LIBRARY

View File

@ -101,7 +101,7 @@ source code by
.Sh BUGS
Never pass a string with user-supplied data as a format without using
.Ql %s .
An attacker can put format specifiers in the string to mangle your stack,
An attacker can put format specifiers in the string to mangle your stack,
leading to a possible security hole.
This holds true even if the string was built using a function like
.Fn snprintf ,

View File

@ -283,7 +283,7 @@ functions appeared in
.Sh BUGS
Never pass a string with user-supplied data as a format without using
.Ql %s .
An attacker can put format specifiers in the string to mangle your stack,
An attacker can put format specifiers in the string to mangle your stack,
leading to a possible security hole.
This holds true even if the string was built using a function like
.Fn snprintf ,

View File

@ -72,7 +72,7 @@ to resume the collection of histogram ticks and call counts use
.Fn moncontrol 1 .
This feature allows the cost of particular operations to be measured.
Note that an output file will be produced on program exit
regardless of the state of
regardless of the state of
.Fn moncontrol .
.Pp
Programs that are not loaded with
@ -88,7 +88,7 @@ the lowest address sampled is that of
.Fa lowpc
and the highest is just below
.Fa highpc .
Only functions in that range that have been compiled with the
Only functions in that range that have been compiled with the
.Fl pg
option to
.Xr cc 1

View File

@ -50,8 +50,8 @@ and the number of contiguous entries will be returned in
.Pp
.Fn i386_set_ioperm
will set access to a range of I/O ports described by the
.Fa start
and
.Fa start
and
.Fa length
arguments to the state specified by the
.Fa enable
@ -73,7 +73,7 @@ and
will fail if:
.Bl -tag -width Er
.It Bq Er EINVAL
An invalid range was specified by the
An invalid range was specified by the
.Fa start
or
.Fa length

View File

@ -58,7 +58,7 @@ LDT.
Both routines accept a starting selector number
.Fa start_sel
, an array of memory that
will contain the descriptors to be set or returned
will contain the descriptors to be set or returned
.Fa descs
, and the number of entries to set or return
.Fa num_sels .

View File

@ -55,9 +55,9 @@ parameters. The
argument specifies which watch register is used, 0, 1, 2, 3, or -1. If
.Fa watchnum
is -1, a free watch register is found and used. If there are no free
watch registers, an error code of -1 is returned.
watch registers, an error code of -1 is returned.
.Fa Watchaddr
specifies the watch address,
specifies the watch address,
.Fa size
specifies the size in bytes of the area to be watched (1, 2, or 4 bytes),
and

View File

@ -72,7 +72,7 @@ it will be dispatched by the vm86 interrupt table.
.\" .It Dv VM86_INTCALL
.El
.Pp
vm86 mode is entered by calling
vm86 mode is entered by calling
.Xr sigreturn 2
with the correct machine context for vm86, and with the
.Em PSL_VM

View File

@ -42,18 +42,18 @@
.Nm euc
.Nd EUC encoding of runes
.Sh SYNOPSIS
.Nm ENCODING
.Nm ENCODING
.Qq EUC
.Pp
.Nm VARIABLE
.Ar len1
.Ar mask1
.Ar len2
.Ar mask2
.Ar len3
.Ar mask3
.Ar len4
.Ar mask4
.Ar len1
.Ar mask1
.Ar len2
.Ar mask2
.Ar len3
.Ar mask3
.Ar len4
.Ar mask4
.Ar mask
.Sh DESCRIPTION
The
@ -85,7 +85,7 @@ A multibyte character in the fourth codeset consists of
.Ar len4
bytes starting with the byte 0x8f.
.Pp
The
The
.Ev rune_t
encoding of
.Nm EUC

View File

@ -42,18 +42,18 @@
.Nm euc
.Nd EUC encoding of runes
.Sh SYNOPSIS
.Nm ENCODING
.Nm ENCODING
.Qq EUC
.Pp
.Nm VARIABLE
.Ar len1
.Ar mask1
.Ar len2
.Ar mask2
.Ar len3
.Ar mask3
.Ar len4
.Ar mask4
.Ar len1
.Ar mask1
.Ar len2
.Ar mask2
.Ar len3
.Ar mask3
.Ar len4
.Ar mask4
.Ar mask
.Sh DESCRIPTION
The
@ -85,7 +85,7 @@ A multibyte character in the fourth codeset consists of
.Ar len4
bytes starting with the byte 0x8f.
.Pp
The
The
.Ev rune_t
encoding of
.Nm EUC

View File

@ -51,7 +51,7 @@
.Sh DESCRIPTION
The
.Fn isalnum
function tests for any character for which
function tests for any character for which
.Xr isalpha 3
or
.Xr isdigit 3

View File

@ -46,7 +46,7 @@
.Lb libc
.Sh SYNOPSIS
.Fd #include <ctype.h>
.Ft int
.Ft int
.Fn isalpha "int c"
.Sh DESCRIPTION
The

View File

@ -49,7 +49,7 @@ The
.Fn isascii
function tests for an
.Tn ASCII
character, which is any character
character, which is any character
between 0 and octal 0177 inclusive.
.Sh SEE ALSO
.Xr ctype 3 ,

View File

@ -133,11 +133,11 @@ if the character does not appear in the string.
The
.Fn mbmb
function
returns a pointer to the
returns a pointer to the
.Fa pattern ,
or
.Dv NULL
if the
if the
.Fa pattern
does not appear in the string.
.Sh "SEE ALSO

View File

@ -164,7 +164,7 @@ the result in
.Fa mbchar .
The object pointed to by
.Fa mbchar
must be large enough to accommodate the multibyte character.
must be large enough to accommodate the multibyte character.
.Pp
The
.Fn mbstowcs

View File

@ -119,7 +119,7 @@ will point to
If there is an encoding error at the start of
.Fa string ,
.Dv _INVALID_RUNE
is returned and
is returned and
.Fa *result
will point to the second character of
.Fa string .
@ -160,7 +160,7 @@ is not
.Fa *result
will be set to
.Dv NULL .
In all cases,
In all cases,
.Fn sputrune
will return the number of bytes which would be needed to store
.Fa rune
@ -170,7 +170,7 @@ The
.Fn fgetrune
function operates the same as
.Fn sgetrune
with the exception that it attempts to read enough bytes from
with the exception that it attempts to read enough bytes from
.Fa stream
to decode a single rune. It returns either
.Dv EOF
@ -185,7 +185,7 @@ function pushes the multibyte encoding, as provided by
of
.Fa rune
onto
.Fa stream
.Fa stream
such that the next
.Fn fgetrune
call will return
@ -242,7 +242,7 @@ as a multibyte string.
.Bl -tag -width /usr/share/locale/locale/LC_CTYPE -compact
.It Pa $PATH_LOCALE/ Ns Em locale Ns /LC_CTYPE
.It Pa /usr/share/locale/ Ns Em locale Ns /LC_CTYPE
binary LC_CTYPE file for the locale
binary LC_CTYPE file for the locale
.Em locale .
.El
.Sh SEE ALSO

View File

@ -286,9 +286,9 @@ or
.Bl -tag -width /usr/share/locale/locale/category -compact
.It Pa $PATH_LOCALE/ Ns Em locale/category
.It Pa /usr/share/locale/ Ns Em locale/category
locale file for the locale
locale file for the locale
.Em locale
and the category
and the category
.Em category .
.El
.Sh SEE ALSO

View File

@ -51,7 +51,7 @@
.Sh DESCRIPTION
The
.Fn toupper
function converts a lower-case letter to the corresponding
function converts a lower-case letter to the corresponding
upper-case letter.
For single C
.Va char Ns s

View File

@ -12,7 +12,7 @@
.\" no representations about the suitability of this software for any
.\" purpose. It is provided "as is" without express or implied
.\" warranty.
.\"
.\"
.\" THIS SOFTWARE IS PROVIDED BY M.I.T. ``AS IS''. M.I.T. DISCLAIMS
.\" ALL EXPRESS OR IMPLIED WARRANTIES WITH REGARD TO THIS SOFTWARE,
.\" INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
@ -146,7 +146,7 @@ inet_ntoa(struct in_addr addr)
int
inet_aton(const char *ascii, struct in_addr *addr)
{
return (ascii2addr(AF_INET, ascii, addr)
return (ascii2addr(AF_INET, ascii, addr)
== sizeof(*addr));
}
.Ed

View File

@ -70,7 +70,7 @@ and
.Sh HISTORY
The
.Nm byteorder
functions appeared in
functions appeared in
.Bx 4.2 .
.Sh BUGS
On the

View File

@ -115,7 +115,7 @@ and
functions map ethernet addresses to their corresponding hostnames
as specified in the
.Pa /etc/ethers
database.
database.
.Fn ether_ntohost
converts from ethernet address to hostname, and
.Fn ether_hostton
@ -132,7 +132,7 @@ structure
and the hostname in the supplied string
.Ar h .
.Pp
On success,
On success,
.Fn ether_ntoa
returns a pointer to a string containing an
.Tn ASCII

View File

@ -185,7 +185,7 @@ If the
flag is non-zero,
this sets the option to send all queries to the name server using
.Tn TCP
and to retain the connection after each call to
and to retain the connection after each call to
.Fn gethostbyname ,
.Fn gethostbyname2
or
@ -240,7 +240,7 @@ if ((hp = gethostbyaddr((const char *)&ip,
printf("name associated with %s is %s\en", ipstr, hp->h_name);
.Ed
.Sh DIAGNOSTICS
Error return status from
Error return status from
.Fn gethostbyname ,
.Fn gethostbyname2
and
@ -277,8 +277,8 @@ A retry at some later time may succeed.
Some unexpected server failure was encountered.
This is a non-recoverable error.
.It Dv NO_DATA
The requested name is valid but does not have an IP address;
this is not a temporary error.
The requested name is valid but does not have an IP address;
this is not a temporary error.
This means that the name is known to the name server but there is no address
associated with this name.
Another type of request to the name server using this domain name
@ -335,7 +335,7 @@ closes the file.
.Sh HISTORY
The
.Fn herror
function appeared in
function appeared in
.Bx 4.3 .
The
.Fn endhostent ,

View File

@ -66,14 +66,14 @@ functions
each return a pointer to an object with the
following structure describing an internet network.
This structure contains either the information obtained
from the nameserver,
from the nameserver,
.Xr named 8 ,
broken-out fields of a line in the network data base
.Pa /etc/networks ,
or entries supplied by the
.Xr yp 4
.Xr yp 4
system. The order of the lookups is controlled by the
`networks' entry in
`networks' entry in
.Xr nsswitch.conf 5 .
.Pp
.Bd -literal -offset indent
@ -109,7 +109,7 @@ function
opens and rewinds the file. If the
.Fa stayopen
flag is non-zero,
the net data base will not be closed after each call to
the net data base will not be closed after each call to
.Fn getnetbyname
or
.Fn getnetbyaddr .
@ -159,7 +159,7 @@ The
.Fn setnetent ,
and
.Fn endnetent
functions appeared in
functions appeared in
.Bx 4.2 .
.Sh BUGS
The data space used by

View File

@ -98,7 +98,7 @@ function
opens and rewinds the file. If the
.Fa stayopen
flag is non-zero,
the net data base will not be closed after each call to
the net data base will not be closed after each call to
.Fn getprotobyname
or
.Fn getprotobynumber .
@ -139,7 +139,7 @@ The
.Fn setprotoent ,
and
.Fn endprotoent
functions appeared in
functions appeared in
.Bx 4.2 .
.Sh BUGS
These functions use a static data space;

View File

@ -47,7 +47,7 @@
.Sh SYNOPSIS
.Fd #include <netdb.h>
.Ft struct servent *
.Fn getservent
.Fn getservent
.Ft struct servent *
.Fn getservbyname "const char *name" "const char *proto"
.Ft struct servent *
@ -102,7 +102,7 @@ function
opens and rewinds the file. If the
.Fa stayopen
flag is non-zero,
the net data base will not be closed after each call to
the net data base will not be closed after each call to
.Fn getservbyname
or
.Fn getservbyport .
@ -126,7 +126,7 @@ or until
.Dv EOF
is encountered.
If a protocol name is also supplied (non-
.Dv NULL ) ,
.Dv NULL ) ,
searches must also match the protocol.
.Sh FILES
.Bl -tag -width /etc/services -compact
@ -148,7 +148,7 @@ The
.Fn setservent ,
and
.Fn endservent
functions appeared in
functions appeared in
.Bx 4.2 .
.Sh BUGS
These functions use static data storage;

View File

@ -53,7 +53,7 @@
.Fd #include <sys/socket.h>
.Fd #include <netinet/in.h>
.Fd #include <arpa/inet.h>
.Ft int
.Ft int
.Fn inet_aton "const char *cp" "struct in_addr *pin"
.Ft in_addr_t
.Fn inet_addr "const char *cp"
@ -65,7 +65,7 @@
.Fn inet_ntop "int af" "const void *src" "char *dst" "size_t size"
.Ft int
.Fn inet_pton "int af" "const char *src" "void *dst"
.Ft struct in_addr
.Ft struct in_addr
.Fn inet_makeaddr "in_addr_t net" "in_addr_t lna"
.Ft in_addr_t
.Fn inet_lnaof "struct in_addr in"
@ -248,7 +248,7 @@ This is a narrower input set than that accepted by
.Fn inet_aton .
.Sh HISTORY
These
functions appeared in
functions appeared in
.Bx 4.2 .
.Sh BUGS
The value

View File

@ -323,7 +323,7 @@ called for a given ancillary data object,
.Fa *tptrp
must be set to
.Dv NULL .
.Pp
.Pp
Each time this function returns success,
.Fa *tptrp
points to the 8-bit
@ -409,7 +409,7 @@ return
.Li -1
setting
.Fa *tptrp
to non
to non
.Dv NULL
value.
.\"

View File

@ -63,7 +63,7 @@ addresses and returns
.Tn ASCII
strings representing NSAPs (network service
access points) in a
notation inverse to that accepted by
notation inverse to that accepted by
.Fn iso_addr .
.Pp
Unfortunately, no universal standard exists for representing
@ -101,7 +101,7 @@ The
.Fn iso_addr
and
.Fn iso_ntoa
functions appeared in
functions appeared in
.Bx 4.3 Reno .
.Sh BUGS
The returned values

View File

@ -116,7 +116,7 @@ The
.Fn link_addr
and
.Fn link_ntoa
functions appeared in
functions appeared in
.Bx 4.3 Reno .
.Sh BUGS
The returned values for link_ntoa

View File

@ -46,7 +46,7 @@ address conversion routines
.Sh SYNOPSIS
.Fd #include <sys/types.h>
.Fd #include <netns/ns.h>
.Ft struct ns_addr
.Ft struct ns_addr
.Fn ns_addr "char *cp"
.Ft char *
.Fn ns_ntoa "struct ns_addr ns"
@ -70,7 +70,7 @@ notation in common use in the Xerox Development Environment:
.Ed
.Pp
Trailing zero fields are suppressed, and each number is printed in hexadecimal,
in a format suitable for input to
in a format suitable for input to
.Fn ns_addr .
Any fields lacking super-decimal digits will have a
trailing
@ -121,7 +121,7 @@ The
.Fn ns_addr
and
.Fn ns_toa
functions appeared in
functions appeared in
.Bx 4.3 .
.Sh BUGS
The string returned by

View File

@ -57,7 +57,7 @@
.Sh DESCRIPTION
The
.Fn nsdispatch
function invokes the callback functions specified in
function invokes the callback functions specified in
.Va dtab
in the order given in
.Pa /etc/nsswitch.conf
@ -95,7 +95,7 @@ The last entry in
should contain
.Dv NULL
values for
.Va src ,
.Va src ,
.Va cb ,
and
.Va cb_data .
@ -132,7 +132,7 @@ For each default source type, an entry with
set to the name of the source, and
.Va flags
set to the relevant flags
(usually
(usually
.Dv NS_SUCCESS ;
refer to
.Sx Callback return values
@ -203,9 +203,9 @@ The
routines first appeared in
.Fx 4.1 .
They were imported from the
.Nx
.Nx
Project,
where they appeared first in
where they appeared first in
.Nx 1.4 .
.Sh AUTHORS
Luke Mewburn

View File

@ -104,7 +104,7 @@ If the connection succeeds,
a socket in the Internet domain of type
.Dv SOCK_STREAM
is returned to the caller, and given to the remote
command as
command as
.Em stdin
and
.Em stdout .
@ -122,10 +122,10 @@ signal numbers, to be
forwarded to the process group of the command.
If
.Fa fd2p
is 0, then the
is 0, then the
.Em stderr
(unit 2 of the remote
command) will be made the same as the
command) will be made the same as the
.Em stdout
and no
provision is made for sending arbitrary signals to the remote process,
@ -138,7 +138,7 @@ The
.Fn rresvport
function is used to obtain a socket to which an address with a Privileged
Internet port is bound.
This socket is suitable for use by
This socket is suitable for use by
.Fn rcmd
and several other functions.
Privileged Internet ports are those in the range 0 to 1023.
@ -284,7 +284,7 @@ is overloaded to mean ``All network ports in use.''
.Re
.Sh HISTORY
Most of these
functions appeared in
functions appeared in
.Bx 4.2 .
.Fn rresvport_af
appeared in RFC2292, and was implemented by the WIDE project

View File

@ -92,7 +92,7 @@
.Fa "int anslen"
.Fc
.Ft int
.Fn res_init
.Fn res_init
.Ft int
.Fo dn_comp
.Fa "const char *exp_dn"
@ -418,5 +418,5 @@ see
.Sh HISTORY
The
.Nm
function appeared in
function appeared in
.Bx 4.3 .

View File

@ -42,7 +42,7 @@
.Sh DESCRIPTION
The
.Fn catclose
function closes the message catalog specified by the argument
function closes the message catalog specified by the argument
.Fa catd .
.Sh RETURN VALUES
.Rv -std catclose

View File

@ -32,7 +32,7 @@
.Os
.Sh NAME
.Nm catgets
.Nd retrieve string from message catalog
.Nd retrieve string from message catalog
.Sh LIBRARY
.Lb libc
.Sh SYNOPSIS
@ -40,20 +40,20 @@
.Ft char *
.Fn catgets "nl_catd catd" "int set_id" "int msg_id" "const char *s"
.Sh DESCRIPTION
The
.Fn catgets
The
.Fn catgets
function attempts to retrieve message
.Fa msg_id
of set
.Fa set_id
from the message catalog referenced by the descriptor
.Fa catd .
The argument
The argument
.Fa s
points to a default message which is returned if the function
is unable to retrieve the specified message.
.Sh RETURN VALUES
If the specified message was retrieved successfully,
If the specified message was retrieved successfully,
.Fn catgets
returns a pointer to an internal buffer containing the message string;
otherwise it returns

View File

@ -32,7 +32,7 @@
.Os
.Sh NAME
.Nm catopen
.Nd open message catalog
.Nd open message catalog
.Sh LIBRARY
.Lb libc
.Sh SYNOPSIS
@ -40,21 +40,21 @@
.Ft nl_catd
.Fn catopen "const char *name" "int oflag"
.Sh DESCRIPTION
The
The
.Fn catopen
function opens the message catalog specified by
.Fa name
.Fa name
and returns a message catalog descriptor.
If
.Fa name
contains a
.Sq /
then
.Sq /
then
.Fa name
specifies the full pathname for the message catalog, otherwise the value
specifies the full pathname for the message catalog, otherwise the value
of the environment variable
.Ev NLSPATH
is used with
.Ev NLSPATH
is used with
the following substitutions:
.Bl -tag -width XXX
.It \&%N
@ -86,7 +86,7 @@ environment variable or from the
.Dv LC_MESSAGES
category.
.It \&%%
A single % character.
A single % character.
.El
.Pp
An empty string is substituted for undefined values.
@ -124,11 +124,11 @@ until a successful call to one of the
.Xr exec 3
function.
.Sh RETURN VALUES
Upon successful completion,
Upon successful completion,
.Fn catopen
returns a message catalog descriptor.
Otherwise, (nl_catd) -1 is returned and
.Va errno
.Va errno
is set to indicate the error.
.Sh ERRORS
.Bl -tag -width Er

View File

@ -220,7 +220,7 @@ POSIX.1e is described in IEEE POSIX.1e draft 17.
Discussion of the draft continues on the cross-platform POSIX.1e
implementation mailing list.
To join this list, see the
.Fx
.Fx
POSIX.1e implementation page for more information.
.Sh HISTORY
POSIX.1e support was introduced in

View File

@ -112,7 +112,7 @@ The file system is read-only.
POSIX.1e is described in IEEE POSIX.1e draft 17. Discussion
of the draft continues on the cross-platform POSIX.1e implementation
mailing list. To join this list, see the
.Fx
.Fx
POSIX.1e implementation
page for more information.
.Sh HISTORY

View File

@ -111,12 +111,12 @@ rely on the
library calls to manage username and uid mapping, as well as the
.Xr getgrent 3
library calls to manage groupname and gid mapping. These calls are not
thread safe, and so transitively, neither are
thread safe, and so transitively, neither are
.Fn acl_from_text
and
.Fn acl_to_text .
These functions may also interfere with stateful
calls associated with the
calls associated with the
.Fn getpwent
and
.Fn getgrent

View File

@ -51,10 +51,10 @@ The
and
.Fn acl_get_fd_np
each allow the retrieval of an ACL from a file.
.Fn acl_get_file
.Fn acl_get_file
is a POSIX.1e call that allows the retrieval of a
specified type of ACL from a file by name;
.Fn acl_get_fd
.Fn acl_get_fd
is a POSIX.1e call that allows the retrieval of an ACL of type
ACL_TYPE_ACCESS
from a file descriptor.

View File

@ -53,13 +53,13 @@ and
each associate an ACL with an object referred to by
.Va fd
or
.Va path_p .
.Va path_p .
All except
.Fn acl_set_fd_np
are POSIX.1e calls--
.Fn acl_set_fd
allows only the setting of ACLs of type ACL_TYPE_ACCESS
where as
where as
.Fn acl_set_fd_np
allows the setting of ACLs of any type.
.Sh IMPLEMENTATION NOTES

View File

@ -39,7 +39,7 @@
.Ft char *
.Fn acl_to_text "acl_t acl" "ssize_t *len_p"
.Sh DESCRIPTION
The
The
.Fn acl_to_text
function translates the ACL pointed to by argument
.Va acl

View File

@ -69,7 +69,7 @@ then one ACL_MASK entry shall also be required. The ACL
shall contain at most on ACL_MASK entry.
.Pp
The qualifier field shall be unique among all entries of
the same POSIX.1e ACL facility defined tag type. The
the same POSIX.1e ACL facility defined tag type. The
tag type field shall contain valid values including any
implementation-defined values. Validation of the values
of the qualifier field is implementation-defined.
@ -78,7 +78,7 @@ of the qualifier field is implementation-defined.
The POSIX.1e
.Fn acl_valid
function may reorder the ACL for the purposes of verification; the
non-portable validation functions will not.
non-portable validation functions will not.
.Sh IMPLEMENTATION NOTES
.Fx Ns 's
support for POSIX.1e interfaces and features is still under

View File

@ -66,7 +66,7 @@ This function is described in
.Xr cap_free 3 ,
and may be used to free a capability structure.
.It Fn cap_from_text
This function is described in
This function is described in
.Xr cap_from_text 3 ,
and may be used to convert a text-form capability to its internal
representation.
@ -153,7 +153,7 @@ ACLs are available, this capability overrides the ACL execute access
restrictions when accessing an object.
.It Dv CAP_DAC_WRITE
This capability overrides file mode write access restrictions when access an
object, and, if
object, and, if
.Xr posix1e 3
ACLs are available, this capability also overrides the ACL write access
restrictions when accessing an object.
@ -229,7 +229,7 @@ capability set when invoking
.It Dv CAP_SYS_SETFFLAG
This capability overrides the restriction that a process cannot manipulate
the system file flags on a file system object.
For portability, equivilent to
For portability, equivilent to
.Dv CAP_LINUX_IMMUTABLE .
.It Dv CAP_NET_BIND_SERVICE
This capability overrides network namespace restrictions on process's
@ -267,7 +267,7 @@ configure, or disable system process accounting.
.It Dv CAP_SYS_ADMIN
.It Dv CAP_SYS_BOOT
This capability overrides the restriction that a process cannot invoke
the
the
.Xr boot 2
system call.
.It Dv CAP_SYS_NICE
@ -323,7 +323,7 @@ use in the short term.
POSIX.1e is described in IEEE POSIX.1e draft 17. Discussion
of the draft continues on the cross-platform POSIX.1e implementation
mailing list. To join this list, see the
.Fx
.Fx
POSIX.1e implementation
page for more information.
.Sh HISTORY

View File

@ -25,7 +25,7 @@
.\"
.\" $FreeBSD$
.\"
.\" TrustedBSD Project - support for POSIX.1e process capabilities
.\" TrustedBSD Project - support for POSIX.1e process capabilities
.\"
.Dd April 1, 2000
.Dt CAP_CLEAR 3

View File

@ -25,7 +25,7 @@
.\"
.\" $FreeBSD$
.\"
.\" TrustedBSD Project - support for POSIX.1e process capabilities
.\" TrustedBSD Project - support for POSIX.1e process capabilities
.\"
.Dd April 1, 2000
.Dt CAP_DUP 3

View File

@ -25,7 +25,7 @@
.\"
.\" $FreeBSD$
.\"
.\" TrustedBSD Project - support for POSIX.1e process capabilities
.\" TrustedBSD Project - support for POSIX.1e process capabilities
.\"
.Dd April 1, 2000
.Dt CAP_FREE 3

View File

@ -25,7 +25,7 @@
.\"
.\" $FreeBSD$
.\"
.\" TrustedBSD Project - support for POSIX.1e process capabilities
.\" TrustedBSD Project - support for POSIX.1e process capabilities
.\"
.Dd April 1, 2000
.Dt CAP_GET_FLAG 3

View File

@ -25,7 +25,7 @@
.\"
.\" $FreeBSD$
.\"
.\" TrustedBSD Project - support for POSIX.1e process capabilities
.\" TrustedBSD Project - support for POSIX.1e process capabilities
.\"
.Dd April 1, 2000
.Dt CAP_GET_PROC 3

View File

@ -25,7 +25,7 @@
.\"
.\" $FreeBSD$
.\"
.\" TrustedBSD Project - support for POSIX.1e process capabilities
.\" TrustedBSD Project - support for POSIX.1e process capabilities
.\"
.Dd April 1, 2000
.Dt CAP_INIT 3

View File

@ -25,7 +25,7 @@
.\"
.\" $FreeBSD$
.\"
.\" TrustedBSD Project - support for POSIX.1e process capabilities
.\" TrustedBSD Project - support for POSIX.1e process capabilities
.\"
.Dd April 1, 2000
.Dt CAP_SET_FLAG 3

View File

@ -25,7 +25,7 @@
.\"
.\" $FreeBSD$
.\"
.\" TrustedBSD Project - support for POSIX.1e process capabilities
.\" TrustedBSD Project - support for POSIX.1e process capabilities
.\"
.Dd April 1, 2000
.Dt CAP_SET_PROC 3

View File

@ -21,7 +21,7 @@
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\" SUCH DAMAGE.
.\"
.\" $FreeBSD$
.\"

View File

@ -56,7 +56,7 @@ Access Control are in the wings, and Information Flow Labels are not on
the calendar.
.Pp
POSIX.1e defines both syntax and semantics for these features, but fairly
substantial changes are required to implement these features in the
substantial changes are required to implement these features in the
operating system. As shipped,
.Fx 4.0
permits file systems to export

View File

@ -230,7 +230,7 @@ and
stands for the
sequence of characters of that collating element.
The sequence is a single element of the bracket expression's list.
A bracket expression containing a multi-character collating element
A bracket expression containing a multi-character collating element
can thus match more than one character,
e.g. if the collating sequence includes a
.Ql ch
@ -419,7 +419,7 @@ RE or the beginning of a parenthesized subexpression
Finally, there is one new type of atom, a
.Em back reference :
.Ql \e
followed by a non-zero decimal digit
followed by a non-zero decimal digit
.Em d
matches the same sequence of characters
matched by the

View File

@ -88,7 +88,7 @@ may also fail and set
for any of the errors specified for the calls
.Xr bind 2 ,
.Xr getsockopt 2 ,
or
or
.Xr setsockopt 2 .
.Sh SEE ALSO
.Xr bind 2 ,

Some files were not shown because too many files have changed in this diff Show More