mdoc(7) police: Removed redundant .Ns calls.

This commit is contained in:
ru 2002-08-13 16:07:28 +00:00
parent 14f702a402
commit ce971426f4
13 changed files with 21 additions and 21 deletions

View File

@ -76,12 +76,12 @@ and process this entries only.
Use Use
.Ar name .Ar name
instead of instead of
.Pa whatis Ns . .Pa whatis .
.It Fl o , Fl outfile Ar file .It Fl o , Fl outfile Ar file
Write all output to Write all output to
.Ar file .Ar file
instead of instead of
.Pa dirname/whatis Ns . .Pa dirname/whatis .
.It Fl v , Fl verbose .It Fl v , Fl verbose
Issue more warnings Issue more warnings
(to stderr). (to stderr).
@ -97,7 +97,7 @@ for a link.
.Ic makewhatis $MANPATH .Ic makewhatis $MANPATH
.Pp .Pp
Create whatis database for all directories in your Create whatis database for all directories in your
.Pa $MANPATH Ns . .Pa $MANPATH .
.Pp .Pp
.Ic makewhatis -outfile /tmp/mywhatis /usr/local/man $HOME/man .Ic makewhatis -outfile /tmp/mywhatis /usr/local/man $HOME/man
.Pp .Pp
@ -106,18 +106,18 @@ Create whatis database
Traverse directories Traverse directories
.Pa /usr/local/man .Pa /usr/local/man
and and
.Pa $HOME/man Ns . .Pa $HOME/man .
Don't create Don't create
.Pa /usr/local/man/whatis .Pa /usr/local/man/whatis
or or
.Pa $HOME/man/whatis Ns . .Pa $HOME/man/whatis .
.Pp .Pp
.Ic makewhatis -name windex $HOME/man .Ic makewhatis -name windex $HOME/man
.Pp .Pp
Create whatis database Create whatis database
.Pa windex .Pa windex
instead of instead of
.Pa whatis Ns . .Pa whatis .
May be useful for Solaris. May be useful for Solaris.
.Sh FILES .Sh FILES
.Bl -tag -width /etc/master.passwdxx -compact .Bl -tag -width /etc/master.passwdxx -compact

View File

@ -125,7 +125,7 @@ or
For compatibility with older versions of For compatibility with older versions of
.Nm , .Nm ,
omitting the numeric parameter (i.e. just omitting the numeric parameter (i.e. just
.Fl d Ns ) .Fl d )
will simply increment the debug level by one. will simply increment the debug level by one.
.It Fl c Ar chdir-path .It Fl c Ar chdir-path
Set the current directory used by Set the current directory used by

View File

@ -192,7 +192,7 @@ echo control chars as
.El .El
.Pp .Pp
The following capabilities are no longer supported by The following capabilities are no longer supported by
.Xr getty 8 Ns : .Xr getty 8 :
.Bl -column Name Type /usr/bin/login .Bl -column Name Type /usr/bin/login
.It "bd num 0 backspace delay" .It "bd num 0 backspace delay"
.It "cb bool false use crt backspace mode" .It "cb bool false use crt backspace mode"

View File

@ -51,7 +51,7 @@ each filesystem specified on the command line by
This increases the security of NFS-exported filesystems by making This increases the security of NFS-exported filesystems by making
it difficult to ``guess'' filehandles. it difficult to ``guess'' filehandles.
.Pp .Pp
.Em Note Ns : .Em Note :
.Xr newfs 8 .Xr newfs 8
now does the equivalent of now does the equivalent of
.Nm .Nm

View File

@ -412,7 +412,7 @@ wrapper support enabled, the administrator can configure
to respond only to selected client machines. to respond only to selected client machines.
.Pp .Pp
While these enhancements provide better security than stock While these enhancements provide better security than stock
.Tn NIS Ns , .Tn NIS ,
they are by no means 100% effective. they are by no means 100% effective.
It is still possible for It is still possible for
someone with access to your network to spoof the server into disclosing someone with access to your network to spoof the server into disclosing

View File

@ -186,10 +186,10 @@ does not exist,
.Pa _PERM_PATH/at.deny .Pa _PERM_PATH/at.deny
is checked, every username not mentioned in it is then allowed is checked, every username not mentioned in it is then allowed
to use to use
.Nm Ns . .Nm .
.Pp .Pp
If neither exists, only the superuser is allowed use of If neither exists, only the superuser is allowed use of
.Nm Ns . .Nm .
This is the default configuration. This is the default configuration.
.Sh IMPLEMENTATION NOTES .Sh IMPLEMENTATION NOTES
Note that Note that

View File

@ -231,7 +231,7 @@ DSDT data file is read.
.El .El
.Sh EXAMPLES .Sh EXAMPLES
The following is an example including, invoking the The following is an example including, invoking the
.Nm Ns , .Nm ,
searching searching
.Li _PRS .Li _PRS
(Possible Resource Settings) (Possible Resource Settings)

View File

@ -138,7 +138,7 @@ definitions of
the number of various devices that will be compiled into the system. the number of various devices that will be compiled into the system.
.Pp .Pp
After running After running
.Nm Ns , .Nm ,
it is necessary to run it is necessary to run
.Dq Li make depend .Dq Li make depend
in the directory where the new makefile in the directory where the new makefile
@ -148,7 +148,7 @@ The
utility prints a reminder of this when it completes. utility prints a reminder of this when it completes.
.Pp .Pp
If any other error messages are produced by If any other error messages are produced by
.Nm Ns , .Nm ,
the problems in the configuration file should be corrected and the problems in the configuration file should be corrected and
.Nm .Nm
should be run again. should be run again.

View File

@ -362,7 +362,7 @@ use the
.Dq nowait .Dq nowait
entry. entry.
Connection requests for these services are accepted by Connection requests for these services are accepted by
.Nm Ns , .Nm ,
and the server is given only the newly-accepted socket connected and the server is given only the newly-accepted socket connected
to a client of the service. to a client of the service.
Most stream-based services operate in this manner. Most stream-based services operate in this manner.

View File

@ -34,7 +34,7 @@ This is useful during power-fail reboots
when no one is around to type a password. when no one is around to type a password.
.Pp .Pp
If a client with no secret key calls If a client with no secret key calls
.Nm Ns , .Nm ,
then the key of user then the key of user
.Em nobody .Em nobody
is used instead as the default key. is used instead as the default key.
@ -46,7 +46,7 @@ Disable the use of default keys for
.Em nobody . .Em nobody .
.It Fl D .It Fl D
Run in debugging mode and log all requests to Run in debugging mode and log all requests to
.Nm Ns . .Nm .
.It Fl n .It Fl n
Root's secret key is not read from Root's secret key is not read from
.Pa /etc/.rootkey . .Pa /etc/.rootkey .

View File

@ -197,7 +197,7 @@ The
and and
.Fl h .Fl h
options are implemented in options are implemented in
.Nm Ns , .Nm ,
but not in the underlying but not in the underlying
.Xr ioctl 2 . .Xr ioctl 2 .
.Pp .Pp

View File

@ -2704,7 +2704,7 @@ Type
is actually specified as is actually specified as
.Dq PPP Magna-link Variable Resource Compression .Dq PPP Magna-link Variable Resource Compression
in in
.Pa rfc1975 Ns ! .Pa rfc1975 !
.Nm .Nm
is capable of negotiating with is capable of negotiating with
.Nm pppd , .Nm pppd ,

View File

@ -120,7 +120,7 @@ There are some problems associated with distributing a
.Fx .Fx
password password
database via database via
.Tn NIS Ns : .Tn NIS :
.Fx .Fx
normally only stores encrypted passwords normally only stores encrypted passwords
in in