Fix typographics errors.diff -r1.7 -r1.8 src/share/man/man0/title.urm
(mbalmer)
--- src/share/man/man0/title.urm 2003/10/13 14:34:25 1.7
+++ src/share/man/man0/title.urm 2009/12/08 09:23:06 1.8
@@ -1,14 +1,14 @@ | @@ -1,14 +1,14 @@ | |||
1 | .\" $NetBSD: title.urm,v 1.7 2003/10/13 14:34:25 agc Exp $ | 1 | .\" $NetBSD: title.urm,v 1.8 2009/12/08 09:23:06 mbalmer Exp $ | |
2 | .\" | 2 | .\" | |
3 | .\" Copyright (c) 1980, 1993, 1994 Regents of the University of California. | 3 | .\" Copyright (c) 1980, 1993, 1994 Regents of the University of California. | |
4 | .\" All rights reserved. | 4 | .\" All rights reserved. | |
5 | .\" | 5 | .\" | |
6 | .\" Redistribution and use in source and binary forms, with or without | 6 | .\" Redistribution and use in source and binary forms, with or without | |
7 | .\" modification, are permitted provided that the following conditions | 7 | .\" modification, are permitted provided that the following conditions | |
8 | .\" are met: | 8 | .\" are met: | |
9 | .\" 1. Redistributions of source code must retain the above copyright | 9 | .\" 1. Redistributions of source code must retain the above copyright | |
10 | .\" notice, this list of conditions and the following disclaimer. | 10 | .\" notice, this list of conditions and the following disclaimer. | |
11 | .\" 2. Redistributions in binary form must reproduce the above copyright | 11 | .\" 2. Redistributions in binary form must reproduce the above copyright | |
12 | .\" notice, this list of conditions and the following disclaimer in the | 12 | .\" notice, this list of conditions and the following disclaimer in the | |
13 | .\" documentation and/or other materials provided with the distribution. | 13 | .\" documentation and/or other materials provided with the distribution. | |
14 | .\" 3. Neither the name of the University nor the names of its contributors | 14 | .\" 3. Neither the name of the University nor the names of its contributors | |
@@ -1890,27 +1890,27 @@ Surprises.\ \ | @@ -1890,27 +1890,27 @@ Surprises.\ \ | |||
1890 | Certain commands provide inter-user communication. | 1890 | Certain commands provide inter-user communication. | |
1891 | Even if you do not plan to use them, it would be | 1891 | Even if you do not plan to use them, it would be | |
1892 | well to learn something about them, because someone else may aim them at you. | 1892 | well to learn something about them, because someone else may aim them at you. | |
1893 | .LP | 1893 | .LP | |
1894 | To communicate with another user currently logged in, | 1894 | To communicate with another user currently logged in, | |
1895 | .IR write (1) | 1895 | .IR write (1) | |
1896 | or | 1896 | or | |
1897 | .IR talk (1) | 1897 | .IR talk (1) | |
1898 | is used; | 1898 | is used; | |
1899 | .IR mail (1) | 1899 | .IR mail (1) | |
1900 | will leave a message whose presence will be announced | 1900 | will leave a message whose presence will be announced | |
1901 | to another user when they next log in. | 1901 | to another user when they next log in. | |
1902 | The write-ups in the manual also suggest how to respond to | 1902 | The write-ups in the manual also suggest how to respond to | |
1903 | the these commands if you are a target. | 1903 | these commands if you are a target. | |
1904 | .LP | 1904 | .LP | |
1905 | If you use | 1905 | If you use | |
1906 | .IR csh (1) | 1906 | .IR csh (1) | |
1907 | the key ^Z (control-Z) will cause jobs to ``stop''. | 1907 | the key ^Z (control-Z) will cause jobs to ``stop''. | |
1908 | If this happens before you learn about it, | 1908 | If this happens before you learn about it, | |
1909 | you can simply continue by saying ``fg'' (for foreground) to bring | 1909 | you can simply continue by saying ``fg'' (for foreground) to bring | |
1910 | the job back. | 1910 | the job back. | |
1911 | .LP | 1911 | .LP | |
1912 | We hope that you will come to enjoy using the BSD system. | 1912 | We hope that you will come to enjoy using the BSD system. | |
1913 | Although it is very large and contains many commands, | 1913 | Although it is very large and contains many commands, | |
1914 | you can become very productive using only a small subset of them. | 1914 | you can become very productive using only a small subset of them. | |
1915 | As your needs expand to doing new tasks, | 1915 | As your needs expand to doing new tasks, | |
1916 | you will almost always find that the system has the facilities | 1916 | you will almost always find that the system has the facilities |
--- src/share/man/man9/kauth.9 2009/08/10 22:36:37 1.88
+++ src/share/man/man9/kauth.9 2009/12/08 09:23:06 1.89
@@ -1,14 +1,14 @@ | @@ -1,14 +1,14 @@ | |||
1 | .\" $NetBSD: kauth.9,v 1.88 2009/08/10 22:36:37 wiz Exp $ | 1 | .\" $NetBSD: kauth.9,v 1.89 2009/12/08 09:23:06 mbalmer Exp $ | |
2 | .\" | 2 | .\" | |
3 | .\" Copyright (c) 2005, 2006 Elad Efrat <elad@NetBSD.org> | 3 | .\" Copyright (c) 2005, 2006 Elad Efrat <elad@NetBSD.org> | |
4 | .\" All rights reserved. | 4 | .\" All rights reserved. | |
5 | .\" | 5 | .\" | |
6 | .\" Redistribution and use in source and binary forms, with or without | 6 | .\" Redistribution and use in source and binary forms, with or without | |
7 | .\" modification, are permitted provided that the following conditions | 7 | .\" modification, are permitted provided that the following conditions | |
8 | .\" are met: | 8 | .\" are met: | |
9 | .\" 1. Redistributions of source code must retain the above copyright | 9 | .\" 1. Redistributions of source code must retain the above copyright | |
10 | .\" notice, this list of conditions and the following disclaimer. | 10 | .\" notice, this list of conditions and the following disclaimer. | |
11 | .\" 2. Redistributions in binary form must reproduce the above copyright | 11 | .\" 2. Redistributions in binary form must reproduce the above copyright | |
12 | .\" notice, this list of conditions and the following disclaimer in the | 12 | .\" notice, this list of conditions and the following disclaimer in the | |
13 | .\" documentation and/or other materials provided with the distribution. | 13 | .\" documentation and/or other materials provided with the distribution. | |
14 | .\" 3. The name of the author may not be used to endorse or promote products | 14 | .\" 3. The name of the author may not be used to endorse or promote products | |
@@ -1486,27 +1486,27 @@ is optional user-data that will be passe | @@ -1486,27 +1486,27 @@ is optional user-data that will be passe | |||
1486 | during an authorization request. | 1486 | during an authorization request. | |
1487 | .It Ft void Fn kauth_unlisten_scope "kauth_listener_t listener" | 1487 | .It Ft void Fn kauth_unlisten_scope "kauth_listener_t listener" | |
1488 | Removes | 1488 | Removes | |
1489 | .Ar listener | 1489 | .Ar listener | |
1490 | from the scope which it belongs to, ensuring it won't be called again, | 1490 | from the scope which it belongs to, ensuring it won't be called again, | |
1491 | and frees the | 1491 | and frees the | |
1492 | .Ft kauth_listener_t | 1492 | .Ft kauth_listener_t | |
1493 | object | 1493 | object | |
1494 | .Ar listener . | 1494 | .Ar listener . | |
1495 | .El | 1495 | .El | |
1496 | .Pp | 1496 | .Pp | |
1497 | .Nm | 1497 | .Nm | |
1498 | provides no means for synchronization within listeners. | 1498 | provides no means for synchronization within listeners. | |
1499 | It is the the programmer's responsibility to make sure data used by the | 1499 | It is the programmer's responsibility to make sure data used by the | |
1500 | listener is properly locked during its use, as it can be accessed | 1500 | listener is properly locked during its use, as it can be accessed | |
1501 | simultaneously from the same listener called multiple times. | 1501 | simultaneously from the same listener called multiple times. | |
1502 | It is also the programmer's responsibility to do garbage collection after | 1502 | It is also the programmer's responsibility to do garbage collection after | |
1503 | the listener, possibly freeing any allocated data it used. | 1503 | the listener, possibly freeing any allocated data it used. | |
1504 | .Pp | 1504 | .Pp | |
1505 | The common method to do the above is by having a reference count to | 1505 | The common method to do the above is by having a reference count to | |
1506 | each listener. | 1506 | each listener. | |
1507 | On entry to the listener, this reference count should be raised, and | 1507 | On entry to the listener, this reference count should be raised, and | |
1508 | on exit -- lowered. | 1508 | on exit -- lowered. | |
1509 | .Pp | 1509 | .Pp | |
1510 | During the removal of a listener, first | 1510 | During the removal of a listener, first | |
1511 | .Fn kauth_scope_unlisten | 1511 | .Fn kauth_scope_unlisten | |
1512 | should be called to make sure the listener code will not be entered in | 1512 | should be called to make sure the listener code will not be entered in |
--- src/share/man/man9/opencrypto.9 2009/05/04 19:40:02 1.7
+++ src/share/man/man9/opencrypto.9 2009/12/08 09:23:06 1.8
@@ -1,15 +1,15 @@ | @@ -1,15 +1,15 @@ | |||
1 | .\" $OpenBSD: crypto.9,v 1.25 2003/07/11 13:47:41 jmc Exp $ | 1 | .\" $OpenBSD: crypto.9,v 1.25 2003/07/11 13:47:41 jmc Exp $ | |
2 | .\" $NetBSD: opencrypto.9,v 1.7 2009/05/04 19:40:02 wiz Exp $ | 2 | .\" $NetBSD: opencrypto.9,v 1.8 2009/12/08 09:23:06 mbalmer Exp $ | |
3 | .\" | 3 | .\" | |
4 | .\" The author of this man page is Angelos D. Keromytis (angelos@cis.upenn.edu) | 4 | .\" The author of this man page is Angelos D. Keromytis (angelos@cis.upenn.edu) | |
5 | .\" | 5 | .\" | |
6 | .\" Copyright (c) 2000, 2001 Angelos D. Keromytis | 6 | .\" Copyright (c) 2000, 2001 Angelos D. Keromytis | |
7 | .\" | 7 | .\" | |
8 | .\" Permission to use, copy, and modify this software with or without fee | 8 | .\" Permission to use, copy, and modify this software with or without fee | |
9 | .\" is hereby granted, provided that this entire notice is included in | 9 | .\" is hereby granted, provided that this entire notice is included in | |
10 | .\" all source code copies of any software which is or includes a copy or | 10 | .\" all source code copies of any software which is or includes a copy or | |
11 | .\" modification of this software. | 11 | .\" modification of this software. | |
12 | .\" | 12 | .\" | |
13 | .\" THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR | 13 | .\" THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR | |
14 | .\" IMPLIED WARRANTY. IN PARTICULAR, NONE OF THE AUTHORS MAKES ANY | 14 | .\" IMPLIED WARRANTY. IN PARTICULAR, NONE OF THE AUTHORS MAKES ANY | |
15 | .\" REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE | 15 | .\" REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE | |
@@ -501,27 +501,27 @@ The | @@ -501,27 +501,27 @@ The | |||
501 | routine is invoked with a request to perform crypto processing. | 501 | routine is invoked with a request to perform crypto processing. | |
502 | This routine must not block, but should queue the request and return | 502 | This routine must not block, but should queue the request and return | |
503 | immediately. | 503 | immediately. | |
504 | Upon processing the request, the callback routine should be invoked. | 504 | Upon processing the request, the callback routine should be invoked. | |
505 | In case of error, the error indication must be placed in the | 505 | In case of error, the error indication must be placed in the | |
506 | .Fa crp_etype | 506 | .Fa crp_etype | |
507 | field of the | 507 | field of the | |
508 | .Fa cryptop | 508 | .Fa cryptop | |
509 | structure. | 509 | structure. | |
510 | The | 510 | The | |
511 | .Fa hint | 511 | .Fa hint | |
512 | argument can be set to | 512 | argument can be set to | |
513 | .Dv CRYPTO_HINT_MORE | 513 | .Dv CRYPTO_HINT_MORE | |
514 | the there will be more request right after this request. | 514 | when there will be more request right after this request. | |
515 | When the request is completed, or an error is detected, the | 515 | When the request is completed, or an error is detected, the | |
516 | .Fn process | 516 | .Fn process | |
517 | routine should invoke | 517 | routine should invoke | |
518 | .Fn crypto_done . | 518 | .Fn crypto_done . | |
519 | Session migration may be performed, as mentioned previously. | 519 | Session migration may be performed, as mentioned previously. | |
520 | .Pp | 520 | .Pp | |
521 | The | 521 | The | |
522 | .Fn kprocess | 522 | .Fn kprocess | |
523 | routine is invoked with a request to perform crypto key processing. | 523 | routine is invoked with a request to perform crypto key processing. | |
524 | This routine must not block, but should queue the request and return | 524 | This routine must not block, but should queue the request and return | |
525 | immediately. | 525 | immediately. | |
526 | Upon processing the request, the callback routine should be invoked. | 526 | Upon processing the request, the callback routine should be invoked. | |
527 | In case of error, the error indication must be placed in the | 527 | In case of error, the error indication must be placed in the |