diff options
author | Theo de Raadt <deraadt@cvs.openbsd.org> | 2003-01-19 21:02:16 +0000 |
---|---|---|
committer | Theo de Raadt <deraadt@cvs.openbsd.org> | 2003-01-19 21:02:16 +0000 |
commit | d970efb1a2a7ce2878808b2d89dddb4b8d74a9fb (patch) | |
tree | b807ae62aff3690fe8ec0e268b8124f5589a2f69 | |
parent | 02e2120255971073931be7b376b8e074fe2ad0bf (diff) |
typos; jmc@prioris.mini.pw.edu.pl
-rw-r--r-- | lib/libkeynote/keynote.5 | 12 | ||||
-rw-r--r-- | sbin/isakmpd/isakmpd.conf.5 | 10 | ||||
-rw-r--r-- | sbin/isakmpd/isakmpd.policy.5 | 16 | ||||
-rw-r--r-- | share/man/man5/link.5 | 10 | ||||
-rw-r--r-- | share/man/man5/login.conf.5 | 19 |
5 files changed, 34 insertions, 33 deletions
diff --git a/lib/libkeynote/keynote.5 b/lib/libkeynote/keynote.5 index 7c0a4802968..8966cec3c54 100644 --- a/lib/libkeynote/keynote.5 +++ b/lib/libkeynote/keynote.5 @@ -1,4 +1,4 @@ -.\" $OpenBSD: keynote.5,v 1.11 2002/05/01 08:03:30 mpech Exp $ +.\" $OpenBSD: keynote.5,v 1.12 2003/01/19 21:02:14 deraadt Exp $ .\" .\" The author of this code is Angelos D. Keromytis (angelos@dsl.cis.upenn.edu) .\" @@ -57,7 +57,7 @@ Whitespace (a SPACE, TAB, or NEWLINE character) separates tokens but is otherwise ignored outside of quoted strings. Comments with a leading octothorp character ('#') may begin in any column. .Pp -One mandatory field is required in all assertions: Authorizer +One mandatory field is required in all assertions: Authorizer. .Pp Six optional fields may also appear: Comment, Conditions, KeyNote-Version, Licensees, Local-Constants, Signature. @@ -107,7 +107,7 @@ character (ASCII 92 decimal) (e.g., .Qc . .\".Pf { Qo mike Ns Qc 12 .Qc Ns ). -This permits the inclusion of the double- quote and backslash characters +This permits the inclusion of the double-quote and backslash characters inside string literals. .Pp A similar escape mechanism is also used to represent non-printable @@ -210,7 +210,7 @@ dereferenced attributes can be converted to integers or floating point numbers with the type conversion operators .Qq \@ and -.Qq \& . +.Qq & . Thus, an attribute named .Qq foo having the value @@ -565,7 +565,7 @@ representation of a numeric value can be converted to an integer or float with the use of the .Qq \@ and -.Qq \& +.Qq & operators, respectively. Any fractional component of an attribute value dereferenced as an integer is rounded down. @@ -585,7 +585,7 @@ KeyNote. Note that this is one of two mechanisms for including comments in KeyNote assertions; comments can also be inserted anywhere in an assertion's body by preceding them with the -.Qq \# +.Qq # character (except inside string literals). .Sh SIGNATURE FIELD The Signature field identifies a signed assertion and gives the diff --git a/sbin/isakmpd/isakmpd.conf.5 b/sbin/isakmpd/isakmpd.conf.5 index 7641481cefe..fcd7a3e9d75 100644 --- a/sbin/isakmpd/isakmpd.conf.5 +++ b/sbin/isakmpd/isakmpd.conf.5 @@ -1,4 +1,4 @@ -.\" $OpenBSD: isakmpd.conf.5,v 1.71 2003/01/09 13:12:42 ho Exp $ +.\" $OpenBSD: isakmpd.conf.5,v 1.72 2003/01/19 21:02:15 deraadt Exp $ .\" $EOM: isakmpd.conf.5,v 1.57 2000/12/21 14:43:17 ho Exp $ .\" .\" Copyright (c) 1998, 1999, 2000 Niklas Hallqvist. All rights reserved. @@ -197,7 +197,7 @@ How many times should a message be retransmitted before giving up. If this tag is defined, whatever the value is, some semantics of .Nm are changed so that multiple instances can run on top of one SADB -and setup SAs with eachother. +and setup SAs with each other. Specifically this means replay protection will not be asked for, and errors that can occur when updating an SA with its parameters a 2nd time will be ignored. @@ -223,7 +223,7 @@ automatically, either on first use if the system supports it, or at startup of the daemon. These names are section names where further information can be found. Look at <IPsec-connection> below. -Normally any connection mentioned here are treated as part of the +Normally any connections mentioned here are treated as part of the "Passive-connection" list we present below, however there is a flag: "Active-only" that disables this behaviour. This too is mentioned in the <IPsec-connection> section, in the "Flags" tag. @@ -437,7 +437,7 @@ The hash algorithm as the RFCs name it, or ANY. The authentication method as the RFCs name it, or ANY. .It Em GROUP_DESCRIPTION The group used for Diffie-Hellman exponentiations, or ANY. -The name are symbolic, like +The names are symbolic, like .Li MODP_768 , MODP_1024 , EC_155 and .Li EC_185 . @@ -722,7 +722,7 @@ WINS-server= 192.168.1.11 # # ##################################################################### -# All configration data below this point is not required as the example +# All configuration data below this point is not required as the example # uses the predefined Main Mode transform and Quick Mode suite names. # It is included here for completeness. Note the default values for the # [General] and [X509-certificates] sections just below. diff --git a/sbin/isakmpd/isakmpd.policy.5 b/sbin/isakmpd/isakmpd.policy.5 index e95be5adc2d..ef32647f330 100644 --- a/sbin/isakmpd/isakmpd.policy.5 +++ b/sbin/isakmpd/isakmpd.policy.5 @@ -1,4 +1,4 @@ -.\" $OpenBSD: isakmpd.policy.5,v 1.27 2002/11/27 14:36:20 ho Exp $ +.\" $OpenBSD: isakmpd.policy.5,v 1.28 2003/01/19 21:02:15 deraadt Exp $ .\" $EOM: isakmpd.policy.5,v 1.24 2000/11/23 12:55:25 niklas Exp $ .\" .\" Copyright (c) 1999-2001, Angelos D. Keromytis. All rights reserved. @@ -48,7 +48,7 @@ layer of the kernel's networking stack. The .Xr isakmpd 1 daemon (also known as IKE, for Internet Key Exchange) is used when two -systems need to automatically setup a pair of Security Associations +systems need to automatically set up a pair of Security Associations (SAs) for securely communicating using IPsec. IKE operates in two stages: .Pp @@ -68,7 +68,7 @@ At this stage, the exact parameters of the SAs (e.g., algorithms to use, encapsulation mode, lifetime) and the identities of the communicating parties (hosts, networks, etc.) are specified. -The reason of existance of Quick Mode is to allow for fast +The reason for the existance of Quick Mode is to allow for fast SA setup, once the more heavy-weight Main Mode has been completed. Generally, Quick Mode uses the key material derived from Main Mode to provide keys to the IPsec transforms to be used. @@ -96,7 +96,7 @@ The responder examines the proposals and determines which of them are acceptable, according to policy and any credentials. .Pp -The following paragraphs assume some knowledge of the contents of +The following paragraphs assume some knowledge of the contents of the .Xr keynote 4 and .Xr keynote 5 @@ -194,7 +194,7 @@ The following policy assertion: .Pp is similar to the previous one, but instead of including a complete X509 credential in the Licensees field, only the X509 certificate's -Subject Canonical Name need to be specified (note that the "DN:" +Subject Canonical Name needs to be specified (note that the "DN:" prefix is necessary). .Pp KeyNote credentials have the same format as policy assertions, with @@ -245,7 +245,7 @@ Information about the proposals, the identity of the remote IKE daemon, the packet classes to be protected, etc. are encoded in what is called an action set. The action set is composed of name-value -attribute, similar in some way to a shell environment variables. +attributes, similar in some ways to shell environment variables. These values are initialized by .Nm isakmpd before each query to the KeyNote system, and can be tested against in @@ -256,8 +256,8 @@ and .Xr keynote 5 for more details on the format and semantics of the Conditions field. .Pp -Note that assertions and credentials can make reference to -non-existant attributes without catastrophic failures (access may be +Note that assertions and credentials can make references to +non-existent attributes without catastrophic failures (access may be denied, depending on the overall structure, but will not be accidentally granted). One reason for credentials referencing diff --git a/share/man/man5/link.5 b/share/man/man5/link.5 index 56e0499ac07..00c1c4dbd81 100644 --- a/share/man/man5/link.5 +++ b/share/man/man5/link.5 @@ -1,4 +1,4 @@ -.\" $OpenBSD: link.5,v 1.12 2003/01/18 20:08:02 deraadt Exp $ +.\" $OpenBSD: link.5,v 1.13 2003/01/19 21:02:15 deraadt Exp $ .\" $NetBSD: link.5,v 1.5 1996/01/09 00:14:32 pk Exp $ .\" .\" Copyright (c) 1993 Paul Kranenburg @@ -111,7 +111,7 @@ segment of the image to which it pertains. The data structures supporting dynamic linking and run-time relocation reside both in the text and data segments of the image they apply to. The text segments contain read-only data such as symbol descriptions and -names, while the data segments contain the tables that need to be modified by +names, while the data segments contain the tables that need to be modified during the relocation process. .Pp The @@ -148,7 +148,7 @@ objects loaded as a result of the actions of the run-time link editor. .It Fa d_entry This field is obsoleted by CRT interface version .Li CRT_VERSION_BSD4 , -and is by the +and by the .Fa crt_ldentry in .Fa crt_ldso . @@ -386,7 +386,7 @@ The .Fa rt_symbol structure is used to keep track of run-time allocated commons and data items copied from shared objects. -These items are kept on linked list and is exported through the +These items are kept in a linked list and are exported through the .Fa dd_cc field in the .Fa so_debug @@ -409,7 +409,7 @@ Virtual address of next .Fa rt_symbol . .It Fa rt_link Next in hash bucket. -Used by internally by +Used internally by .Xr ld.so 1 . .It Fa rt_srcaddr Location of the source of initialized data within a shared object. diff --git a/share/man/man5/login.conf.5 b/share/man/man5/login.conf.5 index cd955ac4dcb..ef90fe21cdf 100644 --- a/share/man/man5/login.conf.5 +++ b/share/man/man5/login.conf.5 @@ -30,7 +30,7 @@ .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF .\" SUCH DAMAGE. .\" -.\" $OpenBSD: login.conf.5,v 1.20 2002/12/09 00:45:37 millert Exp $ +.\" $OpenBSD: login.conf.5,v 1.21 2003/01/19 21:02:15 deraadt Exp $ .\" BSDI $From: login.conf.5,v 2.20 2000/06/26 14:50:38 prb Exp $ .\" .Dd June 18, 2001 @@ -171,7 +171,8 @@ It specifies the base 2 logarithm of the number of rounds. .sp .It ypcipher Ta string Ta old Ta The cipher to use for YP passwords. -The possible values are the same as for localcipher. +The possible values are the same as for +.Ar localcipher . .\" .sp .It login-backoff Ta number Ta 3 Ta @@ -202,7 +203,7 @@ Maximum stack size limit. .\" .sp .It maxproc Ta number Ta "" Ta -Maximum number of process. +Maximum number of processes. .\" .sp .It memorylocked Ta size Ta "" Ta @@ -465,7 +466,7 @@ Request a password and check it against the password in the rpasswd.db file. .\" .It Li skey Send a challenge and request a response, checking it -with S/Key\(tm authentication. +with S/Key (tm) authentication. See .Xr skey 1 . .\" @@ -480,7 +481,7 @@ See .Xr login_token 8 . .El .Pp -Local authentication styles may be added by creating the login script +Local authentication styles may be added by creating a login script for the style (see below). To prevent collisions with future official BSD Authentication style names all local style names should start with a dash (-). @@ -723,11 +724,11 @@ Several \e sequences may be used to introduce non printing characters. These are: .Bl -tag -width indent .It Li \en -A newline +A newline. .It Li \er -A carriage return +A carriage return. .It Li \et -A tab +A tab. .It Li \e Ns Va xxx The character represented by the octal value .Va xxx . @@ -861,7 +862,7 @@ The typical job of the classify program is to determine what authentication type should actually be used, presumably based on the remote IP address. It might also re-specify the hostname to be included in the .Xr utmp 5 -file, reject the login attempt out right, +file, reject the login attempt outright, or even print an additional login banner (e.g., .Pa /etc/issue ) . .Pp |