diff options
author | Jonathan Gray <jsg@cvs.openbsd.org> | 2022-02-18 23:17:17 +0000 |
---|---|---|
committer | Jonathan Gray <jsg@cvs.openbsd.org> | 2022-02-18 23:17:17 +0000 |
commit | 8be72c1ae7f33135222ee4052f593efc9442a98e (patch) | |
tree | 5aca22200b71bf801aacc52b03a48ac79f5ff06e | |
parent | bc6b4029e4904c7d1057d5d9fdc25fe26f54ca3f (diff) |
Avoid gendered language in man pages when not referring to a specific
person. Rewrite or use singular they.
ok thfr@ sthen@ daniel@ ian@ job@ kmos@ jcs@ ratchov@ phessler@ and
others I'm likely missing on an earlier version.
feedback tj@, feedback and ok jmc@
-rw-r--r-- | games/atc/atc.6 | 6 | ||||
-rw-r--r-- | games/bs/bs.6 | 6 | ||||
-rw-r--r-- | games/canfield/canfield/canfield.6 | 12 | ||||
-rw-r--r-- | games/cribbage/cribbage.6 | 14 | ||||
-rw-r--r-- | games/hack/hack.6 | 8 | ||||
-rw-r--r-- | games/hunt/hunt/hunt.6 | 15 | ||||
-rw-r--r-- | games/mille/mille.6 | 6 | ||||
-rw-r--r-- | games/monop/monop.6 | 12 | ||||
-rw-r--r-- | games/phantasia/phantasia.6tbl | 51 | ||||
-rw-r--r-- | games/sail/sail.6 | 32 | ||||
-rw-r--r-- | games/snake/snake.6 | 6 | ||||
-rw-r--r-- | lib/libc/sys/chown.2 | 9 | ||||
-rw-r--r-- | lib/libc/sys/umask.2 | 6 | ||||
-rw-r--r-- | lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3 | 8 | ||||
-rw-r--r-- | lib/libutil/pw_init.3 | 6 | ||||
-rw-r--r-- | sbin/mount_tmpfs/mount_tmpfs.8 | 6 | ||||
-rw-r--r-- | share/man/man4/ipsec.4 | 8 | ||||
-rw-r--r-- | share/man/man4/tty.4 | 11 | ||||
-rw-r--r-- | share/man/man5/bsd.port.mk.5 | 6 | ||||
-rw-r--r-- | share/man/man5/pf.conf.5 | 8 | ||||
-rw-r--r-- | usr.bin/mail/mail.1 | 18 | ||||
-rw-r--r-- | usr.bin/patch/patch.1 | 6 | ||||
-rw-r--r-- | usr.bin/sndiod/sndiod.8 | 6 | ||||
-rw-r--r-- | usr.bin/top/top.1 | 6 | ||||
-rw-r--r-- | usr.sbin/adduser/adduser.8 | 6 | ||||
-rw-r--r-- | usr.sbin/authpf/authpf.8 | 6 | ||||
-rw-r--r-- | usr.sbin/lpr/lprm/lprm.1 | 6 | ||||
-rw-r--r-- | usr.sbin/mtree/mtree.8 | 6 |
28 files changed, 147 insertions, 149 deletions
diff --git a/games/atc/atc.6 b/games/atc/atc.6 index 14e437eb3b9..a4402379a8b 100644 --- a/games/atc/atc.6 +++ b/games/atc/atc.6 @@ -1,4 +1,4 @@ -.\" $OpenBSD: atc.6,v 1.24 2020/12/13 15:47:32 jmc Exp $ +.\" $OpenBSD: atc.6,v 1.25 2022/02/18 23:17:13 jsg Exp $ .\" .\" Copyright (c) 1990, 1993 .\" The Regents of the University of California. All rights reserved. @@ -34,7 +34,7 @@ .\" .\" Copyright (c) 1986 Ed James. All rights reserved. .\" -.Dd $Mdocdate: December 13 2020 $ +.Dd $Mdocdate: February 18 2022 $ .Dt ATC 6 .Os .Sh NAME @@ -488,7 +488,7 @@ The file lists the currently available play fields. New field description file names must be placed in this file to be playable. -If a player specifies a game not in this file, his score will not be logged. +If a player specifies a game not in this file, the score will not be logged. .Pp The game field description files are broken into two parts. The first part is the definition section. diff --git a/games/bs/bs.6 b/games/bs/bs.6 index e760054325e..105e527d04d 100644 --- a/games/bs/bs.6 +++ b/games/bs/bs.6 @@ -1,4 +1,4 @@ -.\" $OpenBSD: bs.6,v 1.15 2014/09/08 01:27:54 schwarze Exp $ +.\" $OpenBSD: bs.6,v 1.16 2022/02/18 23:17:13 jsg Exp $ .\" .\" Copyright (c) 1997, Jason Downs. All rights reserved. .\" @@ -23,7 +23,7 @@ .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF .\" SUCH DAMAGE. .\" -.Dd $Mdocdate: September 8 2014 $ +.Dd $Mdocdate: February 18 2022 $ .Dt BS 6 .Os .Sh NAME @@ -72,7 +72,7 @@ This disables that check and allows them to close-pack. Selects a .Sq salvo variant. -This allows a player one shot per turn for each of his/her +This allows players one shot per turn for each of their ships still afloat. This puts a premium on scoring hits early and knocking out some ships and also makes it much harder, for example, when you face a superior diff --git a/games/canfield/canfield/canfield.6 b/games/canfield/canfield/canfield.6 index 2c80e129448..3736bc14d19 100644 --- a/games/canfield/canfield/canfield.6 +++ b/games/canfield/canfield/canfield.6 @@ -1,4 +1,4 @@ -.\" $OpenBSD: canfield.6,v 1.11 2016/03/02 17:51:28 tim Exp $ +.\" $OpenBSD: canfield.6,v 1.12 2022/02/18 23:17:13 jsg Exp $ .\" $NetBSD: canfield.6,v 1.4 1995/03/21 15:08:30 cgd Exp $ .\" .\" Copyright (c) 1983, 1993 @@ -30,7 +30,7 @@ .\" .\" @(#)canfield.6 8.1 (Berkeley) 5/31/93 .\" -.Dd $Mdocdate: March 2 2016 $ +.Dd $Mdocdate: February 18 2022 $ .Dt CANFIELD 6 .Os .Sh NAME @@ -53,15 +53,15 @@ Spaces must be filled from the stock. The top card of the stock also is available to be played on foundations or built on tableau piles. After the stock is exhausted, -tableau spaces may be filled from the talon and the player may -keep them open until he wishes to use them. +tableau spaces may be filled from the talon. +Players may keep tableau spaces open until they wish to use them. .Pp Cards are dealt from the hand to the talon by threes and this repeats until there are no more cards in the hand or the player quits. -To have cards dealt onto the talon the player types +To have cards dealt onto the talon players type .Sq Ic ht -for his move. +for their move. Foundation base cards are also automatically moved to the foundation when they become available. .Pp diff --git a/games/cribbage/cribbage.6 b/games/cribbage/cribbage.6 index 51d2fb7ccd8..151a5d6cf9c 100644 --- a/games/cribbage/cribbage.6 +++ b/games/cribbage/cribbage.6 @@ -1,4 +1,4 @@ -.\" $OpenBSD: cribbage.6,v 1.15 2015/03/12 02:19:10 bentley Exp $ +.\" $OpenBSD: cribbage.6,v 1.16 2022/02/18 23:17:13 jsg Exp $ .\" .\" Copyright (c) 1980, 1993 .\" The Regents of the University of California. All rights reserved. @@ -29,7 +29,7 @@ .\" .\" @(#)cribbage.6 8.1 (Berkeley) 5/31/93 .\" -.Dd $Mdocdate: March 12 2015 $ +.Dd $Mdocdate: February 18 2022 $ .Dt CRIBBAGE 6 .Os .Sh NAME @@ -50,7 +50,7 @@ are needed \(en if so, it will print out the appropriate section from options include: .Bl -tag -width indent .It Fl e -When the player makes a mistake scoring his hand or crib, provide an +When players make a mistake scoring their hand or crib, provide an explanation of the correct score. .Po This is especially useful for beginning players. @@ -64,12 +64,12 @@ the opponent may claim the overlooked points. Print a shorter form of all messages \(en this is only recommended for users who have played the game without specifying this option. .It Fl r -Instead of asking the player to cut the deck, the program will randomly +Instead of asking players to cut the deck, the program will randomly cut the deck. .El .Pp .Nm -first asks the player whether he wishes to play a short game +first asks whether to play a short game .Po .Dq once around , to 61 @@ -116,8 +116,8 @@ The program keeps track of the scoring of all points and the total of the cards on the table. .Pp After play, the hands are scored. -The program requests the player to score his hand -.Pq and the crib, if it is his +The program requests players to score their hand +.Pq and the crib, if it is theirs by printing out the appropriate cards. Play continues until one player reaches the game limit .Pq 61 or 121 . diff --git a/games/hack/hack.6 b/games/hack/hack.6 index 29814bde0b9..a2cbea14028 100644 --- a/games/hack/hack.6 +++ b/games/hack/hack.6 @@ -1,4 +1,4 @@ -.\" $OpenBSD: hack.6,v 1.22 2019/04/08 17:49:07 jmc Exp $ +.\" $OpenBSD: hack.6,v 1.23 2022/02/18 23:17:14 jsg Exp $ .\" $NetBSD: hack.6,v 1.5 1995/07/03 19:44:30 jtc Exp $ .\" .\" Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica, @@ -59,7 +59,7 @@ .\" OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF .\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.Dd $Mdocdate: April 8 2019 $ +.Dd $Mdocdate: February 18 2022 $ .Dt HACK 6 .Os .Sh NAME @@ -91,8 +91,8 @@ will identify the things you see on the screen. To win the game (as opposed to merely playing to beat other people's high scores) you must locate the Amulet of Yendor which is somewhere below the 20th level of the dungeon and get it out. -Nobody has achieved this yet and if somebody does, -he will probably go down in history as a hero among heroes. +Nobody has achieved this yet and whoever does +will probably go down in history as a hero among heroes. .Pp When the game ends, either by your death, when you quit, or if you escape from the caves, diff --git a/games/hunt/hunt/hunt.6 b/games/hunt/hunt/hunt.6 index c5b44b91990..24297f184ce 100644 --- a/games/hunt/hunt/hunt.6 +++ b/games/hunt/hunt/hunt.6 @@ -1,5 +1,5 @@ .\" $NetBSD: hunt.6,v 1.3 1997/10/10 16:32:30 lukem Exp $ -.\" $OpenBSD: hunt.6,v 1.22 2014/09/28 07:53:02 schwarze Exp $ +.\" $OpenBSD: hunt.6,v 1.23 2022/02/18 23:17:14 jsg Exp $ .\" .\" Copyright (c) 1985 Conrad C. Huang, Gregory S. Couch, Kenneth C.R.C. Arnold .\" San Francisco, California @@ -31,7 +31,7 @@ .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF .\" SUCH DAMAGE. .\" -.Dd $Mdocdate: September 28 2014 $ +.Dd $Mdocdate: February 18 2022 $ .Dt HUNT 6 .Os .Sh NAME @@ -350,16 +350,15 @@ Slime goes around walls, not through them. .It Walls regenerate, reappearing in the order they were destroyed. One percent of the regenerated walls will be diagonal walls or doors. -When a wall is generated directly beneath a player, he is thrown in +When a wall is generated directly beneath a player, they are thrown in a random direction for a random period of time. -When he lands, he -sustains damage +When the player lands, they sustain damage .Po up to 20 percent of the amount of damage already sustained .Pc ; i.e., -the less damage he had, the more nimble he is and -therefore less likely to hurt himself on landing. +the less damage the player had, the more nimble they are and +therefore less likely to hurt themselves on landing. .\"It .\"There is a volcano close to the center of the maze which goes off .\"close to every 30 deaths. @@ -465,7 +464,7 @@ how many times player died .It Still how many times player died without typing in any commands .It Saved -how many times a shot/bomb would have killed player if he hadn't +how many times a shot/bomb would have killed player if they hadn't ducked or absorbed it .It Connect current connection state(s) of player: diff --git a/games/mille/mille.6 b/games/mille/mille.6 index 99c35b36953..58c88e48ed7 100644 --- a/games/mille/mille.6 +++ b/games/mille/mille.6 @@ -1,4 +1,4 @@ -.\" $OpenBSD: mille.6,v 1.13 2014/09/08 01:27:54 schwarze Exp $ +.\" $OpenBSD: mille.6,v 1.14 2022/02/18 23:17:14 jsg Exp $ .\" .\" Copyright (c) 1983, 1993 .\" The Regents of the University of California. All rights reserved. @@ -29,7 +29,7 @@ .\" .\" @(#)mille.6 8.3 (Berkeley) 6/1/94 .\" -.Dd $Mdocdate: September 8 2014 $ +.Dd $Mdocdate: February 18 2022 $ .Dt MILLE 6 .Os .Sh NAME @@ -324,7 +324,7 @@ except that .Em "you cannot play more than two 200 mile cards in one hand" . A hand ends whenever one player gets exactly 700 miles or the deck runs out. In that case, play continues until either someone reaches 700, -or neither player can use any cards in his hand. +or neither player can use any cards in their hand. If the trip is completed after the deck runs out, this is called .Em Delayed Action . .Ss Coup Fourre diff --git a/games/monop/monop.6 b/games/monop/monop.6 index 9e54b209aef..bcf14e4e440 100644 --- a/games/monop/monop.6 +++ b/games/monop/monop.6 @@ -1,4 +1,4 @@ -.\" $OpenBSD: monop.6,v 1.16 2017/06/09 15:32:40 fcambus Exp $ +.\" $OpenBSD: monop.6,v 1.17 2022/02/18 23:17:14 jsg Exp $ .\" .\" Copyright (c) 1980 The Regents of the University of California. .\" All rights reserved. @@ -29,7 +29,7 @@ .\" .\" @(#)monop.6 6.5 (Berkeley) 3/25/93 .\" -.Dd $Mdocdate: June 9 2017 $ +.Dd $Mdocdate: February 18 2022 $ .Dt MONOP 6 .Os .Sh NAME @@ -49,11 +49,11 @@ no auction is held and the property remains unowned. .Pp The game, in effect, lends the player money, so it is possible to buy something which you cannot afford. -However, as soon as a person goes into debt, -he must +However, as soon as players go into debt, +they must .Dq fix the problem , -i.e., make himself solvent, before play can continue. -If this is not possible, the player's property reverts to his debtee, +i.e., make themselves solvent, before play can continue. +If this is not possible, the player's property reverts to their debtee, either a player or the bank. A player can resign at any time to any person or the bank, which puts the property back on the board, unowned. diff --git a/games/phantasia/phantasia.6tbl b/games/phantasia/phantasia.6tbl index 9cdec8ad3cc..ac7af6fad28 100644 --- a/games/phantasia/phantasia.6tbl +++ b/games/phantasia/phantasia.6tbl @@ -1,7 +1,7 @@ -.\" $OpenBSD: phantasia.6tbl,v 1.10 2016/09/09 15:32:28 tb Exp $ +.\" $OpenBSD: phantasia.6tbl,v 1.11 2022/02/18 23:17:14 jsg Exp $ .\" $NetBSD: phantasia.6,v 1.9 2002/09/26 18:32:03 wiz Exp $ .\" -.Dd $Mdocdate: September 9 2016 $ +.Dd $Mdocdate: February 18 2022 $ .Dt PHANTASIA 6 .Os .Sh NAME @@ -196,7 +196,7 @@ Paralyzed monsters wake up very fast when nicked. This is essentially a battle of wits with the monster. Success is based upon the player's and the monster's .Em brains . -The player gets credit for slaying the monster if he/she succeeds. +If successful, the player gets credit for slaying the monster. Otherwise, nothing happens, and the chance to .Ic luckout is lost. @@ -339,8 +339,7 @@ can overcome the player, and how much .Em poison the player can withstand. .Ss Spells -During the course of the game, the player may exercise his/her -magic powers. +During the course of the game, the player may use magic powers. These cases are described below. .Bl -tag -width "all or nothing" -offset indent .It Ic cloak @@ -353,7 +352,7 @@ These cases are described below. Used during normal play. Prevents monsters from finding the character, as well as hiding the player from other players. -His/her coordinates show up as '?' in the +The player's coordinates show up as '?' in the .Ic players option. Players cannot collect @@ -861,7 +860,8 @@ and They come in four different flavors. All .Em rings -rest the player to maximum and cause him/her to hit much harder +rest the player to maximum, +and cause them to hit much harder in battle with monsters (assuming the .Em ring is being used for battle.) @@ -876,8 +876,8 @@ After a few times of using these types, the player falls under the control of the .Em ring , and strange, random things will occur. -Eventually, the player dies, and gives his/her name to a monster -on the file. +Eventually, the player dies, +and the player's name is given to a monster on the file. Dying before the .Em ring is used up also renames the monster. @@ -888,7 +888,7 @@ are much more benign. The one from a .Em nazgul is good for a limited number of battle rounds, and will save -the player from death if it was being used when he/she died. +the player from death if it was being used. The one from .Em Dark Lord is the same, except that it never is used up. @@ -920,7 +920,7 @@ reaches are converted to .Em gold . .Pp -Once a player is king, he/she may do certain things while in +Once a player is king, they may do certain things while in the Lord's Chamber (0,0). These are exercised with the .Ic decree @@ -947,17 +947,16 @@ A protects from king's curses. .It Ic energy void The king may put a number of these scattered about -his/her kingdom as he/she pleases. -If a player hits one, he/she loses +the kingdom. +If a player hits one, they lose .Em mana , energy , and .Em gold . The energy void disappears after being hit. .It Ic bestow This is also done to another player. -The king may wish to reward one or more loyal subjects by sharing his/her -riches -.Em ( gold ) . +The king may wish to reward one or more loyal subjects by sharing +.Em gold . Or it is a convenient way to dispose of some unwanted deadweight. .It Ic collect taxes Everyone pays 7% tax on all @@ -1013,9 +1012,9 @@ may .Ic teleport with greater ease. .Pp -Upon finding the grail, the player advances to position of +Upon finding the grail, players advance to position of .Em valar . -He/she may then exercise more and niftier options under +They may then exercise more and niftier options under .Ic intervention . These include all of the council members' options plus the ability to move other players about, bless them, and throw monsters at @@ -1024,7 +1023,7 @@ A .Em valar Ns 's blessing has the same effect as the treasure .Em blessing , -except that the affected player does not get his/her +except that the affected player does not get the .Em blessing flag set. All @@ -1043,11 +1042,13 @@ or call monsters. .Em valar finds a .Em transporter . ) -This is to allow him/her to dispose of excess +This is to allow the +.Em valar +to dispose of excess .Em gold . Any monsters which a .Em valar -encounters are based upon his/her size. +encounters are based upon the valar's size. Only one valar may exist at a time. The current valar is replaced when another player finds the grail. The valar is then bumped back to the council of the wise. @@ -1097,8 +1098,8 @@ from the other character types. .El .Ss Special Places Certain regions of the playing grid have different names. -In general, this is only to give the player some idea of -his/her present location. +In general, this is only to give players some idea of +their present location. Some special places do exist. .Bl -tag -width "Trading Posts" .It Em Trading Posts @@ -1206,8 +1207,8 @@ One-time chance to try to win against the foe. Has a 10% chance of working. .El .Pp -Sometimes waits for the other player may be excessive, because -he/she may be battling a monster. +Sometimes waits for other players may be excessive, because +they may be battling a monster. Upon slaying a player in battle the winner gets the other's .Em experience and treasures. diff --git a/games/sail/sail.6 b/games/sail/sail.6 index ad11418698e..38a7740a035 100644 --- a/games/sail/sail.6 +++ b/games/sail/sail.6 @@ -1,4 +1,4 @@ -.\" $OpenBSD: sail.6,v 1.23 2016/09/09 15:32:28 tb Exp $ +.\" $OpenBSD: sail.6,v 1.24 2022/02/18 23:17:14 jsg Exp $ .\" $NetBSD: sail.6,v 1.4 1995/04/22 10:37:24 cgd Exp $ .\" .\" Copyright (c) 1988, 1993 @@ -30,7 +30,7 @@ .\" .\" @(#)sail.6 8.2 (Berkeley) 12/30/93 .\" -.Dd $Mdocdate: September 9 2016 $ +.Dd $Mdocdate: February 18 2022 $ .Dt SAIL 6 .Os .Sh NAME @@ -60,13 +60,13 @@ players or the computer. They may re-enact one of the many historical sea battles recorded in the game, or they can choose a fictional battle. .Pp -As a sea captain in the +As sea captains in the .Nm -Navy, the player has complete control over the workings of his ship. -He must order every maneuver, change the set of his sails, and judge the -right moment to let loose the terrible destruction of his broadsides. -In addition to fighting the enemy, he must harness the powers of the wind -and sea to make them work for him. +Navy, players have complete control over the workings of their ship. +They must order every maneuver, change the set of their sails, and judge the +right moments to let loose the terrible destruction of their broadsides. +In addition to fighting their enemies, +they must harness the powers of the wind and sea. The outcome of many battles during the age of sail was decided by the ability of one captain to hold the .Sq weather gage . @@ -87,7 +87,7 @@ Play the first available ship instead of prompting for a choice. .Sh IMPLEMENTATION .Nm is really two programs in one. -Each player starts up a process which runs his own ship. +All players start a process which runs their ship. In addition, a .Em driver process is forked @@ -97,10 +97,10 @@ to run the computer ships and take care of global bookkeeping. Because the driver must calculate moves for each ship it controls, the more ships the computer is playing, the slower the game will appear. .Pp -If a player joins a game in progress, he will synchronize +Players who join a game in progress will synchronize with the other players .Pq a rather slow process for everyone , -and then he may play along with the rest. +and then they may play along with the rest. .Pp To implement a multi-user game in .Ux @@ -145,8 +145,8 @@ that succeeds in linking will have exclusive access to the temporary file. .Ss "CONSEQUENCES OF SEPARATE PLAYER AND DRIVER PROCESSES" When players do something of global interest, such as moving or firing, the driver must coordinate the action with the other ships in the game. -For example, if a player wants to move in a certain direction, he writes a -message into the temporary file requesting that the driver move his ship. +For example, players who want to move in a certain direction, write a +message into the temporary file requesting that the driver move their ship. Each .Dq turn , the driver reads all the messages sent from the players and @@ -155,7 +155,7 @@ It then writes back into the temporary file new values of variables, etc. .Pp The most noticeable effect this communication has on the game is the delay in moving. -Suppose a player types a move for his ship and hits return. +Suppose a player types a move and hits return. What happens then? The player process saves up messages to be written to the temporary file in a buffer. @@ -168,7 +168,7 @@ Finally, when the player process gets around to doing another 7-second update, the results of the move are displayed on the screen. Hence, every movement requires four exclusive accesses to the temporary file (anywhere from 7 to 21 seconds -depending upon asynchrony) before the player sees the results of his moves. +depending upon asynchrony) before players see the results of their moves. .Pp In practice, the delays are not as annoying as they would appear. There is room for @@ -997,7 +997,7 @@ tricky. Ed Wang rewrote the .Fn angle routine in 1981 to be less incorrect, and he added code to let a player -select which ship he wanted at the start of the game. +select a ship at the start of the game. .\"instead of the first one available). .Pp Captain Happy (Craig Leres) is responsible for making diff --git a/games/snake/snake.6 b/games/snake/snake.6 index 753ba977de8..8daed46df19 100644 --- a/games/snake/snake.6 +++ b/games/snake/snake.6 @@ -1,4 +1,4 @@ -.\" $OpenBSD: snake.6,v 1.14 2015/11/29 15:58:38 jmc Exp $ +.\" $OpenBSD: snake.6,v 1.15 2022/02/18 23:17:14 jsg Exp $ .\" $NetBSD: snake.6,v 1.5 1995/04/22 08:34:35 cgd Exp $ .\" .\" Copyright (c) 1980, 1993 @@ -30,7 +30,7 @@ .\" .\" @(#)snake.6 8.1 (Berkeley) 5/31/93 .\" -.Dd $Mdocdate: November 29 2015 $ +.Dd $Mdocdate: February 18 2022 $ .Dt SNAKE 6 .Os .Sh NAME @@ -84,7 +84,7 @@ This does .Em not let you jump away from the snake, but rather saves you from having to type a key repeatedly. -The snake still gets all his turns. +The snake still gets all its turns. .It Ic SEFC Likewise for the upper case versions on the left. .It Ic ATPB diff --git a/lib/libc/sys/chown.2 b/lib/libc/sys/chown.2 index 06d5e4763e8..717a4072e99 100644 --- a/lib/libc/sys/chown.2 +++ b/lib/libc/sys/chown.2 @@ -1,4 +1,4 @@ -.\" $OpenBSD: chown.2,v 1.26 2015/09/10 17:55:21 schwarze Exp $ +.\" $OpenBSD: chown.2,v 1.27 2022/02/18 23:17:14 jsg Exp $ .\" $NetBSD: chown.2,v 1.10 1995/10/12 15:40:47 jtc Exp $ .\" .\" Copyright (c) 1980, 1991, 1993, 1994 @@ -30,7 +30,7 @@ .\" .\" @(#)chown.2 8.4 (Berkeley) 4/19/94 .\" -.Dd $Mdocdate: September 10 2015 $ +.Dd $Mdocdate: February 18 2022 $ .Dt CHOWN 2 .Os .Sh NAME @@ -60,9 +60,10 @@ is changed as specified by the arguments .Fa owner and .Fa group . -The owner of a file may change the +The owner of a file may change its .Fa group -to a group of which he or she is a member, but the change +to one the owner is a member of. +The change .Fa owner capability is restricted to the superuser. .Pp diff --git a/lib/libc/sys/umask.2 b/lib/libc/sys/umask.2 index 00c0f9307db..61d7799727b 100644 --- a/lib/libc/sys/umask.2 +++ b/lib/libc/sys/umask.2 @@ -1,4 +1,4 @@ -.\" $OpenBSD: umask.2,v 1.12 2015/10/12 17:51:55 millert Exp $ +.\" $OpenBSD: umask.2,v 1.13 2022/02/18 23:17:14 jsg Exp $ .\" $NetBSD: umask.2,v 1.6 1995/02/27 12:39:06 cgd Exp $ .\" .\" Copyright (c) 1980, 1991, 1993 @@ -30,7 +30,7 @@ .\" .\" @(#)umask.2 8.1 (Berkeley) 6/4/93 .\" -.Dd $Mdocdate: October 12 2015 $ +.Dd $Mdocdate: February 18 2022 $ .Dt UMASK 2 .Os .Sh NAME @@ -65,7 +65,7 @@ and system calls to turn off corresponding bits requested in the file mode (see .Xr chmod 2 ) . -This clearing allows each user to restrict the default access to his files. +This clearing allows users to restrict the default access to their files. .Pp The default mask value is S_IWGRP|S_IWOTH (022, write access for the owner only). diff --git a/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3 b/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3 index 2628c65a13c..ae0349584a1 100644 --- a/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3 +++ b/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: SSL_CTX_set_tmp_dh_callback.3,v 1.8 2020/03/30 10:28:59 schwarze Exp $ +.\" $OpenBSD: SSL_CTX_set_tmp_dh_callback.3,v 1.9 2022/02/18 23:17:15 jsg Exp $ .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 .\" .\" This file was written by Lutz Jaenicke <jaenicke@openssl.org>. @@ -48,7 +48,7 @@ .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED .\" OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.Dd $Mdocdate: March 30 2020 $ +.Dd $Mdocdate: February 18 2022 $ .Dt SSL_CTX_SET_TMP_DH_CALLBACK 3 .Os .Sh NAME @@ -113,8 +113,8 @@ Anonymous ciphers (without a permanent server key) also use ephemeral DH keys. Using ephemeral DH key exchange yields forward secrecy, as the connection can only be decrypted when the DH key is known. By generating a temporary DH key inside the server application that is lost -when the application is left, it becomes impossible for an attacker to decrypt -past sessions, even if he gets hold of the normal (certified) key, +when the application is left, it becomes impossible for attackers to decrypt +past sessions, even if they get hold of the normal (certified) key, as this key was only used for signing. .Pp In order to perform a DH key exchange the server must use a DH group diff --git a/lib/libutil/pw_init.3 b/lib/libutil/pw_init.3 index afa691cf17b..cdfb1a3faa5 100644 --- a/lib/libutil/pw_init.3 +++ b/lib/libutil/pw_init.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: pw_init.3,v 1.14 2016/08/14 14:57:16 tb Exp $ +.\" $OpenBSD: pw_init.3,v 1.15 2022/02/18 23:17:15 jsg Exp $ .\" .\" Copyright (c) 1995 .\" The Regents of the University of California. All rights reserved. @@ -31,7 +31,7 @@ .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF .\" SUCH DAMAGE. .\" -.Dd $Mdocdate: August 14 2016 $ +.Dd $Mdocdate: February 18 2022 $ .Dt PW_INIT 3 .Os .Sh NAME @@ -114,7 +114,7 @@ before running the editor. .Pp The .Fn pw_prompt -function asks the user whether he or she wants to re-edit the password +function asks the user whether they want to re-edit the password file; if the answer is no, .Fn pw_prompt deletes the lock file and exits the process. diff --git a/sbin/mount_tmpfs/mount_tmpfs.8 b/sbin/mount_tmpfs/mount_tmpfs.8 index 026c9a19def..423926f1951 100644 --- a/sbin/mount_tmpfs/mount_tmpfs.8 +++ b/sbin/mount_tmpfs/mount_tmpfs.8 @@ -1,4 +1,4 @@ -.\" $OpenBSD: mount_tmpfs.8,v 1.4 2014/11/16 02:22:10 brad Exp $ +.\" $OpenBSD: mount_tmpfs.8,v 1.5 2022/02/18 23:17:15 jsg Exp $ .\" $NetBSD: mount_tmpfs.8,v 1.14 2008/04/30 13:10:53 martin Exp $ .\" .\" Copyright (c) 2005, 2006 The NetBSD Foundation, Inc. @@ -29,7 +29,7 @@ .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE .\" POSSIBILITY OF SUCH DAMAGE. .\" -.Dd $Mdocdate: November 16 2014 $ +.Dd $Mdocdate: February 18 2022 $ .Dt MOUNT_TMPFS 8 .Os .Sh NAME @@ -141,7 +141,7 @@ File system meta-data is not pageable. If there is not enough main memory to hold this information, the system may become unstable or very unresponsive because it will not be able to allocate required memory. -A malicious user could trigger this condition if he could create lots of +A malicious user could trigger this condition by creating lots of files inside a size-unbounded tmpfs file system. Limiting the number of nodes per file system .Pq Fl n diff --git a/share/man/man4/ipsec.4 b/share/man/man4/ipsec.4 index 6af1697f2a0..2a9afb0d897 100644 --- a/share/man/man4/ipsec.4 +++ b/share/man/man4/ipsec.4 @@ -1,4 +1,4 @@ -.\" $OpenBSD: ipsec.4,v 1.86 2022/02/17 12:24:08 jsg Exp $ +.\" $OpenBSD: ipsec.4,v 1.87 2022/02/18 23:17:15 jsg Exp $ .\" .\" Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de> .\" All rights reserved. @@ -30,7 +30,7 @@ .\" .\" Manual page, using -mandoc macros .\" -.Dd $Mdocdate: February 17 2022 $ +.Dd $Mdocdate: February 18 2022 $ .Dt IPSEC 4 .Os .Sh NAME @@ -118,9 +118,9 @@ data, some of the IP header data, and a certain secret value (the authentication key). This value is then sent with the rest of each packet. The receiver performs the same computation, and if the value matches, -he knows no one tampered with the data (integrity), the address information +it knows no one tampered with the data (integrity), the address information (authenticity) or a sequence number (replay protection). -He knows this because the secret authentication key makes sure no +It knows this because the secret authentication key makes sure no active attacker (man-in-the-middle) can recompute the correct value after altering the packet. The algorithms used to compute these values are called hash algorithms and are diff --git a/share/man/man4/tty.4 b/share/man/man4/tty.4 index 2d525dc5ae7..4215da9b54f 100644 --- a/share/man/man4/tty.4 +++ b/share/man/man4/tty.4 @@ -1,4 +1,4 @@ -.\" $OpenBSD: tty.4,v 1.54 2022/02/06 00:29:02 jsg Exp $ +.\" $OpenBSD: tty.4,v 1.55 2022/02/18 23:17:15 jsg Exp $ .\" $NetBSD: tty.4,v 1.4 1996/03/19 04:26:01 paulus Exp $ .\" .\" Copyright (c) 1991, 1992, 1993 @@ -30,7 +30,7 @@ .\" .\" @(#)tty.4 8.3 (Berkeley) 4/19/94 .\" -.Dd $Mdocdate: February 6 2022 $ +.Dd $Mdocdate: February 18 2022 $ .Dt TTY 4 .Os .Sh NAME @@ -107,14 +107,13 @@ For more information on dial-out, see When an interactive user logs in, the system prepares the line to behave in a certain way (called a .Em "line discipline" ) , -the particular details of which are described in +described in .Xr stty 1 at the command level, and in .Xr termios 4 at the programming level. -A user may be concerned with changing settings associated with his particular -login terminal and should refer to the preceding man pages for the common -cases. +To change settings associated with a login terminal, +refer to the preceding man pages for the common cases. The remainder of this man page is concerned with describing details of using and controlling terminal devices at a low level, such as that possibly required by a program wishing to provide features similar to those provided diff --git a/share/man/man5/bsd.port.mk.5 b/share/man/man5/bsd.port.mk.5 index 77b188d3512..9c2104e563f 100644 --- a/share/man/man5/bsd.port.mk.5 +++ b/share/man/man5/bsd.port.mk.5 @@ -1,4 +1,4 @@ -.\" $OpenBSD: bsd.port.mk.5,v 1.555 2022/02/11 17:19:59 sthen Exp $ +.\" $OpenBSD: bsd.port.mk.5,v 1.556 2022/02/18 23:17:15 jsg Exp $ .\" .\" Copyright (c) 2000-2008 Marc Espie .\" @@ -24,7 +24,7 @@ .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.Dd $Mdocdate: February 11 2022 $ +.Dd $Mdocdate: February 18 2022 $ .Dt BSD.PORT.MK 5 .Os .Sh NAME @@ -4366,7 +4366,7 @@ instead. .It Ev IGNOREFILES Set to the list of files that can't be checksummed. All uses of it have led to postponing the correct action: talking -to the software author and getting him to provide versioned archives. +to the software authors and getting them to provide versioned archives. .It Ev MANn List of unformatted manpages, per section. .It Ev MANPREFIX diff --git a/share/man/man5/pf.conf.5 b/share/man/man5/pf.conf.5 index 4b997a9067a..30216da7745 100644 --- a/share/man/man5/pf.conf.5 +++ b/share/man/man5/pf.conf.5 @@ -1,4 +1,4 @@ -.\" $OpenBSD: pf.conf.5,v 1.590 2021/12/26 01:00:32 sashan Exp $ +.\" $OpenBSD: pf.conf.5,v 1.591 2022/02/18 23:17:15 jsg Exp $ .\" .\" Copyright (c) 2002, Daniel Hartmeier .\" Copyright (c) 2003 - 2013 Henning Brauer <henning@openbsd.org> @@ -28,7 +28,7 @@ .\" ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE .\" POSSIBILITY OF SUCH DAMAGE. .\" -.Dd $Mdocdate: December 26 2021 $ +.Dd $Mdocdate: February 18 2022 $ .Dt PF.CONF 5 .Os .Sh NAME @@ -2536,8 +2536,8 @@ This means that it will not work on other protocols and will not match a currently established connection. .Pp Caveat: operating system fingerprints are occasionally wrong. -There are three problems: an attacker can trivially craft his packets to -appear as any operating system he chooses; +There are three problems: an attacker can trivially craft packets to +appear as any operating system; an operating system patch could change the stack behavior and no fingerprints will match it until the database is updated; and multiple operating systems may have the same fingerprint. diff --git a/usr.bin/mail/mail.1 b/usr.bin/mail/mail.1 index 8c890e07b39..2a858891d5e 100644 --- a/usr.bin/mail/mail.1 +++ b/usr.bin/mail/mail.1 @@ -1,4 +1,4 @@ -.\" $OpenBSD: mail.1,v 1.81 2021/03/08 02:47:28 jsg Exp $ +.\" $OpenBSD: mail.1,v 1.82 2022/02/18 23:17:15 jsg Exp $ .\" .\" Copyright (c) 1980, 1990, 1993 .\" The Regents of the University of California. All rights reserved. @@ -29,7 +29,7 @@ .\" .\" @(#)mail.1 8.8 (Berkeley) 4/28/95 .\" -.Dd $Mdocdate: March 8 2021 $ +.Dd $Mdocdate: February 18 2022 $ .Dt MAIL 1 .Os .Sh NAME @@ -456,9 +456,9 @@ On return from the editor, the message is read back in. or .Ic x ) Effects an immediate return to the shell without -modifying the user's system mailbox, his +modifying the user's system mailbox, .Ar mbox -file, or his edit file in +file, or edit file in .Fl f . .It Ic file .Pq Ic fi @@ -581,16 +581,14 @@ and Takes a message list and types out each message on the user's terminal. .It Ic quit .Pq Ic q -Terminates the session, saving all undeleted, unsaved messages in -the user's +Terminates the session, saving all undeleted, unsaved messages in the .Ar mbox -file in his login directory, preserving all messages marked with +file in the user's login directory, preserving all messages marked with .Ic hold or .Ic preserve -or never referenced -in his system mailbox, and removing all other messages from his system -mailbox. +or never referenced in the user's system mailbox, +and removing all other messages from the user's system mailbox. If new mail has arrived during the session, the message .Dq Li "You have new mail" is given. diff --git a/usr.bin/patch/patch.1 b/usr.bin/patch/patch.1 index af3dccb50d6..af12a7174e1 100644 --- a/usr.bin/patch/patch.1 +++ b/usr.bin/patch/patch.1 @@ -1,4 +1,4 @@ -.\" $OpenBSD: patch.1,v 1.34 2021/12/21 08:07:20 schwarze Exp $ +.\" $OpenBSD: patch.1,v 1.35 2022/02/18 23:17:15 jsg Exp $ .\" Copyright 1986, Larry Wall .\" .\" Redistribution and use in source and binary forms, with or without @@ -19,7 +19,7 @@ .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF .\" SUCH DAMAGE. .\" -.Dd $Mdocdate: December 21 2021 $ +.Dd $Mdocdate: February 18 2022 $ .Dt PATCH 1 .Os .Sh NAME @@ -153,7 +153,7 @@ the number of lines of context in the context diff, ordinarily 3. .It Fl f , Fl Fl force Forces .Nm -to assume that the user knows exactly what he or she is doing, and to not +to assume that the user knows exactly what they are doing, and to not ask any questions. It assumes the following: skip patches for which a file to patch can't be found; diff --git a/usr.bin/sndiod/sndiod.8 b/usr.bin/sndiod/sndiod.8 index d12fe7b62b7..b7a1d86f404 100644 --- a/usr.bin/sndiod/sndiod.8 +++ b/usr.bin/sndiod/sndiod.8 @@ -1,4 +1,4 @@ -.\" $OpenBSD: sndiod.8,v 1.14 2021/12/25 16:15:53 ratchov Exp $ +.\" $OpenBSD: sndiod.8,v 1.15 2022/02/18 23:17:16 jsg Exp $ .\" .\" Copyright (c) 2006-2012 Alexandre Ratchov <alex@caoua.org> .\" @@ -14,7 +14,7 @@ .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" -.Dd $Mdocdate: December 25 2021 $ +.Dd $Mdocdate: February 18 2022 $ .Dt SNDIOD 8 .Os .Sh NAME @@ -595,4 +595,4 @@ Technically, this allows to attempt to use one of the sub-devices it exposes as an audio device, creating a deadlock. There's nothing to prevent the user -from shooting himself in the foot by creating such a deadlock. +from shooting themselves in the foot by creating such a deadlock. diff --git a/usr.bin/top/top.1 b/usr.bin/top/top.1 index 68cf01ace6f..85a07d11a4e 100644 --- a/usr.bin/top/top.1 +++ b/usr.bin/top/top.1 @@ -1,4 +1,4 @@ -.\" $OpenBSD: top.1,v 1.79 2021/03/12 05:18:01 jsg Exp $ +.\" $OpenBSD: top.1,v 1.80 2022/02/18 23:17:16 jsg Exp $ .\" .\" Copyright (c) 1997, Jason Downs. All rights reserved. .\" @@ -23,7 +23,7 @@ .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF .\" SUCH DAMAGE. .\" -.Dd $Mdocdate: March 12 2021 $ +.Dd $Mdocdate: February 18 2022 $ .Dt TOP 1 .Os .Sh NAME @@ -228,7 +228,7 @@ on an intelligent terminal is, in fact, The environment variable .Ev TOP is examined for options before the command line is scanned. -This enables a user to set his or her own defaults. +This enables users to set their own defaults. The number of processes to display can also be specified in the environment variable .Ev TOP . diff --git a/usr.sbin/adduser/adduser.8 b/usr.sbin/adduser/adduser.8 index 188ddd8857b..639f7458b2b 100644 --- a/usr.sbin/adduser/adduser.8 +++ b/usr.sbin/adduser/adduser.8 @@ -1,4 +1,4 @@ -.\" $OpenBSD: adduser.8,v 1.47 2021/12/04 07:31:38 jmc Exp $ +.\" $OpenBSD: adduser.8,v 1.48 2022/02/18 23:17:16 jsg Exp $ .\" .\" Copyright (c) 1995-1996 Wolfram Schneider <wosch@FreeBSD.org>. Berlin. .\" All rights reserved. @@ -25,7 +25,7 @@ .\" SUCH DAMAGE. .\" .\" $From: adduser.8,v 1.12 1996/08/28 17:54:13 adam Exp $ -.Dd $Mdocdate: December 4 2021 $ +.Dd $Mdocdate: February 18 2022 $ .Dt ADDUSER 8 .Os .Sh NAME @@ -280,7 +280,7 @@ access to it. .El .\" .Sh UNIQUE GROUP .\" Perhaps you're missing what *can* be done with this scheme that falls apart -.\" with most other schemes. With each user in his/her own group the user can +.\" with most other schemes. With each user in their own group the user can .\" safely run with a umask of 002 and have files created in their home .\" directory and not worry about others being able to read them. .\" diff --git a/usr.sbin/authpf/authpf.8 b/usr.sbin/authpf/authpf.8 index 51d3aeeb46b..a571435adff 100644 --- a/usr.sbin/authpf/authpf.8 +++ b/usr.sbin/authpf/authpf.8 @@ -1,4 +1,4 @@ -.\" $OpenBSD: authpf.8,v 1.55 2020/04/05 10:11:07 jmc Exp $ +.\" $OpenBSD: authpf.8,v 1.56 2022/02/18 23:17:16 jsg Exp $ .\" .\" Copyright (c) 1998-2007 Bob Beck (beck@openbsd.org>. All rights reserved. .\" @@ -14,7 +14,7 @@ .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" -.Dd $Mdocdate: April 5 2020 $ +.Dd $Mdocdate: February 18 2022 $ .Dt AUTHPF 8 .Os .Sh NAME @@ -179,7 +179,7 @@ name instead of "authpf_users". .Sh USER MESSAGES On successful invocation, .Nm -displays a message telling the user he or she has been authenticated. +displays a message telling the user they have been authenticated. It will additionally display the contents of the file called .Pa authpf.message . This file will first be searched for in diff --git a/usr.sbin/lpr/lprm/lprm.1 b/usr.sbin/lpr/lprm/lprm.1 index 44a4bee8db5..2a8e77a93ad 100644 --- a/usr.sbin/lpr/lprm/lprm.1 +++ b/usr.sbin/lpr/lprm/lprm.1 @@ -1,4 +1,4 @@ -.\" $OpenBSD: lprm.1,v 1.12 2020/04/23 21:28:10 jmc Exp $ +.\" $OpenBSD: lprm.1,v 1.13 2022/02/18 23:17:16 jsg Exp $ .\" $NetBSD: lprm.1,v 1.10 2002/01/19 03:23:47 wiz Exp $ .\" .\" Copyright (c) 1983, 1990, 1993 @@ -30,7 +30,7 @@ .\" .\" @(#)lprm.1 8.1 (Berkeley) 6/6/93 .\" -.Dd $Mdocdate: April 23 2020 $ +.Dd $Mdocdate: February 18 2022 $ .Dt LPRM 1 .Os .Sh NAME @@ -133,7 +133,7 @@ daemon and the job number of the currently active job. .Sh DIAGNOSTICS .Bl -tag -width Ds .It Sy Permission denied -Printed if the user tries to remove files other than his own. +File to remove was owned by another user. .El .Sh SEE ALSO .Xr lpq 1 , diff --git a/usr.sbin/mtree/mtree.8 b/usr.sbin/mtree/mtree.8 index 2a245780bff..4968238d0d8 100644 --- a/usr.sbin/mtree/mtree.8 +++ b/usr.sbin/mtree/mtree.8 @@ -1,4 +1,4 @@ -.\" $OpenBSD: mtree.8,v 1.41 2019/09/02 21:18:41 deraadt Exp $ +.\" $OpenBSD: mtree.8,v 1.42 2022/02/18 23:17:16 jsg Exp $ .\" $NetBSD: mtree.8,v 1.4 1995/03/07 21:26:25 cgd Exp $ .\" .\" Copyright (c) 1989, 1990, 1993 @@ -30,7 +30,7 @@ .\" .\" @(#)mtree.8 8.2 (Berkeley) 12/11/93 .\" -.Dd $Mdocdate: September 2 2019 $ +.Dd $Mdocdate: February 18 2022 $ .Dt MTREE 8 .Os .Sh NAME @@ -318,7 +318,7 @@ Then, periodically, and .Xr sha256 1 should be run against the on-line specifications. -While it is possible for the bad guys to change the on-line specifications +While it is possible for attackers to change the on-line specifications to conform to their modified binaries, it is believed to be impractical for them to create a modified specification which has the same SHA-256 digest as the original. |