summaryrefslogtreecommitdiff
path: root/usr.bin
diff options
context:
space:
mode:
authorAaron Campbell <aaron@cvs.openbsd.org>2000-04-12 21:48:06 +0000
committerAaron Campbell <aaron@cvs.openbsd.org>2000-04-12 21:48:06 +0000
commit92dcc59984c834e34afcdaac99c0197d63a33ac8 (patch)
treeeb25de6f69d8162ab25e130d8aa6b85c3bce5624 /usr.bin
parente264389dcab269557e4c11a85d01749c8069c994 (diff)
Trailing whitespace begone!
Diffstat (limited to 'usr.bin')
-rw-r--r--usr.bin/file/magic.520
-rw-r--r--usr.bin/m4/m4.110
-rw-r--r--usr.bin/mail/mail.17
-rw-r--r--usr.bin/make/make.110
-rw-r--r--usr.bin/mg/mg.12
-rw-r--r--usr.bin/oldrdist/oldrdist.14
-rw-r--r--usr.bin/script/script.18
-rw-r--r--usr.bin/sort/sort.14
-rw-r--r--usr.bin/ssh/scp.16
-rw-r--r--usr.bin/ssh/ssh-add.18
-rw-r--r--usr.bin/ssh/ssh-agent.114
-rw-r--r--usr.bin/ssh/ssh-keygen.18
-rw-r--r--usr.bin/ssh/ssh.172
-rw-r--r--usr.bin/ssh/sshd.840
-rw-r--r--usr.bin/w/uptime.14
15 files changed, 108 insertions, 109 deletions
diff --git a/usr.bin/file/magic.5 b/usr.bin/file/magic.5
index bfdba15d214..7be5d391054 100644
--- a/usr.bin/file/magic.5
+++ b/usr.bin/file/magic.5
@@ -1,4 +1,4 @@
-.\" $OpenBSD: magic.5,v 1.5 2000/03/23 21:39:53 aaron Exp $
+.\" $OpenBSD: magic.5,v 1.6 2000/04/12 21:47:48 aaron Exp $
.\"
.\" @(#)$FreeBSD: src/usr.bin/file/magic.5,v 1.11 2000/03/01 12:19:39 sheldonh Exp $
.\"
@@ -105,10 +105,10 @@ value,
to specify that the value from the file must be greater than the specified
value,
.Ql &
-to specify that the value from the file must have set all of the bits
+to specify that the value from the file must have set all of the bits
that are set in the specified value,
.Ql ^
-to specify that the value from the file must have clear any of the bits
+to specify that the value from the file must have clear any of the bits
that are set in the specified value, or
.Sq x
to specify that any value will match.
@@ -125,7 +125,7 @@ is octal, and
is hexadecimal.
.It Sy ""
For string values, the byte string from the
-file must match the specified byte string.
+file must match the specified byte string.
The operators
.Ql = ,
.Ql < ,
@@ -187,11 +187,11 @@ in the file.
.Pp
Indirect offsets are of the form:
.Dq (x[.[bsl]][+-][y]) .
-The value of
+The value of
.Sq x
is used as an offset in the file.
A byte, short or long is read at that offset
-depending on the
+depending on the
.Dq [bsl]
type specifier.
To that number the value of
@@ -204,13 +204,13 @@ Sometimes you do not know the exact offset as this depends on the length of
preceding fields.
You can specify an offset relative to the end of the
last uplevel field (of course this may only be done for sublevel tests, i.e.,
-test beginning with
+test beginning with
.Ql > ) .
Such a relative offset is specified using
.Ql &
as a prefix to the offset.
.Sh BUGS
-The formats
+The formats
.Li long ,
.Li belong ,
.Li lelong ,
@@ -222,7 +222,7 @@ The formats
and
.Li ledate
are system-dependent; perhaps they should be specified as a number
-of bytes (2B, 4B, etc),
+of bytes (2B, 4B, etc),
since the files being recognized typically come from
a system on which the lengths are invariant.
.Pp
@@ -242,7 +242,7 @@ indirect offsets.
.\" Date: 3 Sep 85 08:19:07 GMT
.\" Organization: Sun Microsystems, Inc.
.\" Lines: 136
-.\"
+.\"
.\" Here's a manual page for the format accepted by the "file" made by adding
.\" the changes I posted to the S5R2 version.
.\"
diff --git a/usr.bin/m4/m4.1 b/usr.bin/m4/m4.1
index 8db08f37898..32027c1c0db 100644
--- a/usr.bin/m4/m4.1
+++ b/usr.bin/m4/m4.1
@@ -1,4 +1,4 @@
-.\" @(#) $OpenBSD: m4.1,v 1.14 2000/03/23 21:39:54 aaron Exp $
+.\" @(#) $OpenBSD: m4.1,v 1.15 2000/04/12 21:47:48 aaron Exp $
.\"
.\"
.Dd January 26, 1993
@@ -63,12 +63,12 @@ to have some value (or
Undefine the symbol
.Ar name .
.It Fl I Ar "dirname"
-Add directory
+Add directory
.Ar dirname
to the include path.
.It Fl g
Activate GNU-m4 compatibility mode.
-In this mode, changequote with
+In this mode, changequote with
two empty parameters deactivates quotes, translit handles simple character
ranges (e.g., a-z) and regular expressions mimic emacs behavior.
.Sh SYNTAX
@@ -206,7 +206,7 @@ causes the macro cleanup to be
invoked after all other processing is done.)
.It Ic maketemp
Translates the string
-.Dq XXXXX
+.Dq XXXXX
in the first argument with the current process
ID leaving other characters alone.
This can be used to create unique
@@ -219,7 +219,7 @@ included.
.It Ic patsubst
Substitutes a regular expression in a string with a replacement string.
Usual substitution patterns apply: an ampersand
-.Pq Ql &
+.Pq Ql &
is replaced by the string matching the regular expression.
The string
.Ql \e# ,
diff --git a/usr.bin/mail/mail.1 b/usr.bin/mail/mail.1
index ccd108af413..ff33c3690f2 100644
--- a/usr.bin/mail/mail.1
+++ b/usr.bin/mail/mail.1
@@ -1,4 +1,4 @@
-.\" $OpenBSD: mail.1,v 1.28 2000/03/24 21:41:08 aaron Exp $
+.\" $OpenBSD: mail.1,v 1.29 2000/04/12 21:47:48 aaron Exp $
.\"
.\" Copyright (c) 1980, 1990, 1993
.\" The Regents of the University of California. All rights reserved.
@@ -690,9 +690,8 @@ Similar to
except that
.Ic only
the message body
-.Po Ar without\
-the header
-.Pc
+.Pf ( Ar without
+the header)
is saved.
Extremely useful for such tasks as sending and receiving source
program text over the message system.
diff --git a/usr.bin/make/make.1 b/usr.bin/make/make.1
index 578eefae1d9..018a8ae5c7c 100644
--- a/usr.bin/make/make.1
+++ b/usr.bin/make/make.1
@@ -1,4 +1,4 @@
-.\" $OpenBSD: make.1,v 1.30 2000/04/03 02:58:46 espie Exp $
+.\" $OpenBSD: make.1,v 1.31 2000/04/12 21:47:49 aaron Exp $
.\" $NetBSD: make.1,v 1.18 1997/03/10 21:19:53 christos Exp $
.\"
.\" Copyright (c) 1990, 1993
@@ -1163,7 +1163,7 @@ uses the following environment variables, if they exist:
and
.Ev PWD .
.Nm
-also ignores and unsets
+also ignores and unsets
.Ev CDPATH .
.Sh FILES
.Bl -tag -width /usr/share/mk -compact
@@ -1189,9 +1189,9 @@ The determination of
is contorted to the point of absurdity.
.Pp
If you specify the same target several times in normal dependency rules,
-.Nm
+.Nm
silently ignores all commands after the first non empty set of commands,
-e.g., in
+e.g., in
.Bd -literal
a:
@echo "Executed"
@@ -1228,7 +1228,7 @@ For loops are expanded before tests, so a fragment such as:
.Pp
won't work, and should be rewritten the other way around.
.Pp
-When handling pre-BSD 4.4 archives,
+When handling pre-BSD 4.4 archives,
.Nm
may erroneously mark archive members as out of date if the archive name
was truncated.
diff --git a/usr.bin/mg/mg.1 b/usr.bin/mg/mg.1
index 57bdd55d769..f2dd8846b37 100644
--- a/usr.bin/mg/mg.1
+++ b/usr.bin/mg/mg.1
@@ -94,7 +94,7 @@ respectively.
Amonst other major differences, the
.Nm
configuration files are much simpler than real emacs.
-There are two configuration files,
+There are two configuration files,
.Pa .mg ,
and
.Pa .mg-TERM .
diff --git a/usr.bin/oldrdist/oldrdist.1 b/usr.bin/oldrdist/oldrdist.1
index 5cafd7cf2a8..93b1c3e66b6 100644
--- a/usr.bin/oldrdist/oldrdist.1
+++ b/usr.bin/oldrdist/oldrdist.1
@@ -1,4 +1,4 @@
-.\" $OpenBSD: oldrdist.1,v 1.7 2000/03/10 20:17:48 aaron Exp $
+.\" $OpenBSD: oldrdist.1,v 1.8 2000/04/12 21:47:50 aaron Exp $
.\"
.\" Copyright (c) 1985, 1990, 1993
.\" The Regents of the University of California. All rights reserved.
@@ -462,7 +462,7 @@ facility.
.Nm rdist
aborts on files which have a negative mtime (before Jan 1, 1970).
.Pp
-There should be a
+There should be a
.Dq force
option to allow replacement of non-empty directories
by regular files or symlinks.
diff --git a/usr.bin/script/script.1 b/usr.bin/script/script.1
index 6f5c344d74e..3cfe510802d 100644
--- a/usr.bin/script/script.1
+++ b/usr.bin/script/script.1
@@ -1,4 +1,4 @@
-.\" $OpenBSD: script.1,v 1.7 2000/03/23 17:01:35 ericj Exp $
+.\" $OpenBSD: script.1,v 1.8 2000/04/12 21:47:50 aaron Exp $
.\" $NetBSD: script.1,v 1.3 1994/12/21 08:55:41 jtc Exp $
.\"
.\" Copyright (c) 1980, 1990, 1993
@@ -86,9 +86,9 @@ is not set) for the
C-shell,
.Xr csh 1 ) .
.Nm
-will exit with the status of 0 unless any of its child
-processes fail. In which case,
-.Nm
+will exit with the status of 0 unless any of its child
+processes fail. In which case,
+.Nm
will return 1.
.Pp
Certain interactive commands, such as
diff --git a/usr.bin/sort/sort.1 b/usr.bin/sort/sort.1
index 3f288cedb50..5421cfcd29f 100644
--- a/usr.bin/sort/sort.1
+++ b/usr.bin/sort/sort.1
@@ -1,4 +1,4 @@
-.\" $OpenBSD: sort.1,v 1.9 2000/03/24 21:41:09 aaron Exp $
+.\" $OpenBSD: sort.1,v 1.10 2000/04/12 21:47:50 aaron Exp $
.\"
.\" Copyright (c) 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@@ -263,7 +263,7 @@ have the form
.Em (m,n > 0)
and can be followed by one or more of the letters
.Cm b , d , f , i ,
-.Cm n ,
+.Cm n ,
and
.Cm r ,
which correspond to the options discussed above.
diff --git a/usr.bin/ssh/scp.1 b/usr.bin/ssh/scp.1
index 8e93e23d3fd..51de6c5e817 100644
--- a/usr.bin/ssh/scp.1
+++ b/usr.bin/ssh/scp.1
@@ -9,7 +9,7 @@
.\"
.\" Created: Sun May 7 00:14:37 1995 ylo
.\"
-.\" $Id: scp.1,v 1.6 2000/03/23 21:10:09 aaron Exp $
+.\" $Id: scp.1,v 1.7 2000/04/12 21:47:50 aaron Exp $
.\"
.Dd September 25, 1999
.Dt SCP 1
@@ -36,7 +36,7 @@
.Ar host2 No :
.Oc Ar file2
.Sm on
-.Sh DESCRIPTION
+.Sh DESCRIPTION
.Nm
copies files between hosts on a network.
It uses
@@ -74,7 +74,7 @@ Recursively copy entire directories.
Verbose mode.
Causes
.Nm
-and
+and
.Xr ssh 1
to print debugging messages about their progress.
This is helpful in
diff --git a/usr.bin/ssh/ssh-add.1 b/usr.bin/ssh/ssh-add.1
index 8d1486b52db..93a8f986311 100644
--- a/usr.bin/ssh/ssh-add.1
+++ b/usr.bin/ssh/ssh-add.1
@@ -9,7 +9,7 @@
.\"
.\" Created: Sat Apr 22 23:55:14 1995 ylo
.\"
-.\" $Id: ssh-add.1,v 1.11 2000/03/23 21:11:38 aaron Exp $
+.\" $Id: ssh-add.1,v 1.12 2000/04/12 21:47:50 aaron Exp $
.\"
.Dd September 25, 1999
.Dt SSH-ADD 1
@@ -21,7 +21,7 @@
.Nm ssh-add
.Op Fl lLdD
.Op Ar
-.Sh DESCRIPTION
+.Sh DESCRIPTION
.Nm
adds identities to the authentication agent,
.Xr ssh-agent 1 .
@@ -30,7 +30,7 @@ When run without arguments, it adds the file
Alternative file names can be given on the command line.
If any file requires a passphrase,
.Nm
-asks for the passphrase from the user.
+asks for the passphrase from the user.
The Passphrase it is read from the user's tty.
.Pp
The authentication agent must be running and must be an ancestor of
@@ -108,7 +108,7 @@ external libraries.
.It
has been updated to support ssh protocol 1.5.
.It
-contains added support for
+contains added support for
.Xr kerberos 8
authentication and ticket passing.
.It
diff --git a/usr.bin/ssh/ssh-agent.1 b/usr.bin/ssh/ssh-agent.1
index 7029b60dcc4..b49d62b5a6e 100644
--- a/usr.bin/ssh/ssh-agent.1
+++ b/usr.bin/ssh/ssh-agent.1
@@ -1,4 +1,4 @@
-.\" $OpenBSD: ssh-agent.1,v 1.10 2000/03/23 21:10:10 aaron Exp $
+.\" $OpenBSD: ssh-agent.1,v 1.11 2000/04/12 21:47:50 aaron Exp $
.\"
.\" -*- nroff -*-
.\"
@@ -18,14 +18,14 @@
.Nm ssh-agent
.Nd authentication agent
.Sh SYNOPSIS
-.Nm ssh-agent
+.Nm ssh-agent
.Op Fl c Li | Fl s
.Op Fl k
.Oo
.Ar command
.Op Ar args ...
.Oc
-.Sh DESCRIPTION
+.Sh DESCRIPTION
.Nm
is a program to hold authentication private keys.
The idea is that
@@ -64,12 +64,12 @@ When the command dies, so does the agent.
The agent initially does not have any private keys.
Keys are added using
.Xr ssh-add 1 .
-When executed without arguments,
+When executed without arguments,
.Xr ssh-add 1
-adds the
+adds the
.Pa $HOME/.ssh/identity
file.
-If the identity has a passphrase,
+If the identity has a passphrase,
.Xr ssh-add 1
asks for the passphrase (using a small X11 application if running
under X11, or from the terminal if running without X).
@@ -152,7 +152,7 @@ external libraries.
.It
has been updated to support ssh protocol 1.5.
.It
-contains added support for
+contains added support for
.Xr kerberos 8
authentication and ticket passing.
.It
diff --git a/usr.bin/ssh/ssh-keygen.1 b/usr.bin/ssh/ssh-keygen.1
index 90361643c7b..68e27db444d 100644
--- a/usr.bin/ssh/ssh-keygen.1
+++ b/usr.bin/ssh/ssh-keygen.1
@@ -9,7 +9,7 @@
.\"
.\" Created: Sat Apr 22 23:55:14 1995 ylo
.\"
-.\" $Id: ssh-keygen.1,v 1.12 2000/03/23 21:10:10 aaron Exp $
+.\" $Id: ssh-keygen.1,v 1.13 2000/04/12 21:47:51 aaron Exp $
.\"
.Dd September 25, 1999
.Dt SSH-KEYGEN 1
@@ -37,9 +37,9 @@
.Nm ssh-keygen
.Fl l
.Op Fl f Ar keyfile
-.Sh DESCRIPTION
+.Sh DESCRIPTION
.Nm
-generates and manages authentication keys for
+generates and manages authentication keys for
.Xr ssh 1 .
Normally each user wishing to use SSH
with RSA authentication runs this once to create the authentication
@@ -150,7 +150,7 @@ external libraries.
.It
has been updated to support ssh protocol 1.5.
.It
-contains added support for
+contains added support for
.Xr kerberos 8
authentication and ticket passing.
.It
diff --git a/usr.bin/ssh/ssh.1 b/usr.bin/ssh/ssh.1
index b2bd31c0cbd..1c093800e60 100644
--- a/usr.bin/ssh/ssh.1
+++ b/usr.bin/ssh/ssh.1
@@ -9,7 +9,7 @@
.\"
.\" Created: Sat Apr 22 21:55:14 1995 ylo
.\"
-.\" $Id: ssh.1,v 1.43 2000/03/24 03:04:46 brad Exp $
+.\" $Id: ssh.1,v 1.44 2000/04/12 21:47:51 aaron Exp $
.\"
.Dd September 25, 1999
.Dt SSH 1
@@ -49,7 +49,7 @@
.Oc
.Op Ar hostname | user@hostname
.Op Ar command
-.Sh DESCRIPTION
+.Sh DESCRIPTION
.Nm
(Secure Shell) is a program for logging into a remote machine and for
executing commands on a remote machine.
@@ -60,7 +60,7 @@ X11 connections and
arbitrary TCP/IP ports can also be forwarded over the secure channel.
.Pp
.Nm
-connects and logs into the specified
+connects and logs into the specified
.Ar hostname .
The user must prove
his/her identity to the remote machine using one of several methods.
@@ -71,7 +71,7 @@ or
.Pa /etc/shosts.equiv
on the remote machine, and the user names are
the same on both sides, the user is immediately permitted to log in.
-Second, if
+Second, if
.Pa \&.rhosts
or
.Pa \&.shosts
@@ -94,7 +94,7 @@ It means that if the login would be permitted by
or
.Pa /etc/shosts.equiv ,
and if additionally the server can verify the client's
-host key (see
+host key (see
.Pa /etc/ssh_known_hosts
and
.Pa $HOME/.ssh/known_hosts
@@ -109,17 +109,17 @@ spoofing, DNS spoofing and routing spoofing.
and the rlogin/rsh protocol in general, are inherently insecure and should be
disabled if security is desired.]
.Pp
-As a third authentication method,
+As a third authentication method,
.Nm
supports RSA based authentication.
The scheme is based on public-key cryptography: there are cryptosystems
where encryption and decryption are done using separate keys, and it
is not possible to derive the decryption key from the encryption key.
RSA is one such system.
-The idea is that each user creates a public/private
+The idea is that each user creates a public/private
key pair for authentication purposes.
The server knows the public key, and only the user knows the private key.
-The file
+The file
.Pa $HOME/.ssh/authorized_keys
lists the public keys that are permitted for logging
in.
@@ -142,18 +142,18 @@ key but without disclosing it to the server.
implements the RSA authentication protocol automatically.
The user creates his/her RSA key pair by running
.Xr ssh-keygen 1 .
-This stores the private key in
+This stores the private key in
.Pa \&.ssh/identity
and the public key in
.Pa \&.ssh/identity.pub
in the user's home directory.
The user should then copy the
.Pa identity.pub
-to
+to
.Pa \&.ssh/authorized_keys
-in his/her home directory on the remote machine (the
+in his/her home directory on the remote machine (the
.Pa authorized_keys
-file corresponds to the conventional
+file corresponds to the conventional
.Pa \&.rhosts
file, and has one key
per line, though the lines can be very long).
@@ -167,7 +167,7 @@ See
.Xr ssh-agent 1
for more information.
.Pp
-If other authentication methods fail,
+If other authentication methods fail,
.Nm
prompts the user for a password.
The password is sent to the remote
@@ -188,7 +188,7 @@ and suspend
with
.Ic ~^Z .
All forwarded connections can be listed with
-.Ic ~#
+.Ic ~#
and if
the session blocks waiting for forwarded X11 or TCP/IP
connections to terminate, it can be backgrounded with
@@ -232,7 +232,7 @@ Forwarding of X11 connections can be
configured on the command line or in configuration files.
.Pp
The
-.Ev DISPLAY
+.Ev DISPLAY
value set by
.Nm
will point to the server machine, but with a display number greater
@@ -265,10 +265,10 @@ electronic purse; another is going trough firewalls.
.Nm
automatically maintains and checks a database containing RSA-based
identifications for all hosts it has ever been used with.
-The database is stored in
+The database is stored in
.Pa \&.ssh/known_hosts
in the user's home directory.
-Additionally, the file
+Additionally, the file
.Pa /etc/ssh_known_hosts
is automatically checked for known hosts.
Any new hosts are automatically added to the user's file.
@@ -290,10 +290,10 @@ host key is not known or has changed.
Disables forwarding of the authentication agent connection.
This may also be specified on a per-host basis in the configuration file.
.It Fl c Ar blowfish|3des
-Selects the cipher to use for encrypting the session.
+Selects the cipher to use for encrypting the session.
.Ar 3des
is used by default.
-It is believed to be secure.
+It is believed to be secure.
.Ar 3des
(triple-des) is an encrypt-decrypt-encrypt triple with three different keys.
It is presumably more secure than the
@@ -322,7 +322,7 @@ This is useful if
.Nm
is going to ask for passwords or passphrases, but the user
wants it in the background.
-This implies
+This implies
.Fl n .
The recommended way to start X11 programs at a remote site is with
something like
@@ -330,9 +330,9 @@ something like
.It Fl g
Allows remote hosts to connect to local forwarded ports.
.It Fl i Ar identity_file
-Selects the file from which the identity (private key) for
+Selects the file from which the identity (private key) for
RSA authentication is read.
-Default is
+Default is
.Pa \&.ssh/identity
in the user's home directory.
Identity files may also be specified on
@@ -577,12 +577,12 @@ followed by a letter, or
to disable the escape
character entirely (making the connection transparent for binary
data).
-.It Cm FallBackToRsh
+.It Cm FallBackToRsh
Specifies that if connecting via
.Nm
fails due to a connection refused error (there is no
.Xr sshd 8
-listening on the remote host),
+listening on the remote host),
.Xr rsh 1
should automatically be used instead (after a suitable warning about
the session being unencrypted).
@@ -599,10 +599,10 @@ or
.Dq no .
.It Cm ForwardX11
Specifies whether X11 connections will be automatically redirected
-over the secure channel and
+over the secure channel and
.Ev DISPLAY
set.
-The argument must be
+The argument must be
.Dq yes
or
.Dq no .
@@ -618,7 +618,7 @@ or
The default is
.Dq no .
.It Cm GlobalKnownHostsFile
-Specifies a file to use instead of
+Specifies a file to use instead of
.Pa /etc/ssh_known_hosts .
.It Cm HostName
Specifies the real host name to log into.
@@ -773,7 +773,7 @@ The default is
.Dq no .
.It Cm StrictHostKeyChecking
If this flag is set to
-.Dq yes ,
+.Dq yes ,
.Nm
ssh will never automatically add host keys to the
.Pa $HOME/.ssh/known_hosts
@@ -839,7 +839,7 @@ will normally set the following environment variables:
The
.Ev DISPLAY
variable indicates the location of the X11 server.
-It is automatically set by
+It is automatically set by
.Nm
to point to a value of the form
.Dq hostname:n
@@ -885,10 +885,10 @@ on to new connections).
Set to the name of the user logging in.
.El
.Pp
-Additionally,
+Additionally,
.Nm
-reads
-.Pa $HOME/.ssh/environment ,
+reads
+.Pa $HOME/.ssh/environment ,
and adds lines of the format
.Dq VARNAME=value
to the environment.
@@ -911,7 +911,7 @@ ignores this file if it is accessible by others.
It is possible to specify a passphrase when
generating the key; the passphrase will be used to encrypt the
sensitive part of this file using 3DES.
-.It Pa $HOME/.ssh/identity.pub
+.It Pa $HOME/.ssh/identity.pub
Contains the public key for authentication (public part of the
identity file in human-readable form).
The contents of this file should be added to
@@ -1031,7 +1031,7 @@ Additionally, successful RSA host authentication is normally
required.
This file should only be writable by root.
.It Pa /etc/shosts.equiv
-This file is processed exactly as
+This file is processed exactly as
.Pa /etc/hosts.equiv .
This file may be useful to permit logins using
.Nm
@@ -1048,7 +1048,7 @@ Commands in this file are executed by
.Nm
when the user logs in just before the user's shell (or command) is
started.
-See the
+See the
.Xr sshd 8
manual page for more information.
.It Pa $HOME/.ssh/environment
@@ -1077,7 +1077,7 @@ external libraries.
has been updated to support ssh protocol 1.5, making it compatible with
all other ssh protocol 1 clients and servers.
.It
-contains added support for
+contains added support for
.Xr kerberos 8
authentication and ticket passing.
.It
diff --git a/usr.bin/ssh/sshd.8 b/usr.bin/ssh/sshd.8
index ea29247403a..85d694afba9 100644
--- a/usr.bin/ssh/sshd.8
+++ b/usr.bin/ssh/sshd.8
@@ -9,7 +9,7 @@
.\"
.\" Created: Sat Apr 22 21:55:14 1995 ylo
.\"
-.\" $Id: sshd.8,v 1.39 2000/03/29 20:17:56 deraadt Exp $
+.\" $Id: sshd.8,v 1.40 2000/04/12 21:47:51 aaron Exp $
.\"
.Dd September 25, 1999
.Dt SSHD 8
@@ -27,9 +27,9 @@
.Op Fl k Ar key_gen_time
.Op Fl p Ar port
.Op Fl V Ar client_protocol_id
-.Sh DESCRIPTION
+.Sh DESCRIPTION
.Nm
-(Secure Shell Daemon) is the daemon program for
+(Secure Shell Daemon) is the daemon program for
.Xr ssh 1 .
Together these programs replace rlogin and rsh programs, and
provide secure encrypted communications between two untrusted hosts
@@ -39,7 +39,7 @@ install and use as possible.
.Pp
.Nm
is the daemon that listens for connections from clients.
-It is normally started at boot from
+It is normally started at boot from
.Pa /etc/rc .
It forks a new
daemon for each incoming connection.
@@ -157,7 +157,7 @@ host file is normally not readable by anyone but root).
.It Fl i
Specifies that
.Nm
-is being run from inetd.
+is being run from inetd.
.Nm
is normally not run
from inetd because it needs to generate the server key before it can
@@ -204,7 +204,7 @@ to use IPv6 addresses only.
.El
.Sh CONFIGURATION FILE
.Nm
-reads configuration data from
+reads configuration data from
.Pa /etc/sshd_config
(or the file specified with
.Fl f
@@ -284,14 +284,14 @@ does not start if this file is group/world-accessible.
.It Cm IgnoreRhosts
Specifies that
.Pa .rhosts
-and
+and
.Pa .shosts
files will not be used in authentication.
.Pa /etc/hosts.equiv
and
-.Pa /etc/shosts.equiv
+.Pa /etc/shosts.equiv
are still used.
-The default is
+The default is
.Dq yes .
.It Cm IgnoreUserKnownHosts
Specifies whether
@@ -342,7 +342,7 @@ Default is
.Dq yes .
.It Cm KerberosTgtPassing
Specifies whether a Kerberos TGT may be forwarded to the server.
-Default is
+Default is
.Dq no ,
as this only works when the Kerberos KDC is actually an AFS kaserver.
.It Cm KerberosTicketCleanup
@@ -419,7 +419,7 @@ Multiple options of this type are permitted.
.It Cm PrintMotd
Specifies whether
.Nm
-should print
+should print
.Pa /etc/motd
when a user logs in interactively.
(On some systems it is also printed by the shell,
@@ -454,7 +454,7 @@ Defines the number of bits in the server key.
The minimum value is 512, and the default is 768.
.It Cm SkeyAuthentication
Specifies whether
-.Xr skey 1
+.Xr skey 1
authentication is allowed.
The default is
.Dq yes .
@@ -504,12 +504,12 @@ does the following:
.Bl -enum -offset indent
.It
If the login is on a tty, and no command has been specified,
-prints last login time and
+prints last login time and
.Pa /etc/motd
(unless prevented in the configuration file or by
.Pa $HOME/.hushlogin ;
see the
-.Sx FILES
+.Sx FILES
section).
.It
If the login is on a tty, records login time.
@@ -543,7 +543,7 @@ authentication protocol and cookie in standard input.
Runs user's shell or command.
.El
.Sh AUTHORIZED_KEYS FILE FORMAT
-The
+The
.Pa $HOME/.ssh/authorized_keys
file lists the RSA keys that are
permitted for RSA authentication.
@@ -632,9 +632,9 @@ from="*.niksula.hut.fi,!pc.niksula.hut.fi" 1024 35 23.\|.\|.\|2334 ylo@niksula
.Pp
command="dump /home",no-pty,no-port-forwarding 1024 33 23.\|.\|.\|2323 backup.hut.fi
.Sh SSH_KNOWN_HOSTS FILE FORMAT
-The
+The
.Pa /etc/ssh_known_hosts
-and
+and
.Pa $HOME/.ssh/known_hosts
files contain host public keys for all known hosts.
The global file should
@@ -679,7 +679,7 @@ accepted if valid information can be found from either file.
Note that the lines in these files are typically hundreds of characters
long, and you definitely don't want to type in the host keys by hand.
Rather, generate them by a script
-or by taking
+or by taking
.Pa /etc/ssh_host_key.pub
and adding the host names at the front.
.Ss Examples
@@ -734,7 +734,7 @@ should be world-readable, and
.Pa $HOME/.ssh/known_hosts
can but need not be world-readable.
.It Pa /etc/nologin
-If this file exists,
+If this file exists,
.Nm
refuses to let anyone except root log in.
The contents of the file
@@ -865,7 +865,7 @@ external libraries.
has been updated to support ssh protocol 1.5, making it compatible with
all other ssh protocol 1 clients and servers.
.It
-contains added support for
+contains added support for
.Xr kerberos 8
authentication and ticket passing.
.It
diff --git a/usr.bin/w/uptime.1 b/usr.bin/w/uptime.1
index ddc2ef15425..e48f7d860b6 100644
--- a/usr.bin/w/uptime.1
+++ b/usr.bin/w/uptime.1
@@ -1,4 +1,4 @@
-.\" $OpenBSD: uptime.1,v 1.6 1999/08/12 19:26:39 millert Exp $
+.\" $OpenBSD: uptime.1,v 1.7 2000/04/12 21:47:51 aaron Exp $
.\"
.\" Copyright (c) 1980, 1990, 1993, 1994
.\" The Regents of the University of California. All rights reserved.
@@ -64,7 +64,7 @@ instead of the default
.It Fl N Ar system
Extract the name list from the specified
.Ar system
-instead of the default
+instead of the default
.Pa /bsd .
.Sh SEE ALSO
.Xr w 1