aboutsummaryrefslogtreecommitdiff
path: root/usr.sbin
diff options
context:
space:
mode:
authorGlen Barber <gjb@FreeBSD.org>2012-05-12 15:08:22 +0000
committerGlen Barber <gjb@FreeBSD.org>2012-05-12 15:08:22 +0000
commit7b1d17a1bcafbf98cf50588beb0e3c6c8981a0bf (patch)
tree96e9ecd035bd5e73e25e3c47edc970d9de0db051 /usr.sbin
parentcd92c9621538e35678b38cf3ad8c5cc8e6c1200c (diff)
downloadsrc-7b1d17a1bcafbf98cf50588beb0e3c6c8981a0bf.tar.gz
src-7b1d17a1bcafbf98cf50588beb0e3c6c8981a0bf.zip
General mdoc(7) and typo fixes.
PR: 167804 Submitted by: Nobuyuki Koganemaru (kogane!jp.freebsd.org) MFC after: 3 days
Notes
Notes: svn path=/head/; revision=235337
Diffstat (limited to 'usr.sbin')
-rw-r--r--usr.sbin/jail/jail.conf.510
-rw-r--r--usr.sbin/ntp/doc/ntp.conf.531
-rw-r--r--usr.sbin/wpa/hostapd/hostapd.conf.52
-rw-r--r--usr.sbin/wpa/wpa_supplicant/wpa_supplicant.conf.54
4 files changed, 24 insertions, 23 deletions
diff --git a/usr.sbin/jail/jail.conf.5 b/usr.sbin/jail/jail.conf.5
index ed2cf33e4b97..fc5ecf1962be 100644
--- a/usr.sbin/jail/jail.conf.5
+++ b/usr.sbin/jail/jail.conf.5
@@ -37,7 +37,7 @@ A
configuration file consists of one or more jail definitions statements,
and parameter or variable statements within those jail definitions.
A jail definition statement looks something like a C compound statement.
-A parameter statement looks like a C assigment,
+A parameter statement looks like a C assignment,
including a terminating semicolon.
.Pp
The general syntax of a jail definition is:
@@ -100,17 +100,17 @@ A token is any sequence of characters that aren't considered special in
the syntax of the configuration file (such as a semicolon or
whitespace).
If a value contains anything more than letters, numbers, dots, dashes
-and undescores, it is advisable to put quote marks around that value.
+and underscores, it is advisable to put quote marks around that value.
Either single or double quotes may be used.
.Pp
-Special characters may be quoted by preceeding them with a backslash.
+Special characters may be quoted by preceding them with a backslash.
Common C-style backslash character codes are also supported, including
control characters and octal or hex ASCII codes.
A backslash at the end of a line will ignore the subsequent newline and
continue the string at the start of the next line.
.Ss Variables
A string may use shell-style variable substitution.
-A parameter or variable name preceeded by a dollar sign, and possibly
+A parameter or variable name preceded by a dollar sign, and possibly
enclosed in braces, will be replaced with the value of that parameter or
variable.
For example, a jail's path may be defined in terms of its name or
@@ -121,7 +121,7 @@ path = "/var/jail/$name";
path = "/var/jail/${host.hostname}";
.Ed
.Pp
-Variable substition occurs in unquoted tokens or in double-quoted
+Variable substitution occurs in unquoted tokens or in double-quoted
strings, but not in single-quote strings.
.Pp
A variable is defined in the same way a parameter is, except that the
diff --git a/usr.sbin/ntp/doc/ntp.conf.5 b/usr.sbin/ntp/doc/ntp.conf.5
index c19bc29bb66e..1aeed3356e2e 100644
--- a/usr.sbin/ntp/doc/ntp.conf.5
+++ b/usr.sbin/ntp/doc/ntp.conf.5
@@ -268,7 +268,7 @@ Options:
All packets sent to and received from the server or peer are to
include authentication fields encrypted using the autokey scheme
described in
-.Sx Authentication Options .
+.Sx Authentication Commands .
.It Cm burst
when the server is reachable, send a burst of eight packets
instead of the usual one.
@@ -305,7 +305,7 @@ default is to include no encryption field.
.It Cm minpoll Ar minpoll
.It Cm maxpoll Ar maxpoll
These options specify the minimum and maximum poll intervals
-for NTP messages, as a power of 2 in seconds
+for NTP messages, as a power of 2 in seconds.
The maximum poll
interval defaults to 10 (1,024 s), but can be increased by the
.Cm maxpoll
@@ -363,7 +363,7 @@ Note that, in order
to avoid accidental or malicious disruption in this mode, both the
server and client should operate using symmetric-key or public-key
authentication as described in
-.Sx Authentication Options .
+.Sx Authentication Commands .
.It Ic manycastserver Ar address ...
This command enables reception of manycast client messages to
the multicast group address(es) (type m) specified.
@@ -376,7 +376,7 @@ Note that, in order to avoid
accidental or malicious disruption in this mode, both the server
and client should operate using symmetric-key or public-key
authentication as described in
-.Sx Authentication Options .
+.Sx Authentication Commands .
.It Ic multicastclient Ar address ...
This command enables reception of multicast server messages to
the multicast group address(es) (type m) specified.
@@ -389,7 +389,7 @@ Note that,
in order to avoid accidental or malicious disruption in this mode,
both the server and client should operate using symmetric-key or
public-key authentication as described in
-.Sx Authentication Options .
+.Sx Authentication Commands .
.El
.Sh Authentication Support
Authentication support allows the NTP client to verify that the
@@ -466,7 +466,7 @@ of these checks and be discarded.
Furthermore, the Autokey scheme requires a
preliminary protocol exchange to obtain
the server certificate, verify its
-credentials and initialize the protocol
+credentials and initialize the protocol.
.Pp
The
.Cm auth
@@ -669,7 +669,7 @@ using the host name, network address and public keys,
all of which are bound together by the protocol specifically
to deflect masquerade attacks.
For this reason Autokey
-includes the source and destinatino IP addresses in message digest
+includes the source and destination IP addresses in message digest
computations and so the same addresses must be available
at both the server and client.
For this reason operation
@@ -796,7 +796,7 @@ The certificate extension fields must not contain either
a subject key identifier or a issuer key identifier field;
however, an extended key usage field for a trusted host must
contain the value
-.Cm trustRoot ; .
+.Cm trustRoot .
Other extension fields are ignored.
.Ss Authentication Commands
.Bl -tag -width indent
@@ -1068,10 +1068,11 @@ following form to the file generation set named
The first two fields show the date (Modified Julian Day) and time
(seconds and fraction past UTC midnight).
The next field shows the peer
-address in dotted-quad notation, The final message field includes the
+address in dotted-quad notation.
+The final message field includes the
message type and certain ancillary information.
See the
-.Sx Authentication Options
+.Sx Authentication Commands
section for further information.
.It Cm loopstats
Enables recording of loop filter statistics information.
@@ -1155,7 +1156,7 @@ Time in hours since the system was last rebooted.
.It Packets received Cm 81965
Total number of packets received.
.It Packets processed Cm 0
-Number of packets received in response to previous packets sent
+Number of packets received in response to previous packets sent.
.It Current version Cm 9546
Number of packets matching the current NTP version.
.It Previous version Cm 56
@@ -1461,7 +1462,7 @@ subcommand specifies the minimum average packet
spacing, while the
.Cm minimum
subcommand specifies the minimum packet spacing.
-Packets that violate these minima are discarded
+Packets that violate these minimum are discarded
and a kiss-o'-death packet returned if enabled.
The default
minimum average and minimum are 5 and 2, respectively.
@@ -1775,7 +1776,7 @@ It is often useful to narrow the range of acceptable
servers which can be found by manycast client associations.
Because manycast servers respond only when the client
stratum is equal to or greater than the server stratum,
-primary (stratum 1) servers fill find only primary servers
+primary (stratum 1) servers will find only primary servers
in TTL range, which is probably the most common objective.
However, unless configured otherwise, all manycast clients
in TTL range will eventually find all primary servers
@@ -1955,7 +1956,7 @@ peers remaining.
This value defaults to 1, but can be changed
to any number from 1 to 15.
.It Cm minclock Ar minclock
-The clustering algorithm repeatedly casts out outlyer
+The clustering algorithm repeatedly casts out outerlayer
associations until no more than
.Cm minclock
associations remain.
@@ -1965,7 +1966,7 @@ configured sources.
.It Cm minsane Ar minsane
This is the minimum number of candidates available
to the clock selection algorithm in order to produce
-one or more truechimers for the clustering algorithm.
+one or more true chimers for the clustering algorithm.
If fewer than this number are available, the clock is
undisciplined and allowed to run free.
The default is 1
diff --git a/usr.sbin/wpa/hostapd/hostapd.conf.5 b/usr.sbin/wpa/hostapd/hostapd.conf.5
index 3316627a84f6..fd91289f39d3 100644
--- a/usr.sbin/wpa/hostapd/hostapd.conf.5
+++ b/usr.sbin/wpa/hostapd/hostapd.conf.5
@@ -173,7 +173,7 @@ This conversion uses SSID so the PSK changes when ASCII passphrase is
used and the SSID is changed.
.It Va wpa_psk_file
Optionally, WPA PSKs can be read from a separate text file (containing a
-list of (PSK,MAC address) pairs.
+list of PSK,MAC address pairs).
.It Va wpa_key_mgmt
Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both).
.It Va wpa_pairwise
diff --git a/usr.sbin/wpa/wpa_supplicant/wpa_supplicant.conf.5 b/usr.sbin/wpa/wpa_supplicant/wpa_supplicant.conf.5
index d37847e6c2ce..5d6914fccb9d 100644
--- a/usr.sbin/wpa/wpa_supplicant/wpa_supplicant.conf.5
+++ b/usr.sbin/wpa/wpa_supplicant/wpa_supplicant.conf.5
@@ -316,7 +316,7 @@ This can be used to achieve forward secrecy.
If the
.Va dh_file
is in DSA parameters format, it will be automatically converted
-into DH params.
+into DH parameters.
.It Va subject_match
Substring to be matched against the subject of the
authentication server certificate.
@@ -370,7 +370,7 @@ TLS Message Length field in all TLS messages even if they are not
fragmented.
.It Li sim_min_num_chal=3
can be used to configure EAP-SIM to require three
-challenges (by default, it accepts 2 or 3)
+challenges (by default, it accepts 2 or 3).
.It Li fast_provisioning=1
option enables in-line provisioning of EAP-FAST
credentials (PAC).