From: jsg Date: Sat, 10 Sep 2022 08:50:53 +0000 (+0000) Subject: fix repeated words X-Git-Url: http://artulab.com/gitweb/?a=commitdiff_plain;h=139410fb3e68569c0361f09ac28029baf78c1fe9;p=openbsd fix repeated words ok miod@ jmc@ --- diff --git a/lib/libcrypto/man/X509_policy_tree_level_count.3 b/lib/libcrypto/man/X509_policy_tree_level_count.3 index 4b13e6a967c..ff2036c40fd 100644 --- a/lib/libcrypto/man/X509_policy_tree_level_count.3 +++ b/lib/libcrypto/man/X509_policy_tree_level_count.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: X509_policy_tree_level_count.3,v 1.4 2021/11/11 12:06:25 schwarze Exp $ +.\" $OpenBSD: X509_policy_tree_level_count.3,v 1.5 2022/09/10 08:50:53 jsg Exp $ .\" .\" Copyright (c) 2021 Ingo Schwarze .\" @@ -14,7 +14,7 @@ .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" -.Dd $Mdocdate: November 11 2021 $ +.Dd $Mdocdate: September 10 2022 $ .Dt X509_POLICY_TREE_LEVEL_COUNT 3 .Os .Sh NAME @@ -157,7 +157,7 @@ if the argument is .Dv NULL or located on level 0. -Otherwise, it returns an an internal pointer to the parent node of the +Otherwise, it returns an internal pointer to the parent node of the .Fa node argument. The parent node is always located on the previous level. diff --git a/share/man/man9/if_rxr_init.9 b/share/man/man9/if_rxr_init.9 index 7006709db7e..2eb41723d60 100644 --- a/share/man/man9/if_rxr_init.9 +++ b/share/man/man9/if_rxr_init.9 @@ -1,4 +1,4 @@ -.\" $OpenBSD: if_rxr_init.9,v 1.9 2020/05/12 20:47:58 jmc Exp $ +.\" $OpenBSD: if_rxr_init.9,v 1.10 2022/09/10 08:50:53 jsg Exp $ .\" .\" Copyright (c) 2014 David Gwynne .\" @@ -14,7 +14,7 @@ .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" -.Dd $Mdocdate: May 12 2020 $ +.Dd $Mdocdate: September 10 2022 $ .Dt IF_RXR_INIT 9 .Os .Sh NAME @@ -91,10 +91,10 @@ returns receive descriptor slots to the ring. .Pp .Fn if_rxr_livelocked -can signal that that receive ring is generating too much load. +can signal that the receive ring is generating too much load. .Pp .Fn if_rxr_needrefill -signals that that receive ring runs below the low watermark of descriptors. +signals that the receive ring runs below the low watermark of descriptors. .Pp .Fn if_rxr_inuse can be used to determine how many descriptor slots have been allocated diff --git a/share/man/man9/kstat_create.9 b/share/man/man9/kstat_create.9 index 2c2f335b2ba..f17112eed01 100644 --- a/share/man/man9/kstat_create.9 +++ b/share/man/man9/kstat_create.9 @@ -1,4 +1,4 @@ -.\" $OpenBSD: kstat_create.9,v 1.6 2022/04/19 03:51:47 dlg Exp $ +.\" $OpenBSD: kstat_create.9,v 1.7 2022/09/10 08:50:53 jsg Exp $ .\" .\" Copyright (c) 2020 David Gwynne .\" @@ -14,7 +14,7 @@ .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" -.Dd $Mdocdate: April 19 2022 $ +.Dd $Mdocdate: September 10 2022 $ .Dt KSTAT_CREATE 9 .Os .Sh NAME @@ -168,7 +168,7 @@ structure fields and calls to the .Fa ks_read and .Fa ks_copy -handlers by the kstat subsystem are serialised by the the locking primitive +handlers by the kstat subsystem are serialised by the locking primitive referenced by .Fa ks_lock . By default diff --git a/usr.bin/ssh/ssh-keygen.1 b/usr.bin/ssh/ssh-keygen.1 index b31661c10e6..8b1f617d237 100644 --- a/usr.bin/ssh/ssh-keygen.1 +++ b/usr.bin/ssh/ssh-keygen.1 @@ -1,4 +1,4 @@ -.\" $OpenBSD: ssh-keygen.1,v 1.225 2022/08/16 20:24:08 jmc Exp $ +.\" $OpenBSD: ssh-keygen.1,v 1.226 2022/09/10 08:50:53 jsg Exp $ .\" .\" Author: Tatu Ylonen .\" Copyright (c) 1995 Tatu Ylonen , Espoo, Finland @@ -35,7 +35,7 @@ .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.Dd $Mdocdate: August 16 2022 $ +.Dd $Mdocdate: September 10 2022 $ .Dt SSH-KEYGEN 1 .Os .Sh NAME @@ -1059,7 +1059,7 @@ or Refer to those manual pages for details. .Sh FIDO AUTHENTICATOR .Nm -is able to to generate FIDO authenticator-backed keys, after which +is able to generate FIDO authenticator-backed keys, after which they may be used much like any other key type supported by OpenSSH, so long as the hardware authenticator is attached when the keys are used. FIDO authenticators generally require the user to explicitly authorise