···2929.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
3030.\" SUCH DAMAGE.
3131.\"
3232-.\" $OpenBSD: atexit.3,v 1.12 2019/06/27 16:30:39 schwarze Exp $
3232+.\" $OpenBSD: atexit.3,v 1.13 2022/02/06 00:29:02 jsg Exp $
3333.\"
3434-.Dd $Mdocdate: June 27 2019 $
3434+.Dd $Mdocdate: February 6 2022 $
3535.Dt ATEXIT 3
3636.Os
3737.Sh NAME
···6868is very difficult to use correctly without creating
6969.Xr exit 3 Ns -time
7070races.
7171-Unless absolutely necessary, please avoid using it.
7171+Unless absolutely necessary, avoid using it.
7272.Sh RETURN VALUES
7373The
7474.Nm
+3-3
lib/libc/sys/getentropy.2
···11-.\" $OpenBSD: getentropy.2,v 1.9 2019/09/28 14:55:12 deraadt Exp $
11+.\" $OpenBSD: getentropy.2,v 1.10 2022/02/06 00:29:02 jsg Exp $
22.\"
33.\" Copyright (c) 2014 Theo de Raadt
44.\"
···1414.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1515.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
1616.\"
1717-.Dd $Mdocdate: September 28 2019 $
1717+.Dd $Mdocdate: February 6 2022 $
1818.Dt GETENTROPY 2
1919.Os
2020.Sh NAME
···3333The maximum buffer size permitted is 256 bytes.
3434.Pp
3535.Fn getentropy
3636-is not intended for regular code; please use the
3636+is not intended for regular code; use the
3737.Xr arc4random 3
3838family of functions instead.
3939.Pp
+3-3
lib/libkeynote/keynote.4
···11-.\" $OpenBSD: keynote.4,v 1.37 2021/06/12 06:39:17 jmc Exp $
11+.\" $OpenBSD: keynote.4,v 1.38 2022/02/06 00:29:02 jsg Exp $
22.\"
33.\" The author of this code is Angelos D. Keromytis (angelos@dsl.cis.upenn.edu)
44.\"
···2020.\" MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR
2121.\" PURPOSE.
2222.\"
2323-.Dd $Mdocdate: June 12 2021 $
2323+.Dd $Mdocdate: February 6 2022 $
2424.Dt KEYNOTE 4
2525.\" .TH KeyNote 4 local
2626.Os
···374374.Sh QUERY SEMANTICS
375375The discussion in the following sections assume some familiarity with
376376assertion syntax.
377377-Please refer to
377377+Refer to
378378.Xr keynote 5
379379for more details on the syntax.
380380.Sh QUERY PARAMETERS
+3-3
lib/libpthread/man/pthreads.3
···11-.\" $OpenBSD: pthreads.3,v 1.43 2019/02/04 18:06:32 jmc Exp $
11+.\" $OpenBSD: pthreads.3,v 1.44 2022/02/06 00:29:02 jsg Exp $
22.\" David Leonard <d@openbsd.org>, 1998. Public domain.
33-.Dd $Mdocdate: February 4 2019 $
33+.Dd $Mdocdate: February 6 2022 $
44.Dt PTHREADS 3
55.Os
66.Sh NAME
···463463.St -p1003.1-96
464464and various later versions of
465465.Pq Dq Tn POSIX .
466466-Please consult the manpages for the individual functions for details.
466466+Consult the manpages for the individual functions for details.
467467.Sh HISTORY
468468This 1-to-1 implementation of the
469469.Nm
···11-.\" $OpenBSD: SSL_get_ex_data_X509_STORE_CTX_idx.3,v 1.4 2019/06/08 15:25:43 schwarze Exp $
11+.\" $OpenBSD: SSL_get_ex_data_X509_STORE_CTX_idx.3,v 1.5 2022/02/06 00:29:02 jsg Exp $
22.\" OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400
33.\"
44.\" This file was written by Lutz Jaenicke <jaenicke@openssl.org>.
···4848.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
4949.\" OF THE POSSIBILITY OF SUCH DAMAGE.
5050.\"
5151-.Dd $Mdocdate: June 8 2019 $
5151+.Dd $Mdocdate: February 6 2022 $
5252.Dt SSL_GET_EX_DATA_X509_STORE_CTX_IDX 3
5353.Os
5454.Sh NAME
···104104object for the connection during the
105105.Fn verify_callback
106106when checking the peer's certificate.
107107-Please check the example in
107107+Check the example in
108108.Xr SSL_CTX_set_verify 3 .
109109.Sh SEE ALSO
110110.Xr CRYPTO_set_ex_data 3 ,
+8-9
sbin/iked/iked.conf.5
···11-.\" $OpenBSD: iked.conf.5,v 1.91 2021/11/13 20:56:51 tobhe Exp $
11+.\" $OpenBSD: iked.conf.5,v 1.92 2022/02/06 00:29:02 jsg Exp $
22.\"
33.\" Copyright (c) 2010 - 2014 Reyk Floeter <reyk@openbsd.org>
44.\" Copyright (c) 2004 Mathieu Sauve-Frankel All rights reserved.
···1515.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1616.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
1717.\"
1818-.Dd $Mdocdate: November 13 2021 $
1818+.Dd $Mdocdate: February 6 2022 $
1919.Dt IKED.CONF 5
2020.Os
2121.Sh NAME
···197197This fallback will be used if the trusted CA from
198198.Pa /etc/iked/ca/
199199does not have an OCSP-URL extension.
200200-Please note that the matching responder certificates
201201-have to be placed in
200200+The matching responder certificates have to be placed in
202201.Pa /etc/iked/ocsp/responder.crt .
203202.Pp
204203The optional
···231230and
232231.Ar password
233232arguments.
234234-Note that the password has to be specified in plain text which is
233233+The password has to be specified in plain text which is
235234required to support different challenge-based EAP methods like
236235EAP-MD5 or EAP-MSCHAPv2.
237236.El
···255254to use the
256255.Ar default
257256policy, if set.
258258-Please also see the
257257+See the
259258.Sx EXAMPLES
260259section for a detailed example of the policy evaluation.
261260.Pp
···360359.Ar inet
361360or
362361.Ar inet6 .
363363-Note that this only matters for IKEv2 endpoints and does not
362362+This only matters for IKEv2 endpoints and does not
364363restrict the traffic selectors to negotiate flows with different
365364address families, e.g. IPv6 flows negotiated by IPv4 endpoints.
366365.Pp
···626625.Ql G
627626for kilo-, mega- and gigabytes accordingly.
628627.Pp
629629-Please note that rekeying must happen at least several times a day as
628628+Rekeying must happen at least several times a day as
630629IPsec security heavily depends on frequent key renewals.
631630.Pp
632631.It Op Ar ikeauth
···10281027MODP (exponentiation groups modulo a prime),
10291028ECP (elliptic curve groups modulo a prime),
10301029or Curve25519.
10311031-Please note that MODP groups of less than 2048 bits are considered
10301030+MODP groups of less than 2048 bits are considered
10321031as weak or insecure (see RFC 8247 section 2.4) and only provided for
10331032backwards compatibility.
10341033.Sh FILES
+3-3
sbin/isakmpd/isakmpd.conf.5
···11-.\" $OpenBSD: isakmpd.conf.5,v 1.136 2021/11/03 05:59:25 yasuoka Exp $
11+.\" $OpenBSD: isakmpd.conf.5,v 1.137 2022/02/06 00:29:02 jsg Exp $
22.\" $EOM: isakmpd.conf.5,v 1.57 2000/12/21 14:43:17 ho Exp $
33.\"
44.\" Copyright (c) 1998, 1999, 2000 Niklas Hallqvist. All rights reserved.
···2828.\"
2929.\" Manual page, using -mandoc macros
3030.\"
3131-.Dd $Mdocdate: November 3 2021 $
3131+.Dd $Mdocdate: February 6 2022 $
3232.Dt ISAKMPD.CONF 5
3333.Os
3434.Sh NAME
···13721372.Xr isakmpd 8
13731373.Sh CAVEATS
13741374Using aggressive mode is discouraged due to various design problems.
13751375-If your peer only supports aggressive mode, please consider replacing that
13751375+If your peer only supports aggressive mode, consider replacing that
13761376peer with a sane ISAKMP/IKE implementation.
13771377For details see
13781378.Lk http://www.usenix.org/publications/login/1999-12/features/harmful.html .
+3-3
sbin/isakmpd/isakmpd.policy.5
···11-.\" $OpenBSD: isakmpd.policy.5,v 1.50 2021/10/22 16:41:47 jmc Exp $
11+.\" $OpenBSD: isakmpd.policy.5,v 1.51 2022/02/06 00:29:02 jsg Exp $
22.\" $EOM: isakmpd.policy.5,v 1.24 2000/11/23 12:55:25 niklas Exp $
33.\"
44.\" Copyright (c) 1999-2001, Angelos D. Keromytis. All rights reserved.
···2626.\"
2727.\" Manual page, using -mandoc macros
2828.\"
2929-.Dd $Mdocdate: October 22 2021 $
2929+.Dd $Mdocdate: February 6 2022 $
3030.Dt ISAKMPD.POLICY 5
3131.Os
3232.Sh NAME
···143143was already established when the new policies were loaded).
144144The policy change will not affect already established Phase 2 SAs.
145145.Pp
146146-For more details on KeyNote assertion format, please see
146146+For more details on KeyNote assertion format, see
147147.Xr keynote 5 .
148148Briefly, KeyNote policy assertions used in IKE have the following
149149characteristics:
+3-3
sbin/wsconsctl/wsconsctl.8
···11-.\" $OpenBSD: wsconsctl.8,v 1.25 2017/05/27 10:25:44 fcambus Exp $
11+.\" $OpenBSD: wsconsctl.8,v 1.26 2022/02/06 00:29:02 jsg Exp $
22.\" $NetBSD: wsconsctl.8,v 1.5 1999/09/12 18:47:11 kleink Exp $
33.\"
44.\" Copyright (c) 1998 The NetBSD Foundation, Inc.
···2828.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
2929.\" POSSIBILITY OF SUCH DAMAGE.
3030.\"/
3131-.Dd $Mdocdate: May 27 2017 $
3131+.Dd $Mdocdate: February 6 2022 $
3232.Dt WSCONSCTL 8
3333.Os
3434.Sh NAME
···134134key is pressed, the same encoding sequence as
135135.Ar Left Control
136136is sent.
137137-For a full list of keysyms, and keycodes, please refer
137137+For a full list of keysyms, and keycodes, refer
138138to the
139139.Ar /usr/include/dev/wscons/wsksymdef.h
140140file.
+3-3
share/man/man1/dpb.1
···11-.\" $OpenBSD: dpb.1,v 1.24 2021/05/03 07:48:16 espie Exp $
11+.\" $OpenBSD: dpb.1,v 1.25 2022/02/06 00:29:02 jsg Exp $
22.\"
33.\" Copyright (c) 2010-2013 Marc Espie <espie@openbsd.org>
44.\"
···1414.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1515.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
1616.\"
1717-.Dd $Mdocdate: May 3 2021 $
1717+.Dd $Mdocdate: February 6 2022 $
1818.Dt DPB 1
1919.Os
2020.Sh NAME
···14081408contains no other buildable path.
14091409.El
14101410.Pp
14111411-Please note that the engine is no longer run after each package build event
14111411+The engine is no longer run after each package build event
14121412because of performance considerations, so the
14131413.Sq Q
14141414and
+3-3
share/man/man4/carp.4
···11-.\" $OpenBSD: carp.4,v 1.40 2018/01/12 04:36:44 deraadt Exp $
11+.\" $OpenBSD: carp.4,v 1.41 2022/02/06 00:29:02 jsg Exp $
22.\"
33.\" Copyright (c) 2003, Ryan McBride. All rights reserved.
44.\"
···2323.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
2424.\" SUCH DAMAGE.
2525.\"
2626-.Dd $Mdocdate: January 12 2018 $
2626+.Dd $Mdocdate: February 6 2022 $
2727.Dt CARP 4
2828.Os
2929.Sh NAME
···186186never sends packets with its virtual MAC address as source.
187187Stealth mode prevents a switch from learning the virtual MAC
188188address, so that it has to flood the traffic to all its ports.
189189-Please note that activating stealth mode on a
189189+Activating stealth mode on a
190190.Nm
191191interface that has already been running might not work instantly.
192192As a workaround the VHID of the first carpnode can be changed to a
+3-3
share/man/man4/ix.4
···11-.\" $OpenBSD: ix.4,v 1.9 2021/09/07 19:35:41 benno Exp $
11+.\" $OpenBSD: ix.4,v 1.10 2022/02/06 00:29:02 jsg Exp $
22.\"
33.\" Copyright (c) 2008 Reyk Floeter <reyk@openbsd.org>
44.\"
···1414.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1515.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
1616.\"
1717-.Dd $Mdocdate: September 7 2021 $
1717+.Dd $Mdocdate: February 6 2022 $
1818.Dt IX 4
1919.Os
2020.Sh NAME
···7373SFP+ adapters generally also support SFP type modules with their
7474associated 1000base-* media types.
7575.Pp
7676-Please note that the networking interface should be brought down before
7676+The networking interface should be brought down before
7777disconnecting fiber optics, otherwise irreversible damage might be caused
7878to the equipment.
7979.Sh SEE ALSO
+3-3
share/man/man4/man4.i386/pcibios.4
···11-.\" $OpenBSD: pcibios.4,v 1.23 2008/07/01 04:14:57 ray Exp $
11+.\" $OpenBSD: pcibios.4,v 1.24 2022/02/06 00:29:02 jsg Exp $
22.\" $NetBSD: pcibios.4,v 1.7 2000/08/03 13:32:39 soda Exp $
33.\"
44.\" Copyright (c) 2000 Michael Shalayeff, All rights reserved.
···2929.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
3030.\" POSSIBILITY OF SUCH DAMAGE.
3131.\"
3232-.Dd $Mdocdate: July 1 2008 $
3232+.Dd $Mdocdate: February 6 2022 $
3333.Dt PCIBIOS 4 i386
3434.Os
3535.Sh NAME
···9090.Pp
9191A typical symptom of this is the following boot message:
9292.D1 Sy cardbus0 at cardslot0: bus 0 device 0...
9393-Please note that this cardbus0 has a bus number
9393+This cardbus0 has a bus number
9494.Sq 0 ,
9595but normally the bus number 0 is used by the machine's
9696primary PCI bus.
+3-3
share/man/man4/tty.4
···11-.\" $OpenBSD: tty.4,v 1.53 2019/09/07 10:28:27 schwarze Exp $
11+.\" $OpenBSD: tty.4,v 1.54 2022/02/06 00:29:02 jsg Exp $
22.\" $NetBSD: tty.4,v 1.4 1996/03/19 04:26:01 paulus Exp $
33.\"
44.\" Copyright (c) 1991, 1992, 1993
···3030.\"
3131.\" @(#)tty.4 8.3 (Berkeley) 4/19/94
3232.\"
3333-.Dd $Mdocdate: September 7 2019 $
3333+.Dd $Mdocdate: February 6 2022 $
3434.Dt TTY 4
3535.Os
3636.Sh NAME
···148148line discipline is in effect, the terminal file behaves and is
149149operated according to the rules described in
150150.Xr termios 4 .
151151-Please refer to that man page for a full description of the terminal
151151+Refer to that man page for a full description of the terminal
152152semantics.
153153The operations described here
154154generally represent features common
+3-3
share/man/man7/script.7
···11-.\" $OpenBSD: script.7,v 1.8 2019/08/11 15:48:08 deraadt Exp $
11+.\" $OpenBSD: script.7,v 1.9 2022/02/06 00:29:02 jsg Exp $
22.\"
33.\" $NetBSD: script.7,v 1.1 2005/05/07 02:20:34 perry Exp $
44.\"
···2929.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
3030.\" POSSIBILITY OF SUCH DAMAGE.
3131.\"
3232-.Dd $Mdocdate: August 11 2019 $
3232+.Dd $Mdocdate: February 6 2022 $
3333.Dt SCRIPT 7
3434.Os
3535.Sh NAME
···337337style systems, with two significant exceptions: the maximum length of the
338338.Sq #!
339339line, and the behavior if multiple arguments are passed.
340340-Please be aware that the behavior in the
340340+Be aware that the behavior in the
341341face of multiple arguments is not consistent across systems.
342342.Sh HISTORY
343343The behavior of the kernel when encountering scripts that start in
+3-3
share/man/man9/bus_space.9
···11-.\" $OpenBSD: bus_space.9,v 1.31 2015/09/10 15:59:18 schwarze Exp $
11+.\" $OpenBSD: bus_space.9,v 1.32 2022/02/06 00:29:03 jsg Exp $
22.\" $NetBSD: bus_space.9,v 1.15 2000/08/09 03:11:00 tv Exp $
33.\"
44.\" Copyright (c) 1997 The NetBSD Foundation, Inc.
···2828.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
2929.\" POSSIBILITY OF SUCH DAMAGE.
3030.\"
3131-.Dd $Mdocdate: September 10 2015 $
3131+.Dd $Mdocdate: February 6 2022 $
3232.Dt BUS_SPACE 9
3333.Os
3434.Sh NAME
···14711471.Pp
14721472In all other respects these functions are the same as their non-raw
14731473counterparts.
14741474-Please consult the documentation for those functions for further
14741474+Consult the documentation for those functions for further
14751475information.
14761476.Sh SEE ALSO
14771477.Xr bus_dma 9
+3-3
usr.bin/mandoc/mandoc.1
···11-.\" $OpenBSD: mandoc.1,v 1.179 2021/08/14 13:51:46 schwarze Exp $
11+.\" $OpenBSD: mandoc.1,v 1.180 2022/02/06 00:29:03 jsg Exp $
22.\"
33.\" Copyright (c) 2012, 2014-2021 Ingo Schwarze <schwarze@openbsd.org>
44.\" Copyright (c) 2009, 2010, 2011 Kristaps Dzonsons <kristaps@bsd.lv>
···1515.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1616.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
1717.\"
1818-.Dd $Mdocdate: August 14 2021 $
1818+.Dd $Mdocdate: February 6 2022 $
1919.Dt MANDOC 1
2020.Os
2121.Sh NAME
···835835.Cm style
836836level tries to reduce the probability that issues go unnoticed,
837837so it may occasionally issue bogus suggestions.
838838-Please use your good judgement to decide whether any particular
838838+Use your judgement to decide whether any particular
839839.Cm style
840840suggestion really justifies a change to the input file.
841841.It Cm base
+3-3
usr.bin/skeyinit/skeyinit.1
···11-.\" $OpenBSD: skeyinit.1,v 1.41 2015/10/09 21:59:34 tim Exp $
11+.\" $OpenBSD: skeyinit.1,v 1.42 2022/02/06 00:29:03 jsg Exp $
22.\" $NetBSD: skeyinit.1,v 1.4 1995/07/07 22:24:09 jtc Exp $
33.\" @(#)skeyinit.1 1.1 10/28/93
44.\"
55-.Dd $Mdocdate: October 9 2015 $
55+.Dd $Mdocdate: February 6 2022 $
66.Dt SKEYINIT 1
77.Os
88.Sh NAME
···118118.Fl a
119119option
120120(see above).
121121-Please note that entering a password or passphrase in plain text
121121+Entering a password or passphrase in plain text
122122defeats the purpose of using
123123.Dq secure
124124mode.
+8-8
usr.bin/ssh/ssh-keygen.1
···11-.\" $OpenBSD: ssh-keygen.1,v 1.219 2022/01/05 04:50:11 djm Exp $
11+.\" $OpenBSD: ssh-keygen.1,v 1.220 2022/02/06 00:29:03 jsg Exp $
22.\"
33.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
44.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
···3535.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
3636.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
3737.\"
3838-.Dd $Mdocdate: January 5 2022 $
3838+.Dd $Mdocdate: February 6 2022 $
3939.Dt SSH-KEYGEN 1
4040.Os
4141.Sh NAME
···372372.It Fl h
373373When signing a key, create a host certificate instead of a user
374374certificate.
375375-Please see the
375375+See the
376376.Sx CERTIFICATES
377377section for details.
378378.It Fl I Ar certificate_identity
379379Specify the key identity when signing a public key.
380380-Please see the
380380+See the
381381.Sx CERTIFICATES
382382section for details.
383383.It Fl i
···469469Specify one or more principals (user or host names) to be included in
470470a certificate when signing a key.
471471Multiple principals may be specified, separated by commas.
472472-Please see the
472472+See the
473473.Sx CERTIFICATES
474474section for details.
475475.It Fl O Ar option
···534534.It Cm write-attestation Ns = Ns Ar path
535535May be used at key generation time to record the attestation data
536536returned from FIDO tokens during key generation.
537537-Please note that this information is potentially sensitive.
537537+This information is potentially sensitive.
538538By default, this information is discarded.
539539.El
540540.Pp
···594594for the specified public key file.
595595.It Fl s Ar ca_key
596596Certify (sign) a public key using the specified CA key.
597597-Please see the
597597+See the
598598.Sx CERTIFICATES
599599section for details.
600600.Pp
···10591059.Xr sshd 8
10601060or
10611061.Xr ssh 1 .
10621062-Please refer to those manual pages for details.
10621062+Refer to those manual pages for details.
10631063.Sh KEY REVOCATION LISTS
10641064.Nm
10651065is able to manage OpenSSH format Key Revocation Lists (KRLs).
+3-3
usr.bin/ssh/ssh.1
···3333.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
3434.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
3535.\"
3636-.\" $OpenBSD: ssh.1,v 1.428 2022/02/04 02:49:17 dtucker Exp $
3737-.Dd $Mdocdate: February 4 2022 $
3636+.\" $OpenBSD: ssh.1,v 1.429 2022/02/06 00:29:03 jsg Exp $
3737+.Dd $Mdocdate: February 6 2022 $
3838.Dt SSH 1
3939.Os
4040.Sh NAME
···825825.Pp
826826For this reason, X11 forwarding is subjected to X11 SECURITY extension
827827restrictions by default.
828828-Please refer to the
828828+Refer to the
829829.Nm
830830.Fl Y
831831option and the
+3-3
usr.sbin/relayd/relayd.conf.5
···11-.\" $OpenBSD: relayd.conf.5,v 1.203 2021/01/09 08:53:58 denis Exp $
11+.\" $OpenBSD: relayd.conf.5,v 1.204 2022/02/06 00:29:03 jsg Exp $
22.\"
33.\" Copyright (c) 2006 - 2016 Reyk Floeter <reyk@openbsd.org>
44.\" Copyright (c) 2006, 2007 Pierre-Yves Ritschard <pyr@openbsd.org>
···1515.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1616.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
1717.\"
1818-.Dd $Mdocdate: January 9 2021 $
1818+.Dd $Mdocdate: February 6 2022 $
1919.Dt RELAYD.CONF 5
2020.Os
2121.Sh NAME
···179179This can be overridden by the timeout value in the table definitions.
180180The default timeout is 200 milliseconds and it must not exceed the
181181global interval.
182182-Please note that the default value is optimized for checks within the
182182+The default value is optimized for checks within the
183183same collision domain \(en use a higher timeout, such as 1000 milliseconds,
184184for checks of hosts in other subnets.
185185If this option is to be set, it should be placed before overrides in tables.
+3-3
usr.sbin/user/group.8
···11-.\" $OpenBSD: group.8,v 1.17 2016/11/29 03:59:31 jsg Exp $
11+.\" $OpenBSD: group.8,v 1.18 2022/02/06 00:29:03 jsg Exp $
22.\" $NetBSD: group.8,v 1.10 2003/02/25 10:36:21 wiz Exp $
33.\"
44.\" Copyright (c) 1999 Alistair G. Crooks. All rights reserved.
···2828.\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
2929.\"
3030.\"
3131-.Dd $Mdocdate: November 29 2016 $
3131+.Dd $Mdocdate: February 6 2022 $
3232.Dt GROUP 8
3333.Os
3434.Sh NAME
···6565.Xr groupdel 8
6666commands.
6767.Pp
6868-For a full explanation of the options, please see the relevant manual page.
6868+For a full explanation of the options, see the relevant manual page.
6969.Sh EXIT STATUS
7070.Ex -std group
7171.Sh SEE ALSO
+3-3
usr.sbin/user/user.8
···11-.\" $OpenBSD: user.8,v 1.23 2016/11/29 03:59:31 jsg Exp $
11+.\" $OpenBSD: user.8,v 1.24 2022/02/06 00:29:03 jsg Exp $
22.\" $NetBSD: user.8,v 1.9 2001/06/05 11:31:21 wiz Exp $
33.\"
44.\" Copyright (c) 1999 Alistair G. Crooks. All rights reserved.
···2828.\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
2929.\"
3030.\"
3131-.Dd $Mdocdate: November 29 2016 $
3131+.Dd $Mdocdate: February 6 2022 $
3232.Dt USER 8
3333.Os
3434.Sh NAME
···101101.Xr userdel 8
102102commands.
103103.Pp
104104-For a full explanation of the options, please see the relevant manual page.
104104+For a full explanation of the options, see the relevant manual page.
105105.Sh FILES
106106.Bl -tag -width /etc/usermgmt.conf -compact
107107.It Pa /etc/skel/.[A-z]*