jcs's openbsd hax
openbsd

remove please from manual pages ok jmc@ sthen@ millert@

jsg a4e61cf2 4f2e04b4

+79 -80
+3 -3
lib/libc/stdlib/atexit.3
··· 29 29 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30 30 .\" SUCH DAMAGE. 31 31 .\" 32 - .\" $OpenBSD: atexit.3,v 1.12 2019/06/27 16:30:39 schwarze Exp $ 32 + .\" $OpenBSD: atexit.3,v 1.13 2022/02/06 00:29:02 jsg Exp $ 33 33 .\" 34 - .Dd $Mdocdate: June 27 2019 $ 34 + .Dd $Mdocdate: February 6 2022 $ 35 35 .Dt ATEXIT 3 36 36 .Os 37 37 .Sh NAME ··· 68 68 is very difficult to use correctly without creating 69 69 .Xr exit 3 Ns -time 70 70 races. 71 - Unless absolutely necessary, please avoid using it. 71 + Unless absolutely necessary, avoid using it. 72 72 .Sh RETURN VALUES 73 73 The 74 74 .Nm
+3 -3
lib/libc/sys/getentropy.2
··· 1 - .\" $OpenBSD: getentropy.2,v 1.9 2019/09/28 14:55:12 deraadt Exp $ 1 + .\" $OpenBSD: getentropy.2,v 1.10 2022/02/06 00:29:02 jsg Exp $ 2 2 .\" 3 3 .\" Copyright (c) 2014 Theo de Raadt 4 4 .\" ··· 14 14 .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 15 15 .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 16 16 .\" 17 - .Dd $Mdocdate: September 28 2019 $ 17 + .Dd $Mdocdate: February 6 2022 $ 18 18 .Dt GETENTROPY 2 19 19 .Os 20 20 .Sh NAME ··· 33 33 The maximum buffer size permitted is 256 bytes. 34 34 .Pp 35 35 .Fn getentropy 36 - is not intended for regular code; please use the 36 + is not intended for regular code; use the 37 37 .Xr arc4random 3 38 38 family of functions instead. 39 39 .Pp
+3 -3
lib/libkeynote/keynote.4
··· 1 - .\" $OpenBSD: keynote.4,v 1.37 2021/06/12 06:39:17 jmc Exp $ 1 + .\" $OpenBSD: keynote.4,v 1.38 2022/02/06 00:29:02 jsg Exp $ 2 2 .\" 3 3 .\" The author of this code is Angelos D. Keromytis (angelos@dsl.cis.upenn.edu) 4 4 .\" ··· 20 20 .\" MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR 21 21 .\" PURPOSE. 22 22 .\" 23 - .Dd $Mdocdate: June 12 2021 $ 23 + .Dd $Mdocdate: February 6 2022 $ 24 24 .Dt KEYNOTE 4 25 25 .\" .TH KeyNote 4 local 26 26 .Os ··· 374 374 .Sh QUERY SEMANTICS 375 375 The discussion in the following sections assume some familiarity with 376 376 assertion syntax. 377 - Please refer to 377 + Refer to 378 378 .Xr keynote 5 379 379 for more details on the syntax. 380 380 .Sh QUERY PARAMETERS
+3 -3
lib/libpthread/man/pthreads.3
··· 1 - .\" $OpenBSD: pthreads.3,v 1.43 2019/02/04 18:06:32 jmc Exp $ 1 + .\" $OpenBSD: pthreads.3,v 1.44 2022/02/06 00:29:02 jsg Exp $ 2 2 .\" David Leonard <d@openbsd.org>, 1998. Public domain. 3 - .Dd $Mdocdate: February 4 2019 $ 3 + .Dd $Mdocdate: February 6 2022 $ 4 4 .Dt PTHREADS 3 5 5 .Os 6 6 .Sh NAME ··· 463 463 .St -p1003.1-96 464 464 and various later versions of 465 465 .Pq Dq Tn POSIX . 466 - Please consult the manpages for the individual functions for details. 466 + Consult the manpages for the individual functions for details. 467 467 .Sh HISTORY 468 468 This 1-to-1 implementation of the 469 469 .Nm
+3 -3
lib/libssl/man/SSL_get_ex_data_X509_STORE_CTX_idx.3
··· 1 - .\" $OpenBSD: SSL_get_ex_data_X509_STORE_CTX_idx.3,v 1.4 2019/06/08 15:25:43 schwarze Exp $ 1 + .\" $OpenBSD: SSL_get_ex_data_X509_STORE_CTX_idx.3,v 1.5 2022/02/06 00:29:02 jsg Exp $ 2 2 .\" OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400 3 3 .\" 4 4 .\" This file was written by Lutz Jaenicke <jaenicke@openssl.org>. ··· 48 48 .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 49 49 .\" OF THE POSSIBILITY OF SUCH DAMAGE. 50 50 .\" 51 - .Dd $Mdocdate: June 8 2019 $ 51 + .Dd $Mdocdate: February 6 2022 $ 52 52 .Dt SSL_GET_EX_DATA_X509_STORE_CTX_IDX 3 53 53 .Os 54 54 .Sh NAME ··· 104 104 object for the connection during the 105 105 .Fn verify_callback 106 106 when checking the peer's certificate. 107 - Please check the example in 107 + Check the example in 108 108 .Xr SSL_CTX_set_verify 3 . 109 109 .Sh SEE ALSO 110 110 .Xr CRYPTO_set_ex_data 3 ,
+8 -9
sbin/iked/iked.conf.5
··· 1 - .\" $OpenBSD: iked.conf.5,v 1.91 2021/11/13 20:56:51 tobhe Exp $ 1 + .\" $OpenBSD: iked.conf.5,v 1.92 2022/02/06 00:29:02 jsg Exp $ 2 2 .\" 3 3 .\" Copyright (c) 2010 - 2014 Reyk Floeter <reyk@openbsd.org> 4 4 .\" Copyright (c) 2004 Mathieu Sauve-Frankel All rights reserved. ··· 15 15 .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 16 16 .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 17 17 .\" 18 - .Dd $Mdocdate: November 13 2021 $ 18 + .Dd $Mdocdate: February 6 2022 $ 19 19 .Dt IKED.CONF 5 20 20 .Os 21 21 .Sh NAME ··· 197 197 This fallback will be used if the trusted CA from 198 198 .Pa /etc/iked/ca/ 199 199 does not have an OCSP-URL extension. 200 - Please note that the matching responder certificates 201 - have to be placed in 200 + The matching responder certificates have to be placed in 202 201 .Pa /etc/iked/ocsp/responder.crt . 203 202 .Pp 204 203 The optional ··· 231 230 and 232 231 .Ar password 233 232 arguments. 234 - Note that the password has to be specified in plain text which is 233 + The password has to be specified in plain text which is 235 234 required to support different challenge-based EAP methods like 236 235 EAP-MD5 or EAP-MSCHAPv2. 237 236 .El ··· 255 254 to use the 256 255 .Ar default 257 256 policy, if set. 258 - Please also see the 257 + See the 259 258 .Sx EXAMPLES 260 259 section for a detailed example of the policy evaluation. 261 260 .Pp ··· 360 359 .Ar inet 361 360 or 362 361 .Ar inet6 . 363 - Note that this only matters for IKEv2 endpoints and does not 362 + This only matters for IKEv2 endpoints and does not 364 363 restrict the traffic selectors to negotiate flows with different 365 364 address families, e.g. IPv6 flows negotiated by IPv4 endpoints. 366 365 .Pp ··· 626 625 .Ql G 627 626 for kilo-, mega- and gigabytes accordingly. 628 627 .Pp 629 - Please note that rekeying must happen at least several times a day as 628 + Rekeying must happen at least several times a day as 630 629 IPsec security heavily depends on frequent key renewals. 631 630 .Pp 632 631 .It Op Ar ikeauth ··· 1028 1027 MODP (exponentiation groups modulo a prime), 1029 1028 ECP (elliptic curve groups modulo a prime), 1030 1029 or Curve25519. 1031 - Please note that MODP groups of less than 2048 bits are considered 1030 + MODP groups of less than 2048 bits are considered 1032 1031 as weak or insecure (see RFC 8247 section 2.4) and only provided for 1033 1032 backwards compatibility. 1034 1033 .Sh FILES
+3 -3
sbin/isakmpd/isakmpd.conf.5
··· 1 - .\" $OpenBSD: isakmpd.conf.5,v 1.136 2021/11/03 05:59:25 yasuoka Exp $ 1 + .\" $OpenBSD: isakmpd.conf.5,v 1.137 2022/02/06 00:29:02 jsg Exp $ 2 2 .\" $EOM: isakmpd.conf.5,v 1.57 2000/12/21 14:43:17 ho Exp $ 3 3 .\" 4 4 .\" Copyright (c) 1998, 1999, 2000 Niklas Hallqvist. All rights reserved. ··· 28 28 .\" 29 29 .\" Manual page, using -mandoc macros 30 30 .\" 31 - .Dd $Mdocdate: November 3 2021 $ 31 + .Dd $Mdocdate: February 6 2022 $ 32 32 .Dt ISAKMPD.CONF 5 33 33 .Os 34 34 .Sh NAME ··· 1372 1372 .Xr isakmpd 8 1373 1373 .Sh CAVEATS 1374 1374 Using aggressive mode is discouraged due to various design problems. 1375 - If your peer only supports aggressive mode, please consider replacing that 1375 + If your peer only supports aggressive mode, consider replacing that 1376 1376 peer with a sane ISAKMP/IKE implementation. 1377 1377 For details see 1378 1378 .Lk http://www.usenix.org/publications/login/1999-12/features/harmful.html .
+3 -3
sbin/isakmpd/isakmpd.policy.5
··· 1 - .\" $OpenBSD: isakmpd.policy.5,v 1.50 2021/10/22 16:41:47 jmc Exp $ 1 + .\" $OpenBSD: isakmpd.policy.5,v 1.51 2022/02/06 00:29:02 jsg Exp $ 2 2 .\" $EOM: isakmpd.policy.5,v 1.24 2000/11/23 12:55:25 niklas Exp $ 3 3 .\" 4 4 .\" Copyright (c) 1999-2001, Angelos D. Keromytis. All rights reserved. ··· 26 26 .\" 27 27 .\" Manual page, using -mandoc macros 28 28 .\" 29 - .Dd $Mdocdate: October 22 2021 $ 29 + .Dd $Mdocdate: February 6 2022 $ 30 30 .Dt ISAKMPD.POLICY 5 31 31 .Os 32 32 .Sh NAME ··· 143 143 was already established when the new policies were loaded). 144 144 The policy change will not affect already established Phase 2 SAs. 145 145 .Pp 146 - For more details on KeyNote assertion format, please see 146 + For more details on KeyNote assertion format, see 147 147 .Xr keynote 5 . 148 148 Briefly, KeyNote policy assertions used in IKE have the following 149 149 characteristics:
+3 -3
sbin/wsconsctl/wsconsctl.8
··· 1 - .\" $OpenBSD: wsconsctl.8,v 1.25 2017/05/27 10:25:44 fcambus Exp $ 1 + .\" $OpenBSD: wsconsctl.8,v 1.26 2022/02/06 00:29:02 jsg Exp $ 2 2 .\" $NetBSD: wsconsctl.8,v 1.5 1999/09/12 18:47:11 kleink Exp $ 3 3 .\" 4 4 .\" Copyright (c) 1998 The NetBSD Foundation, Inc. ··· 28 28 .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 29 29 .\" POSSIBILITY OF SUCH DAMAGE. 30 30 .\"/ 31 - .Dd $Mdocdate: May 27 2017 $ 31 + .Dd $Mdocdate: February 6 2022 $ 32 32 .Dt WSCONSCTL 8 33 33 .Os 34 34 .Sh NAME ··· 134 134 key is pressed, the same encoding sequence as 135 135 .Ar Left Control 136 136 is sent. 137 - For a full list of keysyms, and keycodes, please refer 137 + For a full list of keysyms, and keycodes, refer 138 138 to the 139 139 .Ar /usr/include/dev/wscons/wsksymdef.h 140 140 file.
+3 -3
share/man/man1/dpb.1
··· 1 - .\" $OpenBSD: dpb.1,v 1.24 2021/05/03 07:48:16 espie Exp $ 1 + .\" $OpenBSD: dpb.1,v 1.25 2022/02/06 00:29:02 jsg Exp $ 2 2 .\" 3 3 .\" Copyright (c) 2010-2013 Marc Espie <espie@openbsd.org> 4 4 .\" ··· 14 14 .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 15 15 .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 16 16 .\" 17 - .Dd $Mdocdate: May 3 2021 $ 17 + .Dd $Mdocdate: February 6 2022 $ 18 18 .Dt DPB 1 19 19 .Os 20 20 .Sh NAME ··· 1408 1408 contains no other buildable path. 1409 1409 .El 1410 1410 .Pp 1411 - Please note that the engine is no longer run after each package build event 1411 + The engine is no longer run after each package build event 1412 1412 because of performance considerations, so the 1413 1413 .Sq Q 1414 1414 and
+3 -3
share/man/man4/carp.4
··· 1 - .\" $OpenBSD: carp.4,v 1.40 2018/01/12 04:36:44 deraadt Exp $ 1 + .\" $OpenBSD: carp.4,v 1.41 2022/02/06 00:29:02 jsg Exp $ 2 2 .\" 3 3 .\" Copyright (c) 2003, Ryan McBride. All rights reserved. 4 4 .\" ··· 23 23 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 24 24 .\" SUCH DAMAGE. 25 25 .\" 26 - .Dd $Mdocdate: January 12 2018 $ 26 + .Dd $Mdocdate: February 6 2022 $ 27 27 .Dt CARP 4 28 28 .Os 29 29 .Sh NAME ··· 186 186 never sends packets with its virtual MAC address as source. 187 187 Stealth mode prevents a switch from learning the virtual MAC 188 188 address, so that it has to flood the traffic to all its ports. 189 - Please note that activating stealth mode on a 189 + Activating stealth mode on a 190 190 .Nm 191 191 interface that has already been running might not work instantly. 192 192 As a workaround the VHID of the first carpnode can be changed to a
+3 -3
share/man/man4/ix.4
··· 1 - .\" $OpenBSD: ix.4,v 1.9 2021/09/07 19:35:41 benno Exp $ 1 + .\" $OpenBSD: ix.4,v 1.10 2022/02/06 00:29:02 jsg Exp $ 2 2 .\" 3 3 .\" Copyright (c) 2008 Reyk Floeter <reyk@openbsd.org> 4 4 .\" ··· 14 14 .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 15 15 .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 16 16 .\" 17 - .Dd $Mdocdate: September 7 2021 $ 17 + .Dd $Mdocdate: February 6 2022 $ 18 18 .Dt IX 4 19 19 .Os 20 20 .Sh NAME ··· 73 73 SFP+ adapters generally also support SFP type modules with their 74 74 associated 1000base-* media types. 75 75 .Pp 76 - Please note that the networking interface should be brought down before 76 + The networking interface should be brought down before 77 77 disconnecting fiber optics, otherwise irreversible damage might be caused 78 78 to the equipment. 79 79 .Sh SEE ALSO
+3 -3
share/man/man4/man4.i386/pcibios.4
··· 1 - .\" $OpenBSD: pcibios.4,v 1.23 2008/07/01 04:14:57 ray Exp $ 1 + .\" $OpenBSD: pcibios.4,v 1.24 2022/02/06 00:29:02 jsg Exp $ 2 2 .\" $NetBSD: pcibios.4,v 1.7 2000/08/03 13:32:39 soda Exp $ 3 3 .\" 4 4 .\" Copyright (c) 2000 Michael Shalayeff, All rights reserved. ··· 29 29 .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 30 30 .\" POSSIBILITY OF SUCH DAMAGE. 31 31 .\" 32 - .Dd $Mdocdate: July 1 2008 $ 32 + .Dd $Mdocdate: February 6 2022 $ 33 33 .Dt PCIBIOS 4 i386 34 34 .Os 35 35 .Sh NAME ··· 90 90 .Pp 91 91 A typical symptom of this is the following boot message: 92 92 .D1 Sy cardbus0 at cardslot0: bus 0 device 0... 93 - Please note that this cardbus0 has a bus number 93 + This cardbus0 has a bus number 94 94 .Sq 0 , 95 95 but normally the bus number 0 is used by the machine's 96 96 primary PCI bus.
+3 -3
share/man/man4/tty.4
··· 1 - .\" $OpenBSD: tty.4,v 1.53 2019/09/07 10:28:27 schwarze Exp $ 1 + .\" $OpenBSD: tty.4,v 1.54 2022/02/06 00:29:02 jsg Exp $ 2 2 .\" $NetBSD: tty.4,v 1.4 1996/03/19 04:26:01 paulus Exp $ 3 3 .\" 4 4 .\" Copyright (c) 1991, 1992, 1993 ··· 30 30 .\" 31 31 .\" @(#)tty.4 8.3 (Berkeley) 4/19/94 32 32 .\" 33 - .Dd $Mdocdate: September 7 2019 $ 33 + .Dd $Mdocdate: February 6 2022 $ 34 34 .Dt TTY 4 35 35 .Os 36 36 .Sh NAME ··· 148 148 line discipline is in effect, the terminal file behaves and is 149 149 operated according to the rules described in 150 150 .Xr termios 4 . 151 - Please refer to that man page for a full description of the terminal 151 + Refer to that man page for a full description of the terminal 152 152 semantics. 153 153 The operations described here 154 154 generally represent features common
+3 -3
share/man/man7/script.7
··· 1 - .\" $OpenBSD: script.7,v 1.8 2019/08/11 15:48:08 deraadt Exp $ 1 + .\" $OpenBSD: script.7,v 1.9 2022/02/06 00:29:02 jsg Exp $ 2 2 .\" 3 3 .\" $NetBSD: script.7,v 1.1 2005/05/07 02:20:34 perry Exp $ 4 4 .\" ··· 29 29 .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 30 30 .\" POSSIBILITY OF SUCH DAMAGE. 31 31 .\" 32 - .Dd $Mdocdate: August 11 2019 $ 32 + .Dd $Mdocdate: February 6 2022 $ 33 33 .Dt SCRIPT 7 34 34 .Os 35 35 .Sh NAME ··· 337 337 style systems, with two significant exceptions: the maximum length of the 338 338 .Sq #! 339 339 line, and the behavior if multiple arguments are passed. 340 - Please be aware that the behavior in the 340 + Be aware that the behavior in the 341 341 face of multiple arguments is not consistent across systems. 342 342 .Sh HISTORY 343 343 The behavior of the kernel when encountering scripts that start in
+3 -3
share/man/man9/bus_space.9
··· 1 - .\" $OpenBSD: bus_space.9,v 1.31 2015/09/10 15:59:18 schwarze Exp $ 1 + .\" $OpenBSD: bus_space.9,v 1.32 2022/02/06 00:29:03 jsg Exp $ 2 2 .\" $NetBSD: bus_space.9,v 1.15 2000/08/09 03:11:00 tv Exp $ 3 3 .\" 4 4 .\" Copyright (c) 1997 The NetBSD Foundation, Inc. ··· 28 28 .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 29 29 .\" POSSIBILITY OF SUCH DAMAGE. 30 30 .\" 31 - .Dd $Mdocdate: September 10 2015 $ 31 + .Dd $Mdocdate: February 6 2022 $ 32 32 .Dt BUS_SPACE 9 33 33 .Os 34 34 .Sh NAME ··· 1471 1471 .Pp 1472 1472 In all other respects these functions are the same as their non-raw 1473 1473 counterparts. 1474 - Please consult the documentation for those functions for further 1474 + Consult the documentation for those functions for further 1475 1475 information. 1476 1476 .Sh SEE ALSO 1477 1477 .Xr bus_dma 9
+3 -3
usr.bin/mandoc/mandoc.1
··· 1 - .\" $OpenBSD: mandoc.1,v 1.179 2021/08/14 13:51:46 schwarze Exp $ 1 + .\" $OpenBSD: mandoc.1,v 1.180 2022/02/06 00:29:03 jsg Exp $ 2 2 .\" 3 3 .\" Copyright (c) 2012, 2014-2021 Ingo Schwarze <schwarze@openbsd.org> 4 4 .\" Copyright (c) 2009, 2010, 2011 Kristaps Dzonsons <kristaps@bsd.lv> ··· 15 15 .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 16 16 .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 17 17 .\" 18 - .Dd $Mdocdate: August 14 2021 $ 18 + .Dd $Mdocdate: February 6 2022 $ 19 19 .Dt MANDOC 1 20 20 .Os 21 21 .Sh NAME ··· 835 835 .Cm style 836 836 level tries to reduce the probability that issues go unnoticed, 837 837 so it may occasionally issue bogus suggestions. 838 - Please use your good judgement to decide whether any particular 838 + Use your judgement to decide whether any particular 839 839 .Cm style 840 840 suggestion really justifies a change to the input file. 841 841 .It Cm base
+3 -3
usr.bin/skeyinit/skeyinit.1
··· 1 - .\" $OpenBSD: skeyinit.1,v 1.41 2015/10/09 21:59:34 tim Exp $ 1 + .\" $OpenBSD: skeyinit.1,v 1.42 2022/02/06 00:29:03 jsg Exp $ 2 2 .\" $NetBSD: skeyinit.1,v 1.4 1995/07/07 22:24:09 jtc Exp $ 3 3 .\" @(#)skeyinit.1 1.1 10/28/93 4 4 .\" 5 - .Dd $Mdocdate: October 9 2015 $ 5 + .Dd $Mdocdate: February 6 2022 $ 6 6 .Dt SKEYINIT 1 7 7 .Os 8 8 .Sh NAME ··· 118 118 .Fl a 119 119 option 120 120 (see above). 121 - Please note that entering a password or passphrase in plain text 121 + Entering a password or passphrase in plain text 122 122 defeats the purpose of using 123 123 .Dq secure 124 124 mode.
+8 -8
usr.bin/ssh/ssh-keygen.1
··· 1 - .\" $OpenBSD: ssh-keygen.1,v 1.219 2022/01/05 04:50:11 djm Exp $ 1 + .\" $OpenBSD: ssh-keygen.1,v 1.220 2022/02/06 00:29:03 jsg Exp $ 2 2 .\" 3 3 .\" Author: Tatu Ylonen <ylo@cs.hut.fi> 4 4 .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland ··· 35 35 .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 36 36 .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 37 37 .\" 38 - .Dd $Mdocdate: January 5 2022 $ 38 + .Dd $Mdocdate: February 6 2022 $ 39 39 .Dt SSH-KEYGEN 1 40 40 .Os 41 41 .Sh NAME ··· 372 372 .It Fl h 373 373 When signing a key, create a host certificate instead of a user 374 374 certificate. 375 - Please see the 375 + See the 376 376 .Sx CERTIFICATES 377 377 section for details. 378 378 .It Fl I Ar certificate_identity 379 379 Specify the key identity when signing a public key. 380 - Please see the 380 + See the 381 381 .Sx CERTIFICATES 382 382 section for details. 383 383 .It Fl i ··· 469 469 Specify one or more principals (user or host names) to be included in 470 470 a certificate when signing a key. 471 471 Multiple principals may be specified, separated by commas. 472 - Please see the 472 + See the 473 473 .Sx CERTIFICATES 474 474 section for details. 475 475 .It Fl O Ar option ··· 534 534 .It Cm write-attestation Ns = Ns Ar path 535 535 May be used at key generation time to record the attestation data 536 536 returned from FIDO tokens during key generation. 537 - Please note that this information is potentially sensitive. 537 + This information is potentially sensitive. 538 538 By default, this information is discarded. 539 539 .El 540 540 .Pp ··· 594 594 for the specified public key file. 595 595 .It Fl s Ar ca_key 596 596 Certify (sign) a public key using the specified CA key. 597 - Please see the 597 + See the 598 598 .Sx CERTIFICATES 599 599 section for details. 600 600 .Pp ··· 1059 1059 .Xr sshd 8 1060 1060 or 1061 1061 .Xr ssh 1 . 1062 - Please refer to those manual pages for details. 1062 + Refer to those manual pages for details. 1063 1063 .Sh KEY REVOCATION LISTS 1064 1064 .Nm 1065 1065 is able to manage OpenSSH format Key Revocation Lists (KRLs).
+3 -3
usr.bin/ssh/ssh.1
··· 33 33 .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34 34 .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35 35 .\" 36 - .\" $OpenBSD: ssh.1,v 1.428 2022/02/04 02:49:17 dtucker Exp $ 37 - .Dd $Mdocdate: February 4 2022 $ 36 + .\" $OpenBSD: ssh.1,v 1.429 2022/02/06 00:29:03 jsg Exp $ 37 + .Dd $Mdocdate: February 6 2022 $ 38 38 .Dt SSH 1 39 39 .Os 40 40 .Sh NAME ··· 825 825 .Pp 826 826 For this reason, X11 forwarding is subjected to X11 SECURITY extension 827 827 restrictions by default. 828 - Please refer to the 828 + Refer to the 829 829 .Nm 830 830 .Fl Y 831 831 option and the
+3 -3
usr.sbin/relayd/relayd.conf.5
··· 1 - .\" $OpenBSD: relayd.conf.5,v 1.203 2021/01/09 08:53:58 denis Exp $ 1 + .\" $OpenBSD: relayd.conf.5,v 1.204 2022/02/06 00:29:03 jsg Exp $ 2 2 .\" 3 3 .\" Copyright (c) 2006 - 2016 Reyk Floeter <reyk@openbsd.org> 4 4 .\" Copyright (c) 2006, 2007 Pierre-Yves Ritschard <pyr@openbsd.org> ··· 15 15 .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 16 16 .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 17 17 .\" 18 - .Dd $Mdocdate: January 9 2021 $ 18 + .Dd $Mdocdate: February 6 2022 $ 19 19 .Dt RELAYD.CONF 5 20 20 .Os 21 21 .Sh NAME ··· 179 179 This can be overridden by the timeout value in the table definitions. 180 180 The default timeout is 200 milliseconds and it must not exceed the 181 181 global interval. 182 - Please note that the default value is optimized for checks within the 182 + The default value is optimized for checks within the 183 183 same collision domain \(en use a higher timeout, such as 1000 milliseconds, 184 184 for checks of hosts in other subnets. 185 185 If this option is to be set, it should be placed before overrides in tables.
+3 -3
usr.sbin/user/group.8
··· 1 - .\" $OpenBSD: group.8,v 1.17 2016/11/29 03:59:31 jsg Exp $ 1 + .\" $OpenBSD: group.8,v 1.18 2022/02/06 00:29:03 jsg Exp $ 2 2 .\" $NetBSD: group.8,v 1.10 2003/02/25 10:36:21 wiz Exp $ 3 3 .\" 4 4 .\" Copyright (c) 1999 Alistair G. Crooks. All rights reserved. ··· 28 28 .\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 29 29 .\" 30 30 .\" 31 - .Dd $Mdocdate: November 29 2016 $ 31 + .Dd $Mdocdate: February 6 2022 $ 32 32 .Dt GROUP 8 33 33 .Os 34 34 .Sh NAME ··· 65 65 .Xr groupdel 8 66 66 commands. 67 67 .Pp 68 - For a full explanation of the options, please see the relevant manual page. 68 + For a full explanation of the options, see the relevant manual page. 69 69 .Sh EXIT STATUS 70 70 .Ex -std group 71 71 .Sh SEE ALSO
+3 -3
usr.sbin/user/user.8
··· 1 - .\" $OpenBSD: user.8,v 1.23 2016/11/29 03:59:31 jsg Exp $ 1 + .\" $OpenBSD: user.8,v 1.24 2022/02/06 00:29:03 jsg Exp $ 2 2 .\" $NetBSD: user.8,v 1.9 2001/06/05 11:31:21 wiz Exp $ 3 3 .\" 4 4 .\" Copyright (c) 1999 Alistair G. Crooks. All rights reserved. ··· 28 28 .\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 29 29 .\" 30 30 .\" 31 - .Dd $Mdocdate: November 29 2016 $ 31 + .Dd $Mdocdate: February 6 2022 $ 32 32 .Dt USER 8 33 33 .Os 34 34 .Sh NAME ··· 101 101 .Xr userdel 8 102 102 commands. 103 103 .Pp 104 - For a full explanation of the options, please see the relevant manual page. 104 + For a full explanation of the options, see the relevant manual page. 105 105 .Sh FILES 106 106 .Bl -tag -width /etc/usermgmt.conf -compact 107 107 .It Pa /etc/skel/.[A-z]*