2c(1), torrent(1), uhtml(1), kbd(3), cwfs(4), hgfs(4), cifsd(8), cryptsetup(8), hjfs(8), kbdfs(8), realemu(8), wpa(8): fix spelling, typos

This commit is contained in:
stanley lieber 2013-08-23 15:48:52 -04:00
parent eca2dbed8b
commit 1556afae40
12 changed files with 18 additions and 18 deletions

View file

@ -404,7 +404,7 @@ only division and modulus use the run-time library
and the other operators generate in-line code
(and
.I uvlong-expression
.I divison-or-modulus
.I division-or-modulus
.BI "(1<<" constant )
will turn into in-line bit operations,
as is done for shorter

View file

@ -45,7 +45,7 @@ option. If provided,
.I torrent
reads the file given at the final
.I file
argument (or standard-input when omited) and writes
argument (or standard-input when omitted) and writes
a torrent file to standard-output and exits.
A
.I tracker-url
@ -60,7 +60,7 @@ can be passed with the
.B -w
option. If
.I webseed-url
ends with a slash, the filename, from the torrent, concatinated
ends with a slash, the filename, from the torrent, concatenated
with the url forms the target url.
.PP
Without the

View file

@ -14,7 +14,7 @@ uhtml \- convert foreign character set HTML file to unicode
.SH DESCRIPTION
HTML comes in various character set encodings
and has special forms to encode characters. To
make it easier to process html, uthml is used
make it easier to process html, uhtml is used
to normalize it to a unicode only form.
.LP
Uhtml detects the character set of the html input

View file

@ -19,8 +19,8 @@ and
.PP
Reading the
.BR scancode
file returns the raw scancode stream as it is emited by the keyboard
device without any translation. It is usualy
file returns the raw scancode stream as it is emitted by the keyboard
device without any translation. It is usually
.IR kbdfs (8)
task to interpret the scancodes and provide device independent
keyboard input to programs. The

View file

@ -309,7 +309,7 @@ io buffers. Where
.I cwfs
running under the Plan 9 kernel reserves a settable percentage
of the remaining user pages. The percentage is read from the
enviroment variable
environment variable
.B fsmempercent
which when not set is assumed to be 25% (default).
.SH EXAMPLES

View file

@ -71,7 +71,7 @@ and the hash
are able to identify
a revision uniquely; only one of them needs to be given
when walking the root directory. The hexadecimal hash
may be shortend so long as the resulting lookup yields
may be shortened so long as the resulting lookup yields
a unique result. The special name
.B tip
corresponds to the latest revision but does not appear
@ -107,7 +107,7 @@ commit message of the changeset.
.TP
.B files
A directory that contains a snapshot of the tree at the time
the changeset was commited.
the changeset was committed.
To retrieve the \fIn\fRth
past version of a file relative to the changeset,

View file

@ -36,7 +36,7 @@ wich passes
and filedescriptors 0 and 1 to the incoming connection.
.PP
Users are authenticated by ther Inferno/pop secret held by the auth server.
When successfull,
When successful,
.I cifsd
changes its user id and namespace to the authenticated user.
Informative log messages are appended to
@ -85,13 +85,13 @@ be enabled. Valid options are:
.RS
.TP
.B trspaces
transforms whitespaces in filenames to non breaking whitespaces. This is usefull
transforms whitespace in filenames to non breaking whitespace. This is useful
when exporting filesystems other than fossil.
.TP
.B casesensitive
By default, filename lookups are done case insensitive to match
windows filesystem sematics. This option disables case insensitive
lookups wich can result in a performance improvement, but might break
windows filesystem semantics. This option disables case insensitive
lookups which can result in a performance improvement, but might break
some applications.
.SH FILES
.B /rc/bin/service/tcp445

View file

@ -30,7 +30,7 @@ The flags
.B -i
and
.B -o
activate a previously formated encrypted partition. The
activate a previously formatted encrypted partition. The
.B -o
flag outputs the
.IR fs (3)

View file

@ -177,7 +177,7 @@ the old
Dangerous if used carelessly.
.PP
.I Debug-deind
requiers a
requires a
.I file
argument. It prints the directory entry of
.I file.

View file

@ -37,7 +37,7 @@ and its
.BR kbin
and
.BR kbdin
file and optionaly reads console input from
file and optionally reads console input from
.I consfile
to provide initial keyboard and console input.
.PP

View file

@ -53,7 +53,7 @@ file in the current namespace.
.PP
Then programs like
.IR vga (8)
can use it to make ther
can use it to make their
.SM BIOS
calls.
.PP

View file

@ -34,7 +34,7 @@ factotum or an interactive key prompter like
.IR fgui (4)
needs to provide it.
.PP
The authentification protocol is initiated by the
The authentication protocol is initiated by the
wireless access point so
.I wpa
will background itself after the keyprompt and establish