2c(1), torrent(1), uhtml(1), kbd(3), cwfs(4), hgfs(4), cifsd(8), cryptsetup(8), hjfs(8), kbdfs(8), realemu(8), wpa(8): fix spelling, typos

This commit is contained in:
stanley lieber 2013-08-23 15:48:52 -04:00
parent eca2dbed8b
commit 1556afae40
12 changed files with 18 additions and 18 deletions

View file

@ -404,7 +404,7 @@ only division and modulus use the run-time library
and the other operators generate in-line code and the other operators generate in-line code
(and (and
.I uvlong-expression .I uvlong-expression
.I divison-or-modulus .I division-or-modulus
.BI "(1<<" constant ) .BI "(1<<" constant )
will turn into in-line bit operations, will turn into in-line bit operations,
as is done for shorter as is done for shorter

View file

@ -45,7 +45,7 @@ option. If provided,
.I torrent .I torrent
reads the file given at the final reads the file given at the final
.I file .I file
argument (or standard-input when omited) and writes argument (or standard-input when omitted) and writes
a torrent file to standard-output and exits. a torrent file to standard-output and exits.
A A
.I tracker-url .I tracker-url
@ -60,7 +60,7 @@ can be passed with the
.B -w .B -w
option. If option. If
.I webseed-url .I webseed-url
ends with a slash, the filename, from the torrent, concatinated ends with a slash, the filename, from the torrent, concatenated
with the url forms the target url. with the url forms the target url.
.PP .PP
Without the Without the

View file

@ -14,7 +14,7 @@ uhtml \- convert foreign character set HTML file to unicode
.SH DESCRIPTION .SH DESCRIPTION
HTML comes in various character set encodings HTML comes in various character set encodings
and has special forms to encode characters. To and has special forms to encode characters. To
make it easier to process html, uthml is used make it easier to process html, uhtml is used
to normalize it to a unicode only form. to normalize it to a unicode only form.
.LP .LP
Uhtml detects the character set of the html input Uhtml detects the character set of the html input

View file

@ -19,8 +19,8 @@ and
.PP .PP
Reading the Reading the
.BR scancode .BR scancode
file returns the raw scancode stream as it is emited by the keyboard file returns the raw scancode stream as it is emitted by the keyboard
device without any translation. It is usualy device without any translation. It is usually
.IR kbdfs (8) .IR kbdfs (8)
task to interpret the scancodes and provide device independent task to interpret the scancodes and provide device independent
keyboard input to programs. The keyboard input to programs. The

View file

@ -309,7 +309,7 @@ io buffers. Where
.I cwfs .I cwfs
running under the Plan 9 kernel reserves a settable percentage running under the Plan 9 kernel reserves a settable percentage
of the remaining user pages. The percentage is read from the of the remaining user pages. The percentage is read from the
enviroment variable environment variable
.B fsmempercent .B fsmempercent
which when not set is assumed to be 25% (default). which when not set is assumed to be 25% (default).
.SH EXAMPLES .SH EXAMPLES

View file

@ -71,7 +71,7 @@ and the hash
are able to identify are able to identify
a revision uniquely; only one of them needs to be given a revision uniquely; only one of them needs to be given
when walking the root directory. The hexadecimal hash when walking the root directory. The hexadecimal hash
may be shortend so long as the resulting lookup yields may be shortened so long as the resulting lookup yields
a unique result. The special name a unique result. The special name
.B tip .B tip
corresponds to the latest revision but does not appear corresponds to the latest revision but does not appear
@ -107,7 +107,7 @@ commit message of the changeset.
.TP .TP
.B files .B files
A directory that contains a snapshot of the tree at the time A directory that contains a snapshot of the tree at the time
the changeset was commited. the changeset was committed.
To retrieve the \fIn\fRth To retrieve the \fIn\fRth
past version of a file relative to the changeset, past version of a file relative to the changeset,

View file

@ -36,7 +36,7 @@ wich passes
and filedescriptors 0 and 1 to the incoming connection. and filedescriptors 0 and 1 to the incoming connection.
.PP .PP
Users are authenticated by ther Inferno/pop secret held by the auth server. Users are authenticated by ther Inferno/pop secret held by the auth server.
When successfull, When successful,
.I cifsd .I cifsd
changes its user id and namespace to the authenticated user. changes its user id and namespace to the authenticated user.
Informative log messages are appended to Informative log messages are appended to
@ -85,13 +85,13 @@ be enabled. Valid options are:
.RS .RS
.TP .TP
.B trspaces .B trspaces
transforms whitespaces in filenames to non breaking whitespaces. This is usefull transforms whitespace in filenames to non breaking whitespace. This is useful
when exporting filesystems other than fossil. when exporting filesystems other than fossil.
.TP .TP
.B casesensitive .B casesensitive
By default, filename lookups are done case insensitive to match By default, filename lookups are done case insensitive to match
windows filesystem sematics. This option disables case insensitive windows filesystem semantics. This option disables case insensitive
lookups wich can result in a performance improvement, but might break lookups which can result in a performance improvement, but might break
some applications. some applications.
.SH FILES .SH FILES
.B /rc/bin/service/tcp445 .B /rc/bin/service/tcp445

View file

@ -30,7 +30,7 @@ The flags
.B -i .B -i
and and
.B -o .B -o
activate a previously formated encrypted partition. The activate a previously formatted encrypted partition. The
.B -o .B -o
flag outputs the flag outputs the
.IR fs (3) .IR fs (3)

View file

@ -177,7 +177,7 @@ the old
Dangerous if used carelessly. Dangerous if used carelessly.
.PP .PP
.I Debug-deind .I Debug-deind
requiers a requires a
.I file .I file
argument. It prints the directory entry of argument. It prints the directory entry of
.I file. .I file.

View file

@ -37,7 +37,7 @@ and its
.BR kbin .BR kbin
and and
.BR kbdin .BR kbdin
file and optionaly reads console input from file and optionally reads console input from
.I consfile .I consfile
to provide initial keyboard and console input. to provide initial keyboard and console input.
.PP .PP

View file

@ -53,7 +53,7 @@ file in the current namespace.
.PP .PP
Then programs like Then programs like
.IR vga (8) .IR vga (8)
can use it to make ther can use it to make their
.SM BIOS .SM BIOS
calls. calls.
.PP .PP

View file

@ -34,7 +34,7 @@ factotum or an interactive key prompter like
.IR fgui (4) .IR fgui (4)
needs to provide it. needs to provide it.
.PP .PP
The authentification protocol is initiated by the The authentication protocol is initiated by the
wireless access point so wireless access point so
.I wpa .I wpa
will background itself after the keyprompt and establish will background itself after the keyprompt and establish