Remove duplicate words.

This commit is contained in:
Dima Dorfman 2001-06-24 01:34:38 +00:00
parent bdd87f4f44
commit a910f192bb
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=78686
24 changed files with 27 additions and 27 deletions

View File

@ -1686,7 +1686,7 @@ value may optionally be followed by one of
.Dq m
or
.Dq h
to explicitly specify seconds, minutes or or hours.
to explicitly specify seconds, minutes or hours.
If none is supplied,
.Dq s
is assumed.

View File

@ -133,7 +133,7 @@ and the database already contains an entry for
that entry is not replaced.
Otherwise the entry is replaced or inserted.
.Fn dbm_store
normally returns returns zero but returns 1 if the entry could not be
normally returns zero but returns 1 if the entry could not be
inserted (because
.Fa flags
is

View File

@ -278,7 +278,7 @@ they returned upon all errors except
and
.Er ETXTBSY .
This was inferior to the traditional error handling,
since it it breaks the ignoring of errors for path prefixes
since it breaks the ignoring of errors for path prefixes
and only improves the handling of the unusual ambiguous error
.Er EFAULT
and the unusual error

View File

@ -55,7 +55,7 @@ MIB variable
.Dq Li kern.bootfile .
.Sh RETURN VALUES
If the call succeeds a string giving the pathname is returned. If it
fails, a a null pointer is returned and an error code is
fails, a null pointer is returned and an error code is
placed in the global location
.Va errno .
.Sh SEE ALSO

View File

@ -47,7 +47,7 @@ least
ACL entries. A pointer to the working storage is returned. The working
storage allocated to contain the ACL is freed by a call to
.Xr acl_free 3 .
When the area is first allocated, it shall contain an an ACL that contains
When the area is first allocated, it shall contain an ACL that contains
no ACL entries.
.Pp
This function may cause memory to be allocated. The caller should free any

View File

@ -91,7 +91,7 @@ For
.Fn cbc_crypt ,
the parameter
.Fa ivec
is the the 8-byte initialization
is the 8-byte initialization
vector for the chaining.
It is updated to the next initialization
vector upon return.

View File

@ -171,7 +171,7 @@ library are the main clients of these four routines.
takes a server netname and a
.Tn DES
key, and decrypts the key by
using the the public key of the the server and the secret key
using the public key of the server and the secret key
associated with the effective uid of the calling process. It
is the inverse of
.Fn key_encryptsession .

View File

@ -282,7 +282,7 @@ The filter returns under the same conditions as aio_error.
.Pp
Alternatively, a kevent structure may be initialized, with
.Va ident
containing the descriptor of the the kqueue, and the
containing the descriptor of the kqueue, and the
address of the kevent structure placed in the
.Va aio_lio_opcode
field of the AIO request. However, this approach will not work on

View File

@ -87,7 +87,7 @@ If it begins with an underscore
then the
.Tn DES
Extended Format
is used in interpreting both the the key and the salt, as outlined below.
is used in interpreting both the key and the salt, as outlined below.
.It Modular
If it begins with the string
.Dq $digit$
@ -108,7 +108,7 @@ a CPU second and MD5 to do about 62 crypts a CPU second.
The
.Ar key
is divided into groups of 8 characters (the last group is null-padded)
and the low-order 7 bits of each each character (56 bits per group) are
and the low-order 7 bits of each character (56 bits per group) are
used to form the
.Tn DES
key as follows:

View File

@ -154,7 +154,7 @@ The
.Va type ,
and
.Va service
arguments must be be set to appropriate values as defined in the
arguments must be set to appropriate values as defined in the
TACACS+ protocol specification. The
.Aq taclib.h
header file contains symbolic constants for these values.

View File

@ -165,7 +165,7 @@ Boot flags:
.Bl -tag -width "-CXX" -compact
.It Fl a
during kernel initialization,
ask for the device to mount as as the root file system.
ask for the device to mount as the root file system.
.It Fl C
boot from CDROM.
.It Fl c

View File

@ -287,7 +287,7 @@ Set or get the status of the
.Dq header complete
flag.
Set to zero if the link level source address should be filled in automatically
by the the interface output routine. Set to one if the link level source
by the interface output routine. Set to one if the link level source
address will be written, as provided, to the wire. This flag is initialized
to zero by default.
.It Dv BIOCSSEESENT

View File

@ -57,7 +57,7 @@ internal actions according to the settings found there.
.Pp
The
.Pa /etc/make.conf
file is included from the the appropriate
file is included from the appropriate
.Pa Makefile
which specifies the default settings for all the available options.
Options need only be specified in
@ -262,7 +262,7 @@ For example,
KERNEL=MINE DEBUG GENERIC OTHERMACHINE
.Ed
.Pp
will build the the kernels specified by the config files
will build the kernels specified by the config files
.Pa MINE , DEBUG , GENERIC ,
and
.Pa OTHERMACHINE ,

View File

@ -114,7 +114,7 @@ for the default value.
.It Va pccard_ifconfig
.Pq Vt str
List of arguments to be passed to ifconfig(8) at boot time or on
insertion of of the card (e.g. "inet 192.168.1.1 netmask 255.255.255.0"
insertion of the card (e.g. "inet 192.168.1.1 netmask 255.255.255.0"
for a fixed address or "DHCP" for a DHCP client).
.It Va pccard_beep
.Pq Vt integer

View File

@ -132,11 +132,11 @@ this stage. See
and
.Ev BATCH .
.It Ar build
Build the the port. This is the same as calling the
Build the port. This is the same as calling the
.Ar all
target.
.It Ar install
Install the the port and register it with the package system. This
Install the port and register it with the package system. This
is all you really need to do.
.El
.Pp

View File

@ -112,7 +112,7 @@ of work by the hacker to cleanup after himself, so most hackers do install
backdoors. This gives you a convienient way to detect the hacker. Making
it impossible for a hacker to install a backdoor may actually be detrimental
to your security because it will not close off the hole the hacker found to
break in in the first place.
break in the first place.
.Pp
Security remedies should always be implemented with a multi-layered
.Sq onion peel

View File

@ -185,7 +185,7 @@ with
.Em tunefs -n enable /filesystem.
(Note: In 5.x softupdates can be turned on using the -U option to newfs).
Softupdates drastically improves meta-data performance, mainly file
creation and deletion. We recommend turning softupdates on on all of your
creation and deletion. We recommend turning softupdates on all of your
filesystems. There are two downsides to softupdates that you should be
aware of: First, softupdates guarantees filesystem consistency in the
case of a crash but could very easily be several seconds (even a minute!)

View File

@ -52,7 +52,7 @@ these namespaces:
.Dv EXTATTR_NAMESPACE_USER ,
.Dv EXTATTR_NAMESPACE_SYSTEM .
The semantics of these attributes are intended to be as follows: user
attribute data is protected according the the normal discretionary
attribute data is protected according the normal discretionary
and mandatory protections associated with the data in the file or
directory; system attribute data is protected such that appropriate
privilege is required to directly access or manipulate these attributes.

View File

@ -160,7 +160,7 @@ It is the current directory if the name passed in doesn't start with /
and we have not gone through any symlinks with an absolute path, and
the root otherwise.
.Pp
In this case, it is is only used by lookup(), and should not be
In this case, it is only used by lookup(), and should not be
considered valid after a call to namei().
.Pp
If SAVESTART is set, this is set to the same as ni_dvp, with an extra

View File

@ -87,7 +87,7 @@ Using the
or
.Fl U Ar user
flags, you may also display the current resource settings modified
by the the appropriate login class resource limit entries from
by the appropriate login class resource limit entries from
the
.Xr login.conf 5
login capabilities database.

View File

@ -59,7 +59,7 @@ the configuration file
.Sh ENVIRONMENT
.Bl -tag -width /var/db/locate.database -compact
.It Pa LOCATE_CONFIG
path to the the configuration file
path to the configuration file
.El
.Sh SEE ALSO
.Xr locate 1 ,

View File

@ -137,7 +137,7 @@ Terminal name to translate.
.Pp
If no terminal specified with the
.Fl t
option, then the terminal name to to translate will be taken from the
option, then the terminal name to translate will be taken from the
environment variable
.Ev TERM .
.Sh FILES

View File

@ -491,7 +491,7 @@ If the file
.Pa .fakeid
exists in the home directory of the identified user, report the username
found in that file instead of the real username.
If the the username found in
If the username found in
.Pa .fakeid
is that of an existing user,
then the real username is reported.

View File

@ -161,7 +161,7 @@ default configuration file
.It Pa /etc/pccard.conf
user configuration file
.It Pa /var/run/pccardd.pid
process id of of the currently running
process id of the currently running
.Nm
.El
.Sh SEE ALSO