diff options
Diffstat (limited to 'usr/src/cmd/cmd-inet/usr.sbin')
36 files changed, 107 insertions, 118 deletions
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/comsat.xml b/usr/src/cmd/cmd-inet/usr.sbin/comsat.xml index a66e18a02e..922cd84933 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/comsat.xml +++ b/usr/src/cmd/cmd-inet/usr.sbin/comsat.xml @@ -103,9 +103,9 @@ requested to be told when mail arrives. </loctext> </description> <documentation> - <manpage title='in.comsat' section='1M' + <manpage title='in.comsat' section='8' manpath='/usr/share/man' /> - <manpage title='comsat' section='1M' + <manpage title='comsat' section='8' manpath='/usr/share/man' /> </documentation> </template> diff --git a/usr/src/cmd/cmd-inet/usr.sbin/finger.xml b/usr/src/cmd/cmd-inet/usr.sbin/finger.xml index 2c4281d84a..565eef962c 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/finger.xml +++ b/usr/src/cmd/cmd-inet/usr.sbin/finger.xml @@ -101,9 +101,9 @@ status and individual users. </loctext> </description> <documentation> - <manpage title='in.fingerd' section='1M' + <manpage title='in.fingerd' section='8' manpath='/usr/share/man' /> - <manpage title='fingerd' section='1M' + <manpage title='fingerd' section='8' manpath='/usr/share/man' /> </documentation> </template> diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ifconfig/ifconfig.c b/usr/src/cmd/cmd-inet/usr.sbin/ifconfig/ifconfig.c index 9da0ed811f..0475fad29f 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/ifconfig/ifconfig.c +++ b/usr/src/cmd/cmd-inet/usr.sbin/ifconfig/ifconfig.c @@ -86,8 +86,8 @@ typedef struct { } if_appflags_t; static const if_appflags_t if_appflags_tbl[] = { - { "dhcpagent(1M)", IFF_DHCPRUNNING, 1 }, - { "in.ndpd(1M)", IFF_ADDRCONF, 3 }, + { "dhcpagent(8)", IFF_DHCPRUNNING, 1 }, + { "in.ndpd(8)", IFF_ADDRCONF, 3 }, { NULL, 0, 0 } }; @@ -643,7 +643,7 @@ ifconfig(int argc, char *argv[], int af, struct ifaddrs *ifa) * sometimes two or more attributes must be set together. For * example, setting an address without a netmask does not make sense. * Yet they can be set separately for IPv4 address using the current - * ifconfig(1M) syntax. The kernel then "infers" the correct netmask + * ifconfig(8) syntax. The kernel then "infers" the correct netmask * using the deprecated "IP address classes." This is simply not * correct. * @@ -660,7 +660,7 @@ ifconfig(int argc, char *argv[], int af, struct ifaddrs *ifa) * it will use the working interface's address to do the query. * It will be wrong now as we don't know the logical interface's name. * - * ifconfig(1M) is too overloaded and the code is so convoluted + * ifconfig(8) is too overloaded and the code is so convoluted * that it is "safer" not to re-architect the code to fix the above * issue, hence this "hack." We may be better off to have a new * command with better syntax for configuring network interface @@ -1074,7 +1074,7 @@ setifaddr(char *addr, int64_t param) } /* - * The following functions are stolen from the ipseckey(1m) program. + * The following functions are stolen from the ipseckey(8) program. * Perhaps they should be somewhere common, but for now, we just maintain * two versions. We do this because of the different semantics for which * algorithms we select ("requested" for ifconfig vs. "actual" for key). @@ -2244,11 +2244,11 @@ again: } /* - * If the interface being moved is under the control of `ipmgmtd(1M)' + * If the interface being moved is under the control of `ipmgmtd(8)' * dameon then we should inform the daemon about this move, so that * the daemon can delete the state associated with this interface. * - * This workaround is needed until the IPMP support in ipadm(1M). + * This workaround is needed until the IPMP support in ipadm(8). */ ipadm_if_move(iph, name); diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm.c b/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm.c index 949fcc064c..67de6e31ba 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm.c +++ b/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm.c @@ -50,7 +50,7 @@ ilbadm_errstr(ilbadm_status_t rc) case ILBADM_ENOMEM: return (gettext("memory allocation failure")); case ILBADM_EINVAL: - return (gettext("invalid value - refer to ilbadm(1M)")); + return (gettext("invalid value - refer to ilbadm(8)")); case ILBADM_HCPRINT: return (gettext("failed to print healthcheck values")); case ILBADM_INVAL_AF: @@ -63,7 +63,7 @@ ilbadm_errstr(ilbadm_status_t rc) return (gettext("address is invalid")); case ILBADM_INVAL_ARGS: return (gettext("invalid/incompatible keywords - refer to" - " ilbadm(1M)")); + " ilbadm(8)")); case ILBADM_ENOSGNAME: return (gettext("servergroup name missing")); case ILBADM_ENORULE: @@ -83,21 +83,21 @@ ilbadm_errstr(ilbadm_status_t rc) return (gettext("operation type is invalid")); case ILBADM_INVAL_KEYWORD: return (gettext("keyword is invalid - please refer" - " to ilbadm(1M)")); + " to ilbadm(8)")); case ILBADM_ASSIGNREQ: return (gettext("assignment '=' missing")); case ILBADM_NORECURSIVE: return (gettext("recursive import not allowed")); case ILBADM_INVAL_COMMAND: return (gettext("subcommand is invalid - please refer" - " to ilbadm(1M)")); + " to ilbadm(8)")); case ILBADM_ENOPROXY: return (gettext("proxy-src is missing")); case ILBADM_INVAL_PROXY: return (gettext("proxy-src not allowed")); case ILBADM_ENOOPTION: return (gettext("mandatory argument(s) missing - refer" - " to ilbadm(1M)")); + " to ilbadm(8)")); case ILBADM_TOOMANYIPADDR: return (gettext("address range contains more than 255" " IP addresses")); @@ -105,7 +105,7 @@ ilbadm_errstr(ilbadm_status_t rc) return (gettext("could not export servergroup because" " of lack of space")); case ILBADM_INVAL_SYNTAX: - return (gettext("syntax failure - refer to ilbadm(1M)")); + return (gettext("syntax failure - refer to ilbadm(8)")); case ILBADM_NOKEYWORD_VAL: return (gettext("missing value")); case ILBADM_LIBERR: diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm_rules.c b/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm_rules.c index f159a3b6d6..dad110a62f 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm_rules.c +++ b/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm_rules.c @@ -1123,7 +1123,7 @@ ilbadm_create_rule(int argc, char *argv[]) if (optind >= argc) { ilbadm_err(gettext("missing mandatory arguments - please refer" " to 'ilbadm create-rule' subcommand description in" - " ilbadm(1M)")); + " ilbadm(8)")); rc = ILBADM_LIBERR; goto out; diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm_sg.c b/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm_sg.c index 8a0d92bbd7..a27ac5c95a 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm_sg.c +++ b/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm_sg.c @@ -467,7 +467,7 @@ ilbadm_create_servergroup(int argc, char *argv[]) if (optind >= argc) { ilbadm_err(gettext("missing mandatory arguments - please refer" " to 'create-servergroup' subcommand" - " description in ilbadm(1M)")); + " description in ilbadm(8)")); rc = ILBADM_LIBERR; goto out; } @@ -546,7 +546,7 @@ ilbadm_add_server_to_group(int argc, char **argv) if (optind >= argc) { ilbadm_err(gettext("missing mandatory arguments - please refer" - " to 'add-server' subcommand description in ilbadm(1M)")); + " to 'add-server' subcommand description in ilbadm(8)")); rc = ILBADM_LIBERR; goto out; } diff --git a/usr/src/cmd/cmd-inet/usr.sbin/in.rdisc/rdisc.xml b/usr/src/cmd/cmd-inet/usr.sbin/in.rdisc/rdisc.xml index eb223ee0e4..2ef0b8701b 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/in.rdisc/rdisc.xml +++ b/usr/src/cmd/cmd-inet/usr.sbin/in.rdisc/rdisc.xml @@ -78,7 +78,7 @@ privileges='basic,proc_owner,proc_fork,proc_exec,proc_info,proc_session,file_cho value='solaris.smf.manage.routing' /> </property_group> - <!-- Properties in this group are used by routeadm (1M) --> + <!-- Properties in this group are used by routeadm(8) --> <property_group name='routeadm' type='application'> <stability value='Unstable' /> <propval name='protocol' type='astring' value='ipv4' /> @@ -89,7 +89,7 @@ privileges='basic,proc_owner,proc_fork,proc_exec,proc_info,proc_session,file_cho </property_group> - <!-- Properties in this group are modifiable via routeadm (1M) --> + <!-- Properties in this group are modifiable via routeadm(8) --> <property_group name='routing' type='application'> <stability value='Evolving' /> @@ -102,7 +102,7 @@ privileges='basic,proc_owner,proc_fork,proc_exec,proc_info,proc_session,file_cho <!-- Equivalent to -r option if true --> <propval name='act_as_router' type='boolean' value='false' /> - <!-- Equivalent to -a option if true --> + <!-- Equivalent to -a option if true --> <propval name='accept_all' type='boolean' value='false' /> <!-- Equivalent to -p preference option if set --> @@ -127,7 +127,7 @@ privileges='basic,proc_owner,proc_fork,proc_exec,proc_info,proc_session,file_cho </loctext> </common_name> <documentation> - <manpage title='in.rdisc' section='1M' + <manpage title='in.rdisc' section='8' manpath='/usr/share/man' /> </documentation> </template> diff --git a/usr/src/cmd/cmd-inet/usr.sbin/in.routed/route.xml b/usr/src/cmd/cmd-inet/usr.sbin/in.routed/route.xml index 530ec5bda7..e9d73eb57f 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/in.routed/route.xml +++ b/usr/src/cmd/cmd-inet/usr.sbin/in.routed/route.xml @@ -80,7 +80,7 @@ privileges='basic,proc_owner,proc_fork,proc_exec,proc_info,proc_session,file_cho value='solaris.smf.manage.routing' /> </property_group> - <!-- Properties in this group are used by routeadm (1M) --> + <!-- Properties in this group are used by routeadm(8) --> <property_group name='routeadm' type='application'> <stability value='Unstable' /> <propval name='protocol' type='astring' value='ipv4' /> @@ -90,7 +90,7 @@ privileges='basic,proc_owner,proc_fork,proc_exec,proc_info,proc_session,file_cho value='solaris.smf.value.routing' /> </property_group> - <!-- Properties in this group are modifiable via routeadm (1M) --> + <!-- Properties in this group are modifiable via routeadm(8) --> <property_group name='routing' type='application'> <stability value='Evolving' /> @@ -122,7 +122,7 @@ privileges='basic,proc_owner,proc_fork,proc_exec,proc_info,proc_session,file_cho <propval name='quiet_mode' type='boolean' value='false' /> <!-- Equivalent to -s option if true --> - <propval name='supply_routes' type='boolean' value='false' /> + <propval name='supply_routes' type='boolean' value='false' /> <!-- Equivalent to -S option if true --> <propval name='default_routes_only' type='boolean' @@ -162,7 +162,7 @@ privileges='basic,proc_owner,proc_fork,proc_exec,proc_info,proc_session,file_cho </loctext> </common_name> <documentation> - <manpage title='in.routed' section='1M' + <manpage title='in.routed' section='8' manpath='/usr/share/man' /> </documentation> </template> diff --git a/usr/src/cmd/cmd-inet/usr.sbin/in.talkd/talk.xml b/usr/src/cmd/cmd-inet/usr.sbin/in.talkd/talk.xml index c4d2494095..29b70d09cf 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/in.talkd/talk.xml +++ b/usr/src/cmd/cmd-inet/usr.sbin/in.talkd/talk.xml @@ -102,9 +102,9 @@ </loctext> </description> <documentation> - <manpage title='in.talkd' section='1M' + <manpage title='in.talkd' section='8' manpath='/usr/share/man' /> - <manpage title='talkd' section='1M' + <manpage title='talkd' section='8' manpath='/usr/share/man' /> </documentation> </template> diff --git a/usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c b/usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c index bbd38a551c..08ad200c45 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c +++ b/usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c @@ -488,7 +488,7 @@ rd_and_store_forwarded_creds(krb5_context context, if ((retval = krb5_cc_close(context, ccache)) != 0) goto cleanup; - /* Register with ktkt_warnd(1M) */ + /* Register with ktkt_warnd(8) */ if ((retval = krb5_unparse_name(context, (*creds)->client, &client_name)) != 0) goto cleanup; @@ -496,11 +496,11 @@ rd_and_store_forwarded_creds(krb5_context context, if (kwarn_add_warning(client_name, (*creds)->times.endtime) != 0) { syslog(LOG_AUTH|LOG_NOTICE, "rd_and_store_forwarded_creds: kwarn_add_warning" - " failed: ktkt_warnd(1M) down? "); + " failed: ktkt_warnd(8) down? "); if (auth_debug) (void) fprintf(stderr, "kwarn_add_warning failed:" - " ktkt_warnd(1M) down?\n"); + " ktkt_warnd(8) down?\n"); } free(client_name); client_name = NULL; diff --git a/usr/src/cmd/cmd-inet/usr.sbin/inetconv/inetconv.c b/usr/src/cmd/cmd-inet/usr.sbin/inetconv/inetconv.c index 6419f9e074..376454019f 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/inetconv/inetconv.c +++ b/usr/src/cmd/cmd-inet/usr.sbin/inetconv/inetconv.c @@ -24,8 +24,8 @@ */ /* - * inetconv - convert inetd.conf entries into smf(5) service manifests, - * import them into smf(5) repository + * inetconv - convert inetd.conf entries into smf(7) service manifests, + * import them into smf(7) repository */ #include <sys/types.h> @@ -115,7 +115,7 @@ static const char xml_comment[] = "<!--\n" " Service manifest for the %s service.\n" "\n" -" Generated by inetconv(1M) from inetd.conf(4).\n" +" Generated by inetconv(8) from inetd.conf(5).\n" "-->\n\n"; static const char xml_service_bundle[] = diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ipmpstat/ipmpstat.c b/usr/src/cmd/cmd-inet/usr.sbin/ipmpstat/ipmpstat.c index c9cbade079..a5d8f79bc4 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/ipmpstat/ipmpstat.c +++ b/usr/src/cmd/cmd-inet/usr.sbin/ipmpstat/ipmpstat.c @@ -280,7 +280,7 @@ main(int argc, char **argv) die_ipmperr(err, "cannot create IPMP handle"); if (ipmp_ping_daemon(ih) != IPMP_SUCCESS) - die("cannot contact in.mpathd(1M) -- is IPMP in use?\n"); + die("cannot contact in.mpathd(8) -- is IPMP in use?\n"); /* * If we've been asked to display probes, then call the probe output diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ikeadm.c b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ikeadm.c index e6257c6184..5ca927ca40 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ikeadm.c +++ b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ikeadm.c @@ -2253,7 +2253,7 @@ print_defaults(char *label, char *description, char *unit, * two ike_defaults_t's, the first contains the hard coded defaults, the second * contains the actual values used. If these differ, then the defaults have been * changed via a config file entry. Note that "-" indicates this default - * is not tunable via ike.config(4) or is system wide tunable. + * is not tunable via ike.config(5) or is system wide tunable. */ static void do_print_defaults(ike_defaults_t *dp) diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipsecalgs.xml b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipsecalgs.xml index cdf27133de..4d620d059d 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipsecalgs.xml +++ b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipsecalgs.xml @@ -113,7 +113,7 @@ svcadm mark <state> ipsecalgs svcadm clear ipsecalgs - see auths(1) and user_attr(4)--> + see auths(1) and user_attr(5)--> <propval name='action_authorization' @@ -125,7 +125,7 @@ svcadm disable ipsecalgs svcadm enable ipsecalgs - see auths(1) and user_attr(4)--> + see auths(1) and user_attr(5)--> <propval name='value_authorization' type='astring' @@ -158,7 +158,7 @@ <documentation> <manpage title='ipsecalgs' - section='1M' + section='8' manpath='/usr/share/man' /> </documentation> diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipsecconf.c b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipsecconf.c index e8203530b4..fc94afe658 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipsecconf.c +++ b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipsecconf.c @@ -1341,7 +1341,7 @@ main(int argc, char *argv[]) boolean_t replace_policy = B_FALSE; char *smf_warning = gettext( - "\n\tIPsec policy should be managed using smf(5). Modifying\n" + "\n\tIPsec policy should be managed using smf(7). Modifying\n" "\tthe IPsec policy from the command line while the 'policy'\n" "\tservice is enabled could result in an inconsistent\n" "\tsecurity policy.\n\n"); @@ -5247,7 +5247,7 @@ ipsec_conf_add(boolean_t just_check, boolean_t smf_managed, boolean_t replace) /* * Treat the non-existence of a policy file as a special - * case when ipsecconf is being managed by smf(5). + * case when ipsecconf is being managed by smf(7). * The assumption is the administrator has not yet * created a policy file, this should not force the service * into maintenance mode. diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipseckey.c b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipseckey.c index 9667fa4047..cbf429a3e7 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipseckey.c +++ b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipseckey.c @@ -191,7 +191,7 @@ handle_errors(char *ep, char *ebuf, boolean_t fatal, boolean_t done) if (ep != NULL) { if (my_fmri == NULL) { /* - * For now suppress the errors when run from smf(5) + * For now suppress the errors when run from smf(7) * because potentially sensitive information could * end up in a publicly readable logfile. */ @@ -1093,7 +1093,7 @@ dodump(int satype, FILE *ofile) (void) fprintf(ofile, gettext("# This key file was generated by the")); (void) fprintf(ofile, - gettext(" ipseckey(1m) command's 'save' feature.\n\n")); + gettext(" ipseckey(8) command's 'save' feature.\n\n")); } msg_init(msg, SADB_DUMP, (uint8_t)satype); rc = key_write(keysock, msg, sizeof (*msg)); @@ -3590,7 +3590,7 @@ main(int argc, char *argv[]) (void) textdomain(TEXT_DOMAIN); /* - * Check to see if the command is being run from smf(5). + * Check to see if the command is being run from smf(7). */ my_fmri = getenv("SMF_FMRI"); @@ -3649,7 +3649,7 @@ main(int argc, char *argv[]) * this file if the file is root owned and only readable * by privileged users. If the command is being run by * the administrator, issue a warning, if this is run by - * smf(5) (IE: boot time) and the permissions are too + * smf(7) (IE: boot time) and the permissions are too * open, we will fail, the SMF service will end up in * maintenace mode. The check is made with fstat() to * eliminate any possible TOT to TOU window. @@ -3719,7 +3719,7 @@ main(int argc, char *argv[]) } /* - * When run from smf(5) flush any existing SA's first + * When run from smf(7) flush any existing SA's first * otherwise you will end up in maintenance mode. */ if ((my_fmri != NULL) && readfile) { diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/manual-key.xml b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/manual-key.xml index d1dac2b94c..fb4fd47374 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/manual-key.xml +++ b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/manual-key.xml @@ -23,8 +23,6 @@ CDDL HEADER END - ident "%Z%%M% %I% %E% SMI" - NOTE: This service manifest is not editable; its contents will be overwritten by package or patch operations, including operating system upgrade. Make customizations in a different @@ -86,7 +84,7 @@ <!-- To prevent ipseckey generating warnings about duplicate SAs when the service is refreshed, ipseckey will flush the - existing SAs when its called from smf(5). --> + existing SAs when its called from smf(7). --> <exec_method type='method' @@ -110,7 +108,7 @@ svcadm mark <state> manual-key svcadm clear manual-key - see auths(1) and user_attr(4)--> + see auths(1) and user_attr(5)--> <propval name='action_authorization' @@ -122,7 +120,7 @@ svcadm disable manual-key svcadm enable manual-key - see auths(1) and user_attr(4)--> + see auths(1) and user_attr(5)--> <propval name='value_authorization' @@ -132,8 +130,8 @@ </property_group> <!-- The properties defined below can be changed by a user - with 'solaris.smf.value.ipsec' authorization using the - svccfg(1M) command. + with 'solaris.smf.value.ipsec' authorization using the + svccfg(8) command. EG: @@ -183,7 +181,7 @@ </loctext> </description> <documentation> - <manpage title='ipseckey' section='1M' + <manpage title='ipseckey' section='8' manpath='/usr/share/man' /> </documentation> </template> diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/policy.xml b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/policy.xml index 297e48d1b4..d63c65c3a4 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/policy.xml +++ b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/policy.xml @@ -102,7 +102,7 @@ svcadm mark <state> policy svcadm clear policy - see auths(1) and user_attr(4)--> + see auths(1) and user_attr(5)--> <propval name='action_authorization' @@ -113,7 +113,7 @@ svcadm disable policy svcadm enable policy - see auths(1) and user_attr(4)--> + see auths(1) and user_attr(5)--> <propval name='value_authorization' @@ -123,8 +123,8 @@ </property_group> <!-- The properties defined below can be changed by a user - with 'solaris.smf.value.ipsec' authorization using the - svccfg(1M) command. + with 'solaris.smf.value.ipsec' authorization using the + svccfg(8) command. EG: @@ -176,7 +176,7 @@ </loctext> </description> <documentation> - <manpage title='ipsecconf' section='1M' + <manpage title='ipsecconf' section='8' manpath='/usr/share/man' /> </documentation> </template> diff --git a/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/kssladm.c b/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/kssladm.c index c2978c564f..7eab57d0cc 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/kssladm.c +++ b/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/kssladm.c @@ -23,8 +23,6 @@ * Use is subject to license terms. */ -#pragma ident "%Z%%M% %I% %E% SMI" - #include <ctype.h> #include <stdio.h> #include <stdlib.h> @@ -39,10 +37,10 @@ /* - * kssladm(1M) + * kssladm(8) * * Command to manage the entries in kernel SSL proxy table. This is - * a private command called indirectly from ksslcfg(1M). + * a private command called indirectly from ksslcfg(8). */ boolean_t verbose = B_FALSE; diff --git a/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/kssl-proxy.xml b/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/kssl-proxy.xml index e2be94717c..3728239974 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/kssl-proxy.xml +++ b/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/kssl-proxy.xml @@ -40,7 +40,7 @@ grouping='require_all' restart_on='restart' type='service'> - <service_fmri value='svc:/network/socket-filter:kssl' /> + <service_fmri value='svc:/network/socket-filter:kssl' /> </dependency> <dependency @@ -72,7 +72,7 @@ </loctext> </common_name> <documentation> - <manpage title='ksslcfg' section='1M' + <manpage title='ksslcfg' section='8' manpath='/usr/share/man' /> </documentation> </template> diff --git a/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/ksslcfg.c b/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/ksslcfg.c index 8b9a33349d..84336d0923 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/ksslcfg.c +++ b/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/ksslcfg.c @@ -38,10 +38,10 @@ #include "ksslcfg.h" /* - * ksslcfg(1M) + * ksslcfg(8) * - * ksslcfg manages smf(5) instances for the Kernel SSL proxy module. - * It makes use of kssladm(1M) which does the grunt work. + * ksslcfg manages smf(7) instances for the Kernel SSL proxy module. + * It makes use of kssladm(8) which does the grunt work. */ /* diff --git a/usr/src/cmd/cmd-inet/usr.sbin/login.xml b/usr/src/cmd/cmd-inet/usr.sbin/login.xml index f21084da5f..ba4d875d5f 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/login.xml +++ b/usr/src/cmd/cmd-inet/usr.sbin/login.xml @@ -45,7 +45,7 @@ <service_fmri value='svc:/network/inetd:default' /> </restarter> - <property_group name='inetd' type='framework'> + <property_group name='inetd' type='framework'> <stability value='Evolving' /> <propval name='endpoint_type' type='astring' value='stream' /> <propval name='wait' type='boolean' value='false' /> @@ -87,7 +87,7 @@ value='solaris.smf.value.firewall.config' /> </property_group> - <property_group name='inetd' type='framework'> + <property_group name='inetd' type='framework'> <propval name='name' type='astring' value='login' /> <propval name='proto' type='astring' value='tcp6' /> </property_group> @@ -134,7 +134,7 @@ </property_group> <!-- Only works over IPv4 at the moment --> - <property_group name='inetd' type='framework'> + <property_group name='inetd' type='framework'> <propval name='name' type='astring' value='klogin' /> <propval name='proto' type='astring' value='tcp' /> </property_group> @@ -182,7 +182,7 @@ remote login with Kerberos authentication </property_group> <!-- Only works over IPv4 at the moment --> - <property_group name='inetd' type='framework'> + <property_group name='inetd' type='framework'> <propval name='name' type='astring' value='eklogin' /> <propval name='proto' type='astring' value='tcp' /> </property_group> @@ -205,9 +205,9 @@ remote login with Kerberos authentication and encryption </loctext> </common_name> <documentation> - <manpage title='in.rlogind' section='1M' + <manpage title='in.rlogind' section='8' manpath='/usr/share/man' /> - <manpage title='rlogind' section='1M' + <manpage title='rlogind' section='8' manpath='/usr/share/man' /> </documentation> </template> diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ndd.c b/usr/src/cmd/cmd-inet/usr.sbin/ndd.c index 8d5fdfa91f..9adf3c8d2d 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/ndd.c +++ b/usr/src/cmd/cmd-inet/usr.sbin/ndd.c @@ -170,8 +170,8 @@ ndd_perm2str(uint_t perm) * - replace leading underscores with protocol name. * For example: `_strong_iss' --> `tcp_strong_iss' * - * - don't print new public properties that are supported only by ipadm(1M) - * For example: `hostmodel' should be supported only from ipadm(1M). + * - don't print new public properties that are supported only by ipadm(8) + * For example: `hostmodel' should be supported only from ipadm(8). * Such properties are identified by not having leading '_' and not * being present in the mapping table. */ @@ -211,7 +211,7 @@ print_ipadm2ndd(char *oldbuf, uint_t obufsize) } /* * print only if it's a private property. We should - * not be printing any new public property in ndd(1M) + * not be printing any new public property in ndd(8) * output. */ if (!matched && pname[0] == '_') { @@ -234,7 +234,7 @@ print_ipadm2ndd(char *oldbuf, uint_t obufsize) * get/set the value for a given property by calling into libipadm. The * IPH_LEGACY flag is used by libipadm for special handling. For some * properties, libipadm.so displays strings (for e.g., on/off, - * never/passive/active, et al) instead of numerals. However ndd(1M) always + * never/passive/active, et al) instead of numerals. However ndd(8) always * printed numberals. This flag will help in avoiding printing strings. */ static boolean_t @@ -270,7 +270,7 @@ do_ipadm_getset(int cmd, char *buf, int buflen) } if (nimap->ndd_name == NULL && strcmp(pname, "?") != 0) { - /* do not allow set/get of public properties from ndd(1M) */ + /* do not allow set/get of public properties from ndd(8) */ if (ipadm_legacy2new_propname(pname, nname, sizeof (nname), &proto) != 0) { status = IPADM_PROP_UNKNOWN; @@ -371,7 +371,7 @@ gldv3_warning(char *module) "WARNING: The ndd commands for datalink " "administration are obsolete and may be " "removed in a future release of Solaris. " - "Use dladm(1M) to manage datalink tunables.\n")); + "Use dladm(8) to manage datalink tunables.\n")); } } dladm_close(handle); diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ndp.c b/usr/src/cmd/cmd-inet/usr.sbin/ndp.c index 2fc19775ad..c77e1587d9 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/ndp.c +++ b/usr/src/cmd/cmd-inet/usr.sbin/ndp.c @@ -106,7 +106,7 @@ static boolean_t ndp_run = B_TRUE; #define NETSTAT_PATH "/usr/bin/netstat" /* - * Macros borrowed from route(1M) for working with PF_ROUTE messages + * Macros borrowed from route(8) for working with PF_ROUTE messages */ #define RT_ADVANCE(x, n) ((x) += ndp_salen(n)) #define RT_NEXTADDR(cp, w, u) \ diff --git a/usr/src/cmd/cmd-inet/usr.sbin/rarp.xml b/usr/src/cmd/cmd-inet/usr.sbin/rarp.xml index de1c254018..d7e052396b 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/rarp.xml +++ b/usr/src/cmd/cmd-inet/usr.sbin/rarp.xml @@ -24,8 +24,6 @@ CDDL HEADER END - ident "%Z%%M% %I% %E% SMI" - NOTE: This service manifest is not editable; its contents will be overwritten by package or patch operations, including operating system upgrade. Make customizations in a different @@ -104,9 +102,9 @@ Reverse Address Resolution Protocol (RARP) server </loctext> </common_name> <documentation> - <manpage title='rarp' section='7P' + <manpage title='rarp' section='4P' manpath='/usr/share/man' /> - <manpage title='in.rarpd' section='1M' + <manpage title='in.rarpd' section='8' manpath='/usr/share/man' /> </documentation> </template> diff --git a/usr/src/cmd/cmd-inet/usr.sbin/rexec.xml b/usr/src/cmd/cmd-inet/usr.sbin/rexec.xml index 98f83f3102..2514e2a04e 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/rexec.xml +++ b/usr/src/cmd/cmd-inet/usr.sbin/rexec.xml @@ -106,7 +106,7 @@ </loctext> </common_name> <documentation> - <manpage title='in.rexecd' section='1M' + <manpage title='in.rexecd' section='8' manpath='/usr/share/man' /> </documentation> </template> diff --git a/usr/src/cmd/cmd-inet/usr.sbin/route.c b/usr/src/cmd/cmd-inet/usr.sbin/route.c index 29ccf97bb1..17a63d6f95 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/route.c +++ b/usr/src/cmd/cmd-inet/usr.sbin/route.c @@ -1659,7 +1659,7 @@ save_route(int argc, char **argv, int do_flush) struct flock lock; struct stat st; const char commentstr[] = - "# File generated by route(1M) - do not edit.\n"; + "# File generated by route(8) - do not edit.\n"; perm_fd = open(perm_file, O_RDWR | O_CREAT, fmode); if (perm_fd == -1 || fstat(perm_fd, &st) == -1) diff --git a/usr/src/cmd/cmd-inet/usr.sbin/routeadm/forwarding.xml b/usr/src/cmd/cmd-inet/usr.sbin/routeadm/forwarding.xml index b0e777ce50..2bdcaa6299 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/routeadm/forwarding.xml +++ b/usr/src/cmd/cmd-inet/usr.sbin/routeadm/forwarding.xml @@ -23,8 +23,6 @@ CDDL HEADER END - ident "%Z%%M% %I% %E% SMI" - NOTE: This service manifest is not editable; its contents will be overwritten by package or patch operations, including operating system upgrade. Make customizations in a different @@ -110,7 +108,7 @@ value='solaris.smf.manage.routing' /> </property_group> - <!-- Properties in this group are modifiable via routeadm (1M) --> + <!-- Properties in this group are modifiable via routeadm(8) --> <property_group name='routeadm' type='application'> <propval name='default-ipv4-forwarding' type='boolean' value='false' /> @@ -132,7 +130,7 @@ </loctext> </description> <documentation> - <manpage title='routeadm' section='1M' + <manpage title='routeadm' section='8' manpath='/usr/share/man' /> </documentation> </template> @@ -214,7 +212,7 @@ value='solaris.smf.manage.routing' /> </property_group> - <!-- Properties in this group are modifiable via routeadm (1M) --> + <!-- Properties in this group are modifiable via routeadm(8) --> <property_group name='routeadm' type='application'> <propval name='default-ipv6-forwarding' type='boolean' value='false' /> @@ -236,7 +234,7 @@ </loctext> </description> <documentation> - <manpage title='routeadm' section='1M' + <manpage title='routeadm' section='8' manpath='/usr/share/man' /> </documentation> </template> diff --git a/usr/src/cmd/cmd-inet/usr.sbin/routeadm/legacy-routing.xml b/usr/src/cmd/cmd-inet/usr.sbin/routeadm/legacy-routing.xml index 5db846b48a..30902c43b5 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/routeadm/legacy-routing.xml +++ b/usr/src/cmd/cmd-inet/usr.sbin/routeadm/legacy-routing.xml @@ -23,8 +23,6 @@ CDDL HEADER END - ident "%Z%%M% %I% %E% SMI" - NOTE: This service manifest is not editable; its contents will be overwritten by package or patch operations, including operating system upgrade. Make customizations in a different @@ -96,7 +94,7 @@ <instance name='ipv4' enabled='false'> - <!-- Properties in this group are used by routeadm (1M) --> + <!-- Properties in this group are used by routeadm(8) --> <property_group name='routeadm' type='application'> <stability value='Evolving' /> <propval name='protocol' type='astring' value='ipv4' /> @@ -118,7 +116,7 @@ <instance name='ipv6' enabled='false'> - <!-- Properties in this group are used by routeadm (1M) --> + <!-- Properties in this group are used by routeadm(8) --> <property_group name='routeadm' type='application'> <stability value='Evolving' /> <propval name='protocol' type='astring' value='ipv6' /> @@ -152,7 +150,7 @@ </loctext> </description> <documentation> - <manpage title='routeadm' section='1M' + <manpage title='routeadm' section='8' manpath='/usr/share/man' /> </documentation> </template> diff --git a/usr/src/cmd/cmd-inet/usr.sbin/routeadm/routeadm.c b/usr/src/cmd/cmd-inet/usr.sbin/routeadm/routeadm.c index be826baba2..6fad8a3513 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/routeadm/routeadm.c +++ b/usr/src/cmd/cmd-inet/usr.sbin/routeadm/routeadm.c @@ -249,7 +249,7 @@ #define RA_SVC_FLAG_IPV6_ROUTING 0x2 #define RA_SMF_UPGRADE_FILE "/var/svc/profile/upgrade" -#define RA_SMF_UPGRADE_MSG " # added by routeadm(1M)" +#define RA_SMF_UPGRADE_MSG " # added by routeadm(8)" #define RA_CONF_FILE "/etc/inet/routing.conf" #define RA_CONF_FILE_OLD "/etc/inet/routing.conf.old" #define RA_MAX_CONF_LINE 256 diff --git a/usr/src/cmd/cmd-inet/usr.sbin/shell.xml b/usr/src/cmd/cmd-inet/usr.sbin/shell.xml index b841f99961..40be5f7572 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/shell.xml +++ b/usr/src/cmd/cmd-inet/usr.sbin/shell.xml @@ -92,10 +92,10 @@ </exec_method> <exec_method - type='method' - name='inetd_disable' - exec=':kill' - timeout_seconds='0'> + type='method' + name='inetd_disable' + exec=':kill' + timeout_seconds='0'> </exec_method> <property_group name='firewall_config' type='com.sun,fw_configuration'> @@ -176,9 +176,9 @@ remote shell with Kerberos authentication </loctext> </common_name> <documentation> - <manpage title='in.rshd' section='1M' + <manpage title='in.rshd' section='8' manpath='/usr/share/man' /> - <manpage title='rshd' section='1M' + <manpage title='rshd' section='8' manpath='/usr/share/man' /> </documentation> </template> diff --git a/usr/src/cmd/cmd-inet/usr.sbin/snoop/snoop_capture.c b/usr/src/cmd/cmd-inet/usr.sbin/snoop/snoop_capture.c index 5ce947b476..63eb4973a0 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/snoop/snoop_capture.c +++ b/usr/src/cmd/cmd-inet/usr.sbin/snoop/snoop_capture.c @@ -112,7 +112,7 @@ select_datalink(const char *linkname, void *arg) /* * Open `linkname' in raw/passive mode (see dlpi_open(3DLPI)). If `linkname' - * is NULL, pick a datalink as per snoop(1M). Also gather some information + * is NULL, pick a datalink as per snoop(8). Also gather some information * about the datalink useful for building the proper packet filters. */ boolean_t diff --git a/usr/src/cmd/cmd-inet/usr.sbin/socket-filter-kssl.xml b/usr/src/cmd/cmd-inet/usr.sbin/socket-filter-kssl.xml index b91fcd47ea..e821a9c964 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/socket-filter-kssl.xml +++ b/usr/src/cmd/cmd-inet/usr.sbin/socket-filter-kssl.xml @@ -41,7 +41,7 @@ grouping='require_all' restart_on='none' type='service'> - <service_fmri value='svc:/system/filesystem/root' /> + <service_fmri value='svc:/system/filesystem/root' /> </dependency> <exec_method @@ -70,15 +70,15 @@ <propval name='socket_tuples' type='astring' value='2:2:0,2:2:6,26:2:0,26:2:6' /> </property_group> - + <template> <common_name> <loctext xml:lang='C'> - kernel SSL socket filter + kernel SSL socket filter </loctext> </common_name> <documentation> - <manpage title='ksslcfg' section='1M' + <manpage title='ksslcfg' section='8' manpath='/usr/share/man' /> </documentation> </template> diff --git a/usr/src/cmd/cmd-inet/usr.sbin/telnet.xml b/usr/src/cmd/cmd-inet/usr.sbin/telnet.xml index a5425c3fc1..b2a8691372 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/telnet.xml +++ b/usr/src/cmd/cmd-inet/usr.sbin/telnet.xml @@ -98,9 +98,9 @@ in.telnetd supports the standard TELNET virtual terminal protocol. </loctext> </description> <documentation> - <manpage title='in.telnetd' section='1M' + <manpage title='in.telnetd' section='8' manpath='/usr/share/man' /> - <manpage title='telnetd' section='1M' + <manpage title='telnetd' section='8' manpath='/usr/share/man' /> </documentation> </template> diff --git a/usr/src/cmd/cmd-inet/usr.sbin/telnetd.dfl b/usr/src/cmd/cmd-inet/usr.sbin/telnetd.dfl index a712bd90fd..1228b273f1 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/telnetd.dfl +++ b/usr/src/cmd/cmd-inet/usr.sbin/telnetd.dfl @@ -1,4 +1,3 @@ -#ident "%Z%%M% %I% %E% SMI" # # Copyright 2005 Sun Microsystems, Inc. All rights reserved. # Use is subject to license terms. @@ -25,10 +24,10 @@ # # /etc/default/telnetd # -# telnetd default settings processed via telnetd(1M). +# telnetd default settings processed via telnetd(8). # # BANNER defines the connection banner which is displayed before the -# telnet login prompt, see telnetd(1M) for details. The following +# telnet login prompt, see telnetd(8) for details. The following # commented line shows the default value. # #BANNER="\\r\\n\\r\\n`uname -s` `uname -r`\\r\\n\\r\\n" diff --git a/usr/src/cmd/cmd-inet/usr.sbin/traceroute/traceroute.c b/usr/src/cmd/cmd-inet/usr.sbin/traceroute/traceroute.c index 98d452665a..1b9e1955b9 100644 --- a/usr/src/cmd/cmd-inet/usr.sbin/traceroute/traceroute.c +++ b/usr/src/cmd/cmd-inet/usr.sbin/traceroute/traceroute.c @@ -1299,7 +1299,7 @@ setup_socket(struct pr_set *pr, int packet_len) * or whether ICMP will be used instead of UDP. * * For historical reasons, the datagrams sent out by - * traceroute(1M) do not have the "don't fragment" flag set. For + * traceroute(8) do not have the "don't fragment" flag set. For * this reason as well as the ability to set the Loose Source and * Record Route (LSRR) option, a raw IP socket will be used for * IPv4 when run in the global zone. Otherwise, the actual |