summaryrefslogtreecommitdiff
path: root/usr/src/cmd/cmd-inet/usr.sbin
diff options
context:
space:
mode:
Diffstat (limited to 'usr/src/cmd/cmd-inet/usr.sbin')
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/comsat.xml4
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/finger.xml4
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/ifconfig/ifconfig.c14
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm.c12
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm_rules.c2
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm_sg.c4
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/in.rdisc/rdisc.xml8
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/in.routed/route.xml8
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/in.talkd/talk.xml4
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c6
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/inetconv/inetconv.c6
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/ipmpstat/ipmpstat.c2
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ikeadm.c2
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipsecalgs.xml6
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipsecconf.c4
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipseckey.c10
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/manual-key.xml14
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/policy.xml10
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/kssladm.c6
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/kssl-proxy.xml4
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/ksslcfg.c6
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/login.xml12
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/ndd.c12
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/ndp.c2
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/rarp.xml6
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/rexec.xml2
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/route.c2
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/routeadm/forwarding.xml10
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/routeadm/legacy-routing.xml8
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/routeadm/routeadm.c2
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/shell.xml12
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/snoop/snoop_capture.c2
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/socket-filter-kssl.xml8
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/telnet.xml4
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/telnetd.dfl5
-rw-r--r--usr/src/cmd/cmd-inet/usr.sbin/traceroute/traceroute.c2
36 files changed, 107 insertions, 118 deletions
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/comsat.xml b/usr/src/cmd/cmd-inet/usr.sbin/comsat.xml
index a66e18a02e..922cd84933 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/comsat.xml
+++ b/usr/src/cmd/cmd-inet/usr.sbin/comsat.xml
@@ -103,9 +103,9 @@ requested to be told when mail arrives.
</loctext>
</description>
<documentation>
- <manpage title='in.comsat' section='1M'
+ <manpage title='in.comsat' section='8'
manpath='/usr/share/man' />
- <manpage title='comsat' section='1M'
+ <manpage title='comsat' section='8'
manpath='/usr/share/man' />
</documentation>
</template>
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/finger.xml b/usr/src/cmd/cmd-inet/usr.sbin/finger.xml
index 2c4281d84a..565eef962c 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/finger.xml
+++ b/usr/src/cmd/cmd-inet/usr.sbin/finger.xml
@@ -101,9 +101,9 @@ status and individual users.
</loctext>
</description>
<documentation>
- <manpage title='in.fingerd' section='1M'
+ <manpage title='in.fingerd' section='8'
manpath='/usr/share/man' />
- <manpage title='fingerd' section='1M'
+ <manpage title='fingerd' section='8'
manpath='/usr/share/man' />
</documentation>
</template>
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ifconfig/ifconfig.c b/usr/src/cmd/cmd-inet/usr.sbin/ifconfig/ifconfig.c
index 9da0ed811f..0475fad29f 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/ifconfig/ifconfig.c
+++ b/usr/src/cmd/cmd-inet/usr.sbin/ifconfig/ifconfig.c
@@ -86,8 +86,8 @@ typedef struct {
} if_appflags_t;
static const if_appflags_t if_appflags_tbl[] = {
- { "dhcpagent(1M)", IFF_DHCPRUNNING, 1 },
- { "in.ndpd(1M)", IFF_ADDRCONF, 3 },
+ { "dhcpagent(8)", IFF_DHCPRUNNING, 1 },
+ { "in.ndpd(8)", IFF_ADDRCONF, 3 },
{ NULL, 0, 0 }
};
@@ -643,7 +643,7 @@ ifconfig(int argc, char *argv[], int af, struct ifaddrs *ifa)
* sometimes two or more attributes must be set together. For
* example, setting an address without a netmask does not make sense.
* Yet they can be set separately for IPv4 address using the current
- * ifconfig(1M) syntax. The kernel then "infers" the correct netmask
+ * ifconfig(8) syntax. The kernel then "infers" the correct netmask
* using the deprecated "IP address classes." This is simply not
* correct.
*
@@ -660,7 +660,7 @@ ifconfig(int argc, char *argv[], int af, struct ifaddrs *ifa)
* it will use the working interface's address to do the query.
* It will be wrong now as we don't know the logical interface's name.
*
- * ifconfig(1M) is too overloaded and the code is so convoluted
+ * ifconfig(8) is too overloaded and the code is so convoluted
* that it is "safer" not to re-architect the code to fix the above
* issue, hence this "hack." We may be better off to have a new
* command with better syntax for configuring network interface
@@ -1074,7 +1074,7 @@ setifaddr(char *addr, int64_t param)
}
/*
- * The following functions are stolen from the ipseckey(1m) program.
+ * The following functions are stolen from the ipseckey(8) program.
* Perhaps they should be somewhere common, but for now, we just maintain
* two versions. We do this because of the different semantics for which
* algorithms we select ("requested" for ifconfig vs. "actual" for key).
@@ -2244,11 +2244,11 @@ again:
}
/*
- * If the interface being moved is under the control of `ipmgmtd(1M)'
+ * If the interface being moved is under the control of `ipmgmtd(8)'
* dameon then we should inform the daemon about this move, so that
* the daemon can delete the state associated with this interface.
*
- * This workaround is needed until the IPMP support in ipadm(1M).
+ * This workaround is needed until the IPMP support in ipadm(8).
*/
ipadm_if_move(iph, name);
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm.c b/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm.c
index 949fcc064c..67de6e31ba 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm.c
+++ b/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm.c
@@ -50,7 +50,7 @@ ilbadm_errstr(ilbadm_status_t rc)
case ILBADM_ENOMEM:
return (gettext("memory allocation failure"));
case ILBADM_EINVAL:
- return (gettext("invalid value - refer to ilbadm(1M)"));
+ return (gettext("invalid value - refer to ilbadm(8)"));
case ILBADM_HCPRINT:
return (gettext("failed to print healthcheck values"));
case ILBADM_INVAL_AF:
@@ -63,7 +63,7 @@ ilbadm_errstr(ilbadm_status_t rc)
return (gettext("address is invalid"));
case ILBADM_INVAL_ARGS:
return (gettext("invalid/incompatible keywords - refer to"
- " ilbadm(1M)"));
+ " ilbadm(8)"));
case ILBADM_ENOSGNAME:
return (gettext("servergroup name missing"));
case ILBADM_ENORULE:
@@ -83,21 +83,21 @@ ilbadm_errstr(ilbadm_status_t rc)
return (gettext("operation type is invalid"));
case ILBADM_INVAL_KEYWORD:
return (gettext("keyword is invalid - please refer"
- " to ilbadm(1M)"));
+ " to ilbadm(8)"));
case ILBADM_ASSIGNREQ:
return (gettext("assignment '=' missing"));
case ILBADM_NORECURSIVE:
return (gettext("recursive import not allowed"));
case ILBADM_INVAL_COMMAND:
return (gettext("subcommand is invalid - please refer"
- " to ilbadm(1M)"));
+ " to ilbadm(8)"));
case ILBADM_ENOPROXY:
return (gettext("proxy-src is missing"));
case ILBADM_INVAL_PROXY:
return (gettext("proxy-src not allowed"));
case ILBADM_ENOOPTION:
return (gettext("mandatory argument(s) missing - refer"
- " to ilbadm(1M)"));
+ " to ilbadm(8)"));
case ILBADM_TOOMANYIPADDR:
return (gettext("address range contains more than 255"
" IP addresses"));
@@ -105,7 +105,7 @@ ilbadm_errstr(ilbadm_status_t rc)
return (gettext("could not export servergroup because"
" of lack of space"));
case ILBADM_INVAL_SYNTAX:
- return (gettext("syntax failure - refer to ilbadm(1M)"));
+ return (gettext("syntax failure - refer to ilbadm(8)"));
case ILBADM_NOKEYWORD_VAL:
return (gettext("missing value"));
case ILBADM_LIBERR:
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm_rules.c b/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm_rules.c
index f159a3b6d6..dad110a62f 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm_rules.c
+++ b/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm_rules.c
@@ -1123,7 +1123,7 @@ ilbadm_create_rule(int argc, char *argv[])
if (optind >= argc) {
ilbadm_err(gettext("missing mandatory arguments - please refer"
" to 'ilbadm create-rule' subcommand description in"
- " ilbadm(1M)"));
+ " ilbadm(8)"));
rc = ILBADM_LIBERR;
goto out;
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm_sg.c b/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm_sg.c
index 8a0d92bbd7..a27ac5c95a 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm_sg.c
+++ b/usr/src/cmd/cmd-inet/usr.sbin/ilbadm/ilbadm_sg.c
@@ -467,7 +467,7 @@ ilbadm_create_servergroup(int argc, char *argv[])
if (optind >= argc) {
ilbadm_err(gettext("missing mandatory arguments - please refer"
" to 'create-servergroup' subcommand"
- " description in ilbadm(1M)"));
+ " description in ilbadm(8)"));
rc = ILBADM_LIBERR;
goto out;
}
@@ -546,7 +546,7 @@ ilbadm_add_server_to_group(int argc, char **argv)
if (optind >= argc) {
ilbadm_err(gettext("missing mandatory arguments - please refer"
- " to 'add-server' subcommand description in ilbadm(1M)"));
+ " to 'add-server' subcommand description in ilbadm(8)"));
rc = ILBADM_LIBERR;
goto out;
}
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/in.rdisc/rdisc.xml b/usr/src/cmd/cmd-inet/usr.sbin/in.rdisc/rdisc.xml
index eb223ee0e4..2ef0b8701b 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/in.rdisc/rdisc.xml
+++ b/usr/src/cmd/cmd-inet/usr.sbin/in.rdisc/rdisc.xml
@@ -78,7 +78,7 @@ privileges='basic,proc_owner,proc_fork,proc_exec,proc_info,proc_session,file_cho
value='solaris.smf.manage.routing' />
</property_group>
- <!-- Properties in this group are used by routeadm (1M) -->
+ <!-- Properties in this group are used by routeadm(8) -->
<property_group name='routeadm' type='application'>
<stability value='Unstable' />
<propval name='protocol' type='astring' value='ipv4' />
@@ -89,7 +89,7 @@ privileges='basic,proc_owner,proc_fork,proc_exec,proc_info,proc_session,file_cho
</property_group>
- <!-- Properties in this group are modifiable via routeadm (1M) -->
+ <!-- Properties in this group are modifiable via routeadm(8) -->
<property_group name='routing' type='application'>
<stability value='Evolving' />
@@ -102,7 +102,7 @@ privileges='basic,proc_owner,proc_fork,proc_exec,proc_info,proc_session,file_cho
<!-- Equivalent to -r option if true -->
<propval name='act_as_router' type='boolean' value='false' />
- <!-- Equivalent to -a option if true -->
+ <!-- Equivalent to -a option if true -->
<propval name='accept_all' type='boolean' value='false' />
<!-- Equivalent to -p preference option if set -->
@@ -127,7 +127,7 @@ privileges='basic,proc_owner,proc_fork,proc_exec,proc_info,proc_session,file_cho
</loctext>
</common_name>
<documentation>
- <manpage title='in.rdisc' section='1M'
+ <manpage title='in.rdisc' section='8'
manpath='/usr/share/man' />
</documentation>
</template>
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/in.routed/route.xml b/usr/src/cmd/cmd-inet/usr.sbin/in.routed/route.xml
index 530ec5bda7..e9d73eb57f 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/in.routed/route.xml
+++ b/usr/src/cmd/cmd-inet/usr.sbin/in.routed/route.xml
@@ -80,7 +80,7 @@ privileges='basic,proc_owner,proc_fork,proc_exec,proc_info,proc_session,file_cho
value='solaris.smf.manage.routing' />
</property_group>
- <!-- Properties in this group are used by routeadm (1M) -->
+ <!-- Properties in this group are used by routeadm(8) -->
<property_group name='routeadm' type='application'>
<stability value='Unstable' />
<propval name='protocol' type='astring' value='ipv4' />
@@ -90,7 +90,7 @@ privileges='basic,proc_owner,proc_fork,proc_exec,proc_info,proc_session,file_cho
value='solaris.smf.value.routing' />
</property_group>
- <!-- Properties in this group are modifiable via routeadm (1M) -->
+ <!-- Properties in this group are modifiable via routeadm(8) -->
<property_group name='routing' type='application'>
<stability value='Evolving' />
@@ -122,7 +122,7 @@ privileges='basic,proc_owner,proc_fork,proc_exec,proc_info,proc_session,file_cho
<propval name='quiet_mode' type='boolean' value='false' />
<!-- Equivalent to -s option if true -->
- <propval name='supply_routes' type='boolean' value='false' />
+ <propval name='supply_routes' type='boolean' value='false' />
<!-- Equivalent to -S option if true -->
<propval name='default_routes_only' type='boolean'
@@ -162,7 +162,7 @@ privileges='basic,proc_owner,proc_fork,proc_exec,proc_info,proc_session,file_cho
</loctext>
</common_name>
<documentation>
- <manpage title='in.routed' section='1M'
+ <manpage title='in.routed' section='8'
manpath='/usr/share/man' />
</documentation>
</template>
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/in.talkd/talk.xml b/usr/src/cmd/cmd-inet/usr.sbin/in.talkd/talk.xml
index c4d2494095..29b70d09cf 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/in.talkd/talk.xml
+++ b/usr/src/cmd/cmd-inet/usr.sbin/in.talkd/talk.xml
@@ -102,9 +102,9 @@
</loctext>
</description>
<documentation>
- <manpage title='in.talkd' section='1M'
+ <manpage title='in.talkd' section='8'
manpath='/usr/share/man' />
- <manpage title='talkd' section='1M'
+ <manpage title='talkd' section='8'
manpath='/usr/share/man' />
</documentation>
</template>
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c b/usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
index bbd38a551c..08ad200c45 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
+++ b/usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
@@ -488,7 +488,7 @@ rd_and_store_forwarded_creds(krb5_context context,
if ((retval = krb5_cc_close(context, ccache)) != 0)
goto cleanup;
- /* Register with ktkt_warnd(1M) */
+ /* Register with ktkt_warnd(8) */
if ((retval = krb5_unparse_name(context, (*creds)->client,
&client_name)) != 0)
goto cleanup;
@@ -496,11 +496,11 @@ rd_and_store_forwarded_creds(krb5_context context,
if (kwarn_add_warning(client_name, (*creds)->times.endtime) != 0) {
syslog(LOG_AUTH|LOG_NOTICE,
"rd_and_store_forwarded_creds: kwarn_add_warning"
- " failed: ktkt_warnd(1M) down? ");
+ " failed: ktkt_warnd(8) down? ");
if (auth_debug)
(void) fprintf(stderr,
"kwarn_add_warning failed:"
- " ktkt_warnd(1M) down?\n");
+ " ktkt_warnd(8) down?\n");
}
free(client_name);
client_name = NULL;
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/inetconv/inetconv.c b/usr/src/cmd/cmd-inet/usr.sbin/inetconv/inetconv.c
index 6419f9e074..376454019f 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/inetconv/inetconv.c
+++ b/usr/src/cmd/cmd-inet/usr.sbin/inetconv/inetconv.c
@@ -24,8 +24,8 @@
*/
/*
- * inetconv - convert inetd.conf entries into smf(5) service manifests,
- * import them into smf(5) repository
+ * inetconv - convert inetd.conf entries into smf(7) service manifests,
+ * import them into smf(7) repository
*/
#include <sys/types.h>
@@ -115,7 +115,7 @@ static const char xml_comment[] =
"<!--\n"
" Service manifest for the %s service.\n"
"\n"
-" Generated by inetconv(1M) from inetd.conf(4).\n"
+" Generated by inetconv(8) from inetd.conf(5).\n"
"-->\n\n";
static const char xml_service_bundle[] =
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ipmpstat/ipmpstat.c b/usr/src/cmd/cmd-inet/usr.sbin/ipmpstat/ipmpstat.c
index c9cbade079..a5d8f79bc4 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/ipmpstat/ipmpstat.c
+++ b/usr/src/cmd/cmd-inet/usr.sbin/ipmpstat/ipmpstat.c
@@ -280,7 +280,7 @@ main(int argc, char **argv)
die_ipmperr(err, "cannot create IPMP handle");
if (ipmp_ping_daemon(ih) != IPMP_SUCCESS)
- die("cannot contact in.mpathd(1M) -- is IPMP in use?\n");
+ die("cannot contact in.mpathd(8) -- is IPMP in use?\n");
/*
* If we've been asked to display probes, then call the probe output
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ikeadm.c b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ikeadm.c
index e6257c6184..5ca927ca40 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ikeadm.c
+++ b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ikeadm.c
@@ -2253,7 +2253,7 @@ print_defaults(char *label, char *description, char *unit,
* two ike_defaults_t's, the first contains the hard coded defaults, the second
* contains the actual values used. If these differ, then the defaults have been
* changed via a config file entry. Note that "-" indicates this default
- * is not tunable via ike.config(4) or is system wide tunable.
+ * is not tunable via ike.config(5) or is system wide tunable.
*/
static void
do_print_defaults(ike_defaults_t *dp)
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipsecalgs.xml b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipsecalgs.xml
index cdf27133de..4d620d059d 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipsecalgs.xml
+++ b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipsecalgs.xml
@@ -113,7 +113,7 @@
svcadm mark <state> ipsecalgs
svcadm clear ipsecalgs
- see auths(1) and user_attr(4)-->
+ see auths(1) and user_attr(5)-->
<propval
name='action_authorization'
@@ -125,7 +125,7 @@
svcadm disable ipsecalgs
svcadm enable ipsecalgs
- see auths(1) and user_attr(4)-->
+ see auths(1) and user_attr(5)-->
<propval
name='value_authorization'
type='astring'
@@ -158,7 +158,7 @@
<documentation>
<manpage
title='ipsecalgs'
- section='1M'
+ section='8'
manpath='/usr/share/man'
/>
</documentation>
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipsecconf.c b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipsecconf.c
index e8203530b4..fc94afe658 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipsecconf.c
+++ b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipsecconf.c
@@ -1341,7 +1341,7 @@ main(int argc, char *argv[])
boolean_t replace_policy = B_FALSE;
char *smf_warning = gettext(
- "\n\tIPsec policy should be managed using smf(5). Modifying\n"
+ "\n\tIPsec policy should be managed using smf(7). Modifying\n"
"\tthe IPsec policy from the command line while the 'policy'\n"
"\tservice is enabled could result in an inconsistent\n"
"\tsecurity policy.\n\n");
@@ -5247,7 +5247,7 @@ ipsec_conf_add(boolean_t just_check, boolean_t smf_managed, boolean_t replace)
/*
* Treat the non-existence of a policy file as a special
- * case when ipsecconf is being managed by smf(5).
+ * case when ipsecconf is being managed by smf(7).
* The assumption is the administrator has not yet
* created a policy file, this should not force the service
* into maintenance mode.
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipseckey.c b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipseckey.c
index 9667fa4047..cbf429a3e7 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipseckey.c
+++ b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ipseckey.c
@@ -191,7 +191,7 @@ handle_errors(char *ep, char *ebuf, boolean_t fatal, boolean_t done)
if (ep != NULL) {
if (my_fmri == NULL) {
/*
- * For now suppress the errors when run from smf(5)
+ * For now suppress the errors when run from smf(7)
* because potentially sensitive information could
* end up in a publicly readable logfile.
*/
@@ -1093,7 +1093,7 @@ dodump(int satype, FILE *ofile)
(void) fprintf(ofile,
gettext("# This key file was generated by the"));
(void) fprintf(ofile,
- gettext(" ipseckey(1m) command's 'save' feature.\n\n"));
+ gettext(" ipseckey(8) command's 'save' feature.\n\n"));
}
msg_init(msg, SADB_DUMP, (uint8_t)satype);
rc = key_write(keysock, msg, sizeof (*msg));
@@ -3590,7 +3590,7 @@ main(int argc, char *argv[])
(void) textdomain(TEXT_DOMAIN);
/*
- * Check to see if the command is being run from smf(5).
+ * Check to see if the command is being run from smf(7).
*/
my_fmri = getenv("SMF_FMRI");
@@ -3649,7 +3649,7 @@ main(int argc, char *argv[])
* this file if the file is root owned and only readable
* by privileged users. If the command is being run by
* the administrator, issue a warning, if this is run by
- * smf(5) (IE: boot time) and the permissions are too
+ * smf(7) (IE: boot time) and the permissions are too
* open, we will fail, the SMF service will end up in
* maintenace mode. The check is made with fstat() to
* eliminate any possible TOT to TOU window.
@@ -3719,7 +3719,7 @@ main(int argc, char *argv[])
}
/*
- * When run from smf(5) flush any existing SA's first
+ * When run from smf(7) flush any existing SA's first
* otherwise you will end up in maintenance mode.
*/
if ((my_fmri != NULL) && readfile) {
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/manual-key.xml b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/manual-key.xml
index d1dac2b94c..fb4fd47374 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/manual-key.xml
+++ b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/manual-key.xml
@@ -23,8 +23,6 @@
CDDL HEADER END
- ident "%Z%%M% %I% %E% SMI"
-
NOTE: This service manifest is not editable; its contents will
be overwritten by package or patch operations, including
operating system upgrade. Make customizations in a different
@@ -86,7 +84,7 @@
<!-- To prevent ipseckey generating warnings about duplicate
SAs when the service is refreshed, ipseckey will flush the
- existing SAs when its called from smf(5). -->
+ existing SAs when its called from smf(7). -->
<exec_method
type='method'
@@ -110,7 +108,7 @@
svcadm mark <state> manual-key
svcadm clear manual-key
- see auths(1) and user_attr(4)-->
+ see auths(1) and user_attr(5)-->
<propval
name='action_authorization'
@@ -122,7 +120,7 @@
svcadm disable manual-key
svcadm enable manual-key
- see auths(1) and user_attr(4)-->
+ see auths(1) and user_attr(5)-->
<propval
name='value_authorization'
@@ -132,8 +130,8 @@
</property_group>
<!-- The properties defined below can be changed by a user
- with 'solaris.smf.value.ipsec' authorization using the
- svccfg(1M) command.
+ with 'solaris.smf.value.ipsec' authorization using the
+ svccfg(8) command.
EG:
@@ -183,7 +181,7 @@
</loctext>
</description>
<documentation>
- <manpage title='ipseckey' section='1M'
+ <manpage title='ipseckey' section='8'
manpath='/usr/share/man' />
</documentation>
</template>
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/policy.xml b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/policy.xml
index 297e48d1b4..d63c65c3a4 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/policy.xml
+++ b/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/policy.xml
@@ -102,7 +102,7 @@
svcadm mark <state> policy
svcadm clear policy
- see auths(1) and user_attr(4)-->
+ see auths(1) and user_attr(5)-->
<propval
name='action_authorization'
@@ -113,7 +113,7 @@
svcadm disable policy
svcadm enable policy
- see auths(1) and user_attr(4)-->
+ see auths(1) and user_attr(5)-->
<propval
name='value_authorization'
@@ -123,8 +123,8 @@
</property_group>
<!-- The properties defined below can be changed by a user
- with 'solaris.smf.value.ipsec' authorization using the
- svccfg(1M) command.
+ with 'solaris.smf.value.ipsec' authorization using the
+ svccfg(8) command.
EG:
@@ -176,7 +176,7 @@
</loctext>
</description>
<documentation>
- <manpage title='ipsecconf' section='1M'
+ <manpage title='ipsecconf' section='8'
manpath='/usr/share/man' />
</documentation>
</template>
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/kssladm.c b/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/kssladm.c
index c2978c564f..7eab57d0cc 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/kssladm.c
+++ b/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/kssladm.c
@@ -23,8 +23,6 @@
* Use is subject to license terms.
*/
-#pragma ident "%Z%%M% %I% %E% SMI"
-
#include <ctype.h>
#include <stdio.h>
#include <stdlib.h>
@@ -39,10 +37,10 @@
/*
- * kssladm(1M)
+ * kssladm(8)
*
* Command to manage the entries in kernel SSL proxy table. This is
- * a private command called indirectly from ksslcfg(1M).
+ * a private command called indirectly from ksslcfg(8).
*/
boolean_t verbose = B_FALSE;
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/kssl-proxy.xml b/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/kssl-proxy.xml
index e2be94717c..3728239974 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/kssl-proxy.xml
+++ b/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/kssl-proxy.xml
@@ -40,7 +40,7 @@
grouping='require_all'
restart_on='restart'
type='service'>
- <service_fmri value='svc:/network/socket-filter:kssl' />
+ <service_fmri value='svc:/network/socket-filter:kssl' />
</dependency>
<dependency
@@ -72,7 +72,7 @@
</loctext>
</common_name>
<documentation>
- <manpage title='ksslcfg' section='1M'
+ <manpage title='ksslcfg' section='8'
manpath='/usr/share/man' />
</documentation>
</template>
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/ksslcfg.c b/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/ksslcfg.c
index 8b9a33349d..84336d0923 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/ksslcfg.c
+++ b/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/ksslcfg.c
@@ -38,10 +38,10 @@
#include "ksslcfg.h"
/*
- * ksslcfg(1M)
+ * ksslcfg(8)
*
- * ksslcfg manages smf(5) instances for the Kernel SSL proxy module.
- * It makes use of kssladm(1M) which does the grunt work.
+ * ksslcfg manages smf(7) instances for the Kernel SSL proxy module.
+ * It makes use of kssladm(8) which does the grunt work.
*/
/*
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/login.xml b/usr/src/cmd/cmd-inet/usr.sbin/login.xml
index f21084da5f..ba4d875d5f 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/login.xml
+++ b/usr/src/cmd/cmd-inet/usr.sbin/login.xml
@@ -45,7 +45,7 @@
<service_fmri value='svc:/network/inetd:default' />
</restarter>
- <property_group name='inetd' type='framework'>
+ <property_group name='inetd' type='framework'>
<stability value='Evolving' />
<propval name='endpoint_type' type='astring' value='stream' />
<propval name='wait' type='boolean' value='false' />
@@ -87,7 +87,7 @@
value='solaris.smf.value.firewall.config' />
</property_group>
- <property_group name='inetd' type='framework'>
+ <property_group name='inetd' type='framework'>
<propval name='name' type='astring' value='login' />
<propval name='proto' type='astring' value='tcp6' />
</property_group>
@@ -134,7 +134,7 @@
</property_group>
<!-- Only works over IPv4 at the moment -->
- <property_group name='inetd' type='framework'>
+ <property_group name='inetd' type='framework'>
<propval name='name' type='astring' value='klogin' />
<propval name='proto' type='astring' value='tcp' />
</property_group>
@@ -182,7 +182,7 @@ remote login with Kerberos authentication
</property_group>
<!-- Only works over IPv4 at the moment -->
- <property_group name='inetd' type='framework'>
+ <property_group name='inetd' type='framework'>
<propval name='name' type='astring' value='eklogin' />
<propval name='proto' type='astring' value='tcp' />
</property_group>
@@ -205,9 +205,9 @@ remote login with Kerberos authentication and encryption
</loctext>
</common_name>
<documentation>
- <manpage title='in.rlogind' section='1M'
+ <manpage title='in.rlogind' section='8'
manpath='/usr/share/man' />
- <manpage title='rlogind' section='1M'
+ <manpage title='rlogind' section='8'
manpath='/usr/share/man' />
</documentation>
</template>
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ndd.c b/usr/src/cmd/cmd-inet/usr.sbin/ndd.c
index 8d5fdfa91f..9adf3c8d2d 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/ndd.c
+++ b/usr/src/cmd/cmd-inet/usr.sbin/ndd.c
@@ -170,8 +170,8 @@ ndd_perm2str(uint_t perm)
* - replace leading underscores with protocol name.
* For example: `_strong_iss' --> `tcp_strong_iss'
*
- * - don't print new public properties that are supported only by ipadm(1M)
- * For example: `hostmodel' should be supported only from ipadm(1M).
+ * - don't print new public properties that are supported only by ipadm(8)
+ * For example: `hostmodel' should be supported only from ipadm(8).
* Such properties are identified by not having leading '_' and not
* being present in the mapping table.
*/
@@ -211,7 +211,7 @@ print_ipadm2ndd(char *oldbuf, uint_t obufsize)
}
/*
* print only if it's a private property. We should
- * not be printing any new public property in ndd(1M)
+ * not be printing any new public property in ndd(8)
* output.
*/
if (!matched && pname[0] == '_') {
@@ -234,7 +234,7 @@ print_ipadm2ndd(char *oldbuf, uint_t obufsize)
* get/set the value for a given property by calling into libipadm. The
* IPH_LEGACY flag is used by libipadm for special handling. For some
* properties, libipadm.so displays strings (for e.g., on/off,
- * never/passive/active, et al) instead of numerals. However ndd(1M) always
+ * never/passive/active, et al) instead of numerals. However ndd(8) always
* printed numberals. This flag will help in avoiding printing strings.
*/
static boolean_t
@@ -270,7 +270,7 @@ do_ipadm_getset(int cmd, char *buf, int buflen)
}
if (nimap->ndd_name == NULL && strcmp(pname, "?") != 0) {
- /* do not allow set/get of public properties from ndd(1M) */
+ /* do not allow set/get of public properties from ndd(8) */
if (ipadm_legacy2new_propname(pname, nname, sizeof (nname),
&proto) != 0) {
status = IPADM_PROP_UNKNOWN;
@@ -371,7 +371,7 @@ gldv3_warning(char *module)
"WARNING: The ndd commands for datalink "
"administration are obsolete and may be "
"removed in a future release of Solaris. "
- "Use dladm(1M) to manage datalink tunables.\n"));
+ "Use dladm(8) to manage datalink tunables.\n"));
}
}
dladm_close(handle);
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/ndp.c b/usr/src/cmd/cmd-inet/usr.sbin/ndp.c
index 2fc19775ad..c77e1587d9 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/ndp.c
+++ b/usr/src/cmd/cmd-inet/usr.sbin/ndp.c
@@ -106,7 +106,7 @@ static boolean_t ndp_run = B_TRUE;
#define NETSTAT_PATH "/usr/bin/netstat"
/*
- * Macros borrowed from route(1M) for working with PF_ROUTE messages
+ * Macros borrowed from route(8) for working with PF_ROUTE messages
*/
#define RT_ADVANCE(x, n) ((x) += ndp_salen(n))
#define RT_NEXTADDR(cp, w, u) \
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/rarp.xml b/usr/src/cmd/cmd-inet/usr.sbin/rarp.xml
index de1c254018..d7e052396b 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/rarp.xml
+++ b/usr/src/cmd/cmd-inet/usr.sbin/rarp.xml
@@ -24,8 +24,6 @@
CDDL HEADER END
- ident "%Z%%M% %I% %E% SMI"
-
NOTE: This service manifest is not editable; its contents will
be overwritten by package or patch operations, including
operating system upgrade. Make customizations in a different
@@ -104,9 +102,9 @@ Reverse Address Resolution Protocol (RARP) server
</loctext>
</common_name>
<documentation>
- <manpage title='rarp' section='7P'
+ <manpage title='rarp' section='4P'
manpath='/usr/share/man' />
- <manpage title='in.rarpd' section='1M'
+ <manpage title='in.rarpd' section='8'
manpath='/usr/share/man' />
</documentation>
</template>
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/rexec.xml b/usr/src/cmd/cmd-inet/usr.sbin/rexec.xml
index 98f83f3102..2514e2a04e 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/rexec.xml
+++ b/usr/src/cmd/cmd-inet/usr.sbin/rexec.xml
@@ -106,7 +106,7 @@
</loctext>
</common_name>
<documentation>
- <manpage title='in.rexecd' section='1M'
+ <manpage title='in.rexecd' section='8'
manpath='/usr/share/man' />
</documentation>
</template>
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/route.c b/usr/src/cmd/cmd-inet/usr.sbin/route.c
index 29ccf97bb1..17a63d6f95 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/route.c
+++ b/usr/src/cmd/cmd-inet/usr.sbin/route.c
@@ -1659,7 +1659,7 @@ save_route(int argc, char **argv, int do_flush)
struct flock lock;
struct stat st;
const char commentstr[] =
- "# File generated by route(1M) - do not edit.\n";
+ "# File generated by route(8) - do not edit.\n";
perm_fd = open(perm_file, O_RDWR | O_CREAT, fmode);
if (perm_fd == -1 || fstat(perm_fd, &st) == -1)
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/routeadm/forwarding.xml b/usr/src/cmd/cmd-inet/usr.sbin/routeadm/forwarding.xml
index b0e777ce50..2bdcaa6299 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/routeadm/forwarding.xml
+++ b/usr/src/cmd/cmd-inet/usr.sbin/routeadm/forwarding.xml
@@ -23,8 +23,6 @@
CDDL HEADER END
- ident "%Z%%M% %I% %E% SMI"
-
NOTE: This service manifest is not editable; its contents will
be overwritten by package or patch operations, including
operating system upgrade. Make customizations in a different
@@ -110,7 +108,7 @@
value='solaris.smf.manage.routing' />
</property_group>
- <!-- Properties in this group are modifiable via routeadm (1M) -->
+ <!-- Properties in this group are modifiable via routeadm(8) -->
<property_group name='routeadm' type='application'>
<propval name='default-ipv4-forwarding' type='boolean'
value='false' />
@@ -132,7 +130,7 @@
</loctext>
</description>
<documentation>
- <manpage title='routeadm' section='1M'
+ <manpage title='routeadm' section='8'
manpath='/usr/share/man' />
</documentation>
</template>
@@ -214,7 +212,7 @@
value='solaris.smf.manage.routing' />
</property_group>
- <!-- Properties in this group are modifiable via routeadm (1M) -->
+ <!-- Properties in this group are modifiable via routeadm(8) -->
<property_group name='routeadm' type='application'>
<propval name='default-ipv6-forwarding' type='boolean'
value='false' />
@@ -236,7 +234,7 @@
</loctext>
</description>
<documentation>
- <manpage title='routeadm' section='1M'
+ <manpage title='routeadm' section='8'
manpath='/usr/share/man' />
</documentation>
</template>
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/routeadm/legacy-routing.xml b/usr/src/cmd/cmd-inet/usr.sbin/routeadm/legacy-routing.xml
index 5db846b48a..30902c43b5 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/routeadm/legacy-routing.xml
+++ b/usr/src/cmd/cmd-inet/usr.sbin/routeadm/legacy-routing.xml
@@ -23,8 +23,6 @@
CDDL HEADER END
- ident "%Z%%M% %I% %E% SMI"
-
NOTE: This service manifest is not editable; its contents will
be overwritten by package or patch operations, including
operating system upgrade. Make customizations in a different
@@ -96,7 +94,7 @@
<instance name='ipv4' enabled='false'>
- <!-- Properties in this group are used by routeadm (1M) -->
+ <!-- Properties in this group are used by routeadm(8) -->
<property_group name='routeadm' type='application'>
<stability value='Evolving' />
<propval name='protocol' type='astring' value='ipv4' />
@@ -118,7 +116,7 @@
<instance name='ipv6' enabled='false'>
- <!-- Properties in this group are used by routeadm (1M) -->
+ <!-- Properties in this group are used by routeadm(8) -->
<property_group name='routeadm' type='application'>
<stability value='Evolving' />
<propval name='protocol' type='astring' value='ipv6' />
@@ -152,7 +150,7 @@
</loctext>
</description>
<documentation>
- <manpage title='routeadm' section='1M'
+ <manpage title='routeadm' section='8'
manpath='/usr/share/man' />
</documentation>
</template>
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/routeadm/routeadm.c b/usr/src/cmd/cmd-inet/usr.sbin/routeadm/routeadm.c
index be826baba2..6fad8a3513 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/routeadm/routeadm.c
+++ b/usr/src/cmd/cmd-inet/usr.sbin/routeadm/routeadm.c
@@ -249,7 +249,7 @@
#define RA_SVC_FLAG_IPV6_ROUTING 0x2
#define RA_SMF_UPGRADE_FILE "/var/svc/profile/upgrade"
-#define RA_SMF_UPGRADE_MSG " # added by routeadm(1M)"
+#define RA_SMF_UPGRADE_MSG " # added by routeadm(8)"
#define RA_CONF_FILE "/etc/inet/routing.conf"
#define RA_CONF_FILE_OLD "/etc/inet/routing.conf.old"
#define RA_MAX_CONF_LINE 256
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/shell.xml b/usr/src/cmd/cmd-inet/usr.sbin/shell.xml
index b841f99961..40be5f7572 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/shell.xml
+++ b/usr/src/cmd/cmd-inet/usr.sbin/shell.xml
@@ -92,10 +92,10 @@
</exec_method>
<exec_method
- type='method'
- name='inetd_disable'
- exec=':kill'
- timeout_seconds='0'>
+ type='method'
+ name='inetd_disable'
+ exec=':kill'
+ timeout_seconds='0'>
</exec_method>
<property_group name='firewall_config' type='com.sun,fw_configuration'>
@@ -176,9 +176,9 @@ remote shell with Kerberos authentication
</loctext>
</common_name>
<documentation>
- <manpage title='in.rshd' section='1M'
+ <manpage title='in.rshd' section='8'
manpath='/usr/share/man' />
- <manpage title='rshd' section='1M'
+ <manpage title='rshd' section='8'
manpath='/usr/share/man' />
</documentation>
</template>
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/snoop/snoop_capture.c b/usr/src/cmd/cmd-inet/usr.sbin/snoop/snoop_capture.c
index 5ce947b476..63eb4973a0 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/snoop/snoop_capture.c
+++ b/usr/src/cmd/cmd-inet/usr.sbin/snoop/snoop_capture.c
@@ -112,7 +112,7 @@ select_datalink(const char *linkname, void *arg)
/*
* Open `linkname' in raw/passive mode (see dlpi_open(3DLPI)). If `linkname'
- * is NULL, pick a datalink as per snoop(1M). Also gather some information
+ * is NULL, pick a datalink as per snoop(8). Also gather some information
* about the datalink useful for building the proper packet filters.
*/
boolean_t
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/socket-filter-kssl.xml b/usr/src/cmd/cmd-inet/usr.sbin/socket-filter-kssl.xml
index b91fcd47ea..e821a9c964 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/socket-filter-kssl.xml
+++ b/usr/src/cmd/cmd-inet/usr.sbin/socket-filter-kssl.xml
@@ -41,7 +41,7 @@
grouping='require_all'
restart_on='none'
type='service'>
- <service_fmri value='svc:/system/filesystem/root' />
+ <service_fmri value='svc:/system/filesystem/root' />
</dependency>
<exec_method
@@ -70,15 +70,15 @@
<propval name='socket_tuples' type='astring'
value='2:2:0,2:2:6,26:2:0,26:2:6' />
</property_group>
-
+
<template>
<common_name>
<loctext xml:lang='C'>
- kernel SSL socket filter
+ kernel SSL socket filter
</loctext>
</common_name>
<documentation>
- <manpage title='ksslcfg' section='1M'
+ <manpage title='ksslcfg' section='8'
manpath='/usr/share/man' />
</documentation>
</template>
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/telnet.xml b/usr/src/cmd/cmd-inet/usr.sbin/telnet.xml
index a5425c3fc1..b2a8691372 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/telnet.xml
+++ b/usr/src/cmd/cmd-inet/usr.sbin/telnet.xml
@@ -98,9 +98,9 @@ in.telnetd supports the standard TELNET virtual terminal protocol.
</loctext>
</description>
<documentation>
- <manpage title='in.telnetd' section='1M'
+ <manpage title='in.telnetd' section='8'
manpath='/usr/share/man' />
- <manpage title='telnetd' section='1M'
+ <manpage title='telnetd' section='8'
manpath='/usr/share/man' />
</documentation>
</template>
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/telnetd.dfl b/usr/src/cmd/cmd-inet/usr.sbin/telnetd.dfl
index a712bd90fd..1228b273f1 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/telnetd.dfl
+++ b/usr/src/cmd/cmd-inet/usr.sbin/telnetd.dfl
@@ -1,4 +1,3 @@
-#ident "%Z%%M% %I% %E% SMI"
#
# Copyright 2005 Sun Microsystems, Inc. All rights reserved.
# Use is subject to license terms.
@@ -25,10 +24,10 @@
#
# /etc/default/telnetd
#
-# telnetd default settings processed via telnetd(1M).
+# telnetd default settings processed via telnetd(8).
#
# BANNER defines the connection banner which is displayed before the
-# telnet login prompt, see telnetd(1M) for details. The following
+# telnet login prompt, see telnetd(8) for details. The following
# commented line shows the default value.
#
#BANNER="\\r\\n\\r\\n`uname -s` `uname -r`\\r\\n\\r\\n"
diff --git a/usr/src/cmd/cmd-inet/usr.sbin/traceroute/traceroute.c b/usr/src/cmd/cmd-inet/usr.sbin/traceroute/traceroute.c
index 98d452665a..1b9e1955b9 100644
--- a/usr/src/cmd/cmd-inet/usr.sbin/traceroute/traceroute.c
+++ b/usr/src/cmd/cmd-inet/usr.sbin/traceroute/traceroute.c
@@ -1299,7 +1299,7 @@ setup_socket(struct pr_set *pr, int packet_len)
* or whether ICMP will be used instead of UDP.
*
* For historical reasons, the datagrams sent out by
- * traceroute(1M) do not have the "don't fragment" flag set. For
+ * traceroute(8) do not have the "don't fragment" flag set. For
* this reason as well as the ability to set the Loose Source and
* Record Route (LSRR) option, a raw IP socket will be used for
* IPv4 when run in the global zone. Otherwise, the actual