[netfilter-cvslog] r7473 - in trunk/iptables: . extensions

kaber at trash.net kaber at trash.net
Sun Apr 13 07:28:31 CEST 2008


Author: kaber at trash.net
Date: 2008-04-13 07:28:31 +0200 (Sun, 13 Apr 2008)
New Revision: 7473

Modified:
   trunk/iptables/extensions/libip6t_frag.man
   trunk/iptables/extensions/libipt_SAME.man
   trunk/iptables/extensions/libxt_NFQUEUE.man
   trunk/iptables/extensions/libxt_connbytes.man
   trunk/iptables/extensions/libxt_dscp.man
   trunk/iptables/extensions/libxt_hashlimit.man
   trunk/iptables/ip6tables.8.in
   trunk/iptables/ip6tables.c
   trunk/iptables/iptables.8.in
   trunk/iptables/iptables.c
Log:
[PATCH 10/13] manpages: grammar and spelling


Modified: trunk/iptables/extensions/libip6t_frag.man
===================================================================
--- trunk/iptables/extensions/libip6t_frag.man	2008-04-13 05:27:29 UTC (rev 7472)
+++ trunk/iptables/extensions/libip6t_frag.man	2008-04-13 05:28:31 UTC (rev 7473)
@@ -17,4 +17,4 @@
 Matches if there are more fragments.
 .TP
 .BR "[--fraglast]"
-Matches if this is the last fragement.
+Matches if this is the last fragment.

Modified: trunk/iptables/extensions/libipt_SAME.man
===================================================================
--- trunk/iptables/extensions/libipt_SAME.man	2008-04-13 05:27:29 UTC (rev 7472)
+++ trunk/iptables/extensions/libipt_SAME.man	2008-04-13 05:28:31 UTC (rev 7473)
@@ -11,5 +11,5 @@
 new source-ip
 .TP
 .B "--random"
-Port mapping will be forcely randomized to avoid attacks based on 
+Port mapping will be forcibly randomized to avoid attacks based on 
 port prediction (kernel >= 2.6.21).

Modified: trunk/iptables/extensions/libxt_NFQUEUE.man
===================================================================
--- trunk/iptables/extensions/libxt_NFQUEUE.man	2008-04-13 05:27:29 UTC (rev 7472)
+++ trunk/iptables/extensions/libxt_NFQUEUE.man	2008-04-13 05:28:31 UTC (rev 7473)
@@ -3,7 +3,7 @@
 number.  
 .TP
 \fB--queue-num\fP \fIvalue\fP
-This specifies the QUEUE number to use. Valud queue numbers are 0 to 65535. The default value is 0.
+This specifies the QUEUE number to use. Valid queue numbers are 0 to 65535. The default value is 0.
 .TP
 It can only be used with Kernel versions 2.6.14 or later, since it requires
 the

Modified: trunk/iptables/extensions/libxt_connbytes.man
===================================================================
--- trunk/iptables/extensions/libxt_connbytes.man	2008-04-13 05:27:29 UTC (rev 7472)
+++ trunk/iptables/extensions/libxt_connbytes.man	2008-04-13 05:28:31 UTC (rev 7473)
@@ -1,5 +1,5 @@
 Match by how many bytes or packets a connection (or one of the two
-flows constituting the connection) have tranferred so far, or by
+flows constituting the connection) has transferred so far, or by
 average bytes per packet.
 
 The counters are 64bit and are thus not expected to overflow ;)
@@ -7,7 +7,7 @@
 The primary use is to detect long-lived downloads and mark them to be
 scheduled using a lower priority band in traffic control.
 
-The transfered bytes per connection can also be viewed through
+The transferred bytes per connection can also be viewed through
 /proc/net/ip_conntrack and accessed via ctnetlink
 .TP
 [\fB!\fP] \fB--connbytes\fP \fIfrom\fP[\fB:\fR\fIto\fP]

Modified: trunk/iptables/extensions/libxt_dscp.man
===================================================================
--- trunk/iptables/extensions/libxt_dscp.man	2008-04-13 05:27:29 UTC (rev 7472)
+++ trunk/iptables/extensions/libxt_dscp.man	2008-04-13 05:28:31 UTC (rev 7473)
@@ -7,4 +7,4 @@
 .BI "--dscp-class " "\fIDiffServ Class\fP"
 Match the DiffServ class. This value may be any of the
 BE, EF, AFxx or CSx classes.  It will then be converted
-into it's according numeric value.
+into its according numeric value.

Modified: trunk/iptables/extensions/libxt_hashlimit.man
===================================================================
--- trunk/iptables/extensions/libxt_hashlimit.man	2008-04-13 05:27:29 UTC (rev 7472)
+++ trunk/iptables/extensions/libxt_hashlimit.man	2008-04-13 05:28:31 UTC (rev 7473)
@@ -53,7 +53,7 @@
 Maximum entries in the hash.
 .TP
 \fB--hashlimit-htable-expire\fR \fImsec\fR
-After how many miliseconds do hash entries expire.
+After how many milliseconds do hash entries expire.
 .TP
 \fB--hashlimit-htable-gcinterval\fR \fImsec\fR
-How many miliseconds between garbage collection intervals.
+How many milliseconds between garbage collection intervals.

Modified: trunk/iptables/ip6tables.8.in
===================================================================
--- trunk/iptables/ip6tables.8.in	2008-04-13 05:27:29 UTC (rev 7472)
+++ trunk/iptables/ip6tables.8.in	2008-04-13 05:28:31 UTC (rev 7473)
@@ -478,7 +478,7 @@
 .PP
 Jozsef Kadlecsik wrote the REJECT target.
 .PP
-Harald Welte wrote the ULOG and NFQUEUE target, the new libiptc, aswell as TTL match+target and libipulog.
+Harald Welte wrote the ULOG and NFQUEUE target, the new libiptc, as well as TTL match+target and libipulog.
 .PP
 The Netfilter Core Team is: Marc Boucher, Martin Josefsson, Yasuyuki Kozakai,
 Jozsef Kadlecsik, Patrick McHardy, James Morris, Pablo Neira Ayuso,

Modified: trunk/iptables/ip6tables.c
===================================================================
--- trunk/iptables/ip6tables.c	2008-04-13 05:27:29 UTC (rev 7472)
+++ trunk/iptables/ip6tables.c	2008-04-13 05:28:31 UTC (rev 7473)
@@ -720,7 +720,7 @@
 	return 0;
 }
 
-/* e is called `fw' here for hysterical raisins */
+/* e is called `fw' here for historical reasons */
 static void
 print_firewall(const struct ip6t_entry *fw,
 	       const char *targname,

Modified: trunk/iptables/iptables.8.in
===================================================================
--- trunk/iptables/iptables.8.in	2008-04-13 05:27:29 UTC (rev 7472)
+++ trunk/iptables/iptables.8.in	2008-04-13 05:28:31 UTC (rev 7473)
@@ -55,7 +55,7 @@
 table.
 
 .SH TARGETS
-A firewall rule specifies criteria for a packet, and a target.  If the
+A firewall rule specifies criteria for a packet and a target.  If the
 packet does not match, the next rule in the chain is the examined; if
 it does match, then the next rule is specified by the value of the
 target, which can be the name of a user-defined chain or one of the
@@ -155,9 +155,9 @@
 .B iptables
 can be divided into several different groups.
 .SS COMMANDS
-These options specify the specific action to perform.  Only one of them
-can be specified on the command line unless otherwise specified
-below.  For all the long versions of the command and option names, you
+These options specify the desired action to perform. Only one of them
+can be specified on the command line unless otherwise stated
+below. For long versions of the command and option names, you
 need to use only enough letters to ensure that
 .B iptables
 can differentiate it from all other options.
@@ -188,7 +188,7 @@
 .TP
 .BR "-L, --list " "[\fIchain\fP]"
 List all rules in the selected chain.  If no chain is selected, all
-chains are listed.  As every other iptables command, it applies to the
+chains are listed. Like every other iptables command, it applies to the
 specified table (filter is the default), so NAT rules get listed by
 .nf
  iptables -t nat -n -L

Modified: trunk/iptables/iptables.c
===================================================================
--- trunk/iptables/iptables.c	2008-04-13 05:27:29 UTC (rev 7472)
+++ trunk/iptables/iptables.c	2008-04-13 05:28:31 UTC (rev 7473)
@@ -720,7 +720,7 @@
 	return 0;
 }
 
-/* e is called `fw' here for hysterical raisins */
+/* e is called `fw' here for historical reasons */
 static void
 print_firewall(const struct ipt_entry *fw,
 	       const char *targname,




More information about the netfilter-cvslog mailing list