Clean up the man pages markup

Closes: #1036826
Closes: #1094208
This commit is contained in:
Bjarni Ingi Gislason 2025-01-26 02:03:30 +00:00 committed by Marco d'Itri
parent 420fff7ee6
commit cb1ce782a1
No known key found for this signature in database
GPG Key ID: CB3EC33AE1DED781
2 changed files with 58 additions and 52 deletions

View File

@ -12,28 +12,28 @@ encrypts the given password with the
libc function, using the given salt. libc function, using the given salt.
.SH OPTIONS .SH OPTIONS
.TP .TP
.BR \-S ", "\c .BR \-S " STRING\fR, \fP" \-\-salt= \fISTRING\fP
.BI \-\-salt= STRING
Use the Use the
.I STRING .I STRING
as salt. If it begins with as salt.
If it begins with
.I $ .I $
then it will be passed straight to then it will be passed straight to
.BR crypt (3) .BR crypt (3)
without any checks. without any checks.
.TP .TP
.BR \-R ", "\c .BR \-R " NUMBER\fR, \fP" \-\-rounds= \fINUMBER\fP
.BI \-\-rounds= NUMBER
Use Use
.I NUMBER .I NUMBER
rounds. This argument is ignored if the method chosen rounds.
does not support variable rounds. For the OpenBSD Blowfish method this is This argument is ignored if the method chosen
does not support variable rounds.
For the OpenBSD Blowfish method this is
the logarithm of the number of rounds. the logarithm of the number of rounds.
The behavior is undefined if this option is used without The behavior is undefined if this option is used without
.IR \-\-method . .IR \-\-method .
.TP .TP
.BR \-m ", "\c .BR \-m " TYPE\fR, \fP" \-\-method= \fITYPE\fP
.BI \-\-method= TYPE
Compute the password using the Compute the password using the
.I TYPE .I TYPE
method. method.
@ -47,20 +47,18 @@ If
begins and end with begins and end with
.I $ .I $
characters then the string is passed to characters then the string is passed to
.IR crypt_gensalt (3) .BR crypt_gensalt (3)
as-is. as-is.
.TP .TP
.B -5 .B \-5
Like Like
.IR \-\-method=md5crypt . .IR \-\-method=md5crypt .
.TP .TP
.B \-P \c .BI \-P " NUM\fR, \fP" \-\-password-fd= NUM
.IR NUM ", "\c
.BI \-\-password-fd= NUM
Read the password from file descriptor Read the password from file descriptor
.I NUM .I NUM
instead of using instead of using
.IR getpass (3). .BR getpass (3).
If the file descriptor is not connected to a tty then no other text If the file descriptor is not connected to a tty then no other text
than the hashed password is printed on stdout. than the hashed password is printed on stdout.
.TP .TP
@ -79,16 +77,16 @@ characters may not be read correctly.
.P .P
This program suffers of a bad case of featuritis. This program suffers of a bad case of featuritis.
.SH "SEE ALSO" .SH "SEE ALSO"
.IR passwd (1), .BR passwd (1),
.IR passwd (5), .BR passwd (5),
.IR crypt (3), .BR crypt (3),
.IR crypt (5), .BR crypt (5),
.IR crypt_gensalt (3), .BR crypt_gensalt (3),
.IR getpass (3). .BR getpass (3).
.SH AUTHOR .SH AUTHOR
.B mkpasswd .B mkpasswd
and this man page were written by Marco d'Itri and this man page were written by Marco d'Itri
.RI < md@linux.it > .RI < md@linux.it >
and are licensed under the terms of the GNU General Public License, and are licensed under the terms of the GNU General Public License,
version 2 or later. version 2 or later.
\" SPDX-License-Identifier: GPL-2.0-or-later .\" SPDX-License-Identifier: GPL-2.0-or-later

68
whois.1
View File

@ -9,18 +9,16 @@ whois \- client for the whois directory service
] [ ] [
.RB {\~ \-p \~|\~ \-\-port \~} .RB {\~ \-p \~|\~ \-\-port \~}
.I PORT .I PORT
] [\~\c ]
.B \-abBcdGHIKlLmMrRx .RB [\~ \-abBcdGHIKlLmMrRx
] [\~\c ]
.BI \-g \~SOURCE:FIRST\-LAST .RB [\~ \-g \fI\~SOURCE:FIRST\-LAST\fR
] [\~\c ]
.BR \-i \~ .RB [\~ \-i
.IR ATTR [, ATTR ]...\~] .IR ATTR [, ATTR ]...\~]
[\~\c .RB [\~ \-s
.BR \-s \~
.IR SOURCE [, SOURCE ]...\~] .IR SOURCE [, SOURCE ]...\~]
[\~\c .RB [\~ \-T
.BR \-T \~
.IR TYPE [, TYPE ]...\~] .IR TYPE [, TYPE ]...\~]
.RB [\~ \-\-verbose \~] .RB [\~ \-\-verbose \~]
.RB [\~ \-\-no\-recursion \~] .RB [\~ \-\-no\-recursion \~]
@ -49,14 +47,15 @@ searches for an object in a
database. database.
.P .P
This version of the whois client tries to guess the right server to This version of the whois client tries to guess the right server to
ask for the specified object. If no guess can be made it will connect to ask for the specified object.
If no guess can be made it will connect to
.I whois.networksolutions.com .I whois.networksolutions.com
for NIC handles or for NIC handles or
.I whois.arin.net .I whois.arin.net
for IPv4 addresses and network names. for IPv4 addresses and network names.
.SH OPTIONS .SH OPTIONS
.TP 8 .TP 8
.B \-h \c .B \-h
.IR HOST , .IR HOST ,
.BI \-\-host= HOST .BI \-\-host= HOST
Connect to Connect to
@ -65,7 +64,7 @@ Connect to
.B \-H .B \-H
Do not display the legal disclaimers that some registries like to show you. Do not display the legal disclaimers that some registries like to show you.
.TP 8 .TP 8
.B \-p \c .B \-p
.IR PORT , .IR PORT ,
.BI \-\-port= PORT .BI \-\-port= PORT
Connect to Connect to
@ -75,7 +74,8 @@ Connect to
First query First query
.I whois.iana.org .I whois.iana.org
and then follow its referral to the and then follow its referral to the
whois server authoritative for that request. This works for IP addresses, whois server authoritative for that request.
This works for IP addresses,
AS numbers and domains. AS numbers and domains.
.BR BEWARE : .BR BEWARE :
this implies that the IANA server will receive your complete query. this implies that the IANA server will receive your complete query.
@ -113,7 +113,7 @@ Return the smallest IP address range with a reference to an irt object.
.B \-d .B \-d
Return the reverse DNS delegation object too. Return the reverse DNS delegation object too.
.TP 8 .TP 8
.B \-g \c .B \-g
.I SOURCE:FIRST\-LAST .I SOURCE:FIRST\-LAST
Search updates from Search updates from
.I SOURCE .I SOURCE
@ -121,12 +121,13 @@ database between
.I FIRST .I FIRST
and and
.I LAST .I LAST
update serial number. It is useful to obtain Near Real Time Mirroring stream. update serial number.
It is useful to obtain Near Real Time Mirroring stream.
.TP 8 .TP 8
.B \-G .B \-G
Disable grouping of associated objects. Disable grouping of associated objects.
.TP 8 .TP 8
.B \-i \c .B \-i
.IR ATTR [, ATTR ]... .IR ATTR [, ATTR ]...
Inverse-search objects having associated attributes. Inverse-search objects having associated attributes.
.I ATTR .I ATTR
@ -135,11 +136,13 @@ is the attribute name, while the positional
argument is the attribute value. argument is the attribute value.
.TP 8 .TP 8
.B \-K .B \-K
Return primary key attributes only. An exception is the Return primary key attributes only.
An exception is the
.I members .I members
attribute of attribute of
.I set .I set
objects, which is always returned. Another exception are all objects, which is always returned.
Another exception are all
attributes of the objects attributes of the objects
.IR organisation , .IR organisation ,
.I person .I person
@ -159,7 +162,7 @@ Return all one level more specific objects.
.B \-M .B \-M
Return all levels of more specific objects. Return all levels of more specific objects.
.TP 8 .TP 8
.B \-q \c .B \-q
.I KEYWORD .I KEYWORD
Return information about the server. Return information about the server.
.I KEYWORD .I KEYWORD
@ -178,7 +181,7 @@ Disable recursive lookups for contact information.
Disable following referrals and force showing the object from the local copy Disable following referrals and force showing the object from the local copy
in the server. in the server.
.TP 8 .TP 8
.B \-s \c .B \-s
.IR SOURCE [, SOURCE ]... .IR SOURCE [, SOURCE ]...
Request the server to search for objects mirrored from Request the server to search for objects mirrored from
.IR SOURCE . .IR SOURCE .
@ -187,18 +190,18 @@ Use the
.I \-q sources .I \-q sources
parameter to obtain a list of valid sources. parameter to obtain a list of valid sources.
.TP 8 .TP 8
.B \-t \c .B \-t
.I TYPE .I TYPE
Return the template for a object of Return the template for a object of
.IR TYPE . .IR TYPE .
.TP 8 .TP 8
.B \-T \c .B \-T
.IR TYPE [, TYPE ]... .IR TYPE [, TYPE ]...
Restrict the search to objects of Restrict the search to objects of
.IR TYPE . .IR TYPE .
Multiple types are separated by a comma. Multiple types are separated by a comma.
.TP 8 .TP 8
.B \-v \c .B \-v
.I TYPE .I TYPE
Return the verbose template for a object of Return the verbose template for a object of
.IR TYPE . .IR TYPE .
@ -206,7 +209,9 @@ Return the verbose template for a object of
.B \-x .B \-x
Search for only exact match on network address prefix. Search for only exact match on network address prefix.
.SH NOTES .SH NOTES
When querying the Verisign gTLDs (e.g.\& \&.com, \&.net...\&) thin registry servers When querying the Verisign gTLDs
(e.g.\& \&.com, \&.net...\&)
thin registry servers
for a domain, the program will automatically prepend the for a domain, the program will automatically prepend the
.I domain .I domain
keyword to only show domain records. The keyword to only show domain records. The
@ -239,7 +244,8 @@ flags have been specified, the program will automatically add the flag
.IR "\-\-show\-handles" . .IR "\-\-show\-handles" .
.P .P
RIPE-specific command line options are ignored when querying non-RIPE RIPE-specific command line options are ignored when querying non-RIPE
servers. This may or may not be the behaviour intended by the user. servers.
This may or may not be the behaviour intended by the user.
When using non-standard query parameters then the command line options When using non-standard query parameters then the command line options
which are not to be interpreted by the client must follow the which are not to be interpreted by the client must follow the
.I \-\- .I \-\-
@ -248,7 +254,8 @@ separator (which marks the beginning of the query string).
If the If the
.I /etc/whois.conf .I /etc/whois.conf
configuration file exists, it will be consulted configuration file exists, it will be consulted
to find a server before applying the normal rules. Each line of the to find a server before applying the normal rules.
Each line of the
file should contain a regular expression to be matched against the query file should contain a regular expression to be matched against the query
text and the whois server to use, separated by white space. text and the whois server to use, separated by white space.
IDN domains must use the ACE format. IDN domains must use the ACE format.
@ -279,7 +286,8 @@ A list of options which will be evaluated before the ones specified on the
command line. command line.
.IP "WHOIS_SERVER" .IP "WHOIS_SERVER"
This server will be queried if the program cannot guess where some kind This server will be queried if the program cannot guess where some kind
of objects are located. If the variable does not exist then of objects are located.
If the variable does not exist then
.I whois.arin.net .I whois.arin.net
will be queried. will be queried.
.SH "SEE ALSO" .SH "SEE ALSO"
@ -289,7 +297,7 @@ will be queried.
WHOIS Protocol Specification. WHOIS Protocol Specification.
.P .P
.IR "RIPE Database Query Reference Manual" : .IR "RIPE Database Query Reference Manual" :
.RI < https://www.ripe.net/data\-tools/support/documentation/ripe\-database\-query\-reference\-manual > .RI < https://www.ripe.net/\:data\-tools/\:support/\:documentation/\:ripe\-database\-query\-reference\-manual >
.SH BUGS .SH BUGS
The program may have buffer overflows in the command line parser: The program may have buffer overflows in the command line parser:
be sure to not pass untrusted data to it. be sure to not pass untrusted data to it.
@ -304,4 +312,4 @@ and this man page were written by Marco d'Itri
.RI < md@linux.it > .RI < md@linux.it >
and are licensed under the terms of the GNU General Public License, and are licensed under the terms of the GNU General Public License,
version 2 or later. version 2 or later.
\" SPDX-License-Identifier: GPL-2.0-or-later .\" SPDX-License-Identifier: GPL-2.0-or-later