On Sat, Feb 05, 2022 at 11:06:32PM +1100, Jonathan Gray wrote:
> drop please from manual pages excluding third party parts of tree
> suggested by multiple documentation style guides
> 

hi. i'm ok with this.
jmc

> diff --git lib/libc/stdlib/atexit.3 lib/libc/stdlib/atexit.3
> index a95a45b92e4..891641489e3 100644
> --- lib/libc/stdlib/atexit.3
> +++ lib/libc/stdlib/atexit.3
> @@ -68,7 +68,7 @@ that matters, not the source of the function that was 
> registered.
>  is very difficult to use correctly without creating
>  .Xr exit 3 Ns -time
>  races.
> -Unless absolutely necessary, please avoid using it.
> +Unless absolutely necessary, avoid using it.
>  .Sh RETURN VALUES
>  The
>  .Nm
> diff --git lib/libc/sys/getentropy.2 lib/libc/sys/getentropy.2
> index 234969e7a1d..942a591a0cc 100644
> --- lib/libc/sys/getentropy.2
> +++ lib/libc/sys/getentropy.2
> @@ -33,7 +33,7 @@ as input for process-context pseudorandom generators like
>  The maximum buffer size permitted is 256 bytes.
>  .Pp
>  .Fn getentropy
> -is not intended for regular code; please use the
> +is not intended for regular code; use the
>  .Xr arc4random 3
>  family of functions instead.
>  .Pp
> diff --git lib/libkeynote/keynote.4 lib/libkeynote/keynote.4
> index aabd2db365d..6e5a29dffb4 100644
> --- lib/libkeynote/keynote.4
> +++ lib/libkeynote/keynote.4
> @@ -374,7 +374,7 @@ attribute
>  .Sh QUERY SEMANTICS
>  The discussion in the following sections assume some familiarity with
>  assertion syntax.
> -Please refer to
> +Refer to
>  .Xr keynote 5
>  for more details on the syntax.
>  .Sh QUERY PARAMETERS
> diff --git lib/libpthread/man/pthreads.3 lib/libpthread/man/pthreads.3
> index 94e86227874..c2de5274f3a 100644
> --- lib/libpthread/man/pthreads.3
> +++ lib/libpthread/man/pthreads.3
> @@ -463,7 +463,7 @@ conform to
>  .St -p1003.1-96
>  and various later versions of
>  .Pq Dq Tn POSIX .
> -Please consult the manpages for the individual functions for details.
> +Consult the manpages for the individual functions for details.
>  .Sh HISTORY
>  This 1-to-1 implementation of the
>  .Nm
> diff --git lib/libssl/man/SSL_get_ex_data_X509_STORE_CTX_idx.3 
> lib/libssl/man/SSL_get_ex_data_X509_STORE_CTX_idx.3
> index e30e4de84fa..adea288e4df 100644
> --- lib/libssl/man/SSL_get_ex_data_X509_STORE_CTX_idx.3
> +++ lib/libssl/man/SSL_get_ex_data_X509_STORE_CTX_idx.3
> @@ -104,7 +104,7 @@ provides access to
>  object for the connection during the
>  .Fn verify_callback
>  when checking the peer's certificate.
> -Please check the example in
> +Check the example in
>  .Xr SSL_CTX_set_verify 3 .
>  .Sh SEE ALSO
>  .Xr CRYPTO_set_ex_data 3 ,
> diff --git sbin/iked/iked.conf.5 sbin/iked/iked.conf.5
> index 78dfbbfa1d1..7343c4a01ea 100644
> --- sbin/iked/iked.conf.5
> +++ sbin/iked/iked.conf.5
> @@ -197,8 +197,7 @@ Enable OCSP and set the fallback URL of the OCSP 
> responder.
>  This fallback will be used if the trusted CA from
>  .Pa /etc/iked/ca/
>  does not have an OCSP-URL extension.
> -Please note that the matching responder certificates
> -have to be placed in
> +The matching responder certificates have to be placed in
>  .Pa /etc/iked/ocsp/responder.crt .
>  .Pp
>  The optional
> @@ -231,7 +230,7 @@ and the
>  and
>  .Ar password
>  arguments.
> -Note that the password has to be specified in plain text which is
> +The password has to be specified in plain text which is
>  required to support different challenge-based EAP methods like
>  EAP-MD5 or EAP-MSCHAPv2.
>  .El
> @@ -255,7 +254,7 @@ the connection, the default action is to ignore the 
> connection attempt or
>  to use the
>  .Ar default
>  policy, if set.
> -Please also see the
> +See the
>  .Sx EXAMPLES
>  section for a detailed example of the policy evaluation.
>  .Pp
> @@ -360,7 +359,7 @@ which can be either
>  .Ar inet
>  or
>  .Ar inet6 .
> -Note that this only matters for IKEv2 endpoints and does not
> +This only matters for IKEv2 endpoints and does not
>  restrict the traffic selectors to negotiate flows with different
>  address families, e.g. IPv6 flows negotiated by IPv4 endpoints.
>  .Pp
> @@ -626,7 +625,7 @@ and
>  .Ql G
>  for kilo-, mega- and gigabytes accordingly.
>  .Pp
> -Please note that rekeying must happen at least several times a day as
> +Rekeying must happen at least several times a day as
>  IPsec security heavily depends on frequent key renewals.
>  .Pp
>  .It Op Ar ikeauth
> @@ -1028,7 +1027,7 @@ The currently supported group types are either
>  MODP (exponentiation groups modulo a prime),
>  ECP (elliptic curve groups modulo a prime),
>  or Curve25519.
> -Please note that MODP groups of less than 2048 bits are considered
> +MODP groups of less than 2048 bits are considered
>  as weak or insecure (see RFC 8247 section 2.4) and only provided for
>  backwards compatibility.
>  .Sh FILES
> diff --git sbin/isakmpd/isakmpd.conf.5 sbin/isakmpd/isakmpd.conf.5
> index 4d35e162393..1ea562f3447 100644
> --- sbin/isakmpd/isakmpd.conf.5
> +++ sbin/isakmpd/isakmpd.conf.5
> @@ -1372,7 +1372,7 @@ LIFE_DURATION=          1000,768:1536
>  .Xr isakmpd 8
>  .Sh CAVEATS
>  Using aggressive mode is discouraged due to various design problems.
> -If your peer only supports aggressive mode, please consider replacing that
> +If your peer only supports aggressive mode, consider replacing that
>  peer with a sane ISAKMP/IKE implementation.
>  For details see
>  .Lk http://www.usenix.org/publications/login/1999-12/features/harmful.html .
> diff --git sbin/isakmpd/isakmpd.policy.5 sbin/isakmpd/isakmpd.policy.5
> index 55fb593dfa6..96a1907034b 100644
> --- sbin/isakmpd/isakmpd.policy.5
> +++ sbin/isakmpd/isakmpd.policy.5
> @@ -143,7 +143,7 @@ SAs established from that point on (even if the 
> associated Phase 1 SA
>  was already established when the new policies were loaded).
>  The policy change will not affect already established Phase 2 SAs.
>  .Pp
> -For more details on KeyNote assertion format, please see
> +For more details on KeyNote assertion format, see
>  .Xr keynote 5 .
>  Briefly, KeyNote policy assertions used in IKE have the following
>  characteristics:
> diff --git sbin/wsconsctl/wsconsctl.8 sbin/wsconsctl/wsconsctl.8
> index f7ef41c50bd..c43b7d5bcf7 100644
> --- sbin/wsconsctl/wsconsctl.8
> +++ sbin/wsconsctl/wsconsctl.8
> @@ -134,7 +134,7 @@ Modify the current keyboard encoding so that, when the
>  key is pressed, the same encoding sequence as
>  .Ar Left Control
>  is sent.
> -For a full list of keysyms, and keycodes, please refer
> +For a full list of keysyms, and keycodes, refer
>  to the
>  .Ar /usr/include/dev/wscons/wsksymdef.h
>  file.
> diff --git share/man/man1/dpb.1 share/man/man1/dpb.1
> index dd8d040845a..a503fb6e675 100644
> --- share/man/man1/dpb.1
> +++ share/man/man1/dpb.1
> @@ -1408,7 +1408,7 @@ affinity mismatch, but job will start on the wrong host 
> anyways, as the queue
>  contains no other buildable path.
>  .El
>  .Pp
> -Please note that the engine is no longer run after each package build event
> +The engine is no longer run after each package build event
>  because of performance considerations, so the
>  .Sq Q
>  and
> diff --git share/man/man4/carp.4 share/man/man4/carp.4
> index 1ea8d5c2dd5..cb14e7aeb76 100644
> --- share/man/man4/carp.4
> +++ share/man/man4/carp.4
> @@ -186,7 +186,7 @@ In this mode
>  never sends packets with its virtual MAC address as source.
>  Stealth mode prevents a switch from learning the virtual MAC
>  address, so that it has to flood the traffic to all its ports.
> -Please note that activating stealth mode on a
> +Activating stealth mode on a
>  .Nm
>  interface that has already been running might not work instantly.
>  As a workaround the VHID of the first carpnode can be changed to a
> diff --git share/man/man4/ix.4 share/man/man4/ix.4
> index 52557648623..f368ce28bdb 100644
> --- share/man/man4/ix.4
> +++ share/man/man4/ix.4
> @@ -73,7 +73,7 @@ HotLava Tambora 64G4/80G4/64G6/120G6 (SFP+)
>  SFP+ adapters generally also support SFP type modules with their
>  associated 1000base-* media types.
>  .Pp
> -Please note that the networking interface should be brought down before
> +The networking interface should be brought down before
>  disconnecting fiber optics, otherwise irreversible damage might be caused
>  to the equipment.
>  .Sh SEE ALSO
> diff --git share/man/man4/man4.i386/pcibios.4 
> share/man/man4/man4.i386/pcibios.4
> index 65e046317d6..3596f9ff708 100644
> --- share/man/man4/man4.i386/pcibios.4
> +++ share/man/man4/man4.i386/pcibios.4
> @@ -90,7 +90,7 @@ And many BIOS implementations don't assign a bus number for 
> CardBuses.
>  .Pp
>  A typical symptom of this is the following boot message:
>  .D1 Sy cardbus0 at cardslot0: bus 0 device 0...
> -Please note that this cardbus0 has a bus number
> +This cardbus0 has a bus number
>  .Sq 0 ,
>  but normally the bus number 0 is used by the machine's
>  primary PCI bus.
> diff --git share/man/man4/tty.4 share/man/man4/tty.4
> index de51cc2d5b7..f4a9b5cab2e 100644
> --- share/man/man4/tty.4
> +++ share/man/man4/tty.4
> @@ -148,7 +148,7 @@ When the
>  line discipline is in effect, the terminal file behaves and is
>  operated according to the rules described in
>  .Xr termios 4 .
> -Please refer to that man page for a full description of the terminal
> +Refer to that man page for a full description of the terminal
>  semantics.
>  The operations described here
>  generally represent features common
> diff --git share/man/man7/script.7 share/man/man7/script.7
> index 80542d1f46f..ab720e873e9 100644
> --- share/man/man7/script.7
> +++ share/man/man7/script.7
> @@ -337,7 +337,7 @@ described is largely portable across
>  style systems, with two significant exceptions: the maximum length of the
>  .Sq #!
>  line, and the behavior if multiple arguments are passed.
> -Please be aware that the behavior in the
> +Be aware that the behavior in the
>  face of multiple arguments is not consistent across systems.
>  .Sh HISTORY
>  The behavior of the kernel when encountering scripts that start in
> diff --git share/man/man9/bus_space.9 share/man/man9/bus_space.9
> index b9fc6e1c71c..c1307eb7d4b 100644
> --- share/man/man9/bus_space.9
> +++ share/man/man9/bus_space.9
> @@ -1471,7 +1471,7 @@ must be a multiple of the access width or the results 
> are undefined.
>  .Pp
>  In all other respects these functions are the same as their non-raw
>  counterparts.
> -Please consult the documentation for those functions for further
> +Consult the documentation for those functions for further
>  information.
>  .Sh SEE ALSO
>  .Xr bus_dma 9
> diff --git usr.bin/mandoc/mandoc.1 usr.bin/mandoc/mandoc.1
> index 1e8dcc4b251..2c82f1efd4c 100644
> --- usr.bin/mandoc/mandoc.1
> +++ usr.bin/mandoc/mandoc.1
> @@ -835,7 +835,7 @@ message levels, the
>  .Cm style
>  level tries to reduce the probability that issues go unnoticed,
>  so it may occasionally issue bogus suggestions.
> -Please use your good judgement to decide whether any particular
> +Use your judgement to decide whether any particular
>  .Cm style
>  suggestion really justifies a change to the input file.
>  .It Cm base
> diff --git usr.bin/skeyinit/skeyinit.1 usr.bin/skeyinit/skeyinit.1
> index 0e1a3060df6..e56a799b86d 100644
> --- usr.bin/skeyinit/skeyinit.1
> +++ usr.bin/skeyinit/skeyinit.1
> @@ -118,7 +118,7 @@ type must be specified via the
>  .Fl a
>  option
>  (see above).
> -Please note that entering a password or passphrase in plain text
> +Entering a password or passphrase in plain text
>  defeats the purpose of using
>  .Dq secure
>  mode.
> diff --git usr.bin/ssh/ssh-keygen.1 usr.bin/ssh/ssh-keygen.1
> index e18a1cf65ee..fd51a02a529 100644
> --- usr.bin/ssh/ssh-keygen.1
> +++ usr.bin/ssh/ssh-keygen.1
> @@ -372,12 +372,12 @@ to use on files that mix hashed and non-hashed names.
>  .It Fl h
>  When signing a key, create a host certificate instead of a user
>  certificate.
> -Please see the
> +See the
>  .Sx CERTIFICATES
>  section for details.
>  .It Fl I Ar certificate_identity
>  Specify the key identity when signing a public key.
> -Please see the
> +See the
>  .Sx CERTIFICATES
>  section for details.
>  .It Fl i
> @@ -469,7 +469,7 @@ Provides the new passphrase.
>  Specify one or more principals (user or host names) to be included in
>  a certificate when signing a key.
>  Multiple principals may be specified, separated by commas.
> -Please see the
> +See the
>  .Sx CERTIFICATES
>  section for details.
>  .It Fl O Ar option
> @@ -534,7 +534,7 @@ but other methods may be supported in the future.
>  .It Cm write-attestation Ns = Ns Ar path
>  May be used at key generation time to record the attestation data
>  returned from FIDO tokens during key generation.
> -Please note that this information is potentially sensitive.
> +This information is potentially sensitive.
>  By default, this information is discarded.
>  .El
>  .Pp
> @@ -594,7 +594,7 @@ Print the SSHFP fingerprint resource record named
>  for the specified public key file.
>  .It Fl s Ar ca_key
>  Certify (sign) a public key using the specified CA key.
> -Please see the
> +See the
>  .Sx CERTIFICATES
>  section for details.
>  .Pp
> @@ -1059,7 +1059,7 @@ public key must be trusted by
>  .Xr sshd 8
>  or
>  .Xr ssh 1 .
> -Please refer to those manual pages for details.
> +Refer to those manual pages for details.
>  .Sh KEY REVOCATION LISTS
>  .Nm
>  is able to manage OpenSSH format Key Revocation Lists (KRLs).
> diff --git usr.bin/ssh/ssh.1 usr.bin/ssh/ssh.1
> index 6f29a067044..98765d4e1e8 100644
> --- usr.bin/ssh/ssh.1
> +++ usr.bin/ssh/ssh.1
> @@ -825,7 +825,7 @@ An attacker may then be able to perform activities such 
> as keystroke monitoring.
>  .Pp
>  For this reason, X11 forwarding is subjected to X11 SECURITY extension
>  restrictions by default.
> -Please refer to the
> +Refer to the
>  .Nm
>  .Fl Y
>  option and the
> diff --git usr.sbin/relayd/relayd.conf.5 usr.sbin/relayd/relayd.conf.5
> index cecbae71f87..6740480bb04 100644
> --- usr.sbin/relayd/relayd.conf.5
> +++ usr.sbin/relayd/relayd.conf.5
> @@ -179,7 +179,7 @@ Set the global timeout in milliseconds for checks.
>  This can be overridden by the timeout value in the table definitions.
>  The default timeout is 200 milliseconds and it must not exceed the
>  global interval.
> -Please note that the default value is optimized for checks within the
> +The default value is optimized for checks within the
>  same collision domain \(en use a higher timeout, such as 1000 milliseconds,
>  for checks of hosts in other subnets.
>  If this option is to be set, it should be placed before overrides in tables.
> diff --git usr.sbin/user/group.8 usr.sbin/user/group.8
> index 2b56c765917..bf0071e3c90 100644
> --- usr.sbin/user/group.8
> +++ usr.sbin/user/group.8
> @@ -65,7 +65,7 @@ and
>  .Xr groupdel 8
>  commands.
>  .Pp
> -For a full explanation of the options, please see the relevant manual page.
> +For a full explanation of the options, see the relevant manual page.
>  .Sh EXIT STATUS
>  .Ex -std group
>  .Sh SEE ALSO
> diff --git usr.sbin/user/user.8 usr.sbin/user/user.8
> index 11f08c17240..f0fd8a45bbd 100644
> --- usr.sbin/user/user.8
> +++ usr.sbin/user/user.8
> @@ -101,7 +101,7 @@ and
>  .Xr userdel 8
>  commands.
>  .Pp
> -For a full explanation of the options, please see the relevant manual page.
> +For a full explanation of the options, see the relevant manual page.
>  .Sh FILES
>  .Bl -tag -width /etc/usermgmt.conf -compact
>  .It Pa /etc/skel/.[A-z]*
> 

Reply via email to