Print this page
10057 Man page misspellings ouput particuliar overriden
Reviewed by: Gergő Mihály Doma <domag02@gmail.com>

@@ -57,11 +57,10 @@
 \fBikeadm\fR help
      [get | set | add | del | read | write | dump | flush | token]
 .fi
 
 .SH DESCRIPTION
-.sp
 .LP
 The \fBikeadm\fR utility retrieves information from and manipulates the
 configuration of the Internet Key Exchange (\fBIKE\fR) protocol daemon,
 \fBin.iked\fR(1M).
 .sp

@@ -79,11 +78,10 @@
 when the daemon is started.
 .sp
 .LP
 For details on how to use this command securely see .
 .SH OPTIONS
-.sp
 .LP
 The following options are supported:
 .sp
 .ne 2
 .na

@@ -108,11 +106,10 @@
 this flag is turned on.
 .RE
 
 .SH USAGE
 .SS "Commands"
-.sp
 .LP
 The following commands are supported:
 .sp
 .ne 2
 .na

@@ -254,11 +251,10 @@
 \fBtoken\fR logout: \fBsolaris.network.ipsec.ike.token.logout\fR
 .RE
 .RE
 
 .SS "Object Types"
-.sp
 .ne 2
 .na
 \fBdebug\fR
 .ad
 .sp .6

@@ -414,16 +410,16 @@
 \fBdefaults\fR
 .ad
 .sp .6
 .RS 4n
 Display default values used by the \fBin.iked\fR daemon. Some values can be
-overriden in the daemon configuration file (see \fBike.config\fR(4)); for these
+overridden in the daemon configuration file (see \fBike.config\fR(4)); for these
 values, the token name is displayed in the \fBget defaults\fR output. The
 output will reflect where a configuration token has changed the default.
 .sp
 Default values might be ignored in the event a peer system makes a valid
-alternative proposal or they can be overriden by per-rule values established in
+alternative proposal or they can be overridden by per-rule values established in
 \fBike.config\fR. In such instances, a \fBget defaults\fR command continues to
 display the default values, not the values used to override the defaults.
 .RE
 
 .sp

@@ -460,11 +456,10 @@
 \fBIKE\fR mode. A preshared key is identified by an \fBIP\fR address pair or an
 identity pair; identification formats are described below.
 .RE
 
 .SS "Id Formats"
-.sp
 .LP
 Commands like \fBadd\fR, \fBdel\fR, and \fBget\fR require that additional
 information be specified on the command line. In the case of the delete and get
 commands, all that is required is to minimally identify a given object; for the
 add command, the full object must be specified.

@@ -546,11 +541,10 @@
 for the in.iked configuration files. Both are made up of a series of id-value
 pairs, contained in curly braces (\fB{\fR and \fB}\fR). See \fBike.config\fR(4)
 and \fBike.preshared\fR(4) for details on the formatting of rules and preshared
 keys.
 .SH SECURITY
-.sp
 .LP
 The \fBikeadm\fR command allows a privileged user to enter cryptographic keying
 information. If an adversary gains access to such information, the security of
 IPsec traffic is compromised. The following issues should be taken into account
 when using the \fBikeadm\fR command.

@@ -790,11 +784,10 @@
 .fi
 .in -2
 .sp
 
 .SH EXIT STATUS
-.sp
 .LP
 The following exit values are returned:
 .sp
 .ne 2
 .na

@@ -812,11 +805,10 @@
 .RS 12n
 An error occurred. Writes an appropriate error message to standard error.
 .RE
 
 .SH ATTRIBUTES
-.sp
 .LP
 See \fBattributes\fR(5) for descriptions of the following attributes:
 .sp
 
 .sp

@@ -828,18 +820,16 @@
 _
 Interface Stability     Not an Interface
 .TE
 
 .SH SEE ALSO
-.sp
 .LP
 \fBin.iked\fR(1M), \fBike.config\fR(4), \fBike.preshared\fR(4),
 \fBattributes\fR(5), \fBipsec\fR(7P)
 .sp
 .LP
 Schneier, Bruce, \fIApplied Cryptography: Protocols, Algorithms, and Source
 Code in C\fR, Second Edition, John Wiley & Sons, New York, NY, 1996.
 .SH NOTES
-.sp
 .LP
 As \fBin.iked\fR can run only in the global zone and exclusive-IP zones, this
 command is not useful in shared-IP zones.