mirror of
https://repo.or.cz/socat.git
synced 2025-06-26 09:38:42 +00:00
Corrected lots of misspellings etc.
This commit is contained in:
parent
d9d06eb587
commit
52e2e5a277
36 changed files with 108 additions and 1896 deletions
|
@ -10,7 +10,7 @@
|
|||
<h2>Introduction</h2>
|
||||
<p>Beginning with version 1.7.0 socat provides means to freely control
|
||||
important aspects of socket handling. This allows to experiment with socket
|
||||
types and protocols that are not explicitely implemented in socat.
|
||||
types and protocols that are not explicitly implemented in socat.
|
||||
</p>
|
||||
|
||||
<p>The related socat features fall into three major categories:<p>
|
||||
|
@ -216,7 +216,7 @@ struct sockaddr_at {
|
|||
</p>
|
||||
|
||||
<p>The address family component must be omitted from the socket address because
|
||||
it is added by socat implicitely. The resulting hexadecimal representation of
|
||||
it is added by socat implicitly. The resulting hexadecimal representation of
|
||||
the target socket address is therefore:
|
||||
</p>
|
||||
<tt>x40x00xff00xf3x00x0000000000000000</tt>
|
||||
|
@ -287,7 +287,7 @@ struct sockaddr_at {
|
|||
and for bind and range options. The basis is the <tt>struct sockaddr_*</tt> for
|
||||
the respective address family that should be declared in the C include files.
|
||||
Please keep in mind that their first two bytes (<tt>sa_family</tt> and - on BSD
|
||||
- <tt>sa_len</tt>) are implicitely prepended by socat.</p>
|
||||
- <tt>sa_len</tt>) are implicitly prepended by socat.</p>
|
||||
|
||||
<h4>Linux on 32bit Intel:</h4>
|
||||
|
||||
|
|
14
doc/socat.yo
14
doc/socat.yo
|
@ -1301,7 +1301,7 @@ label(ADDRESS_TCP6_LISTEN)dit(bf(tt(TCP6-LISTEN:<port>)))
|
|||
link(ipv6only)(OPTION_IPV6_V6ONLY)nl()
|
||||
Option groups: link(FD)(GROUP_FD),link(SOCKET)(GROUP_SOCKET),link(LISTEN)(GROUP_LISTEN),link(CHILD)(GROUP_CHILD),link(RANGE)(GROUP_RANGE),link(IP6)(GROUP_IP6),link(TCP)(GROUP_TCP),link(RETRY)(GROUP_RETRY) nl()
|
||||
label(ADDRESS_TUN)dit(bf(tt(TUN[:<if-addr>/<bits>])))
|
||||
Creates a Linux TUN/TAP device and optionally assignes it the address and
|
||||
Creates a Linux TUN/TAP device and optionally assigns it the address and
|
||||
netmask given by the parameters. The resulting network interface is almost
|
||||
ready for use by other processes; socat serves its "wire side". This address
|
||||
requires read and write access to the tunnel cloning device, usually
|
||||
|
@ -2150,7 +2150,7 @@ label(OPTION_SETGID)dit(bf(tt(setgid=<group>)))
|
|||
processing the address. This call might require root privilege. Please note
|
||||
that this option does not drop other group related privileges.
|
||||
label(OPTION_SETGID_EARLY)dit(bf(tt(setgid-early=<group>)))
|
||||
Like link(setgit)(OPTION_SETGID) but is performed before opening the address.
|
||||
Like link(setgid)(OPTION_SETGID) but is performed before opening the address.
|
||||
label(OPTION_SETUID)dit(bf(tt(setuid=<user>)))
|
||||
Changes the link(<user>)(TYPE_USER) (owner) of the process after processing
|
||||
the address. This call might require root privilege. Please note that this
|
||||
|
@ -2203,7 +2203,7 @@ label(OPTION_NOECHO)dit(bf(tt(noecho=<pattern>)))
|
|||
Specifies a regular pattern for a prompt that prevents the following input
|
||||
line from being displayed on the screen and from being added to the history.
|
||||
The prompt is defined as the text that was output to the readline address
|
||||
after the lastest newline character and before an input character was
|
||||
after the last newline character and before an input character was
|
||||
typed. The pattern is a regular expression, e.g.
|
||||
"^[Pp]assword:.*$" or "([Uu]ser:|[Pp]assword:)". See NOEXPAND(regex(7)) for details.
|
||||
(link(example)(EXAMPLE_OPTION_NOECHO))
|
||||
|
@ -2382,7 +2382,7 @@ COMMENT(label(OPTION_SECURITYENCRYPTIONNETWORK)dit(bf(tt(securityencryptionnetwo
|
|||
COMMENT(label(OPTION_SECURITYENCRYPTIONTRANSPORT)dit(bf(tt(securityencryptiontransport)))
|
||||
Set the code(SO_SECURITY_ENCRYPTION_TRANSPORT) socket option.)
|
||||
COMMENT(label(OPTION_SIOCSPGRP)dit(bf(tt(siocspgrp=<pid_t>)))
|
||||
Set the SIOCSPGRP with code(ioclt()) to enable SIGIO.)
|
||||
Set the SIOCSPGRP with code(ioctl()) to enable SIGIO.)
|
||||
COMMENT(label(OPTION_USEIFBUFS)dit(bf(tt(useifbufs)))
|
||||
Set the code(SO_USE_IFBUFS) socket option.)
|
||||
label(OPTION_SO_TIMESTAMP)dit(bf(tt(so-timestamp)))
|
||||
|
@ -3365,7 +3365,7 @@ label(OPTION_OPENSSL_PSEUDO)dit(bf(tt(pseudo)))
|
|||
gathering daemon can be utilized, this option activates a mechanism for
|
||||
providing pseudo entropy. This is achieved by taking the current time in
|
||||
microseconds for feeding the libc pseudo random number generator with an
|
||||
initial value. openssl is then feeded with output from NOEXPAND(random()) calls.nl()
|
||||
initial value. openssl is then fed with output from NOEXPAND(random()) calls.nl()
|
||||
NOTE:This mechanism is not sufficient for generation of secure keys!
|
||||
label(OPTION_OPENSSL_COMPRESS)dit(bf(tt(compress)))
|
||||
Enable or disable the use of compression for a connection. Setting this to
|
||||
|
@ -3612,10 +3612,10 @@ label(TYPE_LONG)dit(long)
|
|||
label(TYPE_LONGLONG)dit(long long)
|
||||
A number read with code(strtoll()). The value must fit into a C long long.
|
||||
label(TYPE_OFF)dit(off_t)
|
||||
An implementation dependend signed number, usually 32 bits, read with strtol
|
||||
An implementation dependent signed number, usually 32 bits, read with strtol
|
||||
or strtoll.
|
||||
label(TYPE_OFF64)dit(off64_t)
|
||||
An implementation dependend signed number, usually 64 bits, read with strtol
|
||||
An implementation dependent signed number, usually 64 bits, read with strtol
|
||||
or strtoll.
|
||||
label(TYPE_MODE_T)dit(mode_t)
|
||||
An unsigned integer, read with code(strtoul()), specifying mode (permission)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue