mirror of https://github.com/mkerrisk/man-pages
s/SH NOTE$/SH NOTES/
This commit is contained in:
parent
99c7ba5573
commit
19c98696a2
|
@ -275,7 +275,7 @@ Portable programs should not rely on inheritance or non-inheritance
|
||||||
of file status flags and always explicitly set all required flags on
|
of file status flags and always explicitly set all required flags on
|
||||||
the socket returned from
|
the socket returned from
|
||||||
.BR accept ().
|
.BR accept ().
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
The third argument of
|
The third argument of
|
||||||
.BR accept ()
|
.BR accept ()
|
||||||
was originally declared as an `int *' (and is that under libc4 and libc5
|
was originally declared as an `int *' (and is that under libc4 and libc5
|
||||||
|
|
|
@ -272,7 +272,7 @@ function first appeared in 4.2BSD).
|
||||||
.\" and
|
.\" and
|
||||||
.\" .B EISDIR
|
.\" .B EISDIR
|
||||||
.\" Unix-domain error conditions.
|
.\" Unix-domain error conditions.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
The third argument of
|
The third argument of
|
||||||
.BR bind ()
|
.BR bind ()
|
||||||
is in reality an
|
is in reality an
|
||||||
|
|
|
@ -65,6 +65,6 @@ and
|
||||||
.I nbytes
|
.I nbytes
|
||||||
arguments.
|
arguments.
|
||||||
Therefore, the whole cache is always flushed.
|
Therefore, the whole cache is always flushed.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
This system call is only available on MIPS based systems.
|
This system call is only available on MIPS based systems.
|
||||||
It should not be used in programs intended to be portable.
|
It should not be used in programs intended to be portable.
|
||||||
|
|
|
@ -235,7 +235,7 @@ function first appeared in 4.2BSD), POSIX.1-2001.
|
||||||
.\" .BR ENOSR .
|
.\" .BR ENOSR .
|
||||||
.\" It also
|
.\" It also
|
||||||
.\" documents many additional error conditions not described here.
|
.\" documents many additional error conditions not described here.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
The third argument of
|
The third argument of
|
||||||
.BR connect ()
|
.BR connect ()
|
||||||
is in reality an
|
is in reality an
|
||||||
|
|
|
@ -92,7 +92,7 @@ is a file, not a socket.
|
||||||
SVr4, 4.4BSD (the
|
SVr4, 4.4BSD (the
|
||||||
.BR getpeername ()
|
.BR getpeername ()
|
||||||
function call first appeared in 4.2BSD), POSIX.1-2001.
|
function call first appeared in 4.2BSD), POSIX.1-2001.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
The third argument of
|
The third argument of
|
||||||
.BR getpeername ()
|
.BR getpeername ()
|
||||||
is in reality an
|
is in reality an
|
||||||
|
|
|
@ -92,7 +92,7 @@ SVr4, 4.4BSD (the
|
||||||
function call appeared in 4.2BSD), POSIX.1-2001.
|
function call appeared in 4.2BSD), POSIX.1-2001.
|
||||||
.\" SVr4 documents additional ENOMEM
|
.\" SVr4 documents additional ENOMEM
|
||||||
.\" and ENOSR error codes.
|
.\" and ENOSR error codes.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
The third argument of
|
The third argument of
|
||||||
.BR getsockname ()
|
.BR getsockname ()
|
||||||
is in reality an `int *' (and this is what 4.x BSD and libc4 and libc5 have).
|
is in reality an `int *' (and this is what 4.x BSD and libc4 and libc5 have).
|
||||||
|
|
|
@ -170,7 +170,7 @@ POSIX.1-2001.
|
||||||
.\" not document the
|
.\" not document the
|
||||||
.\" .BR SO_SNDLOWAT ", " SO_RCVLOWAT ", " SO_SNDTIMEO ", " SO_RCVTIMEO
|
.\" .BR SO_SNDLOWAT ", " SO_RCVLOWAT ", " SO_SNDTIMEO ", " SO_RCVTIMEO
|
||||||
.\" options
|
.\" options
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
The
|
The
|
||||||
.I optlen
|
.I optlen
|
||||||
argument of
|
argument of
|
||||||
|
|
|
@ -212,7 +212,7 @@ The calling process has insufficient privilege to call
|
||||||
under Linux the
|
under Linux the
|
||||||
.B CAP_SYS_TIME
|
.B CAP_SYS_TIME
|
||||||
capability is required.
|
capability is required.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
The prototype for
|
The prototype for
|
||||||
.BR settimeofday ()
|
.BR settimeofday ()
|
||||||
and the defines for
|
and the defines for
|
||||||
|
|
|
@ -112,7 +112,7 @@ The specified request does not apply to the kind of object that the
|
||||||
descriptor
|
descriptor
|
||||||
.I d
|
.I d
|
||||||
references.
|
references.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
In order to use this call, one needs an open file descriptor.
|
In order to use this call, one needs an open file descriptor.
|
||||||
Often the
|
Often the
|
||||||
.BR open (2)
|
.BR open (2)
|
||||||
|
|
|
@ -514,7 +514,7 @@ The
|
||||||
flag was specified, and an incompatible lease was held on the file
|
flag was specified, and an incompatible lease was held on the file
|
||||||
(see
|
(see
|
||||||
.BR fcntl (2)).
|
.BR fcntl (2)).
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
Under Linux, the O_NONBLOCK flag indicates that one wants to open
|
Under Linux, the O_NONBLOCK flag indicates that one wants to open
|
||||||
but does not necessarily have the intention to read or write.
|
but does not necessarily have the intention to read or write.
|
||||||
This is typically used to open devices in order to get a file descriptor
|
This is typically used to open devices in order to get a file descriptor
|
||||||
|
|
|
@ -323,7 +323,7 @@ appeared in 4.2BSD.
|
||||||
It is generally portable to/from
|
It is generally portable to/from
|
||||||
non-BSD systems supporting clones of the BSD socket layer (including
|
non-BSD systems supporting clones of the BSD socket layer (including
|
||||||
System V variants).
|
System V variants).
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
The manifest constants used under 4.x BSD for protocol families
|
The manifest constants used under 4.x BSD for protocol families
|
||||||
are PF_UNIX, PF_INET, etc., while AF_UNIX etc. are used for address
|
are PF_UNIX, PF_INET, etc., while AF_UNIX etc. are used for address
|
||||||
families.
|
families.
|
||||||
|
|
|
@ -89,7 +89,7 @@ is out-of-bounds;
|
||||||
is invalid.
|
is invalid.
|
||||||
.SH "CONFORMING TO"
|
.SH "CONFORMING TO"
|
||||||
SVr4.
|
SVr4.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
On Linux with the
|
On Linux with the
|
||||||
.I proc
|
.I proc
|
||||||
filesystem mounted on
|
filesystem mounted on
|
||||||
|
|
|
@ -45,7 +45,7 @@ Upon error, the return value is
|
||||||
.BR MM_NOTOK .
|
.BR MM_NOTOK .
|
||||||
Possible errors include: out of memory, attempt to remove a
|
Possible errors include: out of memory, attempt to remove a
|
||||||
nonexistent or default severity class.
|
nonexistent or default severity class.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
New severity classes can also be added by setting the environment variable
|
New severity classes can also be added by setting the environment variable
|
||||||
.BR SEV_LEVEL .
|
.BR SEV_LEVEL .
|
||||||
.SH "CONFORMING TO"
|
.SH "CONFORMING TO"
|
||||||
|
|
|
@ -67,7 +67,7 @@ had completed.
|
||||||
.B EINTR
|
.B EINTR
|
||||||
The call was ended by signal.
|
The call was ended by signal.
|
||||||
(Possibly the completion signal of one of the operations we were waiting for.)
|
(Possibly the completion signal of one of the operations we were waiting for.)
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
One can achieve polling by using a non-NULL
|
One can achieve polling by using a non-NULL
|
||||||
.I timeout
|
.I timeout
|
||||||
that specifies a zero time interval.
|
that specifies a zero time interval.
|
||||||
|
|
|
@ -65,7 +65,7 @@ The byte string functions perform operations on strings (byte arrays)
|
||||||
that are not necessarily null-terminated.
|
that are not necessarily null-terminated.
|
||||||
See the individual man pages
|
See the individual man pages
|
||||||
for descriptions of each function.
|
for descriptions of each function.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
The functions
|
The functions
|
||||||
.BR bcmp (),
|
.BR bcmp (),
|
||||||
.BR bcopy ()
|
.BR bcopy ()
|
||||||
|
|
|
@ -19,7 +19,7 @@ The
|
||||||
.BR cabs ()
|
.BR cabs ()
|
||||||
function returns the absolute value of the complex number z. The
|
function returns the absolute value of the complex number z. The
|
||||||
result is a real number.
|
result is a real number.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
The function is actually an alias for hypot(a,b) = sqrt(a*a+b*b).
|
The function is actually an alias for hypot(a,b) = sqrt(a*a+b*b).
|
||||||
.SH "CONFORMING TO"
|
.SH "CONFORMING TO"
|
||||||
C99
|
C99
|
||||||
|
|
|
@ -20,8 +20,9 @@ The
|
||||||
function returns the imaginary part of the complex number z.
|
function returns the imaginary part of the complex number z.
|
||||||
.LP
|
.LP
|
||||||
One has z = creal(z) + I * cimag(z).
|
One has z = creal(z) + I * cimag(z).
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
gcc also supports __imag__. That is a GNU extension.
|
gcc also supports __imag__.
|
||||||
|
That is a GNU extension.
|
||||||
.SH "CONFORMING TO"
|
.SH "CONFORMING TO"
|
||||||
C99
|
C99
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
|
@ -138,10 +138,10 @@ specified is not supported on this system.
|
||||||
.B EPERM
|
.B EPERM
|
||||||
.BR clock_settime ()
|
.BR clock_settime ()
|
||||||
does not have permission to set the clock indicated.
|
does not have permission to set the clock indicated.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
Most systems require the program be linked with the librt
|
Most systems require the program be linked with the librt
|
||||||
library to use these functions.
|
library to use these functions.
|
||||||
.SH NOTE for SMP systems
|
.SS Note for SMP systems
|
||||||
The
|
The
|
||||||
.B CLOCK_PROCESS_CPUTIME_ID
|
.B CLOCK_PROCESS_CPUTIME_ID
|
||||||
and
|
and
|
||||||
|
|
|
@ -22,7 +22,7 @@ Every complex infinite value is projected to a single infinite value,
|
||||||
namely to positive infinity on the real axis.
|
namely to positive infinity on the real axis.
|
||||||
.SH "CONFORMING TO"
|
.SH "CONFORMING TO"
|
||||||
C99
|
C99
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
The glibc implementation is broken and does something entirely different.
|
The glibc implementation is broken and does something entirely different.
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
.BR cabs (3),
|
.BR cabs (3),
|
||||||
|
|
|
@ -20,8 +20,9 @@ The
|
||||||
function returns the real part of the complex number z.
|
function returns the real part of the complex number z.
|
||||||
.LP
|
.LP
|
||||||
One has z = creal(z) + I * cimag(z).
|
One has z = creal(z) + I * cimag(z).
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
The gcc supports also __real__. That is a GNU extension.
|
The gcc supports also __real__.
|
||||||
|
That is a GNU extension.
|
||||||
.SH "CONFORMING TO"
|
.SH "CONFORMING TO"
|
||||||
C99
|
C99
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
|
@ -135,8 +135,8 @@ main(void)
|
||||||
encrypt(txt, 1); /* decode */
|
encrypt(txt, 1); /* decode */
|
||||||
}
|
}
|
||||||
.fi
|
.fi
|
||||||
.SH "NOTE"
|
.SH NOTES
|
||||||
In glibc2.2 these functions use the DES algorithm.
|
In glibc 2.2 these functions use the DES algorithm.
|
||||||
.SH "CONFORMING TO"
|
.SH "CONFORMING TO"
|
||||||
The functions
|
The functions
|
||||||
.BR encrypt ()
|
.BR encrypt ()
|
||||||
|
|
|
@ -63,7 +63,7 @@ The
|
||||||
.BR isinf ()
|
.BR isinf ()
|
||||||
functions return 1 if \fIx\fP is plus infinity, \-1 is \fIx\fP
|
functions return 1 if \fIx\fP is plus infinity, \-1 is \fIx\fP
|
||||||
is minus infinity, and 0 otherwise.
|
is minus infinity, and 0 otherwise.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
Note that these functions are obsolete.
|
Note that these functions are obsolete.
|
||||||
C99 defines macros
|
C99 defines macros
|
||||||
isfinite(), isinf() and isnan() (for all types) replacing them.
|
isfinite(), isinf() and isnan() (for all types) replacing them.
|
||||||
|
|
|
@ -74,7 +74,7 @@ returns 1 if
|
||||||
is positive infinity, and \-1 if
|
is positive infinity, and \-1 if
|
||||||
.I x
|
.I x
|
||||||
is negative infinity.
|
is negative infinity.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
In glibc 2.01 and earlier,
|
In glibc 2.01 and earlier,
|
||||||
.BR isinf ()
|
.BR isinf ()
|
||||||
returns a non-zero value (actually: 1) if
|
returns a non-zero value (actually: 1) if
|
||||||
|
|
|
@ -174,7 +174,7 @@ suitable for error reporting.
|
||||||
/etc/nsswitch.conf
|
/etc/nsswitch.conf
|
||||||
.br
|
.br
|
||||||
/etc/resolv.conf
|
/etc/resolv.conf
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
In order to assist the programmer in choosing reasonable sizes
|
In order to assist the programmer in choosing reasonable sizes
|
||||||
for the supplied buffers,
|
for the supplied buffers,
|
||||||
.I <netdb.h>
|
.I <netdb.h>
|
||||||
|
|
|
@ -135,7 +135,7 @@ struct in_addr {
|
||||||
Note that on the i80x86 the host byte order is Least Significant Byte
|
Note that on the i80x86 the host byte order is Least Significant Byte
|
||||||
first (little endian), whereas the network byte order, as used on the
|
first (little endian), whereas the network byte order, as used on the
|
||||||
Internet, is Most Significant Byte first (big endian).
|
Internet, is Most Significant Byte first (big endian).
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
When you using numbers-and-dots notation for addresses,
|
When you using numbers-and-dots notation for addresses,
|
||||||
be aware that each number will be interpreted as octal
|
be aware that each number will be interpreted as octal
|
||||||
if preceded by a 0 and as hexadecimal if preceded by 0x.
|
if preceded by a 0 and as hexadecimal if preceded by 0x.
|
||||||
|
|
|
@ -151,7 +151,7 @@ is a BSD extension
|
||||||
and is also an SVr4 extension.
|
and is also an SVr4 extension.
|
||||||
.BR isblank ()
|
.BR isblank ()
|
||||||
conforms to POSIX.1-2001 and C99 7.4.1.3.
|
conforms to POSIX.1-2001 and C99 7.4.1.3.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
The details of what characters belong into which class depend on the current
|
The details of what characters belong into which class depend on the current
|
||||||
locale.
|
locale.
|
||||||
For example,
|
For example,
|
||||||
|
|
|
@ -53,7 +53,7 @@ true if x or y is NaN.
|
||||||
.TP
|
.TP
|
||||||
isunordered()
|
isunordered()
|
||||||
is true if x or y is NaN and false otherwise.
|
is true if x or y is NaN and false otherwise.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
Not all hardware supports these functions, and where it doesn't, they
|
Not all hardware supports these functions, and where it doesn't, they
|
||||||
will be emulated by macros.
|
will be emulated by macros.
|
||||||
This will give you a performance penalty.
|
This will give you a performance penalty.
|
||||||
|
|
|
@ -53,10 +53,9 @@ The function
|
||||||
.BR key_secretkey_is_set ()
|
.BR key_secretkey_is_set ()
|
||||||
can be used to determine whether a key has been
|
can be used to determine whether a key has been
|
||||||
set for the effective UID of the calling process.
|
set for the effective UID of the calling process.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
Note that we talk about two types of encryption here.
|
Note that we talk about two types of encryption here.
|
||||||
One is
|
One is asymmetric using a public and secret key.
|
||||||
asymmetric using a public and secret key.
|
|
||||||
The other is symmetric, the
|
The other is symmetric, the
|
||||||
64-bit DES.
|
64-bit DES.
|
||||||
.br
|
.br
|
||||||
|
|
|
@ -86,7 +86,7 @@ The
|
||||||
.BR logout ()
|
.BR logout ()
|
||||||
function returns 1 if the entry was successfully written to the
|
function returns 1 if the entry was successfully written to the
|
||||||
database, or 0 if an error occurred.
|
database, or 0 if an error occurred.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
These functions are included in libutil, hence you'll need to add
|
These functions are included in libutil, hence you'll need to add
|
||||||
.B \-lutil
|
.B \-lutil
|
||||||
to your compiler command line.
|
to your compiler command line.
|
||||||
|
|
|
@ -65,7 +65,7 @@ is made an empty string.
|
||||||
The last six characters of \fItemplate\fP were not XXXXXX.
|
The last six characters of \fItemplate\fP were not XXXXXX.
|
||||||
.SH "CONFORMING TO"
|
.SH "CONFORMING TO"
|
||||||
4.3BSD, POSIX.1-2001.
|
4.3BSD, POSIX.1-2001.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
The prototype is in
|
The prototype is in
|
||||||
.I <unistd.h>
|
.I <unistd.h>
|
||||||
for libc4, libc5, glibc1; glibc2 follows the Single Unix Specification
|
for libc4, libc5, glibc1; glibc2 follows the Single Unix Specification
|
||||||
|
|
|
@ -32,7 +32,7 @@ This file must be writable to the user or
|
||||||
.BR mtrace ()
|
.BR mtrace ()
|
||||||
will do nothing.
|
will do nothing.
|
||||||
If the file is not empty it will be truncated.
|
If the file is not empty it will be truncated.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
The output of
|
The output of
|
||||||
.BR mtrace ()
|
.BR mtrace ()
|
||||||
will be ASCII but not in a friendly format.
|
will be ASCII but not in a friendly format.
|
||||||
|
|
|
@ -108,7 +108,7 @@ The externals
|
||||||
and
|
and
|
||||||
.I sys_errlist
|
.I sys_errlist
|
||||||
conform to BSD.
|
conform to BSD.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
The externals
|
The externals
|
||||||
.I sys_nerr
|
.I sys_nerr
|
||||||
and
|
and
|
||||||
|
|
|
@ -43,7 +43,7 @@ function returns the value of 10 raised to the
|
||||||
power \fIx\fP.
|
power \fIx\fP.
|
||||||
.SH "CONFORMING TO"
|
.SH "CONFORMING TO"
|
||||||
This is a GNU extension.
|
This is a GNU extension.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
These functions are identical to the functions listed under
|
These functions are identical to the functions listed under
|
||||||
.BR exp10 (3).
|
.BR exp10 (3).
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
|
@ -64,7 +64,7 @@ The
|
||||||
function returns no value.
|
function returns no value.
|
||||||
.SH "CONFORMING TO"
|
.SH "CONFORMING TO"
|
||||||
SVr4, 4.3BSD, C89, C99.
|
SVr4, 4.3BSD, C89, C99.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
Library routines suitable for use as the
|
Library routines suitable for use as the
|
||||||
.I compar
|
.I compar
|
||||||
argument include
|
argument include
|
||||||
|
|
|
@ -72,7 +72,7 @@ C89, C99, 4.3BSD, POSIX.1-2001.
|
||||||
.SH BUGS
|
.SH BUGS
|
||||||
Infelicities in the protocol underlying NFS can cause the unexpected
|
Infelicities in the protocol underlying NFS can cause the unexpected
|
||||||
disappearance of files which are still being used.
|
disappearance of files which are still being used.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
Under libc4 and libc5,
|
Under libc4 and libc5,
|
||||||
.BR remove ()
|
.BR remove ()
|
||||||
was an alias for
|
was an alias for
|
||||||
|
|
|
@ -575,7 +575,7 @@ http://invisible-island.net/vttest/
|
||||||
demonstrates many of these control sequences.
|
demonstrates many of these control sequences.
|
||||||
The \fIxterm\fP source distribution also contains sample
|
The \fIxterm\fP source distribution also contains sample
|
||||||
scripts which exercise other features.
|
scripts which exercise other features.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
ESC 8 (DECRC) is not able to restore the character set changed with
|
ESC 8 (DECRC) is not able to restore the character set changed with
|
||||||
ESC %.
|
ESC %.
|
||||||
.SH BUGS
|
.SH BUGS
|
||||||
|
|
|
@ -91,10 +91,10 @@ advantage.
|
||||||
146.82.138.7 master.debian.org master
|
146.82.138.7 master.debian.org master
|
||||||
209.237.226.90 www.opensource.org
|
209.237.226.90 www.opensource.org
|
||||||
.fi
|
.fi
|
||||||
.SH "NOTE"
|
.SH NOTES
|
||||||
Modifications to this file normally take effect immediately,
|
Modifications to this file normally take effect immediately,
|
||||||
except in cases where the file is cached by applications.
|
except in cases where the file is cached by applications.
|
||||||
.SH "HISTORICAL NOTES"
|
.SS "Historical Notes"
|
||||||
RFC\ 952 gave the original format for the host table, though it has
|
RFC\ 952 gave the original format for the host table, though it has
|
||||||
since changed.
|
since changed.
|
||||||
|
|
||||||
|
|
|
@ -108,7 +108,7 @@ If set to a non-existing executable, the user will be unable to login
|
||||||
through
|
through
|
||||||
.BR login (1).
|
.BR login (1).
|
||||||
.RE
|
.RE
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
If you want to create
|
If you want to create
|
||||||
user groups, their GIDs must be equal and there must be an entry in
|
user groups, their GIDs must be equal and there must be an entry in
|
||||||
\fI/etc/group\fP, or no group will exist.
|
\fI/etc/group\fP, or no group will exist.
|
||||||
|
|
|
@ -36,7 +36,7 @@ services at least all over the ex-SU territory.
|
||||||
.PP
|
.PP
|
||||||
KOI8-R is defined by RFC\ 1489 (Registration of a Cyrillic Character
|
KOI8-R is defined by RFC\ 1489 (Registration of a Cyrillic Character
|
||||||
Set).
|
Set).
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
KOI8-R was designed for mixed Russian/English texts and covers
|
KOI8-R was designed for mixed Russian/English texts and covers
|
||||||
only Russian Cyrillic characters, so if you're looking for Ukrainian,
|
only Russian Cyrillic characters, so if you're looking for Ukrainian,
|
||||||
Byelorussian, etc.
|
Byelorussian, etc.
|
||||||
|
|
|
@ -403,7 +403,7 @@ or
|
||||||
.q Rolling
|
.q Rolling
|
||||||
if the leap second time given by the other fields should be interpreted as
|
if the leap second time given by the other fields should be interpreted as
|
||||||
local wall clock time.
|
local wall clock time.
|
||||||
.SH NOTE
|
.SH NOTES
|
||||||
For areas with more than two types of local time,
|
For areas with more than two types of local time,
|
||||||
you may need to use local standard time in the
|
you may need to use local standard time in the
|
||||||
.B AT
|
.B AT
|
||||||
|
|
Loading…
Reference in New Issue