Index: trunk/minix/man/man5/TZ.5
===================================================================
--- trunk/minix/man/man5/TZ.5	(revision 9)
+++ 	(revision )
@@ -1,138 +1,0 @@
-.TH TZ 5
-.SH NAME
-TZ \- Time zone environment variable
-.SH SYNOPSIS
-\fBTZ=\fIzone\fR[\fB\-\fR]\fIoffset\fR[\fIdst\fR[\fIoffset\fR][\fB,\fIstart\fR[\fB/\fItime\fR]\fB,\fIend\fR[\fB/\fItime\fR]]]
-.SH DESCRIPTION
-.de SP
-.if t .sp 0.4
-.if n .sp
-..
-The
-.B TZ
-environment variable tells functions such as the
-.BR ctime (3)
-family and programs like
-.B date
-what the time zone and daylight saving rule is.  The value of
-.B TZ
-has the \s-2POSIX\s+2 standardized form shown in the synopsis.  This form
-specifies the zone names, offsets from GMT, and daylight saving changeover
-times for at least the current year.
-.TP
-.I zone
-A three or more letter name for the time zone in normal (winter) time.
-.TP
-.BI [\-] offset
-A signed time telling the offset of the time zone westwards from Greenwich.
-The time has the form
-.I hh[:mm[:ss]]
-with a one of two digit hour, and optional two digit minutes and seconds.
-.TP
-.I dst
-The name of the time zone when daylight saving is in effect.  It may
-be followed by an offset telling how big the clock correction is other than
-the default of 1 hour.
-.TP
-\fIstart\fR/\fItime\fR,\fIend\fR/\fItime\fR
-Specifies the start and end of the daylight saving period.  The
-.I start
-and
-.I end
-fields indicate on what day the changeover occurs.  They must be in one of
-the following formats:
-.SP
-.ta +5
-.in +5
-.ti -5
-\fBJ\fIn\fR	The Julian day
-.I n
-(1 <=
-.I n
-<= 365) ignoring leap days, i.e. there is no February 29.
-.SP
-.ti -5
-\fIn\fR	The zero-based Julian day
-(0 <=
-.I n
-<= 365).  Leap days are not ignored.
-.SP
-.ti -5
-.BI M m . n . d
-.br
-This indicates month
-.IR m ,
-the
-.IR n -th
-occurrence of day
-.I d
-(1 <=
-.I m
-<= 12, 1 <=
-.I n
-<= 5, 0 <=
-.I d
-<= 6, 0=Sunday).  The 5-th occurrence means the last occurrence of that day
-in a month.  So
-.B M4.1.0
-is the first Sunday in April,
-.B M9.5.0
-is the last Sunday in September.
-.in -5
-.SP
-The
-.I time
-field indicates the time the changeover occurs on the given day.
-.SH EXAMPLES
-Greenwich Mean Time:
-.PP
-.RS
-.B TZ=GMT0
-.RE
-.PP
-Central European Time, 1 hour east from Greenwich, daylight saving starts on
-the last Sunday in March at 2 AM and ends on the last Sunday in October
-at 3 AM:
-.PP
-.RS
-.B TZ='CET\-1CEST,M3.5.0/2,M10.5.0/3'
-.RE
-.PP
-British time, daylight saving starts and ends at the same moment as CET,
-but in an earlier time zone:
-.PP
-.RS
-.B TZ=GMT0BST,M3.5.0/1,M10.5.0/2
-.RE
-.PP
-The eastern european time zones also have the changeovers at the same
-absolute time as British time and CET.
-.PP
-U.S. Eastern Standard Time, 5 hours west from Greenwich, daylight saving
-starts on the first Sunday in April at 2 AM and ends on the last Sunday in
-October at 2 AM:
-.PP
-.RS
-.B TZ=EST5EDT,M4.1.0/2,M10.5.0/2
-.RE
-.PP
-It shouldn't surprise you that daylight saving in New Zealand is observed
-in the months opposite from the previous examples.  It starts on the first
-Sunday in October at 2 AM and ends on the third Sunday in March at 3 AM:
-.PP
-.RS
-.B TZ=NZST\-12NZDT,M10.1.0/2,M3.3.0/3
-.RE
-.SH "SEE ALSO"
-.BR readclock (8),
-.BR date (1).
-.SH BUGS
-You may have noticed that many fields are optional.  Do no omit them,
-because the defaults are bogus.  If you need daylight saving then fully
-specify the changeovers.
-.PP
-West is negative, east is positive, ask any sailor.
-.PP
-Next year's time zone and daylight saving time are determined by politicians.
-.SH AUTHOR
-Kees J. Bot (kjb@cs.vu.nl)
Index: trunk/minix/man/man5/configfile.5
===================================================================
--- trunk/minix/man/man5/configfile.5	(revision 9)
+++ 	(revision )
@@ -1,83 +1,0 @@
-.TH CONFIGFILE 5
-.SH NAME
-configfile \- generic configuration file format
-.SH SYNOPSIS
-.B */etc/*.conf
-.SH DESCRIPTION
-.de SP
-.if t .sp 0.4
-.if n .sp
-..
-The syntax of the generic configuration file format is as follows:
-.PP
-.RS
-.nf
-.ta +16n
-configfile:	empty
-.ta +8n +8n
-	|	configline configfile
-	;
-
-.ta +16n
-configline:	wordlist '\fB;\fR'
-.ta +8n +8n
-	|	\fBinclude\fR string '\fB;\fR'
-	;
-
-.ta +16n
-wordlist:	empty
-.ta +8n +8n
-	|	word wordlist
-	|	string wordlist
-	|	'\fB{\fR' configfile '\fB}\fR' wordlist
-	;
-
-empty:	;
-.fi
-.RE
-.PP
-A word is a sequence of letters, numbers, and characters from the set
-.BR "!#$%&*+-./<=>?[\e]^_|~" .
-A backslash
-.RB ( \e )
-may be followed by a character in the set
-.B abefnrstv
-to form a BEL, BS, ESC, FF, NL, CR, SP, TAB, or VT character.  Followed by
-up to three octal digits a character of that value is formed, and likewise
-for an
-.B x
-followed by up to two hexadecimal digits.  Any other character is left
-as-is.  A backslash followed by whitespace is completely removed from the
-input.  (This includes comments.)
-.PP
-A string is started by a single or double quote, a series of characters, and
-ended by the same type of quote it started with.  Any character or
-escape with
-.B \e
-may be found in a string.  Strings may not span lines.
-.PP
-Tokens are separated by whitespace, being the usual whitespace characters
-and comments.  A comment starts with the
-.B #
-character, and ends at a newline.
-.PP
-The special word
-.B include
-tells that the file mentioned in the following string must be read and
-included at that point.  The file is found relative to the directory the
-current configuration file is found in, unless its name starts with a
-.BR / .
-A file that doesn't exist is seen as empty.
-.PP
-A generic configuration file can be read with the functions described in
-.BR configfile (3).
-.SH EXAMPLES
-Have a look at
-.BR /etc/dhcp.conf .
-.SH "SEE ALSO"
-.BR configfile (3).
-.SH NOTES
-Inspired by the configuration file of Paul Vixie's
-.BR bind .
-.SH AUTHOR
-Kees J. Bot (kjb@cs.vu.nl)
Index: trunk/minix/man/man5/crontab.5
===================================================================
--- trunk/minix/man/man5/crontab.5	(revision 9)
+++ 	(revision )
@@ -1,137 +1,0 @@
-.TH CRONTAB 5
-.SH NAME
-crontab \- table of jobs to be performed by cron
-.SH SYNOPSIS
-.nf
-.ft B
-/usr/lib/crontab
-/usr/local/lib/crontab
-/var/lib/crontab
-/var/opt/\fIname\fP/lib/crontab\ \ \fR(Minix-vmd only)\fB
-/usr/spool/crontabs/\fIuser\fP
-.ft R
-.fi
-.SH DESCRIPTION
-The
-.BR cron (8)
-daemon runs jobs at regular intervals.  These jobs are listed in
-.B crontab
-files.  The format of entries in a crontab file are five fields of numbers
-specifying the minute (0\-59), hour (0\-23), day of the month (1\-31), month
-(1\-12), and day of the week (0\-6 with 0 = Sunday) that a task must be
-executed.  The task to be executed follows as a shell command.
-.PP
-The time numbers can be given as a comma separated list of simple numbers,
-ranges ("2\-5" is the same as "2,3,4,5"), and repeats ("2:5" means
-"2,7,12,17,22" in the hour field).  A repeat is cyclic affair, i.e. 2:5
-and 12:5 are the same thing.  A single "*" can be used in a field to
-indicate all valid numbers in that field, so it translates to "always".  In
-the minute field you can use "?" for the current minute that the crontab
-file is loaded.  It can be used in a repeat, i.e. "?:10" for every 10
-minutes.  This keeps machines with identical crontabs from executing tasks
-at exactly the same time, causing a burst of traffic if anything is done
-over a network.
-.PP
-If a given time is valid in all five fields then a command is executed.
-Here are a few examples that illustrate the possibilities:
-.PP
-.if t .RS
-.if t .ft C
-.nf
-# min hour mday mon wday command
-   ?   3    *    *   *   /usr/etc/daily  # Daily system cleanup
-   0   *    *    *   *   date            # Print date on the hour
-  30   4    *    *  2\-6  /var/etc/backup # After workdays on 4:30
-   0   9   25   12   *   \-u ast sing     # Andy sings on Xmas morning
-   0   0   13    *   5   echo Beware!    # For the superstitious
-.fi
-.if t .ft P
-.if t .RE
-.PP
-The command may optionally be prefixed by
-.BI \-u " user"
-to specify under which user the command should be run.  Commands from
-crontabs in the spool directory are always run under the id of the crontab's
-owner, the
-.B \-u
-flag is ignored.
-.PP
-A command can be placed on the same line as the time fields, or on the next
-line indented by one TAB character.  (A TAB, not eight spaces.)  More TAB
-indented lines can be added for a multiline command.  The tabs are removed
-from the command when passed to the shell.  If a command is put on the same
-line as the time fields then percent characters are changed into newlines,
-this is not done for a TAB indented command.  The following three entries
-give the same output:
-.PP
-.RS
-.if t .ft C
-.nf
-.ta +8n
-0 12  *  *  *   echo 'Hello'; echo '  World!'
-#1
-0 12  *  *  *   echo 'Hello%  World!'  #2
-0 12  *  *  *        #3
-	cat <<EOF    #4
-	Hello
-	\&  World!
-	EOF
-.fi
-.if t .ft P
-.RE
-.PP
-Comments start with a "#" character and continue until end of line.  They,
-excess whitespace, and empty lines are ignored.  Of the comments in the
-example above #1 and #3 are ignored by
-.BR cron ,
-but #2 and #4 are not recognized as comments, but are seen as part of a
-command and are passed to the shell who then happens to ignore them.  There
-is no interpretation of command characters other than the percent in a
-oneliner.  The time fields must all be on the same line.
-.SH FILES
-.TP 25n
-.B /usr/lib/crontab
-Main MINIX 3 crontab file.
-.TP
-.B /usr/local/lib/crontab
-Local jobs for all systems in an organization.
-.TP
-.B /var/lib/crontab
-System specific jobs.
-.TP
-.B /var/opt/\fIname\fP/lib/crontab
-Per package jobs for Minix-vmd.
-.TP
-.B /usr/lib/packages
-List of installed packages.
-.TP
-.B /usr/spool/crontabs/\fIuser\fP
-Per user jobs.
-.SH "SEE ALSO"
-.BR crontab (1),
-.BR cron (8).
-.SH NOTES
-The "?" in the minute field, the repeat field (e.g. "2:5"), TAB indented
-multiline commands and the
-.B \-u
-option are unique to this cron implementation.  This doesn't mean you
-shouldn't use these features, but just that you should be aware of the
-differences with other systems.  You are even advised to use these features
-and avoid the percent hack for multiline commands.
-.PP
-Other crons allow one to specify input to a job in some way, something this
-cron can't.  Simply use the << shell feature to do that.  Other crons often
-choke on empty lines.
-.PP
-It is a common bug to use 0 for Sunday instead of 7.  This cron, like most
-other crons out there accepts this without comment.
-.PP
-A job is not reissued until a previous instance of it has exited.  The next
-time to execute is computed from the previous time it ran.  If job issuing
-lags behind on the system time then the next time to run it is computed from
-the current system time.
-.SH AUTHOR
-Kees J. Bot (kjb@cs.vu.nl)
-
-.\"
-.\" $PchId: crontab.5,v 1.3 2000/07/17 18:53:05 philip Exp $
Index: trunk/minix/man/man5/dhcp.conf.5
===================================================================
--- trunk/minix/man/man5/dhcp.conf.5	(revision 9)
+++ 	(revision )
@@ -1,498 +1,0 @@
-.TH DHCP.CONF 5
-.SH NAME
-dhcp.conf \- dynamic host configuration protocol configuration
-.SH SYNOPSIS
-.B /etc/dhcp.conf
-.SH DESCRIPTION
-.de SP
-.if t .sp 0.4
-.if n .sp
-..
-The file
-.B /etc/dhcp.conf
-contains the configuration for the DHCP client/server program
-.BR dhcpd .
-This text is a long summation of all the elements that can be found in this
-configuration file.  For a more "just tell me what to do" approach see
-.BR boot (8).
-.PP
-The syntax used is that of the common configuration file described in
-.BR configfile (5).
-.PP
-To find information for a client we first need its IP address.  Occasionally
-this IP address is already known (the special "INFORM" query), but normally
-we have to make a first pass through the configuration file for a
-.B client
-entry.  If that fails then we use an IP address from the pool file.  If we
-now have an IP address then the real information gathering can begin.
-.PP
-The DHCP daemon reads the configuration file from beginning to end and
-gathers all information that matches, and information from all macros that
-are mentioned within the elements that match.  If we end up with DHCP
-information that includes at least a netmask definition, and is good for the
-network the request came in from, then it is returned to the client.  If a
-DHCP tag is specified twice then the last one wins.
-.PP
-In the description below we use [ and ] to denote optional things, and | to
-show a choice between two things.
-.PP
-Client IDs can be either ordinary Ethernet addresses, that are treated as a
-seven octet string (01 followed by the Ethernet address), or any random
-octet string in hexadecimal.
-.PP
-IP addresses can be simply that, or host names.  These host names are
-searched in
-.B /etc/hosts
-by
-.B dhcpd
-itself using a domain based prefix match, i.e. you can use "flotsam" for
-"flotsam.example.com", but not "alpha" for "alphabeta".  Once the program
-decides to be a server it will also look up names normally in the DNS.
-If a host has more than one IP address then the address on the network the
-query was seen on is used.
-.PP
-Case isn't important in the configuration file, "client", "CLIENT" and
-"ClIeNt" are all treated the same.
-.PP
-Some elements may optionally name a macro or a curly braces enclosed
-parameter list of more elements.  If the element matches then the data
-in the macro body or parameter list is gathered.
-.PP
-The following elements can be used:
-.PP
-.B client
-.I client-ID
-.RB [ ip #]
-.I host
-.RI [ macro |{ params }];
-.PP
-.RS
-Defines a client with a given client ID that is to have the IP address
-denoted by
-.I host .
-On the first pass only the client ID is matched looking for an IP address
-that lies on the network the request came in on.  On the
-information gathering pass both client ID and IP address must match.  If
-a machine has the same Ethernet address on two or more interfaces then the
-IP address given out is the one on the same network as the request came in
-on.  The optional interface name
-.RB ( ip #)
-must be used if the DHCP daemon is gathering data for itself at boot time
-to differentiate interfaces with the same ethernet addresses.  This is
-only necessary under Minix-vmd when ethernets on different VLANs share
-the same physical ethernet.  The interface name is only used for a machine's
-own networks, it ignored on entries for other hosts.
-.RE
-.PP
-.B class
-.IR class-name " ..."
-.IR macro |{ params };
-.PP
-.RS
-Includes the macro or parameters if one of the class names is matched.  A
-host normally includes a class ID in its request.  MINIX 3 and Minix-vmd
-use "Minix" as the class name.  For Windows the class ID starts with
-"MSFT", and Solaris' starts with "SUNW".
-(Use
-.B dhcpd \-d3
-to find out what the full IDs are exactly.)  The class names are matched if a
-.I class-name
-is a prefix of the class ID sent by the client.
-.RE
-.PP
-.B host
-.I host-spec
-.IR macro |{ params };
-.PP
-.RS
-Includes the macro or parameters if the IP address of the client matches the
-host specification.  This can either be an ordinary hostname, or a netblock
-in CIDR notation, e.g. 172.35.0.0/16.  The example includes all IP addresses
-whose top 16 bits are the same as the top 16 bits of 172.35.0.0.  Such a
-netblock automatically defines a netmask (255.255.0.0 in the example) if no
-netmask has been specified yet.
-.RE
-.PP
-.B interface
-.BR ip #
-.I host
-.RI [ macro |{ params }];
-.PP
-.RS
-Makes
-.B dhcpd
-set the IP address of interface
-.BR ip #
-(where # is a number) to the IP address denoted by
-.IR host .
-This element should only be used for interfaces that are not true Ethernets,
-and so do not have a unique Ethernet address that can be used for a client
-element.  If the machine has at least one true Ethernet then all interface
-elements should be added to the parameter list of a host or client element
-for that Ethernet interface.  This binds them to that machine and allows a
-single configuration file to be shared among machines.  Especially a server
-should never have "free" interface elements.  The macro or parameters are
-only evaluated if data is gathered for the given interface.  (Note that they
-will be hidden by a client element for another interface.)
-.RE
-.PP
-.B macro
-.IR macro-name ;
-.PP
-.RS
-Include the parameter list of the macro named
-.I macro-name
-defined elsewhere.  (This means that "host flotsam stuff" is just short
-for "host flotsam { macro stuff; }".)
-.RE
-.PP
-.B macro
-.I macro-name
-.RI { params };
-.PP
-.RS
-Defines a macro with the given parameter list.  Whenever the macro is used
-the parameter list is substituted instead.  A macro can not be defined
-within another parameter list.
-.RE
-.PP
-.B option
-.RB [ ip #]
-.B server
-.RB [ inform ];
-.br
-.B option
-.RB [ ip #]
-.B relay
-.IR host ;
-.br
-.B option
-.RB [ ip #]
-.BR possessive ;
-.br
-.B option
-.RB [ ip #]
-.B hostname
-.IR name ;
-.PP
-.RS
-Makes
-.B dhcpd
-set special options for the interface that it is gathering data for, or the
-interface denoted by the optional
-.BR ip #
-argument.  The options are:
-.SP
-.B server
-.RB [ inform ]
-.RS
-Be a DHCP server on the network connected to the interface.  Add the word
-.B inform
-if DHCPINFORM requests must be answered for hosts we don't have an address
-for.
-.RE
-.SP
-.B relay
-.I host
-.RS
-Be a DHCP relay to the indicated host.
-.RE
-.SP
-.B possessive
-.RS
-Do not disable the interface if the DHCP lease expires.  Useful if the
-DHCP server of the provider is unreliable, crashing a lot and causing the
-lease to expire.  (Think twice before turning this option on.  You have to
-be absolutely sure that it's the DHCP server that's the culprit and not
-a flaky network.  You don't want an IP address conflict to be your fault.)
-.RE
-.SP
-.B hostname
-.I name
-.RS
-Use the given name as our hostname in the DHCP queries.  Some sites key on
-that bit of information instead of a client ID.
-.RE
-.RE
-.PP
-.B tag
-.I number name type granularity
-.IR max ;
-.PP
-.RS
-Defines a DHCP tag for the given tag number and gives it a name.  The name can
-be used in the configuration file to set tag values when gathering data.
-The
-.I type
-field can be one of
-.BR ascii ,
-.BR boolean ,
-.BR ip ,
-.BR number
-or
-.BR octet
-to specify the type of the tag as a simple string, a boolean, an IP address,
-a number, or a string of octet values.
-The
-.I granularity
-field specifies that that number of items must be given or a multiple
-thereof, unless the type is a number, then it is the size of the number (1,
-2 or 4).
-The
-.I max
-field tells the maximum number of items that may be used with the tag, with
-0 meaning "unlimited".
-.SP
-Three tags, the ones that MINIX 3 really cares about, have been predefined,
-and there are also a few pseudotags predefined for the static fields in a
-DHCP packet that one may want to set:
-.SP
-.RS
-.nf
-tag ? siaddr ip 1 1;
-tag ? sname ascii 1 64;
-tag ? file ascii 1 128;
-tag 1 netmask ip 1 1;
-tag 3 gateway ip 1 0;
-tag 6 DNSserver ip 1 0;
-.fi
-.RE
-.SP
-The file
-.B /usr/etc/dhcptags.conf
-contains tag definitions for all standard DHCP tags.  It is wise to include
-this file at the top of any DHCP configuration file.
-.RE
-.PP
-.B no
-.IR tag-name ;
-.PP
-.RS
-Removes a tag with the given name from the data gathered at this point.
-Useful if one host is different from all others, for instance if it doesn't
-need a gateway definition, because it happens to be the gateway.
-.RE
-.PP
-.IR "ascii-tag string" ;
-.PP
-.RS
-Adds an ASCII tag to the gathered data.  The string can be a simple word, or
-a quoted string.
-.RE
-.PP
-.I boolean-tag
-.BR false | true ;
-.PP
-.RS
-Set a boolean tag to be false or true.  (Encoded as a octet of value 0 or 1.
-Note that if you prefer to use 0 or 1 instead of false or true then you can
-define a boolean tag as a size 1 number instead.)
-.RE
-.PP
-.IR "ip-tag host" " ...;"
-.PP
-.RS
-Sets a tag that needs one or more IP addresses.  The host names are
-translated as usual.  To make it easier to specify netmasks one can use a
-slash followed by a number, e.g.
-.BR "netmask /27" ,
-which is a handy alternative for
-.BR "netmask 255.255.255.224" .
-.RE
-.PP
-.IR "number-tag number" " ...;"
-.PP
-.RS
-Set a number tag.
-.RE
-.PP
-.IR "octet-tag hexdigits" ;
-.PP
-.RS
-Set an octet string tag.
-.I Hexdigits
-is a series of hexadecimal digits that are two by two used to set the
-octets.
-.RE
-.PP
-.SH EXAMPLE
-As an example the DHCP configuration used by the author of this document is
-included.  His network at home consists of a number of PCs, an ISDN router
-named rhone and a PC named saone serving as router/tunnel to/via a cable
-ISP.  Both the rhone and the saone connect the home net to the network of
-the Vrije Universiteit, but the rhone is only active if the cable doesn't
-work.
-.PP
-The saone is a DHCP server, and one of the ordinary PCs is a backup DHCP
-server.  Both use the same configuration file, which is added below, with
-extra commentary introduced by
-.B ##
-at a deeper indent level:
-.RS
-.de xS	\" Example start
-.sp
-.nf
-.ft C
-..
-.de xE	\" Example end
-.fi
-.ft R
-..
-.de cS	\" Commentary start
-.sp
-.in +12m
-.ti -\w'## 'u
-##\ \c
-..
-.de cE	\" Commentary end
-.in -12m
-..
-.xS
-.ta +8m +16m
-include /usr/etc/dhcptags.conf;
-.xE
-.cS
-With the help of the tag definitions we can use tags like "DHCPlease".
-.cE
-.xS
-host 130.37.102.64/27 {
-	DNSserver saone darask;
-	host 130.37.102.88/29 { DHCPlease 259200; }
-};
-.xE
-.cS
-This defines the network 130.37.102.64/27, with netmask 255.255.255.224
-(implicit from the network definition).  The DNS servers for this net are
-saone and darask.  A smaller subrange of addresses is used as an address
-pool on the saone, so a lease of 259200 seconds (3 days) is defined.  The
-netmask is still /27, as set by the outer network definition.
-.cE
-.xS
-host 130.37.102.248/30 {};
-.xE
-.cS
-A network of two addresses for routing tests.
-.cE
-.xS
-host saone {
-	option server;
-	option ip1 possessive;
-	interface ip2 saone-net2;
-	DNSserver 130.37.24.3 130.37.24.6;
-};
-.xE
-.cS
-With the network definitions done we turn our attention to the hosts.  Saone
-is a DHCP server on its main interface.  The second interface
-.RB ( ip1 )
-is connected to the cable modem.  It gets its address from the cableco's
-DHCP server, and if that server decides to go deaf then the saone keeps
-the interface up ("possessive") even if the lease expires.  The pseudo IP
-interface
-.B ip2
-is set to the IP address of
-.BR saone-net2 ,
-one side of the encrypted tunnel over the cable to a Minix-vmd box at the VU.
-The DNS servers specified override the default setting for the network, naming
-two external servers at the VU that know the world.
-.cE
-.xS
-host darask {
-	option server;
-	DNSserver saone;
-	class MINIX 3 { DNSserver saone 130.37.24.3 130.37.24.6; };
-};
-.xE
-.cS
-The darask is also a server, the backup for saone on the odd chance that it
-is unavailable.  It uses saone and the external name servers, but only
-when it is running MINIX 3.  When running Windows it only uses saone.
-.cE
-.xS
-.ta +32m +16m
-client 0:1:1b:a:68:ce	darask;	# NE2000
-client 0:1:1b:a:77:23	burask;	# NE2000
-#lient 0:0:c0:b0:da:64	burask;	# WD8013EWC
-client 8:0:5a:38:b2:f	finiah;	# PCMCIA NE2000
-client 0:0:c0:3a:12:10	bardelask;	# WD8003
-#lient 2:60:8c:ab:8a:6d	bardelask;	# 3C503
-client 0:a0:c5:20:9:6d	rhone;
-client 0:1:1b:a:4c:3b	saone;	# NE2000
-#lient 0:0:c0:fb:2:6a	saone-net1;	# WD8013EWC
-.xE
-.cS
-Lastly the ethernet addresses of all the hosts are listed, so that they can
-be translated to IP addresses.  The lines that are commented out are for
-extra network cards that are currently unused.  The last is used to connect
-to the cable modem, so it's only here because it's nice to have the ethernet
-address written down somewhere.
-.cE
-.RE
-.PP
-The host names shown above are translated by DHCP using this
-.BR /etc/hosts :
-.RS
-.xS
-.ta +\w'130.37.102.249mm'u
-604800	%ttl
-2419200	%stale
-
-130.37.102.65	darask.kjb.upwind.org
-130.37.102.66	burask.kjb.upwind.org
-130.37.102.67	finiah.kjb.upwind.org
-130.37.102.68	bardelask.kjb.upwind.org
-130.37.102.69	roniah.kjb.upwind.org
-
-130.37.102.70	saone.kjb.upwind.org
-130.37.102.2	saone-net2.kjb.upwind.org
-
-130.37.102.88	rhone.kjb.upwind.org
-130.37.102.89	dyn89.kjb.upwind.org
-130.37.102.90	dyn90.kjb.upwind.org
-130.37.102.91	dyn91.kjb.upwind.org
-130.37.102.92	dyn92.kjb.upwind.org
-130.37.102.93	dyn93.kjb.upwind.org
-130.37.102.94	dyn94.kjb.upwind.org
-
-130.37.102.249	tst1.kjb.upwind.org
-130.37.102.250	tst2.kjb.upwind.org
-.xE
-.RE
-.SH FILES
-.TP
-.B /usr/etc/dhcptags.conf
-A supplied list of standard tag definitions as per RFC-1533.  (Well, the
-tag numbers and their meaning are standard, the names are made up.)
-.SH "SEE ALSO"
-.BR RFC-2131 ,
-.BR RFC-1533 ,
-.BR configfile (5),
-.BR hosts (5),
-.BR boot (8),
-.BR dhcpd (8).
-.SH NOTES
-The amount of memory
-.B dhcpd
-needs increases with the size of configuration file.  MINIX 3 can
-handle
-.B dhcptags.conf
-and a modest sized
-.BR dhcp.conf .
-You have to increase the stack size to accommodate more.  (No problem under
-Minix-vmd, of course.)
-.SH NOTES
-Items that are only necessary for a certain host should only be specified
-for that host.  Items for a whole network are best added to a netblock
-specification.  Use class elements for a certain type of host, and macros
-for exceptions.  Try to limit information as much as possibly to those hosts
-that need it.  (Don't go overboard.  A MINIX 3 machine won't be bothered by a
-few NetBIOS tags.)
-.PP
-DHCPINFORM requests should always be answered when being a server, but
-J. Random Sysadmin trying to diagnose problems doesn't like it when little
-MINIX 3 machines show up in a packet trace unexpectedly.  It's best to be
-inconspicuous on a network you don't own.
-.SH BUGS
-There are a few too many subtle mistakes one can make.
-.SH AUTHOR
-Kees J. Bot <kjb@cs.vu.nl>
Index: trunk/minix/man/man5/dir.5
===================================================================
--- trunk/minix/man/man5/dir.5	(revision 9)
+++ 	(revision )
@@ -1,43 +1,0 @@
-.TH DIR 5
-.SH NAME
-dir \- directory layout
-.SH SYNOPSIS
-.nf
-.ft B
-#include <sys/types.h>
-#include <sys/dir.h>
-.SH DESCRIPTION
-The directories of the V1 and V2 file systems are arrays of the
-following structure defined in <sys/dir.h>:
-.PP
-.nf
-.ta +5n +15n +15n
-struct direct {
-	ino_t	d_ino;	/* I-node number */
-	char	d_name[14];	/* Name of up to 14 characters */
-};
-.fi
-.DT
-.PP
-The
-.B d_ino
-field is the inode number of the file named by
-.BR d_name .
-.B D_ino
-is zero if the directory slot isn't allocated.  This number is the same as
-.B st_ino
-returned by
-.BR stat (2)
-unless the entry is mounted on.
-.B D_name
-is the name of up to 14 characters, null-terminated only if less then 14
-in length.  Any character other than null or '\fB/\fP' is allowed.
-.PP
-See
-.BR directory (3)
-for a portable way to access directories, MINIX 3 is probably the last system
-with these old V7 format directories.
-.SH "SEE ALSO"
-.BR directory (3).
-.SH AUTHOR
-Kees J. Bot (kjb@cs.vu.nl)
Index: trunk/minix/man/man5/ethers.5
===================================================================
--- trunk/minix/man/man5/ethers.5	(revision 9)
+++ 	(revision )
@@ -1,36 +1,0 @@
-.TH ETHERS 5
-.SH NAME
-ethers \- ethernet address to hostname database
-.SH SYNOPSIS
-.B /etc/ethers
-.SH DESCRIPTION
-The ethers database translates ethernet addresses to hostnames for use by
-the RARP daemon (see
-.BR rarpd (8).)
-.B /etc/ethers
-may look like this:
-.PP
-.RS
-.ta +20n +10n
-0:0:c0:a:77:23	flotsam
-.br
-0:0:c0:a:68:ce	jetsam
-.RE
-.PP
-The six octet ethernet numbers must be entered as shown above, the hex
-constants must use lowercase letters and may not have leading zeros.
-Comments are marked with '#'.
-.PP
-See
-.BR rarpd (8)
-on why you shouldn't list Sun hosts in this file.
-.SH FILES
-.TP 15n
-/etc/ethers
-Ethernet addresses database.
-.SH "SEE ALSO"
-.BR hosts (5),
-.BR rarpd (8),
-.BR boot (8).
-.SH AUTHOR
-Kees J. Bot (kjb@cs.vu.nl)
Index: trunk/minix/man/man5/fstab.5
===================================================================
--- trunk/minix/man/man5/fstab.5	(revision 9)
+++ 	(revision )
@@ -1,87 +1,0 @@
-.TH FSTAB 5
-.SH NAME
-fstab, mtab \- list of file systems to mount, mounted file system table.
-.SH SYNOPSIS
-.B /etc/fstab
-.sp
-.B /etc/mtab
-.SH DESCRIPTION
-.B /etc/fstab
-is a table of file system to mount at boot time,
-.B /etc/mtab
-is a table of currently mounted file systems as maintained by
-.B mount
-and
-.BR umount .
-.PP
-.B /etc/fstab
-is not read by
-.B mount
-as it should be.  It is instead a simple shell script listing the two or
-three devices that MINIX 3 needs to operate:  The device names of the root
-file system, the swap file system (optional), and the file system for
-.BR /usr .
-.PP
-.B /etc/mtab
-contains lines of four fields.  The layout is:
-.sp
-.RS
-.nf
-.ft B
-.ta +10n +13n +8n
-device	directory	type	options
-.ft P
-.fi
-.RE
-.PP
-These fields may be explained as follows:
-.sp
-.B device
-.br
-.RS
-A block special device.
-.RE
-.sp
-.B directory
-.br
-.RS
-Mount point.
-.RE
-.sp
-.B type
-.br
-.RS
-Either
-.BR 1 ,
-.BR 2 ,
-or
-.BR swap ,
-indicating a V1 or a V2 file system, or swap space.
-.RE
-.sp
-.B options
-.br
-.RS
-Either
-.BR ro ,
-or
-.BR rw ,
-indicating a read-only or read-write mounted file system.
-.RE
-.SH FILES
-.TP 15n
-.B /etc/fstab
-Shell script naming three important file systems.
-.TP
-.B /etc/mtab
-List of mounted file systems.
-.SH "SEE ALSO"
-.BR printroot (8),
-.BR mount (1),
-.BR fsck (1),
-.BR mkfs (1).
-.SH BUGS
-.B /etc/fstab
-is a joke.
-.SH AUTHOR
-Kees J. Bot (kjb@cs.vu.nl)
Index: trunk/minix/man/man5/hosts.5
===================================================================
--- trunk/minix/man/man5/hosts.5	(revision 9)
+++ 	(revision )
@@ -1,57 +1,0 @@
-.TH HOSTS 5
-.SH NAME
-hosts \- hostname to IP address database
-.SH SYNOPSIS
-.B /etc/hosts
-.SH DESCRIPTION
-The hosts database lists the IP addresses and the hostnames that translate
-to these IP addresses.  It is used by
-.BR nonamed (8)
-in a network without name servers.  A simple
-.B /etc/hosts
-may look like this:
-.PP
-.RS
-.ta +15n
-.nf
-10.0.0.1	flotsam
-10.0.0.2	jetsam
-.fi
-.RE
-.PP
-These two entries give names to two IP addresses.  The file may contain
-comments marked with '#'.
-.PP
-You can have aliases (more hostnames on the same line) to give a machine
-more than one name, like
-.BR www ,
-if you run a web server on one.
-.PP
-If your PC is Internet connected then you can specify the name server(s)
-to get more information from with %nameserver entries:
-.PP
-.RS
-.ta +\w'172.16.24.3'u+4m +\w'%nameserver'u+4m
-.nf
-172.16.24.3	%nameserver	# dns1.example.com
-172.16.24.6	%nameserver	# dns2.example.com
-.fi
-.RE
-.PP
-Read
-.BR nonamed (8)
-for all the details on special host file entries that configure
-.B nonamed
-for use on the Internet, and on home machines that are occasionally
-connected to the Internet.
-.SH FILES
-.TP 15n
-/etc/hosts
-Hosts database.
-.SH "SEE ALSO"
-.BR ethers (5),
-.BR nonamed (8),
-.BR dhcpd (8),
-.BR boot (8).
-.SH AUTHOR
-Kees J. Bot (kjb@cs.vu.nl)
Index: trunk/minix/man/man5/keymap.5
===================================================================
--- trunk/minix/man/man5/keymap.5	(revision 9)
+++ 	(revision )
@@ -1,167 +1,0 @@
-.TH KEYMAP 5
-.SH NAME
-keymap \- keyboard maps
-.SH SYNOPSIS
-.B /etc/keymap
-.SH DESCRIPTION
-.B /etc/keymap 
-is the compressed mapping from keyboard scan codes to ASCII.
-It is made from a keymap source file consisting of MAP_COLS columns
-(MINIX assigns the value 6 to MAX_COLS, corresponding to key pressed,
-key+SHIFT, key+LEFT_ALT, key+RIGHT_ALT, key+ALT+SHIFT and key+CTRL) and 
-NR_SCAN_CODES rows (MINIX assigns the value 0x80 to NR_SCAN_CODES, 
-corresponding to the number of scan codes to be provided by the keyboard),
-and each element is 2 bytes in length (see u16_t in type definitions). 
-The low order byte corresponds to the character represented by the scan 
-code, and the high order byte corresponds to the special meaning (when 
-CAPS LOCK has effect, if it is a function key, etc.), which is converted to
-binary keymap format using the
-.BR genmap  
-utility. 
-.PP
-.SS "Types (general): <sys/types.h>"
-<sys/types.h> defines the
-.B u8_t
-and
-.B u16_t
-types, corresponding to 8 and 16 bit values.
-.SS "Macros: <minix/keymap.h>"
-.TP
-.BI "C(" c ") - Control"
-Maps to control code
-.TP
-.BI "A(" c ") - Alt"
-Sets the eight bit
-.TP
-.BI "CA(" c ") - Control-Alt"
-Short for
-.BI "A(C(" c "))"
-.TP
-.BI "L(" c ") - Caps Lock"
-Adds Caps Lock effect
-.PP
-These macros are used in a keymap source file to help define keys.  So
-instead of writing
-.B 032
-to put a CTRL-Z in the map you write
-.BR "C('Z')" .
-The
-.BI "L(" c ")"
-macro is used in column 0 to tell that the Caps Lock key is active for this
-key.  (Caps Lock should only have effect on letters.)
-.SS "Definitions: <minix/keymap.h>"
-<minix/keymap.h> contains a large number of definitions for special keys,
-like function keys, and keys on the numeric keypad.  They are:
-.PP
-Escape key and modifiers:
-.BR EXT ,
-.BR CTRL ,
-.BR SHIFT ,
-.BR ALT .
-.PP
-Numeric keypad keys:
-.BR HOME ,
-.BR END ,
-.BR UP ,
-.BR DOWN ,
-.BR LEFT ,
-.BR RIGHT ,
-.BR PGUP ,
-.BR PGDN ,
-.BR MID " (numeric '5'),"
-.BR PLUS ,
-.BR INSRT .
-.PP
-ALT + numpad key:
-.BR AHOME ,
-.BR AEND ", ...,"
-.BR AINSRT .
-.PP
-CTRL + numpad:
-.BR CHOME ,
-.BR CEND ", ...,"
-.BR CINSRT .
-.PP
-Lock keys:
-.BR CALOCK " (Caps Lock),"
-.BR NLOCK " (Num Lock),"
-.BR SLOCK " (Scroll Lock)."
-.PP
-Function keys:
-.BR F1 ", ...,"
-.BR F12 .
-.PP
-ALT - function key:
-.BR AF1 ", ...,"
-.BR AF12 .
-.PP
-CTRL - function key:
-.BR CF1 ", ...,"
-.BR CF12 .
-.PP
-SHIFT - function key:
-.BR SF1 ", ...,"
-.BR SF12 .
-.PP
-ALT - SHIFT - function key:
-.BR ASF1 ", ...,"
-.BR ASF12 .
-.PP
-There is one key definition that isn't a key at all:
-.BR EXTKEY .
-This keycode is sent by the keyboard as an indicator that the next keycode
-is special.  For instance both ALT keys have the same keycode, but the right
-ALT key is sent by the keyboard preceded by the EXTKEY keycode.  The same is
-true for the '/' key on the numeric pad versus the other '/' key on the US
-keyboard.  (On other keyboards this key may have a different symbol.)  The
-keyboard driver knows that a different key is presses if it is preceded by
-EXTKEY.
-.SS "Creating/changing keyboard mapping"
-You can create your own keyboard mapping by copying one of the existing
-keymap source files (Standard Minix:
-.BR kernel/keymaps/*.src ,
-Minix-vmd:
-.BR kernel/ibm/keymaps/*.src )
-and modifying the desired keys. Once this has been done, you need to
-recompile the genmap.c file, either by adding a new entry to the Makefile,
-or by running the following commands:
-.PP
-.RS
-.ft B
-cc -DKEYSRC=\e"\fIkeymap\fP.src\e" genmap.c
-.ft P
-.RE
-.PP
-After this, the 
-.BR keymap 
-file can be generated by running:
-.PP
-.RS
-.BI "a.out > " keymap .map
-.RE
-.PP
-The keymap can be loaded in the keyboard driver by:
-.PP
-.RS
-.BI "loadkeys " keymap .map
-.RE
-.PP
-It is wise to first run
-.B loadkeys
-on one of the maps in
-.B /usr/lib/keymaps
-so that you can easily revert back to a known keymap with a few taps on the
-up-arrow key and pressing return.  You will otherwise have to fix the keymap
-with a faulty keymap loaded into the keyboard driver, which is no fun.
-.PP
-When the keymap is to your satisfaction you can copy it to
-.B /etc/keymap
-to have it loaded automatically at reboot.
-.SH FILES
-.TP 15
-.B /etc/keymap
-Default keymap file
-.SH "SEE ALSO"
-.B loadkeys (1).
-.SH AUTHOR
-Victor A. Rodriguez - El bit Fantasma (Bit-Man@Tasa.Com.AR)
Index: trunk/minix/man/man5/passwd.5
===================================================================
--- trunk/minix/man/man5/passwd.5	(revision 9)
+++ 	(revision )
@@ -1,200 +1,0 @@
-.TH PASSWD 5
-.SH NAME
-passwd, group, shadow \- user and group databases, shadow passwords
-.SH SYNOPSIS
-.B /etc/passwd
-.br
-.B /etc/group
-.br
-.B /etc/shadow
-.SH DESCRIPTION
-.B /etc/passwd
-lists all the users of the system, and
-.B /etc/group
-lists all the groups the users may belong to.  Both files also contain
-encrypted passwords, numeric ID's etc.  Encrypted passwords may be hidden
-in the file
-.B /etc/shadow
-if extra protection is warranted.
-.PP
-Each file is an text file containing one line per user or group.  The data
-fields on a line are separated by colons.  Each line in the password file
-has the following form:
-.PP
-.RS
-.I name:passwd:uid:gid:gecos:dir:shell
-.RE
-.PP
-The
-.I name
-field is the login name of a user, it is up to 8 letters or numbers long
-starting with a letter.  The login name must be unique.
-The
-.I password
-field is either empty (no password), a 13 character encrypted password as
-returned by
-.BR crypt (3),
-or a login name preceded by two number signs (#) to index the shadow
-password file.  Anything else (usually \(**) is invalid.
-The
-.I uid
-and
-.I gid
-fields are two numbers indicating the users user-id and group-id.  These
-id's do not have to be unique, there may be more than one name with the same
-id's.
-The
-.I gecos
-field can be set by the user.  It is expected to be a comma separated list
-of personal data where the first item is the full name of the user.
-The
-.I dir
-field
-is the path name of the users home directory.
-Lastly the
-.I shell
-field is the path name of the users login shell, it may be empty to indicate
-.BR /bin/sh .
-A MINIX 3 specific extension allows the shell field to contain extra space
-separated arguments for the shell.
-.PP
-Lines in the group file consist of four fields:
-.PP
-.RS
-.I name:passwd:gid:mem
-.RE
-.PP
-The
-.I name
-field is the name of the group, same restrictions as a login name.
-The
-.I passwd
-field may be used to let users change groups.
-The
-.I gid
-field is a number telling the group-id.  The group-id is unique for a group.
-The
-.I mem
-field is a comma separated list of login names that are special members of
-the group.  If a system supports supplementary group id's then a user's set
-of supplementary group id's is set to all the groups they are a member of.
-If a system allows one to change groups then one can change to a group one
-is a member of without using the group's password.
-.PP
-The shadow password file has precisely the same form as the password file,
-except that only the
-.I name
-or
-.I passwd
-fields are used as yet.  The other fields are zero or empty.  A password in
-the password file may have the form
-.BI "##" user
-to indicate the entry
-.I user
-in the shadow password file.  The password in this entry is then used for
-authentication of the user.  The shadow file can only be read by the
-privileged utility
-.BR pwdauth (8),
-so that the encrypted passwords in the shadow file are kept secret, and thus
-safe from a dictionary attack.
-.SS "Special password and group file entries"
-There are several entries in the password and group files that are
-preallocated for current or future use.  All id's less than 10 are reserved.
-The special password file entries are:
-.PP
-.RS
-.nf
-root:##root:0:0:Big Brother:/usr/src:
-daemon:*:1:1:The Deuce:/etc:
-bin:##root:2:0:Binaries:/usr/src:
-uucp:*:5:5:UNIX to UNIX copy:/usr/spool/uucp:/usr/sbin/uucico
-news:*:6:6:Usenet news:/usr/spool/news:
-ftp:*:7:7:Anonymous FTP:/usr/ftp:
-nobody:*:9999:99::/tmp:
-ast:*:8:3:Andrew S. Tanenbaum:/usr/ast:
-.fi
-.RE
-.PP
-The
-.B root
-id is of course the super user.
-The
-.B daemon
-id is used by some daemons.  Some devices are protected so that only those
-daemons can access them.
-The
-.B bin
-id owns all sources and most binaries.
-The
-.BR uucp ,
-.BR news
-and
-.BR ftp
-id's are for serial line data transfer, usenet news, or ftp if so needed.
-The
-.B nobody
-id is used in those cases that a program may not have any privileges at all.
-The
-.B ast
-id is the honorary home directory for Andrew S. Tanenbaum, the creator of
-MINIX 3.  You can also find the initial contents for a new home directory
-there.
-.PP
-The special group file entries are:
-.PP
-.RS
-.nf
-operator:*:0:
-daemon:*:1:
-bin:*:2:
-other:*:3:
-tty:*:4:
-uucp:*:5:
-news:*:6:
-ftp:*:7:
-kmem:*:8:
-nogroup:*:99:
-.fi
-.RE
-.PP
-Groups with the same name as special user id are used with those id's.
-The
-.B operator
-group is for the administrators of the system.  Users in this group are
-granted special privileges.
-The
-.B other
-group is for ordinary users.
-The
-.B tty
-group is for terminal devices, and associated set-gid commands.
-Same thing with the
-.B kmem
-group and memory devices.
-.SH FILES
-.TP 15n
-.B /etc/passwd
-The user database.
-.TP
-.B /etc/group
-The group database.
-.TP
-.B /etc/shadow
-The shadow password file.
-.SH "SEE ALSO"
-.BR login (1),
-.BR passwd (1),
-.BR su (1),
-.BR crypt (3),
-.BR getpwent (3),
-.BR getgrent (3),
-.BR pwdauth (8).
-.SH NOTES
-The
-.B nobody
-and
-.B nogroup
-id's are likely to be renumbered to the highest possible id's once it is
-figured out what they are.
-.SH AUTHOR
-Kees J. Bot (kjb@cs.vu.nl)
Index: trunk/minix/man/man5/resolv.conf.5
===================================================================
--- trunk/minix/man/man5/resolv.conf.5	(revision 9)
+++ 	(revision )
@@ -1,48 +1,0 @@
-.TH RESOLV.CONF 5
-.SH NAME
-resolv.conf \- Domain Name System resolver configuration
-.SH SYNOPSIS
-.B /etc/resolv.conf
-.SH DESCRIPTION
-.de SP
-.if t .sp 0.4
-.if n .sp
-..
-The
-.B /etc/resolv.conf
-is used to configure how the host will use the Domain Name System to resolve
-hostnames to IP addresses.  It may contain these two lines:
-.PP
-.RS
-.ta +15n
-nameserver	\fIIP-address\fP
-.br
-domain	\fIdomain-name\fP
-.RE
-.PP
-The nameserver entry tells the IP address of the host to use for DNS
-queries.  If it is set to 127.0.0.1 (which is the default) then the local
-name daemon is used that may use the
-.B /etc/hosts
-database to translate host names.  You normally only need a nameserver entry
-if the name server is at the other side of a router.  The default
-.B nonamed
-name server can't look beyond the local network.
-.PP
-The domain entry tells the default domain to use for unqualified hostnames.
-This entry is usually not given in which case the domain of the local host
-is used.
-.PP
-The long version of this story can be found in
-.BR resolver (5).
-.SH FILES
-.TP 20n
-/etc/resolv.conf
-DNS resolver configuration file.
-.SH "SEE ALSO"
-.BR resolver (5),
-.BR hosts (5),
-.BR nonamed (8),
-.BR boot (8).
-.SH AUTHOR
-Kees J. Bot (kjb@cs.vu.nl)
Index: trunk/minix/man/man5/resolver.5
===================================================================
--- trunk/minix/man/man5/resolver.5	(revision 9)
+++ 	(revision )
@@ -1,98 +1,0 @@
-.\" Copyright (c) 1986 The Regents of the University of California.
-.\" All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms are permitted
-.\" provided that the above copyright notice and this paragraph are
-.\" duplicated in all such forms and that any documentation,
-.\" advertising materials, and other materials related to such
-.\" distribution and use acknowledge that the software was developed
-.\" by the University of California, Berkeley.  The name of the
-.\" University may not be used to endorse or promote products derived
-.\" from this software without specific prior written permission.
-.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
-.\" IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
-.\" WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
-.\"
-.\"	@(#)resolver.5	5.9 (Berkeley) 12/14/89
-.\"
-.TH RESOLVER 5 "December 14, 1989"
-.UC 4
-.SH NAME
-resolver \- resolver configuration file
-.SH SYNOPSIS
-/etc/resolv.conf
-.SH DESCRIPTION
-.LP
-The
-.I resolver
-is a set of routines in the C library (\c
-.IR resolv (3))
-that provide access to the Internet Domain Name System.
-The resolver configuration file contains information that is read
-by the resolver routines the first time they are invoked by a process.
-The file is designed to be human readable and contains a list of
-keywords with values that provide various types of resolver information.
-.LP
-On a normally configured system this file should not be necessary.
-The only name server to be queried will be on the local machine,
-the domain name is determined from the host name,
-and the domain search path is constructed from the domain name.
-.LP
-The different configuration options are:
-.TP
-\fBnameserver\fP
-Internet address (in dot notation) of a name server
-that the resolver should query.
-Up to MAXNS (currently 3) name servers may be listed,
-one per keyword.
-If there are multiple servers,
-the resolver library queries them in the order listed.
-If no \fBnameserver\fP entries are present,
-the default is to use the name server on the local machine.
-(The algorithm used is to try a name server, and if the query times out,
-try the next, until out of name servers,
-then repeat trying all the name servers
-until a maximum number of retries are made).
-.TP
-\fBdomain\fP
-Local domain name.
-Most queries for names within this domain can use short names
-relative to the local domain.
-If no \fBdomain\fP entry is present, the domain is determined
-from the local host name returned by
-\fIgethostname\fP\|(2);
-the domain part is taken to be everything after the first `.'.
-Finally, if the host name does not contain a domain part, the root
-domain is assumed.
-.TP
-\fBsearch\fP
-Search list for host-name lookup.
-The search list is normally determined from the local domain name;
-by default, it begins with the local domain name, then successive
-parent domains that have at least two components in their names.
-This may be changed by listing the desired domain search path
-following the \fIsearch\fP keyword with spaces or tabs separating
-the names.
-Most resolver queries will be attempted using each component
-of the search path in turn until a match is found.
-Note that this process may be slow and will generate a lot of network
-traffic if the servers for the listed domains are not local,
-and that queries will time out if no server is available
-for one of the domains.
-.IP
-The search list is currently limited to six domains
-with a total of 256 characters.
-.LP
-The \fIdomain\fP and \fIsearch\fP keywords are mutually exclusive.
-If more than one instance of these keywords is present,
-the last instance will override.
-.LP
-The keyword and value must appear on a single line, and the keyword
-(e.g. \fBnameserver\fP) must start the line.  The value follows
-the keyword, separated by white space.
-.SH FILES
-.I /etc/resolv.conf
-.SH SEE ALSO
-gethostbyname(3N), resolver(3), hostname(7), named(8)
-.br
-Name Server Operations Guide for BIND
Index: trunk/minix/man/man5/rhosts.5
===================================================================
--- trunk/minix/man/man5/rhosts.5	(revision 9)
+++ 	(revision )
@@ -1,59 +1,0 @@
-.TH RHOSTS 5
-.SH NAME
-rhosts, hosts.equiv \- trusted remote users or hosts
-.SH SYNOPSIS
-.BI ~ user /.rhosts
-.br
-.B /etc/hosts.equiv
-.SH DESCRIPTION
-The per user
-.B .rhosts
-and the per system
-.B hosts.equiv
-files can be used to allow users to use
-.B rlogin
-or
-.B rsh
-without a password.  The remote login services first check the system wide
-.B /etc/hosts.equiv
-file and then the
-.BI ~ user /.rhosts
-of the intended user.  Both files contain lines of one of two forms:
-.PP
-.RS
-.I host
-.br
-.I host ruser
-.RE
-.PP
-The first form tells that any user from
-.I host
-is allowed to login to this system under the same name.  The second form
-allows
-.I ruser
-from
-.I host
-to login.
-.PP
-Under MINIX 3
-.I host
-may be a pattern using
-.B "*"
-as a wildcard.  One can use this, carefully one may hope, to allow an
-entire domain to log in.
-.I Host
-may also be an IP address, or a network specification in CIDR form, e.g.
-172.16.102.64/27.
-.SH "SEE ALSO"
-.BR rlogin (1),
-.BR rsh (1).
-.SH NOTES
-MINIX 3 has no restrictions on becoming super-user remotely.  Other systems
-usually require one to log in as a user and then use
-.BR su
-to become root.
-.PP
-You must use fully qualified hostnames, it is not possible to
-omit the domain part.
-.SH AUTHOR
-Kees J. Bot <kjb@cs.vu.nl>
Index: trunk/minix/man/man5/serv.access.5
===================================================================
--- trunk/minix/man/man5/serv.access.5	(revision 9)
+++ 	(revision )
@@ -1,166 +1,0 @@
-.TH SERV.ACCESS 5
-.SH NAME
-serv.access \- Internet service access list
-.SH SYNOPSIS
-.B /etc/serv.access
-.SH DESCRIPTION
-.de SP
-.if t .sp 0.4
-.if n .sp
-..
-The
-.B serv.access
-file contains a list of rules that guide the access checks made by the
-.BR servxcheck (3)
-function.  The file is a text file containing entries that look as follows:
-.PP
-.RS
-.I service1 service2
-.RB ... :
-.I check1 check2
-.RB ... ;
-.RE
-.PP
-Each of the service names is a service name from the
-.B /etc/services
-file.  The same names are used in the
-.B /etc/inetd.conf
-configuration file that guides
-.BR inetd (8).
-.PP
-The checks may look as follows:
-.PP
-.BI +
-.br
-.BI -
-.RS
-Allow all, or allow none.  Used to explicitly set the initial state.
-.RE
-.PP
-.BI + name
-.RS
-Grant access to one of the services if the host name of the remote system
-matches
-.BR name .
-.RE
-.SP
-.BI \- name
-.RS
-Deny access to one of the services if the host name of the remote system
-matches
-.BR name .
-.RE
-.PP
-.BI + ipaddr
-.br
-.BI \- ipaddr
-.br
-.BI + netaddr / len
-.br
-.BI \- netaddr / len
-.RS
-Grants or denies access to a remote host with IP address
-.IR ipaddr ,
-or the remote host whose IP address is within the network
-.IR netaddr .
-.I Len
-tells the number of bits used for the network address, i.e. the top
-.I len
-bits of the network address must equal the host address.
-.RE
-.PP
-.BR log
-.RS
-This is not a check, but a flag that instruct
-.B servxcheck()
-to log the result of the access check whether it succeeds or not to
-.BR /usr/adm/log .
-By default only failure is logged.
-.RE
-.PP
-The first "+" or "\-" access check sets the tone.  Read it as "access denied
-unless +...", or "access granted unless \-...".  An access check will
-therefore almost always start with a "+" check.  To make the initial state
-clear you can start with a lone "+" or "\-".  Checks are done from left
-to right.  A check that doesn't match does not change the outcome.  A check
-that can't change the outcome is skipped.
-.PP
-Both the service and the host names may contain the
-.B "\(**"
-wildcard that matches any number of characters including none.  Letters are
-compared ignoring case.  A service name may appear in more than one rule,
-but a service mentioned explicitly is not matched by wildcard patterns in
-later rules.
-.PP
-A check for a hostname causes
-.B servxcheck()
-to do a reverse lookup on the IP address of the remote host to find its
-name.  This name is then looked up to find the host's IP address(es).
-If those lookups fail then all
-.BI \- name
-checks cause access to be denied, and no
-.BI + name
-check grants access.
-The DNS lookup failures may be a
-misconfiguration, but could indicate a break-in attempt from a badly
-maintained host.  You can use a simple "+*" in an otherwise empty list to
-just deny misconfigured hosts.
-.PP
-An IP or network address check is simply done on the remote hosts IP
-address.  Such a check has no overhead, but a
-.B log
-flag will cause a reverse lookup anyway.
-.PP
-Comments start with "#" and continue until end of line.
-.SH EXAMPLES
-Example access file on a machine that offers most services only to hosts within
-the cs.vu.nl domain, and news (nntp) only to two machines and a specific
-network.
-.PP
-.RS
-.nf
-.ta +2.2i +.4i
-# Service	# Access list
-login shell:	+*.cs.vu.nl log;
-telnet pop smtp finger:	+ log;
-nntp:	+flotsam.cs.vu.nl +jetsam.cs.vu.nl
-		+172.16.102.0/24 log;
-*:	+*.cs.vu.nl;
-.fi
-.RE
-.PP
-More paranoid example that limits all services by default, but allows ftp and
-http to the world:
-.PP
-.RS
-.nf
-.ta +2.2i +.4i
-# Service	# Access list
-ftp http:	+;
-smtp finger:	+ log;
-nntp:	+flotsam.cs.vu.nl +jetsam.cs.vu.nl
-		+172.16.102.0/24 log;
-*:	+*.cs.vu.nl log;
-.fi
-.RE
-.PP
-(Note that the last rule doesn't match any of the services mentioned
-explicitly earlier.)
-.SH FILES
-.TP 25n
-.B /etc/serv.access
-The service access check file.
-.SH "SEE ALSO"
-.BR servxcheck (3),
-.BR services (5),
-.BR inetd.conf (5).
-.SH NOTES
-It may be wise not to put checks on telnet.  It is reasonably secure, since
-it always requires a password, and your only way in if things are seriously
-hosed.
-.SH BUGS
-IP and DNS based access checks will stop most crackers, but not the really
-determined ones.  Luckily MINIX 3 is sufficiently strange to thwart the well
-known cracking schemes.  But don't ever allow yourself to feel secure.
-.SH AUTHOR
-Kees J. Bot <kjb@cs.vu.nl>
Index: trunk/minix/man/man5/syslog.conf.5
===================================================================
--- trunk/minix/man/man5/syslog.conf.5	(revision 9)
+++ 	(revision )
@@ -1,246 +1,0 @@
-.\" syslog.conf - syslogd(8) configuration file
-.\" Copyright (c) 1995  Martin Schulze <Martin.Schulze@Linux.DE>
-.\" Modified for Minix porting by G. Falzoni <gfalzoni@inwind.it>
-.\" $Id: syslog.conf.5,v 1.1 2006/04/03 14:59:52 beng Exp $
-.\" 
-.\" This file is part of the sysklogd package, a kernel and system log daemon.
-.\" 
-.\" This program is free software; you can redistribute it and/or modify
-.\" it under the terms of the GNU General Public License as published by
-.\" the Free Software Foundation; either version 2 of the License, or
-.\" (at your option) any later version.
-.\" 
-.\" This program is distributed in the hope that it will be useful,
-.\" but WITHOUT ANY WARRANTY; without even the implied warranty of
-.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
-.\" GNU General Public License for more details.
-.\" 
-.\" You should have received a copy of the GNU General Public License
-.\" along with this program; if not, write to the Free Software
-.\" Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111, USA.
-.\"
-.\" Local macros
-.de Xr
-.BR \\$1 (\\$2)\\$3
-..
-.de LB
-.TP \\$1
-\\fB\\$2\\fR
-\\$3
-..
-.de LI
-.TP \\$1
-\\fI\\$2\\fR
-\\$3
-..
-.de LR
-.TP \\$1
-\\fR\\$2\\fR
-\\$3
-..
-.\" end local macros
-.TH SYSLOG.CONF 5 "1 January 1998"
-.SH NAME
-syslog.conf \- syslogd(8) configuration file
-.SH DESCRIPTION
-The
-.I syslog.conf
-file is the main configuration file for the
-.Xr syslogd 8
-which logs system messages on *nix systems. This file specifies rules
-for logging. For special features see the
-.Xr syslogd 8
-manpage.
-Every rule consists of two fields, a 
-.I selector
-field and an
-.I action 
-field. These two fields are separated by one or more tabs.
-The selector field specifies a pattern of facilities and
-priorities belonging to the specified action.
-Lines starting with a hash mark (``#'') and empty lines are ignored.
-.SH SELECTORS
-The selector field itself again consists of two parts, a
-.I facility
-and a 
-.IR priority ,
-separated by a period (``.'').
-Both parts are case insensitive and can also be specified as decimal
-numbers, but don't do that, you have been warned. Both facilities and
-priorities are described in 
-.BR syslog (3).
-The names mentioned below correspond to the similar 
-.BR LOG_ -values
-in
-.IR /usr/include/syslog.h .
-The
-.I facility
-is one of the following keywords:
-.BR auth ", " authpriv ", " cron ", " daemon ", " kern ", " lpr ", "
-.BR mail ", " mark ", " news ", " security " (same as " auth "), "
-.BR syslog ", " user ", " uucp " and " local0 " through " local7 .
-The keyword 
-.B security
-should not be used anymore and
-.B mark
-is only for internal use and therefore should not be used in
-applications. Anyway, you may want to specify and redirect these
-messages here. The
-.I facility
-specifies the subsystem that produced the message, i.e. all mail
-programs log with the mail facility
-.BR "" ( LOG_MAIL )
-if they log using syslog.
-
-The
-.I priority
-is one of the following keywords, in ascending order: 
-.BR debug ", " info ", " notice ", " warning ", " warn " (same as "
-.BR warning "), " err ", " error " (same as " err "), " crit ", "
-.BR alert ", " emerg ", " panic " (same as " emerg ).
-The keywords
-.BR error ", " warn " and " panic
-are deprecated and should not be used anymore. The
-.I priority
-defines the severity of the message
-.PP
-The behavior of the original BSD syslogd is that all messages of the
-specified priority and higher are logged according to the given
-action. This
-.BR syslogd (8)
-behaves the same, but has some extensions.
-.PP
-In addition to the above mentioned names the
-.BR syslogd (8)
-understands the following extensions:
-.LB 5 "*" "An asterisk (``*'') before the period stands for all facilities.
-.LB 5 "none" "The keyword none stands for no priority of the given facility.
-.PP
-Multiple selectors may be specified for a single
-.I action
-using the semicolon (``;'') separator.  Remember that each selector in
-the 
-.I selector
-field is capable to overwrite the preceding ones. Using this
-behavior you can exclude some priorities from the pattern.
-.SH ACTIONS
-The action field of a rule describes the abstract term
-``logfile''. A ``logfile'' need not to be a real file, btw. The
-.Xr syslogd 8
-provides the following actions.
-.SS Regular File
-Typically messages are logged to real files. The file has to be
-specified with full pathname, beginning with a slash ``/''.
-.SS Terminal and Console
-If the file you specified is a tty, special tty-handling is done, same
-with
-.IR /dev/console .
-.SS Remote Machine
-This release does not implement 
-remote logging, i.e. the ability to send messages to a remote host running 
-.Xr syslogd 8 .
-To forward messages to another host, prepend the hostname
-with the at sign (``@'').
-.SS List of Users
-Usually critical messages are also directed to ``root'' on that
-machine. You can specify a list of users that shall get the message by
-simply writing the login. You may specify more than one user by
-separating them with commas (``,''). If they're logged in they
-get the message. Don't think a mail would be sent, that might be too
-late.
-.SS Everyone logged on
-Emergency messages often go to all users currently online to notify
-them that something strange is happening with the system. To specify
-this
-.IR wall (1)-feature
-use an asterisk (``*'').
-.SH EXAMPLES
-Here are some example, partially taken from a real existing site and
-configuration. Hopefully they rub out all questions to the
-configuration, if not, drop me (Joey) a line.
-.IP
-.nf
-# Store critical stuff in critical
-#
-*.crit            /var/adm/critical
-.fi
-.LP
-This will store all messages with the priority
-.B crit
-in the file
-.IR /var/adm/critical .
-.IP
-.nf
-# The tcp wrapper loggs with mail.info, we display
-# all the connections on tty12
-#
-mail.info                   /dev/tty12
-.fi
-.LP
-This directs all messages that uses 
-.BR mail.info " (in source " LOG_MAIL " | " LOG_INFO )
-to
-.IR /dev/tty12 , 
-the 12th console.
-.IP
-.nf
-# Log all mail.info and news.info messages to info
-#
-mail,news.info              /var/adm/info
-.fi
-.LP
-This will extract all messages that come either with
-.BR mail.info " or with " news.info 
-and store them in the file
-.IR /var/adm/info .
-.IP
-.nf
-# Emergency messages will be displayed using wall
-#
-*.emerg                     *
-.fi
-.LP
-This rule tells the
-.B syslogd
-to write all emergency messages to all currently logged in users. This
-is the wall action.
-.IP
-.nf
-# Messages of the priority alert will be directed
-# to the operator
-#
-*.alert                      root,joey
-.fi
-.LP
-This rule directs all messages with a priority of
-.B alert
-or higher to the terminals of the operator, i.e. of the users ``root''
-and ``joey'' if they're logged in.
-.IP
-.nf
-*.*                          @finlandia
-.fi
-.LP
-This rule would redirect all messages to a remote host called
-finlandia. This is useful especially in a cluster of machines where
-all syslog messages will be stored on only one machine.
-.SH FILES
-.I /etc/syslog.conf
-Configuration file for
-.B syslogd
-.SH BUGS
-The effects of multiple selectors are sometimes not intuitive. For
-example ``mail.crit,*.err'' will select ``mail'' facility messages at
-the level of ``err'' or higher, not at the level of ``crit'' or
-higher.
-
-.SH SEE ALSO
-.BR syslogd (8),
-.BR logger (1),
-.BR syslog (3)
-.SH AUTHORS
-The
-.B syslogd
-is taken from BSD sources, Greg Wettstein (greg@wind.rmcc.com)
-performed the port to Linux, Martin Schulze (joey@linux.de)
-made some bugfixes and added some new features.
Index: trunk/minix/man/man5/termcap.5
===================================================================
--- trunk/minix/man/man5/termcap.5	(revision 9)
+++ 	(revision )
@@ -1,1865 +1,0 @@
-.\" Copyright (c) 1980 Regents of the University of California.
-.\" All rights reserved.  The Berkeley software License Agreement
-.\" specifies the terms and conditions for redistribution.
-.\"
-.\"	@(#)termcap.5	6.4 (Berkeley) 5/15/86
-.\"
-.tr ||
-.tr *\(**
-.TH TERMCAP 5 "1 November 1985"
-.UC
-.SH NAME
-termcap \- terminal capability data base
-.SH SYNOPSIS
-.B /etc/termcap
-.SH DESCRIPTION
-.B Termcap\^
-is a data base describing terminals,
-used,
-.IR e.g. ,
-by
-.BR vi\^ (1)
-and
-.BR curses\^ (3).
-Terminals are described in
-.B termcap\^
-by giving a set of capabilities that they have and by describing
-how operations are performed.
-Padding requirements and initialization sequences
-are included in
-.BR termcap\^ .
-.PP
-Entries in
-.B termcap\^
-consist of a number of `:'-separated fields.
-The first entry for each terminal gives the names that are known for the
-terminal, separated by `|' characters.
-The first name is always two characters
-long and is used by older systems which store the terminal type
-in a 16-bit word in a system-wide data base.
-The second name given is the most common abbreviation for the terminal,
-the last name given should be a long name fully identifying the terminal,
-and all others are understood as synonyms for the terminal name.
-All names but the first and last
-should be in lower case and contain no blanks;
-the last name may well contain
-upper case and blanks for readability.
-.PP
-Terminal names (except for the last, verbose entry)
-should be chosen using the following conventions.
-The particular piece of hardware making up the terminal
-should have a root name chosen, thus \*(lqhp2621\*(rq.
-This name should not contain hyphens.
-Modes that the hardware can be in
-or user preferences
-should be indicated by appending a hyphen and an indicator of the mode.
-Therefore, a \*(lqvt100\*(rq in 132-column mode would be \*(lqvt100-w\*(rq.
-The following suffixes should be used where possible:
-.sp
-.ta
-.if t .ta \w'\fBSuffix\fP\ \ \ 'u +\w'With automatic margins (usually default)\ \ 'u
-.if n .ta \w'Suffix\ \ \ 'u +\w'With automatic margins (usually default)\ \ 'u
-.nf
-.if t .nr Xx \n(.lu-\n(.i-\w'\fBSuffix\fP\ \ \ With automatic margins (usually default)\ \ vt100-am'u
-.if t .in +\n(Xxu/2u
-\fBSuffix	Meaning	Example\fP
--w	Wide mode (more than 80 columns)	vt100-w
--am	With automatic margins (usually default)	vt100-am
--nam	Without automatic margins	vt100-nam
--\fIn\fP	Number of lines on the screen	aaa-60
--na	No arrow keys (leave them in local)	concept100-na
--\fIn\^\fPp	Number of pages of memory	concept100-4p
--rv	Reverse video	concept100-rv
-.fi
-.SH CAPABILITIES
-.PP
-The characters in the
-.B Notes
-field in the table have the following meanings
-(more than one may apply to a capability):
-.PP
-.ta
-.ta \w'N\ \ \ 'u
-.nr fi \w'N\ \ \ '
-.in +\n(fiu
-.ti -\n(fiu
-N	indicates numeric parameter(s)
-.ti -\n(fiu
-P	indicates that padding may be specified
-.ti -\n(fiu
-*	indicates that padding may be based on the number of lines affected
-.ti -\n(fiu
-o	indicates capability is obsolete
-.in +\n(fiu
-.PP
-\*(lqObsolete\*(rq capabilities have no
-.B terminfo\^
-equivalents,
-since they were considered useless,
-or are subsumed by other capabilities.
-New software should not rely on them at all.
-.PP
-.if t .ta \w'\fBName  \fP'u +\w'\fBType  \fP'u +\w'\fBNotes  \fP'u
-.if n .ta \w'Name  'u +\w'Type  'u +\w'Notes  'u  \" Cawf troubled by \w'\fB
-.if t .nr fi \w'\fBName  Type  Notes  \fP'
-.if n .nr fi \w'Name  Type  Notes  '
-.in +\n(fiu
-.ti -\n(fiu
-\fBName	Type	Notes	Description\fP
-.ti -\n(fiu
-ae	str	(P)	End alternate character set
-.ti -\n(fiu
-AL	str	(NP*)	Add \fIn\^\fP new blank lines
-.ti -\n(fiu
-al	str	(P*)	Add new blank line
-.ti -\n(fiu
-am	bool		Terminal has automatic margins
-.ti -\n(fiu
-as	str	(P)	Start alternate character set
-.ti -\n(fiu
-bc	str	(o)	Backspace if not \fB^H\fP
-.ti -\n(fiu
-bl	str	(P)	Audible signal (bell)
-.ti -\n(fiu
-bs	bool	(o)	Terminal can backspace with \fB^H\fP
-.ti -\n(fiu
-bt	str	(P)	Back tab
-.ti -\n(fiu
-bw	bool		\fBle\fP (backspace) wraps from column 0 to last column
-.ti -\n(fiu
-CC	str		Terminal settable command character in prototype
-.ti -\n(fiu
-cd	str	(P*)	Clear to end of display
-.ti -\n(fiu
-ce	str	(P)	Clear to end of line
-.ti -\n(fiu
-ch	str	(NP)	Set cursor column (horizontal position)
-.ti -\n(fiu
-cl	str	(P*)	Clear screen and home cursor
-.ti -\n(fiu
-CM	str	(NP)	Memory-relative cursor addressing
-.ti -\n(fiu
-cm	str	(NP)	Screen-relative cursor motion
-.ti -\n(fiu
-co	num		Number of columns in a line (See BUGS section below)
-.ti -\n(fiu
-cr	str	(P)	Carriage return
-.ti -\n(fiu
-cs	str	(NP)	Change scrolling region (VT100)
-.ti -\n(fiu
-ct	str	(P)	Clear all tab stops
-.ti -\n(fiu
-cv	str	(NP)	Set cursor row (vertical position)
-.ti -\n(fiu
-da	bool		Display may be retained above the screen
-.ti -\n(fiu
-dB	num	(o)	Milliseconds of \fBbs\fP delay needed (default 0)
-.ti -\n(fiu
-db	bool		Display may be retained below the screen
-.ti -\n(fiu
-DC	str	(NP*)	Delete \fIn\^\fP characters
-.ti -\n(fiu
-dC	num	(o)	Milliseconds of \fBcr\fP delay needed (default 0)
-.ti -\n(fiu
-dc	str	(P*)	Delete character
-.ti -\n(fiu
-dF	num	(o)	Milliseconds of \fBff\fP delay needed (default 0)
-.ti -\n(fiu
-DL	str	(NP*)	Delete \fIn\^\fP lines
-.ti -\n(fiu
-dl	str	(P*)	Delete line
-.ti -\n(fiu
-dm	str		Enter delete mode
-.ti -\n(fiu
-dN	num	(o)	Milliseconds of \fBnl\fP delay needed (default 0)
-.ti -\n(fiu
-DO	str	(NP*)	Move cursor down \fIn\^\fP lines
-.ti -\n(fiu
-do	str		Down one line
-.ti -\n(fiu
-ds	str		Disable status line
-.ti -\n(fiu
-dT	num	(o)	Milliseconds of horizontal tab delay needed (default 0)
-.ti -\n(fiu
-dV	num	(o)	Milliseconds of vertical tab delay needed (default 0)
-.ti -\n(fiu
-ec	str	(NP)	Erase \fIn\^\fP characters
-.ti -\n(fiu
-ed	str		End delete mode
-.ti -\n(fiu
-ei	str		End insert mode
-.ti -\n(fiu
-eo	bool		Can erase overstrikes with a blank
-.ti -\n(fiu
-EP	bool	(o)	Even parity
-.ti -\n(fiu
-es	bool		Escape can be used on the status line
-.ti -\n(fiu
-ff	str	(P*)	Hardcopy terminal page eject
-.ti -\n(fiu
-fs	str		Return from status line
-.ti -\n(fiu
-gn	bool		Generic line type (\fIe.g.\fP dialup, switch)
-.ti -\n(fiu
-hc	bool		Hardcopy terminal
-.ti -\n(fiu
-HD	bool	(o)	Half-duplex
-.ti -\n(fiu
-hd	str		Half-line down (forward 1/2 linefeed)
-.ti -\n(fiu
-ho	str	(P)	Home cursor
-.ti -\n(fiu
-hs	bool		Has extra \*(lqstatus line\*(rq
-.ti -\n(fiu
-hu	str		Half-line up (reverse 1/2 linefeed)
-.ti -\n(fiu
-hz	bool		Cannot print ~s (Hazeltine)
-.ti -\n(fiu
-i1-i3	str		Terminal initialization strings (\fBterminfo\^\fP only)
-.ti -\n(fiu
-IC	str	(NP*)	Insert \fIn\^\fP blank characters
-.ti -\n(fiu
-ic	str	(P*)	Insert character
-.ti -\n(fiu
-if	str		Name of file containing initialization string
-.ti -\n(fiu
-im	str		Enter insert mode
-.ti -\n(fiu
-in	bool		Insert mode distinguishes nulls
-.ti -\n(fiu
-iP	str		Pathname of program for initialization (\fBterminfo\^\fP only)
-.ti -\n(fiu
-ip	str	(P*)	Insert pad after character inserted
-.ti -\n(fiu
-is	str		Terminal initialization string (\fBtermcap\^\fP only)
-.ti -\n(fiu
-it	num		Tabs initially every \fIn\^\fP positions
-.ti -\n(fiu
-K1	str		Sent by keypad upper left
-.ti -\n(fiu
-K2	str		Sent by keypad upper right
-.ti -\n(fiu
-K3	str		Sent by keypad center
-.ti -\n(fiu
-K4	str		Sent by keypad lower left
-.ti -\n(fiu
-K5	str		Sent by keypad lower right
-.ti -\n(fiu
-k0-k9	str		Sent by function keys 0-9
-.ti -\n(fiu
-kA	str		Sent by insert-line key
-.ti -\n(fiu
-ka	str		Sent by clear-all-tabs key
-.ti -\n(fiu
-kb	str		Sent by backspace key
-.ti -\n(fiu
-kC	str		Sent by clear-screen or erase key
-.ti -\n(fiu
-kD	str		Sent by delete-character key
-.ti -\n(fiu
-kd	str		Sent by down-arrow key
-.ti -\n(fiu
-kE	str		Sent by clear-to-end-of-line key
-.ti -\n(fiu
-ke	str		Out of \*(lqkeypad transmit\*(rq mode
-.ti -\n(fiu
-kF	str		Sent by scroll-forward/down key
-.ti -\n(fiu
-kH	str		Sent by home-down key
-.ti -\n(fiu
-kh	str		Sent by home key
-.ti -\n(fiu
-kI	str		Sent by insert-character or enter-insert-mode key
-.ti -\n(fiu
-kL	str		Sent by delete-line key
-.ti -\n(fiu
-kl	str		Sent by left-arrow key
-.ti -\n(fiu
-kM	str		Sent by insert key while in insert mode
-.ti -\n(fiu
-km	bool		Has a \*(lqmeta\*(rq key (shift, sets parity bit)
-.ti -\n(fiu
-kN	str		Sent by next-page key
-.ti -\n(fiu
-kn	num	(o)	Number of function (\fBk0\fP\-\fBk9\fP) keys (default 0)
-.ti -\n(fiu
-ko	str	(o)	Termcap entries for other non-function keys
-.ti -\n(fiu
-kP	str		Sent by previous-page key
-.ti -\n(fiu
-kR	str		Sent by scroll-backward/up key
-.ti -\n(fiu
-kr	str		Sent by right-arrow key
-.ti -\n(fiu
-kS	str		Sent by clear-to-end-of-screen key
-.ti -\n(fiu
-ks	str		Put terminal in \*(lqkeypad transmit\*(rq mode
-.ti -\n(fiu
-kT	str		Sent by set-tab key
-.ti -\n(fiu
-kt	str		Sent by clear-tab key
-.ti -\n(fiu
-ku	str		Sent by up-arrow key
-.ti -\n(fiu
-l0-l9	str		Labels on function keys if not \*(lqf\fIn\^\fP\*(rq
-.ti -\n(fiu
-LC	bool	(o)	Lower-case only
-.ti -\n(fiu
-LE	str	(NP)	Move cursor left \fIn\^\fP positions
-.ti -\n(fiu
-le	str	(P)	Move cursor left one position
-.ti -\n(fiu
-li	num		Number of lines on screen or page (See BUGS section below)
-.ti -\n(fiu
-ll	str		Last line, first column
-.ti -\n(fiu
-lm	num		Lines of memory if > \fBli\fP (0 means varies)
-.ti -\n(fiu
-ma	str	(o)	Arrow key map (used by \fBvi\^\fP version 2 only)
-.ti -\n(fiu
-mb	str		Turn on blinking attribute
-.ti -\n(fiu
-md	str		Turn on bold (extra bright) attribute
-.ti -\n(fiu
-me	str		Turn off all attributes
-.ti -\n(fiu
-mh	str		Turn on half-bright attribute
-.ti -\n(fiu
-mi	bool		Safe to move while in insert mode
-.ti -\n(fiu
-mk	str		Turn on blank attribute (characters invisible)
-.ti -\n(fiu
-ml	str	(o)	Memory lock on above cursor
-.ti -\n(fiu
-mm	str		Turn on \*(lqmeta mode\*(rq (8th bit)
-.ti -\n(fiu
-mo	str		Turn off \*(lqmeta mode\*(rq
-.ti -\n(fiu
-mp	str		Turn on protected attribute
-.ti -\n(fiu
-mr	str		Turn on reverse-video attibute
-.ti -\n(fiu
-ms	bool		Safe to move in standout modes
-.ti -\n(fiu
-mu	str	(o)	Memory unlock (turn off memory lock)
-.ti -\n(fiu
-nc	bool	(o)	No correctly-working \fBcr\fP (Datamedia 2500, Hazeltine 2000)
-.ti -\n(fiu
-nd	str		Non-destructive space (cursor right)
-.ti -\n(fiu
-NL	bool	(o)	\fB\\n\fP is newline, not line feed
-.ti -\n(fiu
-nl	str	(o)	Newline character if not \fB\\n\fP
-.ti -\n(fiu
-ns	bool	(o)	Terminal is a \s-1CRT\s0 but doesn't scroll
-.ti -\n(fiu
-nw	str	(P)	Newline (behaves like \fBcr\fP followed by \fBdo\fP)
-.ti -\n(fiu
-OP	bool	(o)	Odd parity
-.ti -\n(fiu
-os	bool		Terminal overstrikes
-.ti -\n(fiu
-pb	num		Lowest baud where delays are required
-.ti -\n(fiu
-pc	str		Pad character (default \s-2NUL\s0)
-.ti -\n(fiu
-pf	str		Turn off the printer
-.ti -\n(fiu
-pk	str		Program function key \fIn\^\fP to type string \fIs\fP (\fBterminfo\^\fP only)
-.ti -\n(fiu
-pl	str		Program function key \fIn\^\fP to execute string \fIs\fP (\fBterminfo\^\fP only)
-.ti -\n(fiu
-pO	str	(N)	Turn on the printer for \fIn\^\fP bytes
-.ti -\n(fiu
-po	str		Turn on the printer
-.ti -\n(fiu
-ps	str		Print contents of the screen
-.ti -\n(fiu
-pt	bool	(o)	Has hardware tabs (may need to be set with \fBis\fP)
-.ti -\n(fiu
-px	str		Program function key \fIn\^\fP to transmit string \fIs\fP (\fBterminfo\^\fP only)
-.ti -\n(fiu
-r1-r3	str		Reset terminal completely to sane modes (\fBterminfo\^\fP only)
-.ti -\n(fiu
-rc	str	(P)	Restore cursor to position of last \fBsc\fP
-.ti -\n(fiu
-rf	str		Name of file containing reset codes
-.ti -\n(fiu
-RI	str	(NP)	Move cursor right \fIn\^\fP positions
-.ti -\n(fiu
-rp	str	(NP*)	Repeat character \fIc n\^\fP times
-.ti -\n(fiu
-rs	str		Reset terminal completely to sane modes (\fBtermcap\^\fP only)
-.ti -\n(fiu
-sa	str	(NP)	Define the video attributes
-.ti -\n(fiu
-sc	str	(P)	Save cursor position
-.ti -\n(fiu
-se	str		End standout mode
-.ti -\n(fiu
-SF	str	(NP*)	Scroll forward \fIn\^\fP lines
-.ti -\n(fiu
-sf	str	(P)	Scroll text up
-.ti -\n(fiu
-sg	num		Number of garbage chars left by \fBso\fP or \fBse\fP (default 0)
-.ti -\n(fiu
-so	str		Begin standout mode
-.ti -\n(fiu
-SR	str	(NP*)	Scroll backward \fIn\^\fP lines
-.ti -\n(fiu
-sr	str	(P)	Scroll text down
-.ti -\n(fiu
-st	str		Set a tab in all rows, current column
-.ti -\n(fiu
-ta	str	(P)	Tab to next 8-position hardware tab stop
-.ti -\n(fiu
-tc	str		Entry of similar terminal \- must be last
-.ti -\n(fiu
-te	str		String to end programs that use \fBtermcap\fP
-.ti -\n(fiu
-ti	str		String to begin programs that use \fBtermcap\fP
-.ti -\n(fiu
-ts	str	(N)	Go to status line, column \fIn\^\fP
-.ti -\n(fiu
-UC	bool	(o)	Upper-case only
-.ti -\n(fiu
-uc	str		Underscore one character and move past it
-.ti -\n(fiu
-ue	str		End underscore mode
-.ti -\n(fiu
-ug	num		Number of garbage chars left by \fBus\fP or \fBue\fP (default 0)
-.ti -\n(fiu
-ul	bool		Underline character overstrikes
-.ti -\n(fiu
-UP	str	(NP*)	Move cursor up \fIn\^\fP lines
-.ti -\n(fiu
-up	str		Upline (cursor up)
-.ti -\n(fiu
-us	str		Start underscore mode
-.ti -\n(fiu
-vb	str		Visible bell (must not move cursor)
-.ti -\n(fiu
-ve	str		Make cursor appear normal (undo \fBvs\fP/\fBvi\fP)
-.ti -\n(fiu
-vi	str		Make cursor invisible
-.ti -\n(fiu
-vs	str		Make cursor very visible
-.ti -\n(fiu
-vt	num		Virtual terminal number (not supported on all systems)
-.ti -\n(fiu
-wi	str	(N)	Set current window
-.ti -\n(fiu
-ws	num		Number of columns in status line
-.ti -\n(fiu
-xb	bool		Beehive (f1=\s-2ESC\s0, f2=^C)
-.ti -\n(fiu
-xn	bool		Newline ignored after 80 cols (Concept)
-.ti -\n(fiu
-xo	bool		Terminal uses xoff/xon (\s-2DC3\s0/\s-2DC1\s0) handshaking
-.ti -\n(fiu
-xr	bool	(o)	Return acts like \fBce cr nl\fP (Delta Data)
-.ti -\n(fiu
-xs	bool		Standout not erased by overwriting (Hewlett-Packard)
-.ti -\n(fiu
-xt	bool		Tabs ruin, magic \fBso\fP char (Teleray 1061)
-.ti -\n(fiu
-xx	bool	(o)	Tektronix 4025 insert-line
-.in -\n(fiu
-.PP
-.B A Sample Entry
-.PP
-The following entry, which describes the Concept\-100, is among the more
-complex entries in the
-.B termcap\^
-file as of this writing.
-.PP
-.nf
-.if t .ta 8n +8n
-.if n .ta 2n +2n
-ca\||\|concept100\||\|c100\||\|concept\||\|c104\||\|concept100-4p\||\|HDS Concept\-100:\e
-	:al=3*\eE^R:am:bl=^G:cd=16*\eE^C:ce=16\eE^U:cl=2*^L:cm=\eEa%+ %+ :\e
-	:co#80:.cr=9^M:db:dc=16\eE^A:dl=3*\eE^B:do=^J:ei=\eE\e200:eo:im=\eE^P:in:\e
-	:ip=16*:is=\eEU\eEf\eE7\eE5\eE8\eEl\eENH\eEK\eE\e200\eEo&\e200\eEo\e47\eE:k1=\eE5:\e
-	:k2=\eE6:k3=\eE7:kb=^h:kd=\eE<:ke=\eEx:kh=\eE?:kl=\eE>:kr=\eE=:ks=\eEX:\e
-	:ku=\eE;:le=^H:li#24:mb=\eEC:me=\eEN\e200:mh=\eEE:mi:mk=\eEH:mp=\eEI:\e
-	:mr=\eED:nd=\eE=:pb#9600:rp=0.2*\eEr%.%+ :se=\eEd\eEe:sf=^J:so=\eEE\eED:\e
-	:.ta=8\et:te=\eEv    \e200\e200\e200\e200\e200\e200\eEp\er\en:\e
-	:ti=\eEU\eEv  8p\eEp\er:ue=\eEg:ul:up=\eE;:us=\eEG:\e
-	:vb=\eEk\e200\e200\e200\e200\e200\e200\e200\e200\e200\e200\e200\e200\e200\e200\eEK:\e
-	:ve=\eEw:vs=\eEW:vt#8:xn:\e
-	:bs:cr=^M:dC#9:dT#8:nl=^J:ta=^I:pt:
-.fi
-.PP
-Entries may continue onto multiple lines by giving a \e as the last
-character of a line, and empty fields
-may be included for readability (here between the last field on a line
-and the first field on the next).
-Comments may be included on lines beginning with \*(lq#\*(rq.
-.br
-.ne 5
-.PP
-.B Types of Capabilities
-.PP
-Capabilities in
-.B termcap\^
-are of three types: Boolean capabilities,
-which indicate particular features that the terminal has;
-numeric capabilities,
-giving the size of the display or the size of other attributes;
-and string capabilities,
-which give character sequences that can be used to perform particular
-terminal operations.
-All capabilities have two-letter codes.
-For instance, the fact that
-the Concept has
-.I automatic margins
-.RI ( i.e. ,
-an automatic return and linefeed
-when the end of a line is reached) is indicated by the Boolean capability
-.BR am .
-Hence the description of the Concept includes
-.BR am .
-.PP
-Numeric capabilities are followed by the character `#' then the value.
-In the example above
-.BR co ,
-which indicates the number of columns the display has,
-gives the value `80' for the Concept.
-.PP
-Finally, string-valued capabilities, such as
-.B ce
-(clear-to-end-of-line
-sequence) are given by the two-letter code, an `=', then a string
-ending at the next following `:'.
-A delay in milliseconds may appear after
-the `=' in such a capability,
-which causes padding characters to be supplied by
-.B tputs\^
-after the remainder of the string is sent to provide this delay.
-The delay can be either a number,
-.I e.g.
-`20', or a number followed by
-an `*',
-.IR i.e. ,
-`3*'.
-An `*' indicates that the padding required is proportional
-to the number of lines affected by the operation, and the amount given is
-the per-affected-line padding required.
-(In the case of insert-character,
-the factor is still the number of
-.I lines\^
-affected;
-this is always 1 unless the terminal has
-.B in
-and the software uses it.)
-When an `*' is specified, it is sometimes useful to give a delay of the form
-`3.5' to specify a delay per line to tenths of milliseconds.
-(Only one decimal place is allowed.)
-.PP
-A number of escape sequences are provided in the string-valued capabilities
-for easy encoding of control characters there.
-.B \eE
-maps to an \s-2ESC\s0
-character,
-.B ^X
-maps to a control-X for any appropriate X,
-and the sequences
-.B \en
-.B \er
-.B \et
-.B \eb
-.B \ef
-map to linefeed, return, tab, backspace, and formfeed, respectively.
-Finally, characters may be given as three octal digits after a
-.BR \e ,
-and the characters
-.B ^
-and
-.B \e
-may be given as
-.B \e^
-and
-.BR \e\e .
-If it is necessary to place a
-.B :
-in a capability it must be escaped in
-octal as
-.BR \e072 .
-If it is necessary to place a \s-2NUL\s0
-character in a string capability it
-must be encoded as
-.BR \e200 .
-(The routines that deal with
-.B termcap\^
-use C strings and strip the high bits of the output very late, so that
-a
-.B \e200
-comes out as a
-.B \e000
-would.)
-.PP
-Sometimes individual capabilities must be commented out.
-To do this, put a period before the capability name.
-For example, see the first
-.B cr
-and
-.B ta
-in the example above.
-.br
-.ne 5
-.PP
-.B Preparing Descriptions
-.PP
-We now outline how to prepare descriptions of terminals.
-The most effective way to prepare a terminal description is by imitating
-the description of a similar terminal in
-.B termcap\^
-and to build up a description gradually, using partial descriptions
-with
-.B vi\^
-to check that they are correct.
-Be aware that a very unusual terminal may expose deficiencies in
-the ability of the
-.B termcap\^
-file to describe it
-or bugs in
-.BR vi\^ .
-To easily test a new terminal description you can set the environment variable
-.B
-.SM TERMCAP
-to the absolute pathname of a file containing the description you are working
-on and programs will look there rather than in
-.BR /etc/termcap\^ .
-.B
-.SM TERMCAP
-can also be set to the
-.B termcap\^
-entry itself
-to avoid reading the file when starting up a program.
-.PP
-To get the padding for insert-line right
-(if the terminal manufacturer did not document it),
-a severe test is to use
-.B vi\^
-to edit
-.B /etc/passwd\^
-at 9600 baud, delete roughly 16 lines from the middle of the screen,
-then hit the `u' key several times quickly.
-If the display messes up, more padding is usually needed.
-A similar test can be used for insert-character.
-.br
-.ne 5
-.PP
-.B Basic Capabilities
-.PP
-The number of columns on each line of the display is given by the
-.B co
-numeric capability.
-If the display is a \s-1CRT\s0, then the
-number of lines on the screen is given by the
-.B li
-capability.
-If the display wraps around to the beginning of the next line when
-the cursor reaches the right margin, then it should have the
-.B am
-capability.
-If the terminal can clear its screen,
-the code to do this is given by the
-.B cl
-string capability.
-If the terminal overstrikes
-(rather than clearing the position when a character is overwritten),
-it should have the
-.B os
-capability.
-If the terminal is a printing terminal,
-with no soft copy unit,
-give it both
-.B hc
-and
-.BR os .
-.RB ( os
-applies to storage scope terminals,
-such as the Tektronix 4010 series,
-as well as to hard copy and
-.SM APL
-terminals.)
-If there is a code to move the cursor to the left edge of the current row,
-give this as
-.BR cr .
-(Normally this will be carriage-return,
-.BR ^M .)
-If there is a code to produce an audible signal (bell, beep,
-.IR etc.\^ ),
-give this as
-.BR bl .
-.PP
-If there is a code (such as backspace)
-to move the cursor one position to the left,
-that capability should be given as
-.BR le .
-Similarly,
-codes to move to the right, up, and down
-should be given as
-.BR nd ,
-.BR up ,
-and
-.BR do ,
-respectively.
-These
-.I local cursor motions\^
-should not alter the text they pass over;
-for example, you would not normally use
-\*(lqnd=\ \*(rq
-unless the terminal has the
-.B os
-capability,
-because the space would erase the character moved over.
-.PP
-A very important point here is that the local cursor motions encoded
-in
-.B termcap\^
-have undefined behavior at the left and top edges of a
-.SM CRT
-display.
-Programs should never attempt to backspace around the left edge,
-unless
-.B bw
-is given, and never attempt to go up off the top
-using local cursor motions.
-.PP
-In order to scroll text up,
-a program goes to the bottom left corner of the screen and sends the
-.B sf
-(index) string.
-To scroll text down,
-a program goes to the top left corner of the screen and sends the
-.B sr
-(reverse index) string.
-The strings
-.B sf
-and
-.B sr
-have undefined behavior
-when not on their respective corners of the screen.
-Parameterized versions of the scrolling sequences are
-.B SF
-and
-.BR SR ,
-which have the same semantics as
-.B sf
-and
-.B sr
-except that they take one parameter
-and scroll that many lines.
-They also have undefined behavior
-except at the appropriate corner of the screen.
-.PP
-The
-.B am
-capability tells whether the cursor sticks at the right
-edge of the screen when text is output there,
-but this does not necessarily apply to
-.B nd
-from the last column.
-Leftward local motion is defined from the left edge only when
-.B bw
-is given; then an
-.B le
-from the left edge will move to the right edge of the previous row.
-This is useful for drawing a box around the edge of the screen,
-for example.
-If the terminal has switch-selectable automatic margins,
-the
-.B termcap\^
-description usually assumes that this feature is on,
-.IR i.e. ,
-.BR am .
-If the terminal has a command
-that moves to the first column of the next line,
-that command can be given as
-.B nw
-(newline).
-It is permissible for this to clear the remainder of the current line,
-so if the terminal has no correctly-working \s-2CR\s0 and \s-2LF\s0
-it may still be possible to craft a working
-.B nw
-out of one or both of them.
-.PP
-These capabilities suffice to describe hardcopy and \*(lqglass-tty\*(rq terminals.
-Thus the Teletype model 33 is described as
-.PP
-.nf
-	T3\||\|tty33\||\|33\||\|tty\||\|Teletype model 33:\e
-		:bl=^G:co#72:cr=^M:do=^J:hc:os:
-.fi
-.PP
-and the Lear Siegler \s-1ADM\s0\-3 is described as
-.PP
-.nf
-	l3\||\|adm3\||\|3\||\|LSI \s-1ADM\s0-3:\e
-		:am:bl=^G:cl=^Z:co#80:cr=^M:do=^J:le=^H:li#24:sf=^J:
-.fi
-.br
-.ne 5
-.PP
-.B Parameterized Strings
-.PP
-Cursor addressing and other strings requiring parameters
-are described by a
-parameterized string capability, with 
-.BR printf\^ (3)-like
-escapes
-.B %x
-in it,
-while other characters are passed through unchanged.
-For example, to address the cursor the
-.B cm
-capability is given, using two parameters: the row and column to move to.
-(Rows and columns are numbered from zero and refer to the physical screen
-visible to the user, not to any unseen memory.
-If the terminal has memory-relative cursor addressing,
-that can be indicated by an analogous
-.B CM
-capability.)
-.PP
-The
-.B %
-encodings have the following meanings:
-.PP
-.in +16n
-.ta +8n
-.ti -8n
-%%	output `%'
-.ti -8n
-%d	output value as in \fBprintf\^\fP %d
-.ti -8n
-%2	output value as in \fBprintf\^\fP %2d
-.ti -8n
-%3	output value as in \fBprintf\^\fP %3d
-.ti -8n
-%.	output value as in \fBprintf\^\fP %c
-.ti -8n
-%+\fIx\fP	add \fIx\^\fP to value, then do %.
-.ti -8n
-%>\fIxy\fP	if value > \fIx\^\fP then add \fIy\^\fP, no output
-.ti -8n
-%r	reverse order of two parameters, no output
-.ti -8n
-%i	increment by one, no output
-.ti -8n
-%n	exclusive-or all parameters with 0140 (Datamedia 2500)
-.ti -8n
-%B	BCD (16*(value/10)) + (value%10), no output
-.ti -8n
-%D	Reverse coding (value \- 2*(value%16)), no output (Delta Data)
-.ti -16n
-.fi
-.PP
-Consider the Hewlett-Packard 2645, which, to get to row 3 and column 12, needs
-to be sent \*(lq\eE&a12c03Y\*(rq padded for 6 milliseconds.
-Note that the order
-of the row and column coordinates is reversed here
-and that the row and column
-are sent as two-digit integers.
-Thus its
-.B cm
-capability is \*(lqcm=6\eE&%r%2c%2Y\*(rq.
-.PP
-The Microterm
-.SM ACT-IV
-needs the current row and column sent
-simply encoded in binary
-preceded by a
-.BR ^T ,
-\*(lqcm=^T%.%.\*(rq.
-Terminals that use \*(lq%.\*(rq need to be able to
-backspace the cursor
-.RB ( le )
-and to move the cursor up one line on the screen
-.RB ( up ).
-This is necessary because it is not always safe to transmit
-.BR \en ,
-.BR ^D ,
-and
-.BR \er ,
-as the system may change or discard them.
-(Programs using
-.B termcap\^
-must set terminal modes so that tabs are not expanded, so
-.B \et
-is safe to send.
-This turns out to be essential for the Ann Arbor 4080.)
-.PP
-A final example is the Lear Siegler \s-1ADM\s0\-3a,
-which offsets row and column
-by a blank character, thus \*(lqcm=\eE=%+ %+ \*(rq.
-.PP
-Row or column absolute cursor addressing
-can be given as single parameter capabilities
-.B ch
-(horizontal position absolute) and
-.B cv
-(vertical position absolute).
-Sometimes these are shorter than the more general two-parameter sequence
-(as with the Hewlett-Packard 2645) and can be used in preference to
-.BR cm .
-If there are parameterized local motions
-.RI ( e.g. ,
-move
-.I n\^
-positions to the right)
-these can be given as
-.BR DO ,
-.BR LE ,
-.BR RI ,
-and
-.B UP
-with a single parameter indicating how many positions to move.
-These are primarily useful if the terminal does not have
-.BR cm ,
-such as the Tektronix 4025.
-.br
-.ne 5
-.PP
-.B Cursor Motions
-.PP
-If the terminal has a fast way to home the cursor
-(to the very upper left corner of the screen), this can be given as
-.BR ho .
-Similarly, a fast way of getting to the lower left-hand corner
-can be given as
-.BR ll ;
-this may involve going up with
-.B up
-from the home position,
-but a program should never do this itself (unless
-.B ll
-does), because it can
-make no assumption about the effect of moving up from the home position.
-Note that the home position is the same as
-cursor address (0,0): to the top left corner of the screen, not of memory.
-(Therefore, the \*(lq\eEH\*(rq sequence on Hewlett-Packard terminals
-cannot be used for
-.BR ho .)
-.br
-.ne 5
-.PP
-.B Area Clears
-.PP
-If the terminal can clear from the current position to the end of the
-line, leaving the cursor where it is, this should be given as
-.BR ce .
-If the terminal can clear from the current position to the end of the
-display, this should be given as
-.BR cd .
-.B cd
-must only be invoked from the first column of a line.
-(Therefore,
-it can be simulated by a request to delete a large number of lines,
-if a true
-.B cd
-is not available.)
-.br
-.ne 5
-.PP
-.B Insert/Delete Line
-.PP
-If the terminal can open a new blank line
-before the line containing the cursor,
-this should be given as
-.BR al ;
-this must be invoked only from the first
-position of a line.
-The cursor must then appear at the left of the newly blank line.
-If the terminal can delete the line that the cursor is on, this
-should be given as
-.BR dl ;
-this must only be used from the first position on
-the line to be deleted.
-Versions of
-.B al
-and
-.B dl
-which take a single parameter
-and insert or delete that many lines
-can be given as
-.B AL
-and
-.BR DL .
-If the terminal has a settable scrolling region
-(like the VT100),
-the command to set this can be described with the
-.B cs
-capability,
-which takes two parameters: the top and bottom lines of the scrolling region.
-The cursor position is, alas, undefined after using this command.
-It is possible to get the effect of insert or delete line
-using this command \(em the
-.B sc
-and
-.B rc
-(save and restore cursor) commands are also useful.
-Inserting lines at the top or bottom of the screen can also be done using
-.B sr
-or
-.B sf
-on many terminals without a true insert/delete line,
-and is often faster even on terminals with those features.
-.PP
-If the terminal has the ability to define a window as part of memory
-which all commands affect, it should be given as the parameterized string
-.BR wi .
-The four parameters are the starting and ending lines in memory
-and the starting and ending columns in memory, in that order.
-(This
-.B terminfo\^
-capability is described for completeness.
-It is unlikely that any
-.BR termcap\^ -using
-program will support it.)
-.PP
-If the terminal can retain display memory above the screen, then the
-.B da
-capability should be given;
-if display memory can be retained
-below, then
-.B db
-should be given.
-These indicate
-that deleting a line or scrolling may bring non-blank lines up from below
-or that scrolling back with
-.B sr
-may bring down non-blank lines.
-.br
-.ne 5
-.PP
-.B Insert/Delete Character
-.PP
-There are two basic kinds of intelligent terminals with respect to
-insert/delete character that can be described using
-.BR termcap\^ .
-The most common insert/delete character operations affect only the characters
-on the current line and shift characters off the end of the line rigidly.
-Other terminals, such as the Concept\-100 and the Perkin Elmer Owl, make
-a distinction between typed and untyped blanks on the screen, shifting
-upon an insert or delete only to an untyped blank on the screen which is
-either eliminated or expanded to two untyped blanks.
-You can determine
-the kind of terminal you have by clearing the screen then typing
-text separated by cursor motions.
-Type \*(lqabc\ \ \ \ def\*(rq using local
-cursor motions (not spaces) between the \*(lqabc\*(rq and the \*(lqdef\*(rq.
-Then position the cursor before the \*(lqabc\*(rq and put the terminal in insert
-mode.
-If typing characters causes the rest of the line to shift
-rigidly and characters to fall off the end, then your terminal does
-not distinguish between blanks and untyped positions.
-If the \*(lqabc\*(rq
-shifts over to the \*(lqdef\*(rq which then move together around the end of the
-current line and onto the next as you insert, then you have the second type of
-terminal and should give the capability \fBin\fP, which stands for
-\*(lqinsert null\*(rq.
-While these are two logically separate attributes
-(one line
-.I vs.
-multi-line insert mode,
-and special treatment of untyped spaces),
-we have seen no terminals whose insert
-mode cannot be described with the single attribute.
-.PP
-.B Termcap\^
-can describe both terminals that have an insert mode and terminals
-that send a simple sequence to open a blank position on the current line.
-Give as
-.B im
-the sequence to get into insert mode.
-Give as
-.B ei
-the sequence to leave insert mode.
-Now give as
-.B ic
-any sequence that needs to be sent just before
-each character to be inserted.
-Most terminals with a true insert mode
-will not give
-.BR ic ;
-terminals that use a sequence to open a screen
-position should give it here.
-(If your terminal has both,
-insert mode is usually preferable to
-.BR ic .
-Do not give both unless the terminal actually requires both to be used
-in combination.)
-If post-insert padding is needed, give this as a number of milliseconds
-in
-.B ip
-(a string option).
-Any other sequence that may need to be
-sent after insertion of a single character can also be given in
-.BR ip .
-If your terminal needs to be placed into an `insert mode'
-and needs a special code preceding each inserted character,
-then both
-.BR im / ei
-and
-.B ic
-can be given, and both will be used.
-The
-.B IC
-capability, with one parameter
-.IR n\^ ,
-will repeat the effects of
-.B ic
-.I n\^
-times.
-.PP
-It is occasionally necessary to move around while in insert mode
-to delete characters on the same line
-.RI ( e.g. ,
-if there is a tab after
-the insertion position).
-If your terminal allows motion while in
-insert mode, you can give the capability
-.B mi
-to speed up inserting
-in this case.
-Omitting
-.B mi
-will affect only speed.
-Some terminals
-(notably Datamedia's) must not have
-.B mi
-because of the way their
-insert mode works.
-.PP
-Finally, you can specify
-.B dc
-to delete a single character,
-.B DC
-with one parameter
-.I n\^
-to delete
-.I n\^
-characters,
-and delete mode by giving
-.B dm
-and
-.B ed
-to enter and exit delete mode
-(which is any mode the terminal needs to be placed in for
-.B dc
-to work).
-.br
-.ne 5
-.PP
-.B Highlighting, Underlining, and Visible Bells
-.PP
-If your terminal has one or more kinds of display attributes,
-these can be represented in a number of different ways.
-You should choose one display form as
-.IR "standout mode" ,
-representing a good high-contrast, easy-on-the-eyes format
-for highlighting error messages and other attention getters.
-(If you have a choice, reverse video plus half-bright is good,
-or reverse video alone.)
-The sequences to enter and exit standout mode
-are given as
-.B so
-and
-.BR se ,
-respectively.
-If the code to change into or out of standout
-mode leaves one or even two blank spaces or garbage characters on the screen,
-as the TVI 912 and Teleray 1061 do,
-then
-.B sg
-should be given to tell how many characters are left.
-.PP
-Codes to begin underlining and end underlining can be given as
-.B us
-and
-.BR ue ,
-respectively.
-Underline mode change garbage is specified by
-.BR ug ,
-similar to
-.BR sg .
-If the terminal has a code to underline the current character and move
-the cursor one position to the right, 
-such as the Microterm Mime,
-this can be given as
-.BR uc .
-.PP
-Other capabilities to enter various highlighting modes include
-.B mb
-(blinking),
-.B md
-(bold or extra bright),
-.B mh
-(dim or half-bright),
-.B mk
-(blanking or invisible text),
-.B mp
-(protected),
-.B mr
-(reverse video),
-.B me
-(turn off
-.I all
-attribute modes),
-.B as
-(enter alternate character set mode), and
-.B ae
-(exit alternate character set mode).
-Turning on any of these modes singly may or may not turn off other modes.
-.PP
-If there is a sequence to set arbitrary combinations of mode,
-this should be given as
-.B sa
-(set attributes), taking 9 parameters.
-Each parameter is either 0 or 1,
-as the corresponding attributes is on or off.
-The 9 parameters are, in order: standout, underline, reverse, blink,
-dim, bold, blank, protect, and alternate character set.
-Not all modes need be supported by
-.BR sa ,
-only those for which corresponding attribute commands exist.
-(It is unlikely that a
-.BR termcap\^ -using
-program will support this capability, which is defined for compatibility
-with
-.BR terminfo\^ .)
-.PP
-Terminals with the \*(lqmagic cookie\*(rq glitches
-.RB ( sg
-and
-.BR ug ),
-rather than maintaining extra attribute bits for each character cell,
-instead deposit special \*(lqcookies\*(rq,
-or \*(lqgarbage characters\*(rq,
-when they receive mode-setting sequences,
-which affect the display algorithm.
-.PP
-Some terminals,
-such as the Hewlett-Packard 2621,
-automatically leave standout
-mode when they move to a new line or when the cursor is addressed.
-Programs using standout mode
-should exit standout mode on such terminals
-before moving the cursor or sending a newline.
-On terminals where this is not a problem,
-the
-.B ms
-capability should be present
-to say that this overhead is unnecessary.
-.PP
-If the terminal has
-a way of flashing the screen to indicate an error quietly
-(a bell replacement),
-this can be given as
-.BR vb ;
-it must not move the cursor.
-.PP
-If the cursor needs to be made more visible than normal
-when it is not on the bottom line
-(to change, for example, a non-blinking underline into an easier-to-find
-block or blinking underline),
-give this sequence as
-.BR vs .
-If there is a way to make the cursor completely invisible, give that as
-.BR vi .
-The capability
-.BR ve ,
-which undoes the effects of both of these modes,
-should also be given.
-.PP
-If your terminal correctly displays underlined characters
-(with no special codes needed)
-even though it does not overstrike,
-then you should give the capability
-.BR ul .
-If overstrikes are erasable with a blank,
-this should be indicated by giving
-.BR eo .
-.br
-.ne 5
-.PP
-.B Keypad
-.PP
-If the terminal has a keypad that transmits codes when the keys are pressed,
-this information can be given.
-Note that it is not possible to handle
-terminals where the keypad only works in local mode
-(this applies, for example, to the unshifted Hewlett-Packard 2621 keys).
-If the keypad can be set to transmit or not transmit,
-give these codes as
-.B ks
-and
-.BR ke .
-Otherwise the keypad is assumed to always transmit.
-The codes sent by the left-arrow, right-arrow, up-arrow, down-arrow,
-and home keys can be given as
-.BR kl ,
-.BR kr ,
-.BR ku ,
-.BR kd ,
-and
-.BR kh ,
-respectively.
-If there are function keys such as f0, f1, ..., f9, the codes they send
-can be given as
-.BR k0 ,
-.BR k1 , "" ...,
-.BR k9 .
-If these keys have labels other than the default f0 through f9, the labels
-can be given as
-.BR l0 ,
-.BR l1 , "" ...,
-.BR l9 .
-The codes transmitted by certain other special keys can be given:
-.B kH
-(home down),
-.B kb
-(backspace),
-.B ka
-(clear all tabs),
-.B kt
-(clear the tab stop in this column),
-.B kC
-(clear screen or erase),
-.B kD
-(delete character),
-.B kL
-(delete line),
-.B kM
-(exit insert mode),
-.B kE
-(clear to end of line),
-.B kS
-(clear to end of screen),
-.B kI
-(insert character or enter insert mode),
-.B kA
-(insert line),
-.B kN
-(next page),
-.B kP
-(previous page),
-.B kF
-(scroll forward/down),
-.B kR
-(scroll backward/up), and
-.B kT
-(set a tab stop in this column).
-In addition, if the keypad has a 3 by 3 array of keys
-including the four arrow keys, then the other five keys can be given as
-.BR K1 ,
-.BR K2 ,
-.BR K3 ,
-.BR K4 ,
-and
-.BR K5 .
-These keys are useful when the effects of a 3 by 3 directional pad are needed.
-The obsolete
-.B ko
-capability formerly used to describe \*(lqother\*(rq function keys has been
-completely supplanted by the above capabilities.
-.PP
-The
-.B ma
-entry is also used to indicate arrow keys on terminals that have
-single-character arrow keys.
-It is obsolete but still in use in
-version 2 of
-.B vi\^
-which must be run on some minicomputers due to
-memory limitations.
-This field is redundant with
-.BR kl ,
-.BR kr ,
-.BR ku ,
-.BR kd ,
-and
-.BR kh .
-It consists of groups of two characters.
-In each group, the first character is what an arrow key sends, and the
-second character is the corresponding
-.B vi\^
-command.
-These commands are
-.B h
-for
-.BR kl ,
-.B j
-for
-.BR kd ,
-.B k
-for
-.BR ku ,
-.B l
-for
-.BR kr ,
-and
-.B H
-for
-.BR kh .
-For example, the Mime would have \*(lqma=^Hh^Kj^Zk^Xl\*(rq
-indicating arrow keys left (^H), down (^K), up (^Z), and right (^X).
-(There is no home key on the Mime.)
-.br
-.ne 5
-.PP
-.B Tabs and Initialization
-.PP
-If the terminal needs to be in a special mode when running
-a program that uses these capabilities,
-the codes to enter and exit this mode can be given as
-.B ti
-and
-.BR te .
-This arises, for example, from terminals like the Concept with more than
-one page of memory.
-If the terminal has only memory-relative cursor addressing and not
-screen-relative cursor addressing,
-a screen-sized window must be fixed into
-the display for cursor addressing to work properly.
-This is also used for the Tektronix 4025, where
-.B ti
-sets the command character to be the one used by
-.BR termcap\^ .
-.PP
-Other capabilities
-include
-.BR is ,
-an initialization string for the terminal,
-and
-.BR if ,
-the name of a file containing long initialization strings.
-These strings are expected to set the terminal into modes
-consistent with the rest of the
-.B termcap\^
-description.
-They are normally sent to the terminal by the
-.B tset\^
-program each time the user logs in.
-They will be printed in the following order:
-.BR is ;
-setting tabs using
-.B ct
-and
-.BR st ;
-and finally
-.BR if .
-.RI ( Terminfo\^
-uses
-.B i1-i2
-instead of
-.B is
-and runs the program
-.B iP
-and prints
-.B i3
-after the other initializations.)
-A pair of sequences that does a harder reset from a totally unknown state
-can be analogously given as
-.B rs
-and
-.BR if .
-These strings are output by the
-.B reset\^
-program, which is used when the terminal gets into a wedged state.
-.RI ( Terminfo\^
-uses
-.B r1-r3
-instead of
-.BR rs .)
-Commands are normally placed in
-.B rs
-and
-.B rf
-only if they produce annoying effects on the screen and are not necessary
-when logging in.
-For example, the command to set the VT100 into 80-column mode
-would normally be part of
-.BR is ,
-but it causes an annoying glitch of the screen and is not normally needed
-since the terminal is usually already in 80-column mode.
-.PP
-If the terminal has hardware tabs,
-the command to advance to the next tab stop can be given as
-.B ta
-(usually
-.BR ^I ).
-A \*(lqbacktab\*(rq command which moves leftward to the previous tab stop
-can be given as
-.BR bt .
-By convention,
-if the terminal driver modes indicate that tab stops are being expanded
-by the computer rather than being sent to the terminal,
-programs should not use
-.B ta
-or
-.B bt
-even if they are present,
-since the user may not have the tab stops properly set.
-If the terminal has hardware tabs that are initially set every
-.I n\^
-positions when the terminal is powered up, then the numeric parameter
-.B it
-is given, showing the number of positions between tab stops.
-This is normally used by the
-.B tset\^
-command to determine whether to set the driver mode for hardware tab
-expansion, and whether to set the tab stops.
-If the terminal has tab stops that can be saved in nonvolatile memory, the
-.B termcap\^
-description can assume that they are properly set.
-.PP
-If there are commands to set and clear tab stops, they can be given as
-.B ct
-(clear all tab stops) and
-.B st
-(set a tab stop in the current column of every row).
-If a more complex sequence is needed to set the tabs than can be
-described by this, the sequence can be placed in
-.B is
-or
-.BR if .
-.br
-.ne 5
-.PP
-.B Delays
-.PP
-Certain capabilities control padding in the terminal driver.
-These are primarily needed by hardcopy terminals and are used by the
-.B tset\^
-program to set terminal driver modes appropriately.
-Delays embedded in the capabilities
-.BR cr ,
-.BR sf ,
-.BR le ,
-.BR ff ,
-and
-.B ta
-will cause the appropriate delay bits to be set in the terminal driver.
-If
-.B pb
-(padding baud rate) is given, these values can be ignored at baud rates
-below the value of
-.BR pb .
-For 4.2BSD
-.BR tset\^ ,
-the delays are given as numeric capabilities
-.BR dC ,
-.BR dN ,
-.BR dB ,
-.BR dF ,
-and
-.BR dT
-instead.
-.br
-.ne 5
-.PP
-.B Miscellaneous
-.PP
-If the terminal requires other than a \s-2NUL\s0 (zero) character as a pad,
-this can be given as
-.BR pc .
-Only the first character of the
-.B pc
-string is used.
-.PP
-If the terminal has commands to save and restore the position of the
-cursor, give them as
-.B sc
-and
-.BR rc .
-.PP
-If the terminal has an extra \*(lqstatus line\*(rq that is not normally used by
-software, this fact can be indicated.
-If the status line is viewed as an extra line below the bottom line,
-then the capability
-.B hs
-should be given.
-Special strings to go to a position in the status line and to return
-from the status line can be given as
-.B ts
-and
-.BR fs .
-.RB ( fs
-must leave the cursor position in the same place that it was before
-.BR ts .
-If necessary, the
-.B sc
-and
-.B rc
-strings can be included in
-.B ts
-and
-.B fs
-to get this effect.)
-The capability
-.B ts
-takes one parameter, which is the column number of the status line
-to which the cursor is to be moved.
-If escape sequences and other special commands such as tab work while in
-the status line, the flag
-.B es
-can be given.
-A string that turns off the status line (or otherwise erases its contents)
-should be given as
-.BR ds .
-The status line is normally assumed to be the same width as the
-rest of the screen,
-.IR i.e. ,
-.BR co .
-If the status line is a different width (possibly because the terminal
-does not allow an entire line to be loaded), then its width in columns
-can be indicated with the numeric parameter
-.BR ws .
-.PP
-If the terminal can move up or down half a line, this can be
-indicated with
-.B hu
-(half-line up) and
-.B hd
-(half-line down).
-This is primarily useful for superscripts and subscripts on hardcopy
-terminals.
-If a hardcopy terminal can eject to the next page (form feed),
-give this as
-.B ff
-(usually
-.BR ^L ).
-.PP
-If there is a command to repeat a given character a given number of times
-(to save time transmitting a large number of identical characters),
-this can be indicated with the parameterized string
-.BR rp .
-The first parameter is the character to be repeated and the second is
-the number of times to repeat it.
-(This is a
-.B terminfo\^
-feature that is unlikely to be supported by a program that uses
-.BR termcap\^ .)
-.PP
-If the terminal has a settable command character, such as the
-Tektronix 4025, this can be indicated with
-.BR CC .
-A prototype command character is chosen which is used in all capabilities.
-This character is given in the
-.B CC
-capability to identify it.
-The following convention is supported on some UNIX systems:
-The environment is to be searched for a
-.B
-.SM CC
-variable,
-and if found,
-all occurrences of the prototype character are replaced by the character
-in the environment variable.
-This use of the
-.B
-.SM CC
-environment variable
-is a very bad idea, as it conflicts with
-.BR make\^ (1).
-.PP
-Terminal descriptions that do not represent a specific kind of known
-terminal, such as
-.BR switch\^ ,
-.BR dialup\^ ,
-.BR patch\^ ,
-and
-.BR network\^ ,
-should include the
-.B gn
-(generic) capability so that programs can complain that they do not know
-how to talk to the terminal.
-(This capability does not apply to
-.I virtual\^
-terminal descriptions for which the escape sequences are known.)
-.PP
-If the terminal uses xoff/xon (\s-2DC3\s0/\s-2DC1\s0)
-handshaking for flow control, give
-.BR xo .
-Padding information should still be included so that routines can make
-better decisions about costs, but actual pad characters will not be
-transmitted.
-.PP
-If the terminal has a \*(lqmeta key\*(rq which acts as a shift key, setting the
-8th bit of any character transmitted, then this fact can be indicated with
-.BR km .
-Otherwise, software will assume that the 8th bit is parity and it will
-usually be cleared.
-If strings exist to turn this \*(lqmeta mode\*(rq on and off, they can be given as
-.B mm
-and
-.BR mo .
-.PP
-If the terminal has more lines of memory than will fit on the screen at once,
-the number of lines of memory can be indicated with
-.BR lm .
-An explicit value of 0 indicates that the number of lines is not fixed,
-but that there is still more memory than fits on the screen.
-.PP
-If the terminal is one of those supported by the UNIX system virtual
-terminal protocol, the terminal number can be given as
-.BR vt .
-.PP
-Media copy strings which control an auxiliary printer
-connected to the terminal can be given as
-.BR ps :
-print the contents of the screen;
-.BR pf :
-turn off the printer; and
-.BR po :
-turn on the printer.
-When the printer is on, all text sent to the terminal will be sent to the
-printer.
-It is undefined whether the text is also displayed on the terminal screen
-when the printer is on.
-A variation
-.B pO
-takes one parameter and leaves the printer on for as many characters as the
-value of the parameter, then turns the printer off.
-The parameter should not exceed 255.
-All text, including
-.BR pf ,
-is transparently passed to the printer while
-.B pO
-is in effect.
-.PP
-Strings to program function keys can be given as
-.BR pk ,
-.BR pl ,
-and
-.BR px .
-Each of these strings takes two parameters: the function key number
-to program (from 0 to 9) and the string to program it with.
-Function key numbers out of this range may program undefined keys
-in a terminal-dependent manner.
-The differences among the capabilities are that
-.B pk
-causes pressing the given key to be the same as the user typing the given
-string;
-.B pl
-causes the string to be executed by the terminal in local mode;
-and
-.B px
-causes the string to be transmitted to the computer.
-Unfortunately, due to lack of a definition for string parameters in
-.BR termcap\^ ,
-only
-.B terminfo\^
-supports these capabilities.
-.br
-.ne 5
-.PP
-.B Glitches and Braindamage
-.PP
-Hazeltine terminals, which do not allow `~' characters to be displayed,
-should indicate
-.BR hz .
-.PP
-The
-.B nc
-capability, now obsolete, formerly indicated Datamedia terminals,
-which echo
-.B \er \en
-for
-carriage return then ignore a following linefeed.
-.PP
-Terminals that ignore a linefeed immediately after an
-.B am
-wrap, such as the Concept, should indicate
-.BR xn .
-.PP
-If
-.B ce
-is required to get rid of standout
-(instead of merely writing normal text on top of it),
-.B xs
-should be given.
-.PP
-Teleray terminals, where tabs turn all characters moved over to blanks,
-should indicate
-.B xt
-(destructive tabs).
-This glitch is also taken to mean that it is not possible
-to position the cursor on top of a \*(lqmagic cookie\*(rq, and that
-to erase standout mode it is necessary to use delete and insert line.
-.PP
-The Beehive Superbee, which is unable to correctly transmit the
-\s-2ESC\s0 or ^C characters, has
-.BR xb ,
-indicating that the \*(lqf1\*(rq key is used for \s-2ESC\s0 and \*(lqf2\*(rq for ^C.
-(Only certain Superbees have this problem, depending on the ROM.)
-.PP
-Other specific terminal problems may be corrected by adding more
-capabilities of the form \fBx\fIx\^\fP.
-.br
-.ne 5
-.PP
-.B Similar Terminals
-.PP
-If there are two very similar terminals,
-one can be defined as being just like the other with certain exceptions.
-The string capability
-.B tc
-can be given
-with the name of the similar terminal.
-This capability must be
-.IR last\^ ,
-and the combined length of the entries
-must not exceed 1024.
-The capabilities given before
-.B tc
-override those in the terminal type invoked by
-.BR tc .
-A capability can be canceled by placing
-.B xx@
-to the left of the
-.B tc
-invocation, where
-.I xx\^
-is the capability.
-For example, the entry
-.PP
-	hn\||\|2621\-nl:ks@:ke@:tc=2621:
-.PP
-defines a \*(lq2621\-nl\*(rq that does not have the
-.B ks
-or
-.B ke
-capabilities,
-hence does not turn on the function key labels when in visual mode.
-This is useful for different modes for a terminal, or for different
-user preferences.
-.SH AUTHOR
-William Joy
-.br
-Mark Horton added underlining and keypad support
-.SH FILES
-.TP 15
-.B /etc/termcap
-file containing terminal descriptions
-.B /usr/etc/termcap
-file containing more terminal descriptions (Minix-vmd)
-.SH SEE ALSO
-.BR elvis (1),
-.BR more (1),
-.BR termcap (3),
-.BR printf (3).
-.SH "CAVEATS AND BUGS"
-Lines and columns are now stored by the kernel as well as in the termcap
-entry.
-Most programs now use the kernel information primarily; the information
-in this file is used only if the kernel does not have any information.
-.PP
-Not all programs support all entries.
-.PP
-The MINIX 3
-.BR termcap (3)
-does not understand everything described here, unlike the one Minix-vmd uses.
Index: trunk/minix/man/man5/ttytab.5
===================================================================
--- trunk/minix/man/man5/ttytab.5	(revision 9)
+++ 	(revision )
@@ -1,95 +1,0 @@
-.TH TTYTAB
-.SH NAME
-ttytab \- table of login terminals
-.SH SYNOPSIS
-.B /etc/ttytab
-.SH DESCRIPTION
-.de SP
-.if t .sp 0.4
-.if n .sp
-..
-The
-.B ttytab
-file lists all the terminal devices that one can login on.  It is a simple
-text file that contains lines of the form:
-.PP
-.RS
-.ft I
-.ta +\w'namennn'u +\w'typennn'u +\w'"getty"nnn'u
-name	type	"getty"	"init"
-.DT
-.ft R
-.RE
-.PP
-The
-.I name
-and
-.I type
-fields are simple words,
-.I name
-is the name of the terminal device with
-.B /dev
-stripped off, and
-.I type
-tells the type of terminal to initialize the
-.B TERM
-environment variable.
-.PP
-The
-.I getty
-and
-.I init
-fields may name commands that are run to allow one to login on the line, or
-to initialize the line.  Both these fields may be more than one word if
-the whole field is enclosed in double quotes.
-.I Getty
-is usually simply the word
-.BR getty ,
-the command that prints a system identification banner and allows on to type
-a name to log in.
-.I Init
-is usually an
-.B stty
-command to set the baud rate and parity of a serial line.
-.PP
-The
-.I init
-field may be omitted to indicate that no initialization is necessary, and the
-.I getty
-field may be left out to not start a login process.  Terminals should not be
-left out, because their place in the
-.B ttytab
-file determines their slot number as returned by
-.BR ttyslot (3).
-.PP
-Comments (introduced by #) and empty lines are ignored.
-.SH EXAMPLE
-A
-.B ttytab
-for the console, two serial lines, and a pseudo tty entry:
-.PP
-.RS
-.nf
-.ta +\w'consolennn'u +\w'networknnn'u +\w'gettynnnn'u
-console	minix	getty
-tty00	vt100	getty	"stty 9600"
-tty01	dialup	getty	"stty 38400"
-ttyp0	network
-.DT
-.fi
-.RE
-.SH ENVIRONMENT
-.TP 15n
-.B TERM
-Terminal type
-.SH NOTES
-It is customary to set the type to
-.B dialup
-for a dialin line.  One can check for that name in one's
-.BR .profile .
-.SH "SEE ALSO"
-.BR getttyent (3),
-.BR ttyslot (3),
-.BR init (8).
-.SH AUTHOR
-Kees J. Bot (kjb@cs.vu.nl)
Index: trunk/minix/man/man5/utmp.5
===================================================================
--- trunk/minix/man/man5/utmp.5	(revision 9)
+++ 	(revision )
@@ -1,70 +1,0 @@
-.TH UTMP 5
-.SH NAME
-utmp, wtmp \- logged in users, login and logout history
-.SH SYNOPSIS
-.nf
-.ft B
-#include <sys/types.h>
-#include <utmp.h>
-.SH DESCRIPTION
-.de SP
-.if t .sp 0.4
-.if n .sp
-..
-The files
-.B /etc/utmp
-and
-.B /usr/adm/wtmp
-respectively contain the currently logged in users, and the history of
-logins and logouts.
-.PP
-Each file is an array of the following structure defined in <utmp.h>:
-.PP
-.nf
-.ta +5n +15n +15n
-struct utmp {
-	char	ut_user[8];	/* user name */
-	char	ut_line[12];	/* terminal name */
-	char	ut_host[16];	/* host name, when remote */
-	time_t	ut_time;	/* login/logout time */
-};
-.SP
-.ta +15n
-#define ut_name ut_user	/* for compatibility with other systems */
-.fi
-.DT
-.PP
-The structure contains more fields than those listed, but they are only of
-interest to
-.B init
-and
-.BR login .
-Note that the
-.B ut_name
-field is a compatibility alias for
-.BR ut_user ,
-it is actually better to use it.
-.PP
-A login entry is completely specified.  A logout entry has a null string for
-.BR ut_name .
-A shutdown or reboot entry has an
-.B ut_line
-field containing a "~" (tilde).  The
-.B ut_name
-field is usually the name of the program that did the shutdown, or "reboot"
-at reboot.  This is a bit confusing, but note that there should always be
-two such entries.  If you see just one entry then the system has crashed, if
-you see two entries then the system was properly shut down and later
-rebooted.
-.SH FILES
-.TP 25n
-.B /etc/utmp
-Currently logged in users.
-.TP
-.B /usr/adm/wtmp
-History of logins and logouts.
-.SH "SEE ALSO"
-.BR who (1),
-.BR ttyslot (3).
-.SH AUTHOR
-Kees J. Bot (kjb@cs.vu.nl)
Index: trunk/minix/man/man5/whatis.5
===================================================================
--- trunk/minix/man/man5/whatis.5	(revision 9)
+++ 	(revision )
@@ -1,57 +1,0 @@
-.TH WHATIS 5
-.SH NAME
-whatis \- database of online manual pages
-.SH SYNOPSIS
-.B /usr/man/*/whatis
-.br
-.B /usr/man/whatis
-.SH DESCRIPTION
-The
-.B whatis
-file in each manual page directory is a database of titles for manual pages.
-This database is used by
-.BR man (1)
-to map titles to manual pages names.  The database is created by
-.BR makewhatis (1)
-from the NAME sections of the manual pages.
-.PP
-The NAME secions must be simple lines with no troff fluff but one
-backslash like these two:
-.PP
-.RS
-whatis \e\- database of online manual pages
-.br
-cawf, nroff \e\- C version of the nroff-like, Amazingly Workable (text)
-Formatter
-.RE
-.PP
-These lines are transformed by
-.B makewhatis
-to these two lines for the database:
-.PP
-.RS
-cawf, nroff (1) \- C version of the nroff-like, Amazingly Workable (text)
-Formatter
-.br
-whatis (5) \- database of online manual pages
-.RE
-.PP
-As you can see they are in section number order, so that
-.B man
-searches them in section order.
-.PP
-Each entry is just a single line, restricting the NAME section to a single
-line too with just one dash, and commas and spaces before the dash as you
-see above.
-.SH "SEE ALSO"
-.BR man (1),
-.BR whatis (1),
-.BR makewhatis (1),
-.BR man (7).
-.SH BUGS
-It seems to be impossible for many manual page writers to keep the NAME
-section simple.  They also like to use every font available in their
-documents.  My simple scripts can't read their NAME sections, my simple
-me can't read their texts.
-.SH AUTHOR
-Kees J. Bot (kjb@cs.vu.nl)
