From owner-man-jp-reviewer@jp.FreeBSD.org Thu May  2 11:05:15 2002
Received: (from daemon@localhost)
	by castle.jp.FreeBSD.org (8.11.6+3.4W/8.11.3) id g4225Fu58525;
	Thu, 2 May 2002 11:05:15 +0900 (JST)
	(envelope-from owner-man-jp-reviewer@jp.FreeBSD.org)
Received: from rwcrmhc51.attbi.com (rwcrmhc51.attbi.com [204.127.198.38])
	by castle.jp.FreeBSD.org (8.11.6+3.4W/8.11.3) with ESMTP/inet id g4225Ef58519
	for <man-jp-reviewer@jp.FreeBSD.org>; Thu, 2 May 2002 11:05:14 +0900 (JST)
	(envelope-from horikawa@jp.FreeBSD.org)
Received: from localhost ([12.252.32.143]) by rwcrmhc51.attbi.com
          (InterMail vM.4.01.03.27 201-229-121-127-20010626) with ESMTP
          id <20020502020501.SDH9799.rwcrmhc51.attbi.com@localhost>
          for <man-jp-reviewer@jp.FreeBSD.org>;
          Thu, 2 May 2002 02:05:01 +0000
Date: Wed, 01 May 2002 20:04:59 -0600 (MDT)
Message-Id: <20020501.200459.92590091.horikawa@attbi.com>
To: man-jp-reviewer@jp.FreeBSD.org
From: Kazuo Horikawa <horikawa@jp.FreeBSD.org>
X-Mailer: Mew version 2.2 on Emacs 20.7 / Mule 4.0 (HANANOEN)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=iso-2022-jp
Content-Transfer-Encoding: 7bit
Reply-To: man-jp-reviewer@jp.FreeBSD.org
Precedence: list
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+020417
X-Sequence: man-jp-reviewer 4101
Subject: [man-jp-reviewer 4101] dhcp-eval.5
Errors-To: owner-man-jp-reviewer@jp.FreeBSD.org
Sender: owner-man-jp-reviewer@jp.FreeBSD.org
X-Originator: horikawa@jp.FreeBSD.org

dhcp-eval.5 $B$rLu$7$?$N$GAw$j$^$9!#(B

$B86J8$N8m$j$G!"LuJ8$GD>$7$?$b$N$O!"(Bmurray@FreeBSD.org
(FreeBSD $B$N(B isc-dhcp $B%a%s%F%J(B) $B$K$bO"Mm:Q$G$9!#(B
--
$BKY@nOBM:(B

--- dhcp-eval.5.eng	Wed May  1 19:49:46 2002
+++ dhcp-eval.5	Wed May  1 19:52:11 2002
@@ -34,20 +34,19 @@
 .\" ``http://www.isc.org/''.  To learn more about Vixie Enterprises,
 .\" see ``http://www.vix.com''.   To learn more about Nominum, Inc., see
 .\" ``http://www.nominum.com''.
+.\" jpman %Id: dhcp-eval.5,v 0.0 2002/04/28 21:23:14 horikawa Stab %
 .TH dhcp-eval 5
-.SH NAME
-dhcp-eval - ISC DHCP conditional evaluation
-.SH DESCRIPTION
-The Internet Software Consortium DHCP client and server both provide
-the ability to perform conditional behavior depending on the contents
-of packets they receive.   The syntax for specifying this conditional
-behaviour is documented here.
-.SH REFERENCE: CONDITIONAL BEHAVIOUR
-Conditional behaviour is specified using the if statement and the else
-or elsif statements.   A conditional statement can appear anywhere
-that a regular statement (e.g., an option statement) can appear, and
-can enclose one or more such statements.   A typical conditional
-statement in a server might be:
+.SH $BL>>N(B
+dhcp-eval - ISC DHCP $B$K$*$1$k>r7oIU$-I>2A(B
+.SH $B2r@b(B
+Internet Software Consortium $B$N(B DHCP $B%/%i%$%"%s%H$H%5!<%P$O!"(B
+$B<u?.$9$k%Q%1%C%H$K0MB8$7$?>r7oIU$-F0:n$r9T$&G=NO$r;}$A$^$9!#(B
+$B>r7oIU$-F0:n$NJ8K!$r$3$3$K<($7$^$9!#(B
+.SH $B;2>H(B: $B>r7oIU$-F0:n(B
+$B>r7oIU$-F0:n$O!"(Bif, else, elsif $BJ8$r;HMQ$7$F;XDj$7$^$9!#(B
+$B>r7oJ8$O!"DL>oJ8(B (option $BJ8(B) $B$,EP>l2DG=$J>l=j$O$I$3$K$G$bEP>l2DG=$G$"$j!"(B
+$B$^$?$3$N$h$&$JJ8$r3g$k$3$H$b2DG=$G$9!#(B
+$B%5!<%P$K$*$1$k>r7oJ8$O<!$N$h$&$K$J$k$3$H$,B?$$$G$7$g$&(B:
 .PP
 .nf
 if option dhcp-user-class = "accounting" {
@@ -73,242 +72,237 @@
 }
 .fi
 .PP
-On the client side, an example of conditional evaluation might be:
+$B%/%i%$%"%s%HB&$G$O!">r7oIU$-I>2A$NNc$O<!$N$h$&$K$J$k$G$7$g$&(B:
 .PP
 .nf
-# example.org filters DNS at its firewall, so we have to use their DNS
-# servers when we connect to their network.   If we are not at
-# example.org, prefer our own DNS server.
+# example.org $B$O%U%!%$%d%&%)!<%k$G(B DNS $B$r%U%#%k%?$9$k$N$G!"(B
+# example.org $B%M%C%H%o!<%/$K7R$,$k$H$-$N$_!"$=$N(B DNS $B%5!<%P$r;HMQ$7$^$9!#(B
+# example.org $B$K7R$,$k$N$G$O$J$$>l9g!"<+8J$N(B DNS $B%5!<%P$rM%@h;HMQ$7$^$9!#(B
 if not option domain-name = "example.org" {
   prepend domain-name-servers 127.0.0.1;
 }
 .fi  
 .PP
-The
 .B if
-statement and the
+$BJ8$H(B
 .B elsif
-continuation statement both take boolean expressions as their
-arguments.   That is, they take expressions that, when evaluated,
-produce a boolean result.   If the expression evaluates to true, then
-the statements enclosed in braces following the 
+$B7QB3J8$O!"0z?t$H$7$F%V!<%k<0$r<h$j$^$9!#(B
+$B$D$^$j!"$3$l$i$NJ8$O!"I>2A$5$l$k$H%V!<%kCM$N7k2L$r@8@.$9$k<0$r<h$j$^$9!#(B
+$B<0$NI>2A7k2L$,??$K$J$k$H!"(B
 .B if
-statement are executed, and all subsequent
+$BJ8$ND>8e$N%V%l!<%9$G3g$i$l$?J8$,<B9T$5$l!"8eB3$9$k(B
 .B elsif
-and
-.B else
-clauses are skipped.   Otherwise, each subsequent 
+$B$H(B
 .B elsif
-clause's expression is checked, until an elsif clause is encountered
-whose test evaluates to true.   If such a clause is found, the
-statements in braces following it are executed, and then any
-subsequent
+$B$N@a$O%9%-%C%W$5$l$^$9!#(B
+$B$=$&$G$J$$>l9g!"I>2A7k2L$,??$K$J$k(B elsif $B@a$K=P2q$&$^$G!"8eB3$9$k3F(B
 .B elsif
-and
-.B else
-clauses are skipped.   If all the 
+$B@a$N<0$,%A%'%C%/$5$l$^$9!#(B
+$B$=$N$h$&$J@a$,8+IU$+$k$H!"D>8e$N%V%l!<%9Cf$NJ8$,<B9T$5$l!"8eB3$9$k(B
+.B elsif
+$B$H(B
+.B elsif
+$B$N@a$O%9%-%C%W$5$l$^$9!#(B
+$B$9$Y$F$N(B
 .B if
-and
+$B$*$h$S(B
 .B elsif
-clauses are checked but none
-of their expressions evaluate true, then if there is an
+$B$N@a$,%A%'%C%/$5$l$?$b$N$N$I$N<0$b??$K$J$i$J$$>l9g$G!"(B
 .B else
-clause, the statements enclosed in braces following the
+$B@a$,B8:_$9$k>l9g!"(B
 .B else
-are evaluated.   Boolean expressions that evaluate to null are
-treated as false in conditionals.
-.SH BOOLEAN EXPRESSIONS
-The following is the current list of boolean expressions that are
-supported by the DHCP distribution.
+$B$ND>8e$N%V%l!<%9Cf$NJ8$,I>2A$5$l$^$9!#(B
+$B>r7o$K$*$$$F$O!"I>2A7k2L$,6u$K$J$k%V!<%k<0$O56$H$7$F07$o$l$^$9!#(B
+.SH $B%V!<%k<0(B
+$B0J2<$O!"(BDHCP $BG[I[J*$G8=:_%5%]!<%H$5$l$F$$$k%V!<%k<0$N0lMw$G$9!#(B
 .PP
 .I data-expression-1 \fB=\fI data-expression-2\fR
 .RS 0.25i
 .PP
-The \fB=\fR operator compares the values of two data expressions,
-returning true if they are the same, false if they are not.   If
-either the left-hand side or the right-hand side are null, the
-result is also null.
+\fB=\fR $B%*%Z%l!<%?$O!"(B2 $B8D$N%G!<%?<0$rHf3S$7!"N><T$,F1$8>l9g$O??$rJV$7!"(B
+$BF10l$G$J$$>l9g$O56$rJV$7$^$9!#(B
+$B:8JU$b$7$/$O1&JU$N$$$:$l$+$,6u$N>l9g!"7k2L$O6u$K$J$j$^$9!#(B
 .RE
 .PP
 .I boolean-expression-1 \fBand\fI boolean-expression-2\fR
 .PP
 .RS 0.25i
-The \fBand\fR operator evaluates to true if the boolean expression on
-the left-hand side and the boolean expression on the right-hand side
-both evaluate to true.  Otherwise, it evaluates to false.  If either
-the expression on the left-hand side or the expression on the
-right-hand side are null, the result is null.
+\fBand\fR $B%*%Z%l!<%?$O!":8JU$N%V!<%k<0$H1&JU$N%V!<%k<0$NN>J}$NI>2A7k2L$,(B
+$B??$N>l9g!"??$HI>2A$5$l$^$9!#(B
+$B$=$&$G$J$$>l9g!"56$HI>2A$5$l$^$9!#(B
+$B:8JU$b$7$/$O1&JU$N$$$:$l$+$,6u$N>l9g!"7k2L$O6u$K$J$j$^$9!#(B
 .RE
 .PP
 .I boolean-expression-1 \fBor\fI boolean-expression-2\fR
 .PP
 .RS 0.25i
-The \fBor\fR operator evaluates to true if either the boolean
-expression on the left-hand side or the boolean expression on the
-right-hand side evaluate to true.  Otherwise, it evaluates to false.
-If either the expression on the left-hand side or the expression on
-the right-hand side are null, the result is null.
+\fBor\fR $B%*%Z%l!<%?$O!":8JU$N%V!<%k<0$H1&JU$N%V!<%k<0$N$$$:$l$+$NI>2A7k2L$,(B
+$B??$N>l9g!"??$HI>2A$5$l$^$9!#(B
+$B$=$&$G$J$$>l9g!"56$HI>2A$5$l$^$9!#(B
+$B:8JU$b$7$/$O1&JU$N$$$:$l$+$,6u$N>l9g!"7k2L$O6u$K$J$j$^$9!#(B
 .RE
 .PP
 .B not \fIboolean-expression
 .PP
 .RS 0.25i
-The \fBnot\fR operator evaluates to true if \fIboolean-expression\fR
-evaluates to false, and returns false if \fIboolean-expression\fR evaluates
-to true.   If \fIboolean-expression\fR evaluates to null, the result
-is also null.
+\fBnot\fR $B%*%Z%l!<%?$O!"(B\fIboolean-expression\fR $B$NI>2A7k2L$,56$N>l9g!"(B
+$B??$HI>2A$5$l$^$9!#(B
+$B$^$?!"(B\fIboolean-expression\fR $B$NI>2A7k2L$,??$N>l9g!"56$HI>2A$5$l$^$9!#(B
+\fIboolean-expression\fR $B$NI>2A7k2L$,6u$N>l9g!"7k2L$b$^$?6u$K$J$j$^$9!#(B
 .RE
 .PP
 .B exists \fIoption-name\fR
 .PP
 .RS 0.25i
-The \fBexists\fR expression returns true if the specified option
-exists in the incoming DHCP packet being processed.
+\fBexists\fR $B<0$O!"=hM}BP>]$NF~NO(B DCHP $B%Q%1%C%HCf$K!"(B
+$B;XDj$5$l$?%*%W%7%g%s$,B8:_$9$k>l9g!"??$rJV$7$^$9!#(B
 .RE
 .B known
 .PP
 .RS 0.25i
-The \fBknown\fR expression returns true if the client whose request is
-currently being processed is known - that is, if there's a host
-declaration for it.
+\fBknown\fR $B<0$O!"MW5aBP1~Cf$N%/%i%$%"%s%H$,4{CN$N>l9g!"(B
+$B$9$J$o$A%[%9%H@k8@$,$"$k>l9g!"??$rJV$7$^$9!#(B
 .RE
 .B static
 .PP
 .RS 0.25i
-The \fBstatic\fR expression returns true if the lease assigned to the
-client whose request is currently being processed is derived from a static
-address assignment.
+\fBstatic\fR $B<0$O!"MW5aBP1~Cf$N%/%i%$%"%s%H$X$N%j!<%93d$jEv$F$,!"(B
+$B@EE*%"%I%l%93d$jEv$F$+$iGI@8$7$?$b$N$G$"$k>l9g!"??$rJV$7$^$9!#(B
 .RE
-.SH DATA EXPRESSIONS
-Several of the boolean expressions above depend on the results of
-evaluating data expressions.   A list of these expressions is provided
-here.
+.SH $B%G!<%?<0(B
+$BA0=R$N%V!<%k<0$O!"%G!<%?<0$NI>2A7k2L$K0MB8$7$^$9!#(B
+$B%G!<%?<0$r$3$3$K<($7$^$9!#(B
 .PP
 .B substring (\fIdata-expr\fB, \fIoffset\fB, \fIlength\fB)\fR
 .PP
 .RS 0.25i
-The \fBsubstring\fR operator evaluates the data expression and returns
-the substring of the result of that evaluation that starts
-\fIoffset\fR bytes from the beginning, continuing for \fIlength\fR
-bytes.  \fIOffset\fR and \fIlength\fR are both numeric expressions.
-If \fIdata-expr\fR, \fIoffset\fR or \fIlength\fR evaluate to null,
-then the result is also null.  If \fIoffset\fR is greater than or
-equal to the length of the evaluated data, then a zero-length data
-string is returned.  If \fIlength\fI is greater then the remaining
-length of the evaluated data after \fIoffset\fR, then a data string
-containing all data from \fIoffset\fR to the end of the evaluated data
-is returned.
+\fBsubstring\fR $B%*%Z%l!<%?$O!"%G!<%?<0$rI>2A$7!"(B
+$BI>2A7k2LCf$N(B \fIoffset\fR $B%P%$%H$+$i3+;O$7$F(B \fIlength\fR $B%P%$%H7QB3$9$k(B
+$B%5%V%9%H%j%s%0$rJV$7$^$9!#(B
+\fIoffset\fR $B$H(B \fIlength\fR $B$O6&$K?tCM<0$G$9!#(B
+\fIdata-expr\fR, \fIoffset\fR, \fIlength\fR $B$N$$$:$l$+$,6u$HI>2A$5$l$k>l9g!"(B
+$B7k2L$b$^$?6u$K$J$j$^$9!#(B
+\fIoffset\fR $B$,!"I>2A$5$l$?%G!<%?$ND9$50J>e$G$"$k>l9g!"(B
+$BD9$5(B 0 $B$N%G!<%?J8;zNs$,JV$5$l$^$9!#(B
+\fIlength\fI $B$,!"I>2A$5$l$?%G!<%?$N(B \fIoffset\fR $B$h$j8e$ND9$5$h$jBg$-$$>l9g!"(B
+$BI>2A$5$l$?%G!<%?$N(B \fIoffset\fR $B$+$i=*C<$^$G$NA4%G!<%?$r4^$`(B
+$B%G!<%?J8;zNs$,JV$5$l$^$9!#(B
 .RE
 .PP
 .B suffix (\fIdata-expr\fB, \fIlength\fB)\fR
 .PP
 .RS 0.25i
-The \fBsuffix\fR operator evaluates \fIdata-expr\fR and returns the
-last \fIlength\fR bytes of the result of that evaluation. \fILength\fR
-is a numeric expression.  If \fIdata-expr\fR or \fIlength\fR evaluate
-to null, then the result is also null.  If \fIsuffix\fR evaluates to a
-number greater than the length of the evaluated data, then the
-evaluated data is returned.
+\fBsuffix\fR $B%*%Z%l!<%?$O!"(B\fIdata-expr\fR $B$rI>2A$7!"(B
+$BI>2A7k2L$N:G8e$N(B \fIlength\fR $B%P%$%H$rJV$7$^$9!#(B
+\fIlength\fR $B$O?tCM<0$G$9!#(B
+\fIdata-expr\fR $B$^$?$O(B \fIlength\fR $B$NI>2A7k2L$,6u$N>l9g!"(B
+$B7k2L$b$^$?6u$K$J$j$^$9!#(B
+\fIsuffix\fR
+($BLuCm(B: \fIlength\fR $B$,@5$7$$$H;W$o$l$^$9(B)
+$B$NI>2A7k2L$,I>2A$5$l$?%G!<%?$ND9$5$h$jBg$-$$>l9g!"(B
+$BI>2A$5$l$?%G!<%?$,JV$5$l$^$9!#(B
+.\" horikawa@jp.FreeBSD.org 2002/04/29
 .RE
 .PP
 .B option \fIoption-name\fR
 .PP
 .RS 0.25i
-The \fBoption\fR operator returns the contents of the specified option in
-the packet to which the server is responding.
+\fBoption\fR $B%*%Z%l!<%?$O!"%5!<%P$,1~Ez=hM}Cf$N%Q%1%C%H$NCf$N!"(B
+$B;XDj$7$?%*%W%7%g%s$NFbMF$rJV$7$^$9!#(B
 .RE
 .PP
 .B config-option \fIoption-name\fR
 .PP
 .RS 0.25i
-The \fBconfig-option\fR operator returns the value for the specified option
-that the DHCP client or server has been configured to send.
+\fBconfig-option\fR $B%*%Z%l!<%?$O!";XDj$7$?%*%W%7%g%s$KBP$7!"(B
+DHCP $B%/%i%$%"%s%H$^$?$O%5!<%P$,Aw=P$9$k$h$&@_Dj$5$l$?CM$rJV$7$^$9!#(B
 .RE
 .PP
 .B hardware
 .PP
 .RS 0.25i
-The \fBhardware\fR operator returns a data string whose first element
-is the type of network interface indicated in packet being considered,
-and whose subsequent elements are client's link-layer address.   If
-there is no packet, or if the RFC2131 \fIhlen\fR field is invalid,
-then the result is null.   Hardware types include ethernet (1),
-token-ring (6), and fddi (8).   Hardware types are specified by the
-IETF, and details on how the type numbers are defined can be found in
-RFC2131 (in the ISC DHCP distribution, this is included in the doc/
-subdirectory).
+\fBhardware\fR $B%*%Z%l!<%?$O!"%G!<%?%9%H%j%s%0$rJV$7$^$9!#(B
+$B%G!<%?%9%H%j%s%0$N:G=i$NMWAG$O!"(B
+$BBP>]%Q%1%C%H$,<($9%M%C%H%o!<%/%$%s%?%U%'!<%9$N%?%$%W$G$"$j!"(B
+$B8eB3$9$kMWAG$O!"%/%i%$%"%s%H$N%j%s%/AX%"%I%l%9$G$9!#(B
+$B%Q%1%C%H$,B8:_$7$J$$>l9g$b$7$/$O(B RFC2131 \fIhlen\fR $B%U%#!<%k%I$,L58z$J>l9g!"(B
+$B7k2L$O6u$K$J$j$^$9!#(B
+$B%O!<%I%&%'%"%?%$%W$K$O!"%$!<%5%M%C%H(B (1)$B!"%H!<%/%s%j%s%0(B (6)$B!"(B
+FDDI (8) $B$,4^$^$l$^$9!#(B
+$B%O!<%I%&%'%"%?%$%W$O(B IETF $B$K$h$C$F5,Dj$5$l!"(B
+$B$I$N$h$&$K%?%$%W$N?tCM$,Dj5A$5$l$k$+$N>\:Y$O(B RFC2131
+(ISC DHCP $BG[I[J*$G$O!"(Bdoc/ $B%5%V%G%#%l%/%H%j$K$"$j$^$9(B) $B$r;2>H$7$F$/$@$5$$!#(B
 .RE
 .PP
 .B packet (\fIoffset\fB, \fIlength\fB)\fR
 .PP
 .RS 0.25i
-The \fBpacket\fR operator returns the specified portion of the packet
-being considered, or null in contexts where no packet is being
-considered.   \fIOffset\fR and \fIlength\fR are applied to the
-contents packet as in the \fBsubstring\fR operator.
+\fBpacket\fR $B%*%Z%l!<%?$O!"BP>]%Q%1%C%H$N;XDjItJ,$rJV$9$+!"(B
+$BBP>]%Q%1%C%H$,L5$$J8L.$G$O6u$rJV$7$^$9!#(B
+\fIoffset\fR $B$H(B \fIlength\fR $B$O!"(B
+\fBsubstring\fR $B%*%Z%l!<%?$HF1MM$K!"%Q%1%C%H$NFbMF$KE,MQ$5$l$^$9!#(B
 .RE
 .PP
 .I string
 .PP
 .RS 0.25i
-A string, enclosed in quotes, may be specified as a data expression,
-and returns the text between the quotes, encoded in ASCII.   The
-backslash ('\\') character is treated specially, as in C programming:
-'\\t' means TAB, '\\r' means carriage return, '\\n' means newline, and
-'\\b' means bell.   Any octal value can be specified with '\\nnn',
-where nnn is any positive octal number less than 0400.  Any
-hexadecimal value can be specified with '\xnn', where nn is any
-positive hexadecimal number less than 0xff.
+$B%/%)!<%H$G3g$i$l$?%9%H%j%s%0$O%G!<%?<0$H$7$F;XDj2DG=$G$"$j!"(B
+$B%/%)!<%H$N4V$r(B ASCII $B%(%s%3!<%I$7$?$N%F%-%9%H$rJV$7$^$9!#(B
+$B%P%C%/%9%i%C%7%e(B ('\\') $BJ8;z$O(B C $B%W%m%0%i%`$N$h$&$KFCJL07$$$5$l$^$9(B:
+$B$9$J$o$A(B '\\t' $B$O%?%V$r!"(B'\\r' $B$OI|2~$r!"(B'\\n' $B$O2~9T$r!"(B'\\b' $B$O%Y%k$r(B
+$B0UL#$7$^$9!#(B
+8 $B?J?tCM$O(B '\\nnn' $B$G;XDj2DG=$G$"$j!"(Bnnn $B$O(B 0 $B0J>e(B 0377 $B0J2<$N(B 8 $B?J?tCM$G$9!#(B
+16 $B?J?tCM$O(B '\\xnn' $B$G;XDj2DG=$G$"$j!"(Bnn $B$O(B 0 $B0J>e(B 0xff $B0J2<$N(B 16 $B?J?tCM$G$9!#(B
+.\" $BCM$NHO0O$N8m$j$K$D$$$F$O!"(BMurray $B7PM3$G%l%]!<%H:Q(B
+.\" horikawa@jp.FreeBSD.org 2002/05/01
 .RE
 .PP
 .I colon-seperated hexadecimal list
 .PP
 .RS 0.25i
-A list of hexadecimal octet values, seperated by colons, may be
-specified as a data expression.
+$B%3%m%s$G6h@Z$i$l$?(B 16 $B?J?t$N%*%/%F%C%HCM$N%j%9%H$r!"(B
+$B%G!<%?<0$H$7$F;XDj2DG=$G$9!#(B
 .RE
 .PP
 .B concat (\fIdata-expr1\fB, ..., \fIdata-exprN\fB)\fR
 .RS 0.25i
-The expressions are evaluated, and the results of each evaluation are
-concatenated in the sequence that the subexpressions are listed.   If
-any subexpression evaluates to null, the result of the concatenation
-is null.
+$B<0$,I>2A$5$l!"3FI>2A7k2L$,%5%V<0$N=gHV$KO"7k$5$l$^$9!#(B
+$B%5%V<0$N$$$:$l$+$NI>2A7k2L$,6u$K$J$k>l9g!"O"7k$N7k2L$O6u$K$J$j$^$9!#(B
 .RE
 .PP
 .B reverse (\fInumeric-expr1\fB, \fIdata-expr2\fB)\fR
 .RS 0.25i
-The two expressions are evaluated, and then the result of evaluating
-the data expression is reversed in place, using hunks of the size
-specified in the numeric expression.   For example, if the numeric
-expression evaluates to four, and the data expression evaluates to 
-twelve bytes of data, then the reverse expression will evaluate to
-twelve bytes of data, consisting of the last four bytes of the the
-input data, followed by the middle four bytes, followed by the first
-four bytes.
+2 $B8D$N<0$,I>2A$5$l!"%G!<%?<0$NI>2A7k2L$,$=$N>l$GH?E>$5$l$^$9!#(B
+$BH?E>$O!"?tCM<0$G;XDj$5$l$kBg$-$5$NC10L$G9T$o$l$^$9!#(B
+$BNc$($P!"?tCM<0$NI>2A7k2L$,(B 4 $B$N>l9g$G!"(B
+$B%G!<%?<0$NI>2A7k2L$,(B 12 $B%P%$%H$K$J$k>l9g!"(B
+reverse $B<0$NI>2A7k2L$O!"<!$N$h$&$J(B 12 $B%P%$%H$N%G!<%?$K$J$j$^$9!#(B
+$B$9$J$o$A!"F~NO$N:G8e$N(B 4 $B%P%$%H!"??Cf$N(B 4$B%P%$%H!":G=i$N(B 4 $B%P%$%H$N(B
+$B=g$K$J$j$^$9!#(B
 .RE
 .PP
 .B leased-address
 .RS 0.25i
-In any context where the client whose request is being processed has
-been assigned an IP address, this data expression returns that IP
-address.
+$B$$$+$J$kJ8L.$K$*$$$F$b!"(B
+$BMW5a=hM}BP>]$H$J$C$F$$$k%/%i%$%"%s%H$K(B IP $B%"%I%l%9$,3d$jEv$F:Q$N>l9g!"(B
+$B$=$N(B IP $B%"%I%l%9$,JV$5$l$^$9!#(B
 .RE
 .PP
 .B binary-to-ascii (\fInumeric-expr1\fB, \fInumeric-expr2\fB,
 .B \fIdata-expr1\fB,\fR \fIdata-expr2\fB)\fR
 .RS 0.25i
-Converts the result of evaluating data-expr2 into a text string
-containing one number for each element of the result of evaluating
-data-expr2.   Each number is seperated from the other by the result of
-evaluating data-expr1.   The result of evaluating numeric-expr1
-specifies the base (2 through 16) into which the numbers should be
-converted.   The result of evaluating numeric-expr2 specifies the
-width in bits of each number, which may be either 8, 16 or 32.
+data-expr2 $B$NI>2A7k2L$r%F%-%9%H%9%H%j%s%0$KJQ49$7$^$9!#(B
+$B$3$N%F%-%9%H%9%H%j%s%0Cf$G$O!"(B
+data-expr2 $B$NI>2A7k2L$N3FMWAG$,!"(B1 $B8D$N?tCM$K$J$j$^$9!#(B
+$B3F?tCM$O!"$=$l$>$l!"(Bdata-expr1 $B$NI>2A7k2L$K$h$C$F6h@Z$i$l$^$9!#(B
+numeric-expr1 $B$NI>2A7k2L$O!"4p?t(B (2 $B$+$i(B 16) $B$G$"$j!"(B
+$B$3$N4p?t$K?tCM$,JQ49$5$l$^$9!#(B
+numeric-expr2 $B$NI>2A7k2L$O!"3F?tCM$N%S%C%HI}$G$"$j!"(B
+8, 16, 32 $B$N$$$:$l$+$G$9!#(B
 .PP
-As an example of the preceding three types of expressions, to produce
-the name of a PTR record for the IP address being assigned to a
-client, one could write the following expression:
+$B:G=i$N(B 3 $B8D$N%?%$%W$N<0$NNc$H$7$F!"(B
+$B%/%i%$%"%s%H$K3d$jEv$F$i$l$?(B IP $B%"%I%l%9MQ$N(B
+PTR $B%l%3!<%I$NL>A0$r@8@.$9$k$?$a$K;HMQ2DG=$J<0$r<($7$^$9(B
 .RE
 .PP
 .nf
@@ -320,165 +314,181 @@
 .PP
 .B encode-int (\fInumeric-expr\fB, \fIwidth\fB)\fR
 .RS 0.25i
-Numeric-expr is evaluated and encoded as a data string of the
-specified width, in network byte order (most significant byte first).
-If the numeric expression evaluates to the null value, the result is
-also null.
+$B?tCM<0$,I>2A$5$l!";XDj$5$l$?I}$N%G!<%?%9%H%j%s%0$K(B
+$B%M%C%H%o!<%/%P%$%H=g(B ($B:G>e0L%P%$%H$,:G=i(B) $B$G%(%s%3!<%I$5$l$^$9!#(B
+$B?tCM<0$NI>2A7k2L$,6u$NCM$K$J$k>l9g!"7k2L$b$^$?6u$G$9!#(B
+.RE
+.\" $B$3$N(B ".RE" $B$,L5$$$H!"%$%s%G%s%H$,@5$7$/$J$$$G$9(B
+.\" horikawa@jp.FreeBSD.org 2002/04/29
 .PP
 .B pick-first-value (\fIdata-expr1\fR [ ... \fIexpr\fRn ] \fB)\fR
 .RS 0.25i
-The pick-first-value function takes any number of data expressions as
-its arguments.   Each expression is evaluated, starting with the first
-in the list, until an expression is found that does not evaluate to a
-null value.   That expression is returned, and none of the subsequent
-expressions are evaluated.   If all expressions evaluate to a null
-value, the null value is returned.
+pick-first-value $B4X?t$O!"G$0U8D$N%G!<%?<0$r<h$jF@$^$9!#(B
+$B%j%9%H$N@hF,$+$i3F<0$,I>2A$5$l!"(B
+$BI>2A7k2L$,6u$G$O$J$$<0$,8+IU$+$k$^$G$3$l$,B3$-$^$9!#(B
+$B$3$N<0$,JV$5$l!"$3$N<0$K8eB3$9$k<0$OI>2A$5$l$^$;$s!#(B
+$B$9$Y$F$N<0$NI>2A7k2L$,6u$N>l9g!"6u$NCM$,JV$5$l$^$9!#(B
 .RE
 .PP
 .B host-decl-name
 .RS 0.25i
-The host-decl-name function returns the name of the host declaration
-that matched the client whose request is currently being processed, if
-any.   If no host declaration matched, the result is the null value.
+host-decl-name $B4X?t$O!"8=:_MW5a=hM}BP>]$H$J$C$F$$$k%/%i%$%"%s%H$K%^%C%A$9$k!"(B
+$B%[%9%H@k8@$NL>A0$rJV$7$^$9!#(B
+$B$I$N%[%9%H@k8@$b%^%C%A$7$J$$>l9g!"7k2L$O6u$K$J$j$^$9!#(B
 .RE
-.SH NUMERIC EXPRESSIONS
-Numeric expressions are expressions that evaluate to an integer.   In
-general, the maximum size of such an integer should not be assumed to
-be representable in fewer than 32 bits, but the precision of such
-integers may be more than 32 bits.
+.SH $B?tCM<0(B
+$B?tCM<0$O!"I>2A7k2L$,@0?t$K$J$k<0$G$9!#(B
+$B0lHL$K!"@0?t$N:GBg%5%$%:$,(B 32 $B%S%C%HL$K~$G$"$k$H2>Dj$9$Y$-$G$O$"$j$^$;$s$,!"(B
+$B@0?t$N@:EY$,(B 32 $B%S%C%H$r1[$($k$3$H$O$"$jF@$^$9!#(B
 .PP
 .B extract-int (\fIdata-expr\fB, \fIwidth\fB)\fR
 .PP
 .RS 0.25i
-The \fBextract-int\fR operator extracts an integer value in network
-byte order from the result of evaluating the specified data
-expression.   Width is the width in bits of the integer to extract.
-Currently, the only supported widths are 8, 16 and 32.   If the
-evaluation of the data expression doesn't provide sufficient bits to
-extract an integer of the specified size, the null value is returned.
+\fBextract-int\fR $B%*%Z%l!<%?$O!"%M%C%H%o!<%/%P%$%H=g$N@0?t$r!"(B
+$B;XDj$7$?%G!<%?<0$NI>2A7k2L$+$i<h$j=P$7$^$9!#(B
+$BI}$O!"<h$j=P$9@0?t$N%S%C%HI}$G$9!#(B
+$B8=:_!"%5%]!<%H$5$l$F$$$kI}$O(B 8, 16, 32 $B$N$$$:$l$+$G$9!#(B
+$B%G!<%?<0$NI>2A7k2L$,!";XDj$7$?Bg$-$5$N@0?t$H<h$j=P$9$N$K(B
+$B==J,$J%S%C%H$rDs6!$7$J$$>l9g!"6u$NCM$,JV$5$l$^$9!#(B
 .RE
 .PP
 .B lease-time
 .PP
 .RS 0.25i
-The duration of the current lease - that is, the difference between
-the current time and the time that the lease expires.
+$B8=:_$N%j!<%9$N4|4V$G$9!#(B
+$B$9$J$o$A!"8=:_$N;~9o$H%j!<%9$N4|8B$,@Z$l$k;~9o$H$N:9$G$9!#(B
 .RE
 .PP
 .I number
 .PP
 .RS 0.25i
-Any number between zero and the maximum representable size may be
-specified as a numeric expression.
+0 $B$+$iI=8=2DG=$J:GBg%5%$%:$NHO0O$NG$0U$N?tCM$r!"?tCM<0$H$7$F;XDj2DG=$G$9!#(B
 .RE
 .PP
 .B client-state
 .PP
 .RS 0.25i
-The current state of the client instance being processed.   This is
-only useful in DHCP client configuration files.   Possible values are:
+$B=hM}BP>]$N%/%i%$%"%s%H$N8=:_$N>uBV$G$9!#(B
+DHCP $B%/%i%$%"%s%H@_Dj%U%!%$%k$K$*$$$F$N$_M-MQ$G$9!#(B
+$B<h$jF@$kCM$O<!$NDL$j$G$9(B:
 .TP 2
 .I \(bu
-Booting - DHCP client is in the INIT state, and does not yet have an
-IP address.   The next message transmitted will be a DHCPDISCOVER,
-which will be broadcast.
+Booting - DHCP $B%/%i%$%"%s%H$O(B INIT $B>uBV$G$"$j!"(B
+IP $B%"%I%l%9$r$^$@;}$A$^$;$s!#(B
+$B<!$KAw?.$5$l$k%a%C%;!<%8$O(B DHCPDISCOVER $B$G$"$j!"(B
+$B$3$l$O%V%m!<%I%-%c%9%H$5$l$^$9!#(B
 .TP
 .I \(bu
-Reboot - DHCP client is in the INIT-REBOOT state.   It has an IP
-address, but is not yet using it.   The next message to be transmitted
-will be a DHCPREQUEST, which will be broadcast.   If no response is
-heard, the client will bind to its address and move to the BOUND state.
+Reboot - DHCP $B%/%i%$%"%s%H$O(B INIT-REBOOT $B>uBV$G$9!#(B
+IP $B%"%I%l%9$r;}$A$^$9$,$^$@;HMQ$7$F$$$^$;$s!#(B
+$B<!$KAw?.$5$l$k%a%C%;!<%8$O(B DHCPREQUEST $B$G$"$j!"(B
+$B$3$l$O%V%m!<%I%-%c%9%H$5$l$^$9!#(B
+$B1~Ez$,2?$bJ9$3$($J$$$H!"%/%i%$%"%s%H$O$3$N%"%I%l%9$K%P%$%s%I$7!"(B
+BOUND $B>uBV$KA+0\$7$^$9!#(B
 .TP
 .I \(bu
-Select - DHCP client is in the SELECTING state - it has received at
-least one DHCPOFFER message, but is waiting to see if it may receive
-other DHCPOFFER messages from other servers.   No messages are sent in
-the SELECTING state.
+Select - DHCP $B%/%i%$%"%s%H$O(B SELECTING $B>uBV$G$9!#(B
+$B>/$J$/$H$b(B 1 $B8D$N(B DHCPOFFER $B%a%C%;!<%8$O<u?.$7$^$7$?$,!"(B
+$BB>$N(B DHCPOFFER $B%a%C%;!<%8$rB>$N%5!<%P$+$i<u$1<h$k$+$I$&$+BT$C$F$$$^$9!#(B
+SELECTING $B>uBV$G$O%a%C%;!<%8$OAw?.$5$l$^$;$s!#(B
 .TP
 .I \(bu
-Request - DHCP client is in the REQUESTING state - it has received at
-least one DHCPOFFER message, and has chosen which one it will
-request.   The next message to be sent will be a DHCPREQUEST message,
-which will be broadcast.
+Request - DHCP $B%/%i%$%"%s%H$O(B REQUESTING $B>uBV$G$9!#(B
+$B>/$J$/$H$b(B 1 $B8D$N(B DHCPOFFER $B%a%C%;!<%8$r<u?.$7!"(B
+$B$=$N$&$A$N$I$l$rMW5a$9$k$+A*Br$7$^$7$?!#(B
+$B<!$KAw?.$5$l$k%a%C%;!<%8$O(B DHCPREQUEST $B%a%C%;!<%8$G$"$j!"(B
+$B$3$l$O%V%m!<%I%-%c%9%H$5$l$^$9!#(B
 .TP
 .I \(bu
-Bound - DHCP client is in the BOUND state - it has an IP address.   No
-messages are transmitted in this state.
+Bound - DHCP $B%/%i%$%"%s%H$O(B BOUND $B>uBV$G$9!#(B
+IP $B%"%I%l%9$r=jM-$7$F$$$^$9!#(B
+$B$3$N>uBV$G$O%a%C%;!<%8$OAw?.$5$l$^$;$s!#(B
 .TP
 .I \(bu
-Renew - DHCP client is in the RENEWING state - it has an IP address,
-and is trying to contact the server to renew it.   The next message to
-be sent will be a DHCPREQUEST message, which will be unicast directly
-to the server.
+Renew - DHCP $B%/%i%$%"%s%H$O(B RENEWING $B>uBV$G$9!#(B
+IP $B%"%I%l%9$r=jM-$7$F$*$j!"$3$l$r99?7$9$k$?$a$K%5!<%P$K@\B3$r;n$_$F$$$^$9!#(B
+$B<!$KAw?.$5$l$k%a%C%;!<%8$O(B DHCPREQUEST $B%a%C%;!<%8$G$"$j!"(B
+$B$3$l$O%5!<%P$KD>@\%f%K%-%c%9%H$5$l$^$9!#(B
 .TP
 .I \(bu
-Rebind - DHCP client is in the REBINDING state - it has an IP address,
-and is trying to contact any server to renew it.   The next message to
-be sent will be a DHCPREQUEST, which will be broadcast.
+Rebind - DHCP $B%/%i%$%"%s%H$O(B REBINDING $B>uBV$G$9!#(B
+IP $B%"%I%l%9$r=jM-$7$F$*$j!"(B
+$B$3$l$r99?7$9$k$?$a$KG$0U$N%5!<%P$K@\B3$r;n$_$F$$$^$9!#(B
+$B<!$KAw?.$5$l$k%a%C%;!<%8$O(B DHCPREQUEST $B%a%C%;!<%8$G$"$j!"(B
+$B$3$l$O%V%m!<%I%-%c%9%H$5$l$^$9!#(B
 .RE
-.SH REFERENCE: LOGGING
-Logging statements may be used to send information to the standard logging
-channels.  A logging statement includes an optional priority (\fBfatal\fR,
-\fBerror\fR, \fBinfo\fR, or \fBdebug\fR), and a data expression.
+.SH $B;2>H(B: $B%m%0(B
+$B%m%0J8$r;HMQ$7$F!"I8=`%m%0%A%c%M%k$K>pJs$rAw?.2DG=$G$9!#(B
+$B%m%0J8$O!">JN,2DG=$J(B priority
+(\fBfatal\fR, \fBerror\fR, \fBinfo\fR, \fBdebug\fR $B$N$$$:$l$+(B) $B$H!"(B
+$B%G!<%?<0$r<h$j$^$9!#(B
 .PP
-.B log (\fIpriority\fB, \fIdata-expr\FB)\fR
+.B log (\fIpriority\fB, \fIdata-expr\fB)\fR
+.\" "\FB" $B$O(B "\fB" $B$,@5$7$$(B
+.\" horikawa@jp.FreeBSD.org 2002/04/29
 .PP
-Logging statements take only a single data expression argument, so if you
-want to output multiple data values, you will need to use the \fBconcat\fR
-operator to concatenate them.
+$B%m%0J8$O!"C10l$N%G!<%?<00z?t$N$_<h$j$^$9!#(B
+$BJ#?t$N%G!<%?CM$r=PNO$7$?$$>l9g!"(B
+\fBconcat\fR $B%*%Z%l!<%?$r;HMQ$7$F$=$l$i$rO"7k$9$kI,MW$,$"$j$^$9!#(B
 .RE
-.SH REFERENCE: DYNAMIC DNS UPDATES
+.SH $B;2>H(B: $BF0E*$J(B DNS $B99?7(B
 .PP
-The DHCP client and server have the ability to dynamically update the
-Domain Name System.  Within the configuration files, you can define
-how you want the Domain Name System to be updated.  These updates are
-RFC 2136 compliant so any DNS server supporting RFC 2136 should be
-able to accept updates from the DHCP server.
-.SH SECURITY
-Support for TSIG and DNSSEC is not yet available.  When you set your
-DNS server up to allow updates from the DHCP server or client, you may
-be exposing it to unauthorized updates.  To avoid this, the best you
-can do right now is to use IP address-based packet filtering to
-prevent unauthorized hosts from submitting update requests.
-Obviously, there is currently no way to provide security for client
-updates - this will require TSIG or DNSSEC, neither of which is yet
-available in the DHCP distribution.
+DHCP $B%/%i%$%"%s%H$H%5!<%P$O!"(B
+$BF0E*$K%I%a%$%s%M!<%`%7%9%F%`$r99?7$9$kG=NO$,$"$j$^$9!#(B
+$B@_Dj%U%!%$%kCf$K!"$I$N$h$&$K%I%a%$%s%M!<%`%7%9%F%`$r99?7$7$FM_$7$$$+!"(B
+$BDj5A2DG=$G$9!#(B
+$B99?7$O(B RFC 2136 $B$K=>$C$F$*$j!"(B
+RFC 2136 $B$r%5%]!<%H$9$k(B DNS $B%5!<%P$O!"(B
+DHCP $B%5!<%P$+$i$N99?7$r<u$1IU$12DG=$G$9!#(B
+.SH $B%;%-%e%j%F%#(B
+TSIG $B$*$h$S(B DNSSEC $B$N%5%]!<%H$O$^$@MxMQ$G$-$^$;$s!#(B
+DHCP $B%5!<%P$^$?$O%/%i%$%"%s%H$+$i$N99?7$r<u$1IU$1$k$h$&$K(B
+DNS $B%5!<%P$r@_Dj$9$k>l9g!"8"8B$NL5$$99?7$KBP$7$F(B
+DNS $B%5!<%P$r;/$9$3$H$K$J$k$+$b$7$l$^$;$s!#(B
+$B$3$l$rHr$1$k$?$a$K:#$9$0$G$-$k:GNI$NJ}K!$O!"(B
+IP $B%"%I%l%9%Y!<%9$N%Q%1%C%H%U%#%k%?$r;HMQ$7$F!"(B
+$B8"8B$NL5$$%[%9%H$+$i$N99?7MW5aH/9T$rM^;_$9$k$3$H$G$9!#(B
+$BL@$i$+$K!"%/%i%$%"%s%H$N99?7$KBP$9$k%;%-%e%j%F%#$rDs6!$9$kJ}K!$O$"$j$^$;$s!#(B
+$B$3$N$?$a$K$O(B TSIG $B$+(B DNSSEC $B$,I,MW$G$9$,!"(B
+$B$3$N(B DHCP $BG[I[J*$K$O$^$@4^$^$l$F$$$^$;$s!#(B
 .PP
-Dynamic DNS (DDNS) updates are performed by using the \fBdns-update\fR
-expression.  The \fBdns-update\fR expression is a boolean expression
-that takes four parameters.  If the update succeeds, the result is
-true.  If it fails, the result is false.  The four parameters that the
-are the resource record type (RR), the left hand side of the RR, the
-right hand side of the RR and the ttl that should be applied to the
-record.  The simplest example of the use of the function can be found
-in the reference section of the dhcpd.conf file, where events are
-described.  In this example several statements are being used to make
-the arguments to the \fBdns-update\f\R.
+$BF0E*(B DNS (DDNS) $B99?7$O!"(B\fBdns-update\fR $B<0$r;HMQ$9$k$3$H$G<B9T$5$l$^$9!#(B
+\fBdns-update\fR $B<0$O!"%V!<%k<0$G$"$j!"(B4 $B8D$N%Q%i%a!<%?$r<h$j$^$9!#(B
+$B99?7$K@.8y$9$k$H!"7k2L$O??$K$J$j$^$9!#(B
+$B<:GT$9$k$H!"7k2L$O56$K$J$j$^$9!#(B
+4 $B8D$N%Q%i%a!<%?$O!"%j%=!<%9%l%3!<%I%?%$%W(B (RR)$B!"(B
+RR $B$N:8JU!"(BRR $B$N1&JU!"%l%3!<%I$KE,MQ$5$l$k$Y$-(B ttl $B$G$9!#(B
+$B$3$N4X?t$N:G$b4JC1$J;HMQNc$O!"(Bdhcpd.conf $B%U%!%$%k$N;2>H@a$K$"$j!"(B
+$B$J$K$,5/$-$k$+5-=R$5$l$F$$$^$9!#(B
+$B$3$NNc$G$O!"J#?t$N<0$,;HMQ$5$l$F!"(B
+\fBdns-update\fR $BMQ$N0z?t$,:n@.$5$l$F$$$^$9!#(B
 .PP
-In the example, the first argument to the first \f\Bdns-update\fR
-expression is a data expression that evaluates to the A RR type.  The
-second argument is constructed by concatenating the DHCP host-name
-option with a text string containing the local domain, in this case
-"ssd.example.net".  The third argument is constructed by converting
-the address the client has been assigned from a 32-bit number into an
-ascii string with each byte separated by a ".".  The fourth argument,
-the TTL, specifies the amount of time remaining in the lease (note
-that this isn't really correct, since the DNS server will pass this
-TTL out whenever a request comes in, even if that is only a few
-seconds before the lease expires).
+$BNc$NCf$G$O!":G=i$N(B \fBdns-update\fR $B<0$X$N(B 1 $BHVL\$N0z?t$O!"(B
+A RR $B%?%$%W$KI>2A$5$l$k%G!<%?<0$G$9!#(B
+2 $BHVL\$N0z?t$O!"(BDHCP host-name $B%*%W%7%g%s$H(B
+$B%m!<%+%k%I%a%$%s!"$3$N>l9g(B "ssd.example.net"$B!"(B
+$B$r4^$`%F%-%9%H%9%H%j%s%0$rO"7k$9$k$3$H$G!"9=C[$5$l$^$9!#(B
+3 $BHVL\$N0z?t$O!"%/%i%$%"%s%H$K3d$jEv$F$i$l$?%"%I%l%9$r!"(B
+32 $B%S%C%H$N?tCM$+$i3F%P%$%H$r(B "."  $B$G6h@Z$C$?(B ASCII $BJ8;zNs$KJQ49$9$k$3$H$G!"(B
+$B9=C[$5$l$^$9!#(B
+4 $BHVL\$N0z?t(B TTL $B$O!"%j!<%9$N;D$j;~4V$G$9(B
+($B$3$l$OK\Ev$O@5$7$/$"$j$^$;$s!#(B
+$B$J$<$J$i(B DNS $B%5!<%P$O!"MW5a$KBP$7$F$$$D$b$3$N(B TTL $BCM$r=PNO$7$F$7$^$&$+$i$G$9!#(B
+$B$3$l$O!"%j!<%94|8B@Z$l$N?tICA0$G$"$C$F$b$G$9(B)$B!#(B
 .PP
-If the first \fBdns-update\fR statement succeeds, it is followed up
-with a second update to install a PTR RR.  The installation of a PTR
-record is similar to installing an A RR except that the left hand side
-of the record is the leased address, reversed, with ".in-addr.arpa"
-concatenated.  The right hand side is the fully qualified domain name
-of the client to which the address is being leased.
-.SH SEE ALSO
+$B:G=i$N(B \fBdns-update\fR $BJ8$,@.8y$9$k$H!"(B
+$B0z$-B3$$$F(B 2 $BHVL\$N99?7$K$h$j(B PTR RR $B$,%$%s%9%H!<%k$5$l$^$9!#(B
+PTR $B%l%3!<%I$N%$%s%9%H!<%k$O!"(BA RR $B$N%$%s%9%H!<%k$HF1MM$G$9$,!"(B
+$B%l%3!<%I$N:8JU$O%j!<%9$5$l$?%"%I%l%9$r5U$K$7$F(B ".in-addr.arpa" $B$H(B
+$B7k9g$5$l$?$b$N$G$9!#(B
+$B1&JU$O!"%"%I%l%9$N%j!<%9Ds6!@h%/%i%$%"%s%H$N!"40A4$J7A$G$N%I%a%$%sL>$G$9!#(B
+.SH $B4XO"9`L\(B
 dhcpd.conf(5), dhcpd.leases(5), dhclient.conf(5), dhcp-eval(5), dhcpd(8),
 dhclient(8), RFC2132, RFC2131.
-.SH AUTHOR
-The Internet Software Consortium DHCP Distribution was written by Ted
-Lemon under a contract with Vixie Labs.  Funding for
-this project was provided through the Internet Software Consortium.
-Information about the Internet Software Consortium can be found at
-.B http://www.isc.org.
+.SH $B:n<T(B
+Internet Software Consortium DHCP Distribution
+$B$O!"(BVixie Labs $B$H$N7@Ls$N$b$H$G!"(BTed Lemon $B$,5-=R$7$^$7$?!#(B
+$BK\%W%m%8%'%/%H$N;q6b$O!"(BInternet Software Corporation $B$,Ds6!$7$^$7$?!#(B
+Internet Software Consortium $B$K4X$9$k>pJs$O!"(B
+.B http://www.isc.org
+$B$K$"$j$^$9!#(B
