Skip to content

Commit 16b6b77

Browse files
author
NIIBE Yutaka
committed
Minor style fixes.
-- Signed-off-by: NIIBE Yutaka <[email protected]>
1 parent 227b3b1 commit 16b6b77

10 files changed

+85
-85
lines changed

doc/debugging.texi

+2-2
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ should not occur but sometimes things go wrong), run it using
9191
@item How to find the IP address of a keyserver
9292

9393
If a round robin URL of is used for a keyserver
94-
(e.g. subkeys.gnupg.org); it is not easy to see what server is actually
94+
(e.g., subkeys.gnupg.org); it is not easy to see what server is actually
9595
used. Using the keyserver debug option as in
9696

9797
@smallexample
@@ -130,7 +130,7 @@ but Dirmngr's OCSP feature has not been enabled using
130130
The far most common reason for this is that the environment variable
131131
@code{GPG_TTY} has not been set correctly. Make sure that it has been
132132
set to a real tty device and not just to @samp{/dev/tty};
133-
i.e. @samp{GPG_TTY=tty} is plainly wrong; what you want is
133+
i.e., @samp{GPG_TTY=tty} is plainly wrong; what you want is
134134
@samp{GPG_TTY=`tty`} --- note the back ticks. Also make sure that
135135
this environment variable gets exported, that is you should follow up
136136
the setting with an @samp{export GPG_TTY} (assuming a Bourne style

doc/dirmngr.texi

+16-16
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ available flags the sole word "help" can be used.
180180
This option is only useful for testing; it sets the system time back or
181181
forth to @var{epoch} which is the number of seconds elapsed since the year
182182
1970. Alternatively @var{epoch} may be given as a full ISO time string
183-
(e.g. "20070924T154812").
183+
(e.g., "20070924T154812").
184184

185185
@item --debug-level @var{level}
186186
@opindex debug-level
@@ -213,7 +213,7 @@ however carefully selected to best aid in debugging.
213213
@item --debug @var{flags}
214214
@opindex debug
215215
Set debug flags. All flags are or-ed and @var{flags} may be given in
216-
C syntax (e.g. 0x0042) or as a comma separated list of flag names. To
216+
C syntax (e.g., 0x0042) or as a comma separated list of flag names. To
217217
get a list of all supported flags the single word "help" can be used.
218218
This option is only useful for debugging and the behavior may change
219219
at any time without notice.
@@ -374,7 +374,7 @@ there for details; here is an example:
374374
as given. Replace USERNAME, PASSWORD, and the 'dc' parts
375375
according to the instructions received from your LDAP
376376
administrator. Note that only simple authentication
377-
(i.e. cleartext passwords) is supported and thus using ldaps is
377+
(i.e., cleartext passwords) is supported and thus using ldaps is
378378
strongly suggested (since 2.2.28 "ldaps" defaults to port 389
379379
and uses STARTTLS). On Windows authentication via AD can be
380380
requested by adding @code{gpgNtds=1} after the fourth question
@@ -465,7 +465,7 @@ Lines starting with a @samp{#} are comments.
465465
Note that as usual all strings entered are expected to be UTF-8 encoded.
466466
Obviously this will lead to problems if the password has originally been
467467
encoded as Latin-1. There is no other solution here than to put such a
468-
password in the binary encoding into the file (i.e. non-ascii characters
468+
password in the binary encoding into the file (i.e., non-ascii characters
469469
won't show up readable).@footnote{The @command{gpgconf} tool might be
470470
helpful for frontends as it enables editing this configuration file using
471471
percent-escaped strings.}
@@ -681,7 +681,7 @@ those certificates on startup and when given a SIGHUP. Certificates
681681
which are not readable or do not make up a proper X.509 certificate
682682
are ignored; see the log file for details.
683683

684-
Applications using dirmngr (e.g. gpgsm) can request these
684+
Applications using dirmngr (e.g., gpgsm) can request these
685685
certificates to complete a trust chain in the same way as with the
686686
extra-certs directory (see below).
687687

@@ -690,7 +690,7 @@ Note that for OCSP responses the certificate specified using the option
690690

691691
@item /etc/gnupg/extra-certs
692692
This directory may contain extra certificates which are preloaded
693-
into the internal cache on startup. Applications using dirmngr (e.g. gpgsm)
693+
into the internal cache on startup. Applications using dirmngr (e.g., gpgsm)
694694
can request cached certificates to complete a trust chain.
695695
This is convenient in cases you have a couple intermediate CA certificates
696696
or certificates usually used to sign OCSP responses.
@@ -799,7 +799,7 @@ Enter @code{HELP} at the prompt to see a list of commands and enter
799799
@node Dirmngr Signals
800800
@section Use of signals
801801

802-
A running @command{dirmngr} may be controlled by signals, i.e. using
802+
A running @command{dirmngr} may be controlled by signals, i.e., using
803803
the @command{kill} command to send a signal to the process.
804804

805805
Here is a list of supported signals:
@@ -1031,7 +1031,7 @@ includes a local certificate store as well as a list of trusted root
10311031
certificates.
10321032

10331033
@noindent
1034-
The return code is 0 for success; i.e. the certificate has not been
1034+
The return code is 0 for success; i.e., the certificate has not been
10351035
revoked or one of the usual error codes from libgpg-error.
10361036

10371037
@node Dirmngr CHECKOCSP
@@ -1066,7 +1066,7 @@ of the global option @option{--ignore-ocsp-service-url}.
10661066

10671067

10681068
@noindent
1069-
The return code is 0 for success; i.e. the certificate has not been
1069+
The return code is 0 for success; i.e., the certificate has not been
10701070
revoked or one of the usual error codes from libgpg-error.
10711071

10721072
@node Dirmngr CACHECERT
@@ -1088,7 +1088,7 @@ Thus the caller is expected to return the certificate for the request
10881088
as a binary blob.
10891089

10901090
@noindent
1091-
The return code is 0 for success; i.e. the certificate has not been
1091+
The return code is 0 for success; i.e., the certificate has not been
10921092
successfully cached or one of the usual error codes from libgpg-error.
10931093

10941094
@node Dirmngr VALIDATE
@@ -1188,7 +1188,7 @@ as a binary blob.
11881188
@c does not yet end up in memory.
11891189
@c * @code{crl_cache_insert} is called with that descriptor to
11901190
@c actually read the CRL into the cache. See below for a
1191-
@c description of this function. If there is any error (e.g. read
1191+
@c description of this function. If there is any error (e.g., read
11921192
@c problem, CRL not correctly signed or verification of signature
11931193
@c not possible), this descriptor is rejected and we continue
11941194
@c with the next name. If the CRL has been successfully loaded,
@@ -1214,7 +1214,7 @@ as a binary blob.
12141214
@c a) An authorityKeyIdentifier with an issuer and serialno exits: The
12151215
@c certificate is retrieved using @code{find_cert_bysn}. If
12161216
@c the certificate is in the certificate cache, it is directly
1217-
@c returned. Then the requester (i.e. the client who requested the
1217+
@c returned. Then the requester (i.e., the client who requested the
12181218
@c CRL check) is asked via the Assuan inquiry ``SENDCERT'' whether
12191219
@c he can provide this certificate. If this succeed the returned
12201220
@c certificate gets cached and returned. Note, that dirmngr does not
@@ -1293,7 +1293,7 @@ as a binary blob.
12931293
@c expiration time of all certificates in the chain.
12941294
@c
12951295
@c We first check that the certificate may be used for the requested
1296-
@c purpose (i.e. OCSP or CRL signing). If this is not the case
1296+
@c purpose (i.e., OCSP or CRL signing). If this is not the case
12971297
@c GPG_ERR_WRONG_KEY_USAGE is returned.
12981298
@c
12991299
@c The next step is to find the trust anchor (root certificate) and to
@@ -1317,7 +1317,7 @@ as a binary blob.
13171317
@c Now the issuer's certificate is looked up: If an
13181318
@c authorityKeyIdentifier is available, this one is used to locate the
13191319
@c certificate either using issuer and serialnumber or subject DN
1320-
@c (i.e. the issuer's DN) and the keyID. The functions
1320+
@c (i.e., the issuer's DN) and the keyID. The functions
13211321
@c @code{find_cert_bysn) and @code{find_cert_bysubject} are used
13221322
@c respectively. The have already been described above under the
13231323
@c description of @code{crl_cache_insert}. If no certificate was found
@@ -1331,13 +1331,13 @@ as a binary blob.
13311331
@c actual certificate is checked and in case this fails the error
13321332
@c #code{GPG_ERR_BAD_CERT_CHAIN} is returned. If the signature checks out, the
13331333
@c maximum chain length of the issuing certificate is checked as well as
1334-
@c the capability of the certificate (i.e. whether he may be used for
1334+
@c the capability of the certificate (i.e., whether he may be used for
13351335
@c certificate signing). Then the certificate is prepended to our list
13361336
@c representing the certificate chain. Finally the loop is continued now
13371337
@c with the issuer's certificate as the current certificate.
13381338
@c
13391339
@c After the end of the loop and if no error as been encountered
1340-
@c (i.e. the certificate chain has been assempled correctly), a check is
1340+
@c (i.e., the certificate chain has been assempled correctly), a check is
13411341
@c done whether any certificate expired or a critical policy has not been
13421342
@c met. In any of these cases the validation terminates with an
13431343
@c appropriate error.

doc/gpg-agent.texi

+12-12
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ the included Secure Shell Agent you may start the agent using:
7272
@c One way of enforcing this split is a per-key or per-session
7373
@c passphrase, known only by the owner, which must be supplied to the
7474
@c agent to permit the use of the secret key material. Another way is
75-
@c with an out-of-band permission mechanism (e.g. a button or GUI
75+
@c with an out-of-band permission mechanism (e.g@:. a button or GUI
7676
@c interface that the owner has access to, but the supplicant does not).
7777
@c
7878
@c The rationale for this separation is that it allows access to the
@@ -111,8 +111,8 @@ Please make sure that a proper pinentry program has been installed
111111
under the default filename (which is system dependent) or use the
112112
option @option{pinentry-program} to specify the full name of that program.
113113
It is often useful to install a symbolic link from the actual used
114-
pinentry (e.g. @file{@value{BINDIR}/pinentry-gtk}) to the expected
115-
one (e.g. @file{@value{BINDIR}/pinentry}).
114+
pinentry (e.g., @file{@value{BINDIR}/pinentry-gtk}) to the expected
115+
one (e.g., @file{@value{BINDIR}/pinentry}).
116116

117117
@manpause
118118
@noindent
@@ -178,7 +178,7 @@ If in @file{common.conf} the option @option{no-autostart} is set, any
178178
start attempts will be ignored.
179179

180180
In --supervised mode, different file descriptors can be provided for
181-
use as different socket types (e.g. ssh, extra) as long as they are
181+
use as different socket types (e.g., ssh, extra) as long as they are
182182
identified in the environment variable @code{LISTEN_FDNAMES} (see
183183
sd_listen_fds(3) on some Linux distributions for more information on
184184
this convention).
@@ -259,7 +259,7 @@ however carefully selected to best aid in debugging.
259259
@item --debug @var{flags}
260260
@opindex debug
261261
Set debug flags. All flags are or-ed and @var{flags} may be given
262-
in C syntax (e.g. 0x0042) or as a comma separated list of flag names.
262+
in C syntax (e.g., 0x0042) or as a comma separated list of flag names.
263263
To get a list of all supported flags the single word "help" can be
264264
used. This option is only useful for debugging and the behavior may
265265
change at any time without notice.
@@ -345,7 +345,7 @@ specify the logging output.
345345
@anchor{option --no-allow-mark-trusted}
346346
@item --no-allow-mark-trusted
347347
@opindex no-allow-mark-trusted
348-
Do not allow clients to mark keys as trusted, i.e. put them into the
348+
Do not allow clients to mark keys as trusted, i.e., put them into the
349349
@file{trustlist.txt} file. This makes it harder for users to inadvertently
350350
accept Root-CA keys.
351351

@@ -705,15 +705,15 @@ The order in which keys are presented to ssh are:
705705

706706
Editing the "Use-for-ssh" values can be done with an editor or using
707707
@command{gpg-connect-agent} and "KEYATTR" (Remember to append a colon
708-
to the key; i.e. use "Use-for-ssh:").
708+
to the key; i.e., use "Use-for-ssh:").
709709

710710

711711
@anchor{option --ssh-fingerprint-digest}
712712
@item --ssh-fingerprint-digest
713713
@opindex ssh-fingerprint-digest
714714

715715
Select the digest algorithm used to compute ssh fingerprints that are
716-
communicated to the user, e.g. in pinentry dialogs. OpenSSH has
716+
communicated to the user, e.g., in pinentry dialogs. OpenSSH has
717717
transitioned from using MD5 to the more secure SHA256.
718718

719719

@@ -819,7 +819,7 @@ It might even be advisable to change the permissions to read-only so
819819
that this file can't be changed inadvertently.
820820

821821
As a special feature a line @code{include-default} will include a global
822-
list of trusted certificates (e.g. @file{@value{SYSCONFDIR}/trustlist.txt}).
822+
list of trusted certificates (e.g., @file{@value{SYSCONFDIR}/trustlist.txt}).
823823
This global list is also used if the local list is not available;
824824
the @ref{option --no-user-trustlist} enforces the use of only
825825
this global list.
@@ -881,7 +881,7 @@ The keygrip may be prefixed with a @code{!} to disable an entry.
881881

882882
The following example lists exactly one key. Note that keys available
883883
through a OpenPGP smartcard in the active smartcard reader are
884-
implicitly added to this list; i.e. there is no need to list them.
884+
implicitly added to this list; i.e., there is no need to list them.
885885

886886
@cartouche
887887
@smallexample
@@ -914,7 +914,7 @@ a small helper script is provided to create these files (@pxref{addgnupghome}).
914914
@mansect signals
915915
@node Agent Signals
916916
@section Use of some signals
917-
A running @command{gpg-agent} may be controlled by signals, i.e. using
917+
A running @command{gpg-agent} may be controlled by signals, i.e., using
918918
the @command{kill} command to send a signal to the process.
919919

920920
Here is a list of supported signals:
@@ -1396,7 +1396,7 @@ convention either the hexified fingerprint of the key shall be used for
13961396
calling application and a colon: Like @code{gpg:somestring}.
13971397

13981398
@var{error_message} is either a single @code{X} for no error message or
1399-
a string to be shown as an error message like (e.g. "invalid
1399+
a string to be shown as an error message like (e.g., "invalid
14001400
passphrase"). Blanks must be percent escaped or replaced by @code{+}'.
14011401

14021402
@var{prompt} is either a single @code{X} for a default prompt or the

0 commit comments

Comments
 (0)