@@ -180,7 +180,7 @@ available flags the sole word "help" can be used.
180
180
This option is only useful for testing; it sets the system time back or
181
181
forth to @var {epoch } which is the number of seconds elapsed since the year
182
182
1970. Alternatively @var {epoch } may be given as a full ISO time string
183
- (e.g. "20070924T154812").
183
+ (e.g., "20070924T154812").
184
184
185
185
@item -- debug-level @var {level }
186
186
@opindex debug-level
@@ -213,7 +213,7 @@ however carefully selected to best aid in debugging.
213
213
@item -- debug @var {flags }
214
214
@opindex debug
215
215
Set debug flags. All flags are or-ed and @var {flags } may be given in
216
- C syntax (e.g. 0x0042) or as a comma separated list of flag names. To
216
+ C syntax (e.g., 0x0042) or as a comma separated list of flag names. To
217
217
get a list of all supported flags the single word "help" can be used.
218
218
This option is only useful for debugging and the behavior may change
219
219
at any time without notice.
@@ -374,7 +374,7 @@ there for details; here is an example:
374
374
as given. Replace USERNAME, PASSWORD, and the 'dc' parts
375
375
according to the instructions received from your LDAP
376
376
administrator. Note that only simple authentication
377
- (i.e. cleartext passwords) is supported and thus using ldaps is
377
+ (i.e., cleartext passwords) is supported and thus using ldaps is
378
378
strongly suggested (since 2.2.28 "ldaps" defaults to port 389
379
379
and uses STARTTLS). On Windows authentication via AD can be
380
380
requested by adding @code {gpgNtds=1 } after the fourth question
@@ -465,7 +465,7 @@ Lines starting with a @samp{#} are comments.
465
465
Note that as usual all strings entered are expected to be UTF-8 encoded.
466
466
Obviously this will lead to problems if the password has originally been
467
467
encoded as Latin-1. There is no other solution here than to put such a
468
- password in the binary encoding into the file (i.e. non-ascii characters
468
+ password in the binary encoding into the file (i.e., non-ascii characters
469
469
won't show up readable).@footnote {The @command {gpgconf } tool might be
470
470
helpful for frontends as it enables editing this configuration file using
471
471
percent-escaped strings. }
@@ -681,7 +681,7 @@ those certificates on startup and when given a SIGHUP. Certificates
681
681
which are not readable or do not make up a proper X.509 certificate
682
682
are ignored; see the log file for details.
683
683
684
- Applications using dirmngr (e.g. gpgsm) can request these
684
+ Applications using dirmngr (e.g., gpgsm) can request these
685
685
certificates to complete a trust chain in the same way as with the
686
686
extra-certs directory (see below).
687
687
@@ -690,7 +690,7 @@ Note that for OCSP responses the certificate specified using the option
690
690
691
691
@item /etc/gnupg/extra-certs
692
692
This directory may contain extra certificates which are preloaded
693
- into the internal cache on startup. Applications using dirmngr (e.g. gpgsm)
693
+ into the internal cache on startup. Applications using dirmngr (e.g., gpgsm)
694
694
can request cached certificates to complete a trust chain.
695
695
This is convenient in cases you have a couple intermediate CA certificates
696
696
or certificates usually used to sign OCSP responses.
@@ -799,7 +799,7 @@ Enter @code{HELP} at the prompt to see a list of commands and enter
799
799
@node Dirmngr Signals
800
800
@section Use of signals
801
801
802
- A running @command {dirmngr } may be controlled by signals, i.e. using
802
+ A running @command {dirmngr } may be controlled by signals, i.e., using
803
803
the @command {kill } command to send a signal to the process.
804
804
805
805
Here is a list of supported signals:
@@ -1031,7 +1031,7 @@ includes a local certificate store as well as a list of trusted root
1031
1031
certificates.
1032
1032
1033
1033
@noindent
1034
- The return code is 0 for success; i.e. the certificate has not been
1034
+ The return code is 0 for success; i.e., the certificate has not been
1035
1035
revoked or one of the usual error codes from libgpg-error.
1036
1036
1037
1037
@node Dirmngr CHECKOCSP
@@ -1066,7 +1066,7 @@ of the global option @option{--ignore-ocsp-service-url}.
1066
1066
1067
1067
1068
1068
@noindent
1069
- The return code is 0 for success; i.e. the certificate has not been
1069
+ The return code is 0 for success; i.e., the certificate has not been
1070
1070
revoked or one of the usual error codes from libgpg-error.
1071
1071
1072
1072
@node Dirmngr CACHECERT
@@ -1088,7 +1088,7 @@ Thus the caller is expected to return the certificate for the request
1088
1088
as a binary blob.
1089
1089
1090
1090
@noindent
1091
- The return code is 0 for success; i.e. the certificate has not been
1091
+ The return code is 0 for success; i.e., the certificate has not been
1092
1092
successfully cached or one of the usual error codes from libgpg-error.
1093
1093
1094
1094
@node Dirmngr VALIDATE
@@ -1188,7 +1188,7 @@ as a binary blob.
1188
1188
@c does not yet end up in memory.
1189
1189
@c * @code{crl_cache_insert} is called with that descriptor to
1190
1190
@c actually read the CRL into the cache. See below for a
1191
- @c description of this function. If there is any error (e.g. read
1191
+ @c description of this function. If there is any error (e.g., read
1192
1192
@c problem, CRL not correctly signed or verification of signature
1193
1193
@c not possible), this descriptor is rejected and we continue
1194
1194
@c with the next name. If the CRL has been successfully loaded,
@@ -1214,7 +1214,7 @@ as a binary blob.
1214
1214
@c a) An authorityKeyIdentifier with an issuer and serialno exits: The
1215
1215
@c certificate is retrieved using @code{find_cert_bysn}. If
1216
1216
@c the certificate is in the certificate cache, it is directly
1217
- @c returned. Then the requester (i.e. the client who requested the
1217
+ @c returned. Then the requester (i.e., the client who requested the
1218
1218
@c CRL check) is asked via the Assuan inquiry ``SENDCERT'' whether
1219
1219
@c he can provide this certificate. If this succeed the returned
1220
1220
@c certificate gets cached and returned. Note, that dirmngr does not
@@ -1293,7 +1293,7 @@ as a binary blob.
1293
1293
@c expiration time of all certificates in the chain.
1294
1294
@c
1295
1295
@c We first check that the certificate may be used for the requested
1296
- @c purpose (i.e. OCSP or CRL signing). If this is not the case
1296
+ @c purpose (i.e., OCSP or CRL signing). If this is not the case
1297
1297
@c GPG_ERR_WRONG_KEY_USAGE is returned.
1298
1298
@c
1299
1299
@c The next step is to find the trust anchor (root certificate) and to
@@ -1317,7 +1317,7 @@ as a binary blob.
1317
1317
@c Now the issuer's certificate is looked up: If an
1318
1318
@c authorityKeyIdentifier is available, this one is used to locate the
1319
1319
@c certificate either using issuer and serialnumber or subject DN
1320
- @c (i.e. the issuer's DN) and the keyID. The functions
1320
+ @c (i.e., the issuer's DN) and the keyID. The functions
1321
1321
@c @code{find_cert_bysn) and @code{find_cert_bysubject} are used
1322
1322
@c respectively. The have already been described above under the
1323
1323
@c description of @code{crl_cache_insert}. If no certificate was found
@@ -1331,13 +1331,13 @@ as a binary blob.
1331
1331
@c actual certificate is checked and in case this fails the error
1332
1332
@c #code{GPG_ERR_BAD_CERT_CHAIN} is returned. If the signature checks out, the
1333
1333
@c maximum chain length of the issuing certificate is checked as well as
1334
- @c the capability of the certificate (i.e. whether he may be used for
1334
+ @c the capability of the certificate (i.e., whether he may be used for
1335
1335
@c certificate signing). Then the certificate is prepended to our list
1336
1336
@c representing the certificate chain. Finally the loop is continued now
1337
1337
@c with the issuer's certificate as the current certificate.
1338
1338
@c
1339
1339
@c After the end of the loop and if no error as been encountered
1340
- @c (i.e. the certificate chain has been assempled correctly), a check is
1340
+ @c (i.e., the certificate chain has been assempled correctly), a check is
1341
1341
@c done whether any certificate expired or a critical policy has not been
1342
1342
@c met. In any of these cases the validation terminates with an
1343
1343
@c appropriate error.
0 commit comments