Module Name: src
Committed By: wiz
Date: Thu May 21 09:21:35 UTC 2009
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/bin: netpgp.1
Log Message:
New sentence, new line. Add ".An -nosplit" to AUTHORS section for better
formatting. Mark up filenames with .Pa. Remove trailing whitespace. Try
only using mdoc macros. Some other minor nits fixed.
To generate a diff of this commit:
cvs rdiff -u -r1.10 -r1.11 \
src/crypto/external/bsd/netpgp/dist/src/bin/netpgp.1
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: src/crypto/external/bsd/netpgp/dist/src/bin/netpgp.1
diff -u src/crypto/external/bsd/netpgp/dist/src/bin/netpgp.1:1.10 src/crypto/external/bsd/netpgp/dist/src/bin/netpgp.1:1.11
--- src/crypto/external/bsd/netpgp/dist/src/bin/netpgp.1:1.10 Thu May 21 00:33:31 2009
+++ src/crypto/external/bsd/netpgp/dist/src/bin/netpgp.1 Thu May 21 09:21:35 2009
@@ -1,4 +1,4 @@
-.\" $NetBSD: netpgp.1,v 1.10 2009/05/21 00:33:31 agc Exp $
+.\" $NetBSD: netpgp.1,v 1.11 2009/05/21 09:21:35 wiz Exp $
.\"
.\" Copyright (c) 2009 The NetBSD Foundation, Inc.
.\" All rights reserved.
@@ -42,7 +42,7 @@
.Fl Fl decrypt
.Op options
.Ar file ...
-.sp
+.Pp
.Nm
.Fl Fl sign
.Op Fl Fl armor
@@ -63,9 +63,9 @@
.Fl Fl clearsign
.Op options
.Ar file ...
-.sp
+.Pp
.Nm
-.Fl Fl export-key ,
+.Fl Fl export-key
.Op options
.Ar file ...
.Nm
@@ -81,17 +81,17 @@
.Op options
.Ar file ...
.Nm
-.Fl Fl list-keys
+.Fl Fl list-keys
.Op options
.Ar file ...
-.sp
+.Pp
.Nm
.Fl Fl list-packets
.Nm
.Fl Fl version
-.sp
+.Pp
where the options for all commands are:
-.sp
+.Pp
.Op Fl Fl homedir Ns = Ns Ar home-directory
.br
.Op Fl Fl keyring Ns = Ns Ar keyring
@@ -115,7 +115,7 @@
who created the identity.
The secret key is protected with a passphrase.
.Pp
-In rough terms, a digital signature
+In rough terms, a digital signature
is a digest of a file's contents,
encrypted with the user's private key.
Since together, the private and public keys identify the user
@@ -125,7 +125,8 @@
.Pp
As a corollary, the file can be transformed using a user's public key,
into text such that the contents can only be viewed by someone
-with the corresponding private key. This is called encryption.
+with the corresponding private key.
+This is called encryption.
.Pp
The
.Nm
@@ -141,7 +142,8 @@
.Fl Fl export-key ,
.Fl Fl find-key ,
.Fl Fl generate-key ,
-.Fl Fl import-key , and
+.Fl Fl import-key ,
+and
.Fl Fl list-keys .
Keyrings are collections of public keys belonging to other users.
By using other means of identification, it is possible to establish
@@ -239,7 +241,7 @@
This option, however it is spelled, wraps the signature as an
ASCII-encoded piece of text, for ease of use.
.It Fl Fl detached
-when signing a file, place the resulting signature in a separate
+When signing a file, place the resulting signature in a separate
file from the one being signed.
.It Fl Fl hash-alg Ar hash-algorithm
can be used to specify the hash algorithm (sometimes called
@@ -271,7 +273,7 @@
be reviewed, and increased when it becomes easier to factor 2048
bit numbers.
.It Fl Fl output
-specifies a filename to which verified otuput from a signed file
+specifies a filename to which verified output from a signed file
may be redirected.
The default is to send the verified output to stdout,
and this may also be specified using the
@@ -320,7 +322,6 @@
a person's identity, and since identity theft can have
far-reaching consequences, users are strongly encouraged to
enter their pass phrases only when prompted by the application.
-.Pp
.Sh SIGNING AND VERIFICATION
Signing and verification of a file is best viewed using the following example:
.Bd -literal
@@ -345,13 +346,13 @@
.Ed
.Pp
In the example above, a signature is made on a single file called
-.Dq a
+.Dq Pa a
using a user identity corresponding to
.Dq [email protected]
The key located for the user identity is displayed, and
the user is prompted to type in their passphrase.
The resulting file, called
-.Dq a.gpg
+.Dq Pa a.gpg
is placed in the same directory.
The second part of the example shows a verification of the signed file
taking place.
@@ -360,10 +361,10 @@
In both cases, the exit value from the utility was a successful one.
.Pp
If a detached signature of a file called
-.Dq a
+.Dq Pa a
is requested, the signature would be placed
in a file called
-.Dq a.sig .
+.Dq Pa a.sig .
.Pp
To encrypt a file, the user's public key is used.
Subsequent decryption of the file requires that the secret
@@ -405,6 +406,7 @@
command first appeared in
.Nx 6.0 .
.Sh AUTHORS
+.An -nosplit
.An Ben Laurie ,
.An Rachel Willmer ,
and overhauled and rewritten by