Module Name:    src
Committed By:   wiz
Date:           Thu May 21 09:21:35 UTC 2009

Modified Files:
        src/crypto/external/bsd/netpgp/dist/src/bin: netpgp.1

Log Message:
New sentence, new line. Add ".An -nosplit" to AUTHORS section for better
formatting. Mark up filenames with .Pa. Remove trailing whitespace. Try
only using mdoc macros. Some other minor nits fixed.


To generate a diff of this commit:
cvs rdiff -u -r1.10 -r1.11 \
    src/crypto/external/bsd/netpgp/dist/src/bin/netpgp.1

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/crypto/external/bsd/netpgp/dist/src/bin/netpgp.1
diff -u src/crypto/external/bsd/netpgp/dist/src/bin/netpgp.1:1.10 src/crypto/external/bsd/netpgp/dist/src/bin/netpgp.1:1.11
--- src/crypto/external/bsd/netpgp/dist/src/bin/netpgp.1:1.10	Thu May 21 00:33:31 2009
+++ src/crypto/external/bsd/netpgp/dist/src/bin/netpgp.1	Thu May 21 09:21:35 2009
@@ -1,4 +1,4 @@
-.\" $NetBSD: netpgp.1,v 1.10 2009/05/21 00:33:31 agc Exp $
+.\" $NetBSD: netpgp.1,v 1.11 2009/05/21 09:21:35 wiz Exp $
 .\"
 .\" Copyright (c) 2009 The NetBSD Foundation, Inc.
 .\" All rights reserved.
@@ -42,7 +42,7 @@
 .Fl Fl decrypt
 .Op options
 .Ar file ...
-.sp
+.Pp
 .Nm
 .Fl Fl sign
 .Op Fl Fl armor
@@ -63,9 +63,9 @@
 .Fl Fl clearsign
 .Op options
 .Ar file ...
-.sp
+.Pp
 .Nm
-.Fl Fl export-key ,
+.Fl Fl export-key
 .Op options
 .Ar file ...
 .Nm
@@ -81,17 +81,17 @@
 .Op options
 .Ar file ...
 .Nm
-.Fl Fl list-keys 
+.Fl Fl list-keys
 .Op options
 .Ar file ...
-.sp
+.Pp
 .Nm
 .Fl Fl list-packets
 .Nm
 .Fl Fl version
-.sp
+.Pp
 where the options for all commands are:
-.sp
+.Pp
 .Op Fl Fl homedir Ns = Ns Ar home-directory
 .br
 .Op Fl Fl keyring Ns = Ns Ar keyring
@@ -115,7 +115,7 @@
 who created the identity.
 The secret key is protected with a passphrase.
 .Pp
-In rough terms, a digital signature 
+In rough terms, a digital signature
 is a digest of a file's contents,
 encrypted with the user's private key.
 Since together, the private and public keys identify the user
@@ -125,7 +125,8 @@
 .Pp
 As a corollary, the file can be transformed using a user's public key,
 into text such that the contents can only be viewed by someone
-with the corresponding private key. This is called encryption.
+with the corresponding private key.
+This is called encryption.
 .Pp
 The
 .Nm
@@ -141,7 +142,8 @@
 .Fl Fl export-key ,
 .Fl Fl find-key ,
 .Fl Fl generate-key ,
-.Fl Fl import-key , and
+.Fl Fl import-key ,
+and
 .Fl Fl list-keys .
 Keyrings are collections of public keys belonging to other users.
 By using other means of identification, it is possible to establish
@@ -239,7 +241,7 @@
 This option, however it is spelled, wraps the signature as an
 ASCII-encoded piece of text, for ease of use.
 .It Fl Fl detached
-when signing a file, place the resulting signature in a separate
+When signing a file, place the resulting signature in a separate
 file from the one being signed.
 .It Fl Fl hash-alg Ar hash-algorithm
 can be used to specify the hash algorithm (sometimes called
@@ -271,7 +273,7 @@
 be reviewed, and increased when it becomes easier to factor 2048
 bit numbers.
 .It Fl Fl output
-specifies a filename to which verified otuput from a signed file
+specifies a filename to which verified output from a signed file
 may be redirected.
 The default is to send the verified output to stdout,
 and this may also be specified using the
@@ -320,7 +322,6 @@
 a person's identity, and since identity theft can have
 far-reaching consequences, users are strongly encouraged to
 enter their pass phrases only when prompted by the application.
-.Pp
 .Sh SIGNING AND VERIFICATION
 Signing and verification of a file is best viewed using the following example:
 .Bd -literal
@@ -345,13 +346,13 @@
 .Ed
 .Pp
 In the example above, a signature is made on a single file called
-.Dq a
+.Dq Pa a
 using a user identity corresponding to
 .Dq a...@netbsd.org
 The key located for the user identity is displayed, and
 the user is prompted to type in their passphrase.
 The resulting file, called
-.Dq a.gpg
+.Dq Pa a.gpg
 is placed in the same directory.
 The second part of the example shows a verification of the signed file
 taking place.
@@ -360,10 +361,10 @@
 In both cases, the exit value from the utility was a successful one.
 .Pp
 If a detached signature of a file called
-.Dq a
+.Dq Pa a
 is requested, the signature would be placed
 in a file called
-.Dq a.sig .
+.Dq Pa a.sig .
 .Pp
 To encrypt a file, the user's public key is used.
 Subsequent decryption of the file requires that the secret
@@ -405,6 +406,7 @@
 command first appeared in
 .Nx 6.0 .
 .Sh AUTHORS
+.An -nosplit
 .An Ben Laurie ,
 .An Rachel Willmer ,
 and overhauled and rewritten by

Reply via email to