diff options
author | Daniel Kahn Gillmor <[email protected]> | 2016-09-15 18:21:15 +0000 |
---|---|---|
committer | NIIBE Yutaka <[email protected]> | 2016-09-17 07:00:37 +0000 |
commit | 0d67241e317b172a258a910c02d90639e2b08fce (patch) | |
tree | f1f68c8a94af20f1a3273da46633c7f8af750bc4 /doc/gpgsm.texi | |
parent | move some file encodings to UTF-8 (diff) | |
download | gnupg-0d67241e317b172a258a910c02d90639e2b08fce.tar.gz gnupg-0d67241e317b172a258a910c02d90639e2b08fce.zip |
Fix more spelling
* NEWS, acinclude.m4, agent/command-ssh.c, agent/command.c,
agent/gpg-agent.c, agent/keyformat.txt, agent/protect-tool.c,
common/asshelp.c, common/b64enc.c, common/recsel.c, doc/DETAILS,
doc/HACKING, doc/Notes, doc/TRANSLATE, doc/dirmngr.texi,
doc/faq.org, doc/gpg-agent.texi, doc/gpg.texi, doc/gpgsm.texi,
doc/instguide.texi, g10/armor.c, g10/gpg.c, g10/keyedit.c,
g10/mainproc.c, g10/pkclist.c, g10/tofu.c, g13/sh-cmd.c,
g13/sh-dmcrypt.c, kbx/keybox-init.c, m4/pkg.m4, sm/call-dirmngr.c,
sm/gpgsm.c, tests/Makefile.am, tests/gpgscm/Manual.txt,
tests/gpgscm/scheme.c, tests/openpgp/gpgv-forged-keyring.scm,
tests/openpgp/multisig.test, tests/openpgp/verify.scm,
tests/pkits/README, tools/applygnupgdefaults,
tools/gpg-connect-agent.c, tools/mime-maker.c, tools/mime-parser.c:
minor spelling cleanup.
Signed-off-by: Daniel Kahn Gillmor <[email protected]>
Diffstat (limited to 'doc/gpgsm.texi')
-rw-r--r-- | doc/gpgsm.texi | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/doc/gpgsm.texi b/doc/gpgsm.texi index 7cee0f35f..c632ce739 100644 --- a/doc/gpgsm.texi +++ b/doc/gpgsm.texi @@ -852,7 +852,7 @@ updated; new distributions of this software should come with an updated list but it is still the responsibility of the Administrator to check that this list is correct. -Everytime @command{gpgsm} uses a certificate for signing or verification +Every time @command{gpgsm} uses a certificate for signing or verification this file will be consulted to check whether the certificate under question has ultimately been issued by one of these CAs. If this is the case the user will be informed that the verified signature represents a @@ -1110,7 +1110,7 @@ certificate signing request): @item Serial: @var{sn} If this parameter is given an X.509 certificate will be generated. @var{sn} is expected to be a hex string representing an unsigned -integer of arbitary length. The special value @samp{random} can be +integer of arbitrary length. The special value @samp{random} can be used to create a 64 bit random serial number. @item Issuer-DN: @var{issuer-name} |