aboutsummaryrefslogtreecommitdiffstats
path: root/doc/specify-user-id.texi
diff options
context:
space:
mode:
authorDavid Shaw <[email protected]>2007-01-18 18:52:24 +0000
committerDavid Shaw <[email protected]>2007-01-18 18:52:24 +0000
commit09bc5abc9248660e637a5240ed99419b5f9d1322 (patch)
tree92fc9a394e57deee001e8f1f5044652c29c8ed78 /doc/specify-user-id.texi
parent* gpg.texi (GPG Configuration Options): Make http_proxy option (diff)
downloadgnupg-09bc5abc9248660e637a5240ed99419b5f9d1322.tar.gz
gnupg-09bc5abc9248660e637a5240ed99419b5f9d1322.zip
* gpg.texi, specify-user-id.texi: Only some of the mentions of
exclamation marks have an example. Give examples to the rest.
Diffstat (limited to 'doc/specify-user-id.texi')
-rw-r--r--doc/specify-user-id.texi8
1 files changed, 4 insertions, 4 deletions
diff --git a/doc/specify-user-id.texi b/doc/specify-user-id.texi
index 7643f93ec..0b615b657 100644
--- a/doc/specify-user-id.texi
+++ b/doc/specify-user-id.texi
@@ -12,8 +12,8 @@ This format is deduced from the length of the string and its content or
of its SHA-1 fingerprint. The use of key Ids is just a shortcut, for
all automated processing the fingerprint should be used.
-When using @command{gpg} an exclamation mark may be appended to force
-using the specified primary or secondary key and not to try and
+When using @command{gpg} an exclamation mark (!) may be appended to
+force using the specified primary or secondary key and not to try and
calculate which primary or secondary key to use.
The last four lines of the example give the key ID in their long form as
@@ -42,8 +42,8 @@ the @code{0x} prefix. Note, that only the 20 byte version fingerprint
is available with @command{gpgsm} (i.e. the SHA-1 hash of the
certificate).
-When using @command{gpg} an exclamation mark may be appended to force
-using the specified primary or secondary key and not to try and
+When using @command{gpg} an exclamation mark (!) may be appended to
+force using the specified primary or secondary key and not to try and
calculate which primary or secondary key to use.
The best way to specify a key Id is by using the fingerprint. This