summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDeon Lackey <dlackey@redhat.com>2010-08-18 10:18:24 -0400
committerDeon Lackey <dlackey@redhat.com>2010-08-18 10:18:24 -0400
commitfb7ada2c29e9741a589ff75fbe0592322e54f437 (patch)
treeb0620459f13ce9425c2314f4faf55b9dc236302f
parent7d75b501ab7cf6957ab5d2862cfb1b3c34797b01 (diff)
downloadrepo-fb7ada2c29e9741a589ff75fbe0592322e54f437.tar.gz
repo-fb7ada2c29e9741a589ff75fbe0592322e54f437.tar.xz
repo-fb7ada2c29e9741a589ff75fbe0592322e54f437.zip
latest build
-rw-r--r--certutil.112
-rw-r--r--certutil.html14
2 files changed, 13 insertions, 13 deletions
diff --git a/certutil.1 b/certutil.1
index 7cfb38a..f6674ba 100644
--- a/certutil.1
+++ b/certutil.1
@@ -108,7 +108,7 @@ Display a list of the options and arguments used by the Certificate Database Too
.B -K
.IP
-List the keyID of keys in the key database. A keyID is the modulus of the RSA key or the publicValue of the DSA key. IDs are displayed in hexadecimal ("0x" is not shown).
+List the key ID of keys in the key database. A key ID is the modulus of the RSA key or the publicValue of the DSA key. IDs are displayed in hexadecimal ("0x" is not shown).
.TP
.B -L
@@ -536,7 +536,7 @@ X.509 certificate extensions are described in RFC 5280.
.B -3
.IP
-Add an authority keyID extension to a certificate that is being created or added to a database. This extension supports the identification of a particular certificate, from among multiple certificates associated with one subject name, as the correct issuer of a certificate. The Certificate Database Tool will prompt you to select the authority keyID extension.
+Add an authority key ID extension to a certificate that is being created or added to a database. This extension supports the identification of a particular certificate, from among multiple certificates associated with one subject name, as the correct issuer of a certificate. The Certificate Database Tool will prompt you to select the authority key ID extension.
.IP
X.509 certificate extensions are described in RFC 5280.
@@ -745,7 +745,7 @@ command options requires four arguments:
.PP
*
.B -k
-to specify either the key type to generate or, when renewing a certificate, the exisitng key pair to use
+to specify either the key type to generate or, when renewing a certificate, the existing key pair to use
.PP
*
@@ -864,7 +864,7 @@ Key pairs are generated automatically with a certificate request or certificate,
command option.
.nf
-certutil -G -d directory | -h tokenname -k key-type -g key-size [-y exponent-value] -q pgfile|curve-name
+certutil -G -d directory | -h tokenname -k key-type -g key-size [-y exponent-value] -q pqgfile|curve-name
.fi
.PP
@@ -938,7 +938,7 @@ nI7q5n1USM3eWQlVXw==
.B Listing Keys
.PP
-Keys are the orignal material used to encrypt certificate data. The keys generated for certificates are stored separately, in the
+Keys are the original material used to encrypt certificate data. The keys generated for certificates are stored separately, in the
.B key3.db
database.
@@ -1102,7 +1102,7 @@ Certificates can be issued in
.I chains
because every certificate authority itself has a certificate; when a CA issues a certificate, it essentially stamps that certificate with its own fingerprint. The
.B -O
-prints the full chain of a certificate, going from the intial CA (the root CA) through ever intermediary CA to the actual certificate. For example, for an email certificate with two CAs in the chain:
+prints the full chain of a certificate, going from the initial CA (the root CA) through ever intermediary CA to the actual certificate. For example, for an email certificate with two CAs in the chain:
.nf
$ certutil -d . -O -n "jsmith@example.com"
diff --git a/certutil.html b/certutil.html
index ded3e44..e9510fe 100644
--- a/certutil.html
+++ b/certutil.html
@@ -154,7 +154,7 @@ Display a list of the options and arguments used by the Certificate Database Too
<DD>
<P>
<DT><DD>
-List the keyID of keys in the key database. A keyID is the modulus of the RSA key or the publicValue of the DSA key. IDs are displayed in hexadecimal (&quot;0x&quot; is not shown).
+List the key ID of keys in the key database. A key ID is the modulus of the RSA key or the publicValue of the DSA key. IDs are displayed in hexadecimal (&quot;0x&quot; is not shown).
<P>
<DT><B>-L </B>
@@ -661,7 +661,7 @@ X.509 certificate extensions are described in RFC 5280.
<DD>
<P>
<DT><DD>
-Add an authority keyID extension to a certificate that is being created or added to a database. This extension supports the identification of a particular certificate, from among multiple certificates associated with one subject name, as the correct issuer of a certificate. The Certificate Database Tool will prompt you to select the authority keyID extension.
+Add an authority key ID extension to a certificate that is being created or added to a database. This extension supports the identification of a particular certificate, from among multiple certificates associated with one subject name, as the correct issuer of a certificate. The Certificate Database Tool will prompt you to select the authority key ID extension.
<DT><DD>
X.509 certificate extensions are described in RFC 5280.
<P>
@@ -909,7 +909,7 @@ command options requires four arguments:
*
<B>-k</B>
-to specify either the key type to generate or, when renewing a certificate, the exisitng key pair to use
+to specify either the key type to generate or, when renewing a certificate, the existing key pair to use
<TT>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</TT><BR>
<P>
@@ -1065,7 +1065,7 @@ Key pairs are generated automatically with a certificate request or certificate,
command option.
<TT>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</TT><BR>
<PRE>
-certutil -G -d directory | -h tokenname -k key-type -g key-size [-y exponent-value] -q pgfile|curve-name
+certutil -G -d directory | -h tokenname -k key-type -g key-size [-y exponent-value] -q pqgfile|curve-name
</PRE>
<P>
@@ -1157,7 +1157,7 @@ nI7q5n1USM3eWQlVXw==
<P>
<P>
-Keys are the orignal material used to encrypt certificate data. The keys generated for certificates are stored separately, in the
+Keys are the original material used to encrypt certificate data. The keys generated for certificates are stored separately, in the
<B>key3.db</B>
database.
@@ -1382,7 +1382,7 @@ Certificates can be issued in
because every certificate authority itself has a certificate; when a CA issues a certificate, it essentially stamps that certificate with its own fingerprint. The
<B>-O</B>
-prints the full chain of a certificate, going from the intial CA (the root CA) through ever intermediary CA to the actual certificate. For example, for an email certificate with two CAs in the chain:
+prints the full chain of a certificate, going from the initial CA (the root CA) through ever intermediary CA to the actual certificate. For example, for an email certificate with two CAs in the chain:
<TT>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</TT><BR>
<PRE>
$ certutil -d . -O -n &quot;<A HREF="mailto:jsmith@example.com">jsmith@example.com</A>&quot;
@@ -1574,6 +1574,6 @@ Authors: Elio Maldonado &lt;<A HREF="mailto:emaldona@redhat.com">emaldona@redhat
This document was created by
<A HREF="http://localhost/cgi-bin/man/man2html">man2html</A>,
using the manual pages.<BR>
-Time: 13:50:25 GMT, August 18, 2010
+Time: 14:16:44 GMT, August 18, 2010
</BODY>
</HTML>