From 7d75b501ab7cf6957ab5d2862cfb1b3c34797b01 Mon Sep 17 00:00:00 2001 From: Deon Lackey Date: Wed, 18 Aug 2010 10:15:52 -0400 Subject: spell checked --- certutil.xml | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/certutil.xml b/certutil.xml index 734003a..d0e04e9 100644 --- a/certutil.xml +++ b/certutil.xml @@ -94,7 +94,7 @@ When you delete keys, be sure to also remove any certificates associated with th -K - List the keyID of keys in the key database. A keyID is the modulus of the RSA key or the publicValue of the DSA key. IDs are displayed in hexadecimal ("0x" is not shown). + List the key ID of keys in the key database. A key ID is the modulus of the RSA key or the publicValue of the DSA key. IDs are displayed in hexadecimal ("0x" is not shown). @@ -414,7 +414,7 @@ the default and create a validity period of one month. -3 - Add an authority keyID extension to a certificate that is being created or added to a database. This extension supports the identification of a particular certificate, from among multiple certificates associated with one subject name, as the correct issuer of a certificate. The Certificate Database Tool will prompt you to select the authority keyID extension. + Add an authority key ID extension to a certificate that is being created or added to a database. This extension supports the identification of a particular certificate, from among multiple certificates associated with one subject name, as the correct issuer of a certificate. The Certificate Database Tool will prompt you to select the authority key ID extension. X.509 certificate extensions are described in RFC 5280. @@ -589,7 +589,7 @@ the default and create a validity period of one month. The command options requires four arguments: - * to specify either the key type to generate or, when renewing a certificate, the exisitng key pair to use + * to specify either the key type to generate or, when renewing a certificate, the existing key pair to use * to set the keysize of the key to generate @@ -661,7 +661,7 @@ qmtyQNjIi1F8c1Z+TL4uFYlMg8z6LG/J/u1E5t1QqB5e9Q4+BhRbrQjRR1JZx3tB Key pairs are generated automatically with a certificate request or certificate, but they can also be generated independently using the command option. -certutil -G -d directory | -h tokenname -k key-type -g key-size [-y exponent-value] -q pgfile|curve-name +certutil -G -d directory | -h tokenname -k key-type -g key-size [-y exponent-value] -q pqgfile|curve-name For example: @@ -710,7 +710,7 @@ nI7q5n1USM3eWQlVXw== Listing Keys - Keys are the orignal material used to encrypt certificate data. The keys generated for certificates are stored separately, in the key3.db database. + Keys are the original material used to encrypt certificate data. The keys generated for certificates are stored separately, in the key3.db database. To list all keys in the database, use the command option and the (required) argument to give the path to the directory. @@ -791,7 +791,7 @@ certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Printing the Certificate Chain - Certificates can be issued in chains because every certificate authority itself has a certificate; when a CA issues a certificate, it essentially stamps that certificate with its own fingerprint. The prints the full chain of a certificate, going from the intial CA (the root CA) through ever intermediary CA to the actual certificate. For example, for an email certificate with two CAs in the chain: + Certificates can be issued in chains because every certificate authority itself has a certificate; when a CA issues a certificate, it essentially stamps that certificate with its own fingerprint. The prints the full chain of a certificate, going from the initial CA (the root CA) through ever intermediary CA to the actual certificate. For example, for an email certificate with two CAs in the chain: $ certutil -d . -O -n "jsmith@example.com" "Builtin Object Token:Thawte Personal Freemail CA" [E=personal-freemail@thawte.com,CN=Thawte Personal Freemail CA,OU=Certification Services Division,O=Thawte Consulting,L=Cape Town,ST=Western Cape,C=ZA] -- cgit