From 318b3f8c98133f07d68ac2d29a5b8dbe26f1c44f Mon Sep 17 00:00:00 2001 From: phk Date: Sun, 1 Dec 2002 15:57:02 +0000 Subject: De-danglify the manual page. Submitted by: ceri Approved by: re (blanket) --- sbin/gbde/gbde.8 | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) (limited to 'sbin/gbde/gbde.8') diff --git a/sbin/gbde/gbde.8 b/sbin/gbde/gbde.8 index 0377459..8ef0425 100644 --- a/sbin/gbde/gbde.8 +++ b/sbin/gbde/gbde.8 @@ -76,7 +76,7 @@ and analysis by qualified cryptographers and therefore should be considered a slightly suspect experimental facility. .Pp We cannot at this point guarantee that the on-disk format will not change -in response to reviews or bug-fixes, so potential users are adviced to +in response to reviews or bug-fixes, so potential users are advised to be prepared that .Xr dump 8 Ns / Ns .Xr restore 8 @@ -116,8 +116,8 @@ specifies the lock selector file for the key modified with the .Pp The .Fl n Ar key -argument can be used to specify which of the four keys -to which the operation applies. +argument can be used to specify to which of the four keys +the operation applies. A value of 1 to 4 selects the specified key, a value of 0 (the default) means .Dq "this key" @@ -137,7 +137,7 @@ of the parameters can be interactively edited. The .Fl p Ar pass-phrase argument -specifies the pass-phrase used to opening the device. +specifies the pass-phrase used for opening the device. If not specified, the controlling terminal will be used to prompt the user for the pass-phrase. Be aware that using this option may expose the pass-phrase to other @@ -161,7 +161,7 @@ users who happen to run or similar while the command is running. .Sh EXAMPLES To initialize a device, using default parameters: -.Dl # gbde init /dev/ad0s1f -l /etc/ad0s1f.lock +.Dl # gbde init /dev/ad0s1f -L /etc/ad0s1f.lock .Pp To attach an encrypted device: .Dl # gbde attach ad0s1f -l /etc/ad0s1f.lock @@ -191,5 +191,5 @@ DARPA CHATS research program. .Sh AUTHORS .An "Poul-Henning Kamp" Aq phk@FreeBSD.org .Sh BUGS -The cryptographic algorithms and the overall design has not been +The cryptographic algorithms and the overall design have not been attacked mercilessly for over 10 years by a gang or cryptoanalysts. -- cgit v1.1