Commit 4a9b6178 authored by Andreas Gustafsson's avatar Andreas Gustafsson
Browse files

incorrect use of plural

parent 761a1c37
...@@ -14,7 +14,7 @@ ...@@ -14,7 +14,7 @@
.\" NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION .\" NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
.\" WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" .\"
.\" $Id: dnssec-keygen.8,v 1.4 2000/07/26 00:47:13 bwelling Exp $ .\" $Id: dnssec-keygen.8,v 1.5 2000/07/26 18:52:05 gson Exp $
.\" .\"
.Dd Jun 30, 2000 .Dd Jun 30, 2000
.Dt DNSSEC-KEYGEN 8 .Dt DNSSEC-KEYGEN 8
...@@ -79,7 +79,7 @@ The argument identifying the encryption algorithm is case-insensitive. ...@@ -79,7 +79,7 @@ The argument identifying the encryption algorithm is case-insensitive.
DNSSEC specifies DSA as a mandatory algorithm and RSA as a recommended one. DNSSEC specifies DSA as a mandatory algorithm and RSA as a recommended one.
Implementations of TSIG must support HMAC-MD5. Implementations of TSIG must support HMAC-MD5.
.Pp .Pp
The number of bits in the key are determined by the The number of bits in the key is determined by the
.Ar keysize .Ar keysize
argument following the argument following the
.Fl b .Fl b
......
...@@ -14,7 +14,7 @@ ...@@ -14,7 +14,7 @@
.\" NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION .\" NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
.\" WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" .\"
.\" $Id: dnssec-keygen.8,v 1.4 2000/07/26 00:47:13 bwelling Exp $ .\" $Id: dnssec-keygen.8,v 1.5 2000/07/26 18:52:05 gson Exp $
.\" .\"
.Dd Jun 30, 2000 .Dd Jun 30, 2000
.Dt DNSSEC-KEYGEN 8 .Dt DNSSEC-KEYGEN 8
...@@ -79,7 +79,7 @@ The argument identifying the encryption algorithm is case-insensitive. ...@@ -79,7 +79,7 @@ The argument identifying the encryption algorithm is case-insensitive.
DNSSEC specifies DSA as a mandatory algorithm and RSA as a recommended one. DNSSEC specifies DSA as a mandatory algorithm and RSA as a recommended one.
Implementations of TSIG must support HMAC-MD5. Implementations of TSIG must support HMAC-MD5.
.Pp .Pp
The number of bits in the key are determined by the The number of bits in the key is determined by the
.Ar keysize .Ar keysize
argument following the argument following the
.Fl b .Fl b
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment