Punctuation fixes.
This commit is contained in:
parent
624f3e364c
commit
de2728383c
|
@ -1,4 +1,4 @@
|
||||||
.\" $NetBSD: racoon.conf.5,v 1.17 2003/06/27 22:31:29 wiz Exp $
|
.\" $NetBSD: racoon.conf.5,v 1.18 2003/07/04 12:31:33 wiz Exp $
|
||||||
.\" $KAME: racoon.conf.5,v 1.101 2002/07/17 03:43:38 sakane Exp $
|
.\" $KAME: racoon.conf.5,v 1.101 2002/07/17 03:43:38 sakane Exp $
|
||||||
.\"
|
.\"
|
||||||
.\" Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
|
.\" Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
|
||||||
|
@ -303,7 +303,7 @@ specifies a certificate specification.
|
||||||
.Ar certspec
|
.Ar certspec
|
||||||
is one of followings:
|
is one of followings:
|
||||||
.Bl -tag -width Ds -compact
|
.Bl -tag -width Ds -compact
|
||||||
.It Ic x509 Ar certfile Ar privkeyfile;
|
.It Ic x509 Ar certfile Ar privkeyfile ;
|
||||||
.Ar certfile
|
.Ar certfile
|
||||||
means a file name of certificate.
|
means a file name of certificate.
|
||||||
.Ar privkeyfile
|
.Ar privkeyfile
|
||||||
|
@ -445,7 +445,7 @@ is one of following:
|
||||||
for oakley.
|
for oakley.
|
||||||
For other transforms, this statement should not be used.
|
For other transforms, this statement should not be used.
|
||||||
.\"
|
.\"
|
||||||
.It Ic hash_algorithm Ar algorithm;
|
.It Ic hash_algorithm Ar algorithm ;
|
||||||
define the hash algorithm used for the phase 1 negotiation.
|
define the hash algorithm used for the phase 1 negotiation.
|
||||||
This directive must be defined.
|
This directive must be defined.
|
||||||
.Ar algorithm
|
.Ar algorithm
|
||||||
|
@ -495,7 +495,7 @@ will obey the policy configured into the kernel by
|
||||||
and will construct phase 2 proposals by combining
|
and will construct phase 2 proposals by combining
|
||||||
.Ic sainfo
|
.Ic sainfo
|
||||||
specifications in
|
specifications in
|
||||||
.Nm Ns ,
|
.Nm ,
|
||||||
and policies in the kernel.
|
and policies in the kernel.
|
||||||
.\"
|
.\"
|
||||||
.Ss Sainfo Specifications
|
.Ss Sainfo Specifications
|
||||||
|
@ -566,7 +566,7 @@ will compute the actual phase 2 proposals by computing
|
||||||
the permutation of the specified algorithms,
|
the permutation of the specified algorithms,
|
||||||
and then combining them with the security protocol specified by the SPD.
|
and then combining them with the security protocol specified by the SPD.
|
||||||
For example, if
|
For example, if
|
||||||
.Ic des, 3des, hmac_md5,
|
.Ic des , 3des , hmac_md5 ,
|
||||||
and
|
and
|
||||||
.Ic hmac_sha1
|
.Ic hmac_sha1
|
||||||
are specified as algorithms, we have four combinations for use with ESP,
|
are specified as algorithms, we have four combinations for use with ESP,
|
||||||
|
|
Loading…
Reference in New Issue