On Fri, Aug 3, 2012 at 12:00 PM, Ben Pfaff <b...@nicira.com> wrote:

> The usual manpage style is to write metasyntactic variable names in
> lowercase, so this commit adopts that consistently.
>
> Signed-off-by: Ben Pfaff <b...@nicira.com>
> ---
>  utilities/ovs-pki.8.in |   62
> ++++++++++++++++++++++++------------------------
>  1 files changed, 31 insertions(+), 31 deletions(-)
>
> diff --git a/utilities/ovs-pki.8.in b/utilities/ovs-pki.8.in
> index d63aa0a..12d003e 100644
> --- a/utilities/ovs-pki.8.in
> +++ b/utilities/ovs-pki.8.in
> @@ -11,25 +11,25 @@ ovs\-pki \- OpenFlow public key infrastructure
> management utility
>  .SH SYNOPSIS
>  Each command takes the form:
>  .sp
> -\fBovs\-pki\fR [\fIOPTIONS\fR] \fICOMMAND\fR [\fIARGS\fR]
> +\fBovs\-pki\fR [\fIoptions\fR] \fIcommand\fR [\fIargs\fR]
>  .sp
>  The implemented commands and their arguments are:
>  .br
>  \fBovs\-pki\fR \fBinit\fR
>  .br
> -\fBovs\-pki\fR \fBreq\fR \fINAME\fR
> +\fBovs\-pki\fR \fBreq\fR \fIname\fR
>  .br
> -\fBovs\-pki\fR \fBsign\fR \fINAME\fR [\fITYPE\fR]
> +\fBovs\-pki\fR \fBsign\fR \fIname\fR [\fItype\fR]
>  .br
> -\fBovs\-pki\fR \fBreq+sign\fR \fINAME\fR [\fITYPE\fR]
> +\fBovs\-pki\fR \fBreq+sign\fR \fIname\fR [\fItype\fR]
>  .br
> -\fBovs\-pki\fR \fBverify\fR \fINAME\fR [\fITYPE\fR]
> +\fBovs\-pki\fR \fBverify\fR \fIname\fR [\fItype\fR]
>  .br
> -\fBovs\-pki\fR \fBfingerprint\fR \fIFILE\fR
> +\fBovs\-pki\fR \fBfingerprint\fR \fIfile\fR
>  .br
> -\fBovs\-pki\fR \fBself\-sign\fR \fINAME\fR
> +\fBovs\-pki\fR \fBself\-sign\fR \fIname\fR
>  .sp
> -Each \fITYPE\fR above is a certificate type, either \fBswitch\fR
> +Each \fItype\fR above is a certificate type, either \fBswitch\fR
>  (default) or \fBcontroller\fR.
>  .sp
>  The available options are:
> @@ -94,14 +94,14 @@ The files \fBpki/controllerca/private/cakey.pem\fR and
>  contents that should not be exposed.
>
>  .TP
> -\fBreq\fR \fINAME\fR
> -Generates a new private key named \fINAME\fR\fB\-privkey.pem\fR and
> -corresponding certificate request named \fINAME\fR\fB\-req.pem\fR.
> +\fBreq\fR \fIname\fR
> +Generates a new private key named \fIname\fR\fB\-privkey.pem\fR and
> +corresponding certificate request named \fIname\fR\fB\-req.pem\fR.
>  The private key can be intended for use by a switch or a controller.
>
>  This command should ideally be run on the switch or controller that
>  will use the private key to identify itself.  The file
> -\fINAME\fR\fB\-req.pem\fR must be copied to the CA machine for signing
> +\fIname\fR\fB\-req.pem\fR must be copied to the CA machine for signing
>  with the \fBsign\fR command (below).
>
>  This command will output a fingerprint to stdout as its final step.
> @@ -121,14 +121,14 @@ hierarchy (but not to other files in that tree).  By
> default,
>  the \fB\-D\fR or \fB\-\^\-dsaparam\fR option (see below) may be used to
>  specify an alternate location.
>
> -\fINAME\fR\fB\-privkey.pem\fR has sensitive contents that should not be
> -exposed.  \fINAME\fR\fB\-req.pem\fR may be safely made public.
> +\fIname\fR\fB\-privkey.pem\fR has sensitive contents that should not be
> +exposed.  \fIname\fR\fB\-req.pem\fR may be safely made public.
>
>  .TP
> -\fBsign\fR \fINAME\fR [\fITYPE\fR]
> -Signs the certificate request named \fINAME\fR\fB\-req.pem\fR that was
> +\fBsign\fR \fIname\fR [\fItype\fR]
> +Signs the certificate request named \fIname\fR\fB\-req.pem\fR that was
>  produced in the previous step, producing a certificate named
> -\fINAME\fR\fB\-cert.pem\fR.  \fITYPE\fR, either \fBswitch\fR (default) or
> +\fIname\fR\fB\-cert.pem\fR.  \fItype\fR, either \fBswitch\fR (default) or
>  \fBcontroller\fR, indicates the use for which the key is being
>  certified.
>
> @@ -140,17 +140,17 @@ command.  This ensures that the request being signed
> is the same one
>  produced by \fBreq\fR.  (The \fB\-b\fR or \fB\-\^\-batch\fR option
>  suppresses the verification step.)
>
> -The file \fINAME\fR\fB\-cert.pem\fR will need to be copied back to the
> +The file \fIname\fR\fB\-cert.pem\fR will need to be copied back to the
>  switch or controller for which it is intended.  Its contents may
>  safely be made public.
>
>  .TP
> -\fBreq+sign\fR \fINAME\fR [\fITYPE\fR]
> +\fBreq+sign\fR \fIname\fR [\fItype\fR]
>  Combines the \fBreq\fR and \fBsign\fR commands into a single step,
>  outputting all the files produced by each.  The
> -\fINAME\fR\fB\-privkey.pem\fR and \fINAME\fR\fB\-cert.pem\fR files must
> +\fIname\fR\fB\-privkey.pem\fR and \fIname\fR\fB\-cert.pem\fR files must
>  be copied securely to the switch or controller.
> -\fINAME\fR\fB\-privkey.pem\fR has sensitive contents and must not be
> +\fIname\fR\fB\-privkey.pem\fR has sensitive contents and must not be
>  exposed in transit.  Afterward, it should be deleted from the CA
>  machine.
>
> @@ -160,25 +160,25 @@ because there is additional potential for exposure
> of the private
>  key.  However, it is also more convenient.
>
>  .TP
> -\fBverify\fR \fINAME\fR [\fITYPE\fR]
> -Verifies that \fINAME\fR\fB\-cert.pem\fR is a valid certificate for the
> -given \fITYPE\fR of use, either \fBswitch\fR (default) or
> +\fBverify\fR \fIname\fR [\fItype\fR]
> +Verifies that \fIname\fR\fB\-cert.pem\fR is a valid certificate for the
> +given \fItype\fR of use, either \fBswitch\fR (default) or
>  \fBcontroller\fR.  If the certificate is valid for this use, it prints
> -the message ``\fINAME\fR\fB\-cert.pem\fR: OK''; otherwise, it prints an
> +the message ``\fIname\fR\fB\-cert.pem\fR: OK''; otherwise, it prints an
>  error message.
>
>  .TP
> -\fBfingerprint\fR \fIFILE\fR
> -Prints the fingerprint for \fIFILE\fR.  If \fIFILE\fR is a
> +\fBfingerprint\fR \fIfile\fR
> +Prints the fingerprint for \fIfile\fR.  If \fIfile\fR is a
>  certificate, then this is the SHA\-1 digest of the DER encoded version
>  of the certificate; otherwise, it is the SHA\-1 digest of the entire
>  file.
>
>  .TP
> -\fBself\-sign\fR \fINAME\fR
> -Signs the certificate request named \fINAME\fB\-req.pem\fR using the
> -private key \fINAME\fB\-privkey.pem\fR, producing a self-signed
> -certificate named \fINAME\fB\-cert.pem\fR.  The input files should have
> +\fBself\-sign\fR \fIname\fR
> +Signs the certificate request named \fIname\fB\-req.pem\fR using the
> +private key \fIname\fB\-privkey.pem\fR, producing a self-signed
> +certificate named \fIname\fB\-cert.pem\fR.  The input files should have
>  been produced with \fBovs\-pki req\fR.
>
>  Some controllers accept such self-signed certificates.
> --
> 1.7.2.5
>
> _______________________________________________
> dev mailing list
> dev@openvswitch.org
> http://openvswitch.org/mailman/listinfo/dev


Looks good to me.
Thanks,
Guru
_______________________________________________
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev

Reply via email to