From fba956c630d10b6ab1453f195d28dd1d3196bd04 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Petr=20P=C3=ADsa=C5=99?= <ppisar@redhat.com>
Date: Tue, 4 Oct 2016 13:44:35 +0200
Subject: [PATCH] Correct misspellings
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Signed-off-by: Petr Písař <ppisar@redhat.com>
---
 lib/Net/LDAP/FAQ.pod      | 4 ++--
 lib/Net/LDAP/Schema.pod   | 2 +-
 lib/Net/LDAP/Security.pod | 8 ++++----
 3 files changed, 7 insertions(+), 7 deletions(-)

diff --git a/lib/Net/LDAP/FAQ.pod b/lib/Net/LDAP/FAQ.pod
index fd34ccb..99d9036 100644
--- a/lib/Net/LDAP/FAQ.pod
+++ b/lib/Net/LDAP/FAQ.pod
@@ -1195,7 +1195,7 @@ attribute name and no values.
 In LDAPv3, this is defined to always work even if that attribute
 doesn't exist in the entry.
 
-ie:
+I.e.:
 
   my $mesg = $ldap->modify( $entry, replace => { %qv_del_arry } );
 
@@ -1770,7 +1770,7 @@ eldapo - a directory manager's blog
 http://eldapo.blogspot.de/
 
 Eine deutsche LDAP Website
-A german LDAP Website
+A German LDAP Website
 http://verzeichnisdienst.de/ldap/Perl/index.html
 
 (non-exhaustive) list of LDAP software on Wikipedia
diff --git a/lib/Net/LDAP/Schema.pod b/lib/Net/LDAP/Schema.pod
index 92ab69c..e222b72 100644
--- a/lib/Net/LDAP/Schema.pod
+++ b/lib/Net/LDAP/Schema.pod
@@ -32,7 +32,7 @@ may be an object class, attribute or syntax) then a case-insensitive name
 or raw OID (object identifier, in dotted numeric string form, e.g. 2.5.4.0)
 may be supplied.
 
-Each returned item of schema (eg an attribute definition) is returned
+Each returned item of schema (e.g. an attribute definition) is returned
 in a HASH. The keys in the returned HASH are lowercase versions of
 the keys read from the server. Here's a partial list (not all HASHes
 define all keys) although note that RFC 4512 permits other keys as
diff --git a/lib/Net/LDAP/Security.pod b/lib/Net/LDAP/Security.pod
index a12a259..6ca48f1 100644
--- a/lib/Net/LDAP/Security.pod
+++ b/lib/Net/LDAP/Security.pod
@@ -130,7 +130,7 @@ standardized version of SSL.
 
 You can only use TLS with an LDAPv3 server. That is because the
 standard (RFC 4511) for LDAP and TLS requires that the I<normal> LDAP
-connection (ie., on port 389) can be switched on demand from plain text
+connection (i.e., on port 389) can be switched on demand from plain text
 into a TLS connection. The switching mechanism uses a special extended
 LDAP operation, and since these are not legal in LDAPv2, you can only
 switch to TLS on an LDAPv3 connection.
@@ -151,18 +151,18 @@ I<mechanism>. A number of mechanisms are defined, such as CRAM-MD5.
 
 The use of a mechanism like CRAM-MD5 provides a solution to the
 password sniffing vulnerability, because these mechanisms typically do
-not require the user to send across a secret (eg., a password) in the
+not require the user to send across a secret (e.g., a password) in the
 clear across the network. Instead, authentication is carried out in a
 clever way which avoids this, and so prevents passwords from being
 sniffed.
 
 B<Net::LDAP> supports SASL using the B<Authen::SASL> class. Currently the
-only B<Authen::SASL> subclasses (ie., SASL mechanism) available are
+only B<Authen::SASL> subclasses (i.e., SASL mechanism) available are
 CRAM-MD5 and EXTERNAL.
 
 Some SASL mechanisms provide a general solution to the sniffing of all
 data on the network vulnerability, as they can negotiate confidential
-(ie., encrypted) network connections. Note that this is over and above
+(i.e., encrypted) network connections. Note that this is over and above
 any SSL or TLS encryption! Unfortunately, perl's B<Authen::SASL> code
 cannot negotiate this.
 
-- 
2.20.1