Some fixes in schemas:
 Replace “/” to "
 Remove unexpected ':'

Change-Id: Id9821a900d8d9a81ca6dc6816aba724174fc8569
diff --git a/openssh/schemas/server.yaml b/openssh/schemas/server.yaml
index 86e1abe..cceb110 100644
--- a/openssh/schemas/server.yaml
+++ b/openssh/schemas/server.yaml
@@ -21,7 +21,7 @@
       Banner
       ------
       The contents of the specified file are sent to the remote user
-      before authentication is allowed.  If the argument is “none” then
+      before authentication is allowed.  If the argument is "none" then
       no banner is displayed.  By default, no banner is displayed.
     type: string
   bind:
@@ -42,7 +42,7 @@
       -----------------------
       Specifies whether rhosts or /etc/hosts.equiv authentication
       together with successful public key client host authentication is
-      allowed (host-based authentication). The default is False(“no”).
+      allowed (host-based authentication). The default is False("no").
     type: boolean
   ignore_rhosts:
     description: |
@@ -52,7 +52,7 @@
       RhostsRSAAuthentication or HostbasedAuthentication.
       .
       /etc/hosts.equiv and /etc/ssh/shosts.equiv are still used.  The
-      default is True (“yes”).
+      default is True ("yes").
     type: boolean
   kerberos_auth:
     description: |
@@ -62,7 +62,7 @@
       PasswordAuthentication will be validated through the Kerberos
       KDC.  To use this option, the server needs a Kerberos servtab
       which allows the verification of the KDC's identity. The default
-      is False (“no”).
+      is False ("no").
     type: boolean
   syslog_facility:
     description: |
@@ -120,13 +120,13 @@
       Specifies the available MAC (message authentication code)
       algorithms.  The MAC algorithm is used for data integrity
       protection.  Multiple algorithms must be comma-separated.  If the
-      specified value begins with a ‘+’ character, then the specified
+      specified value begins with a '+' character, then the specified
       algorithms will be appended to the default set instead of
       replacing them.
       .
-      The algorithms that contain “-etm” calculate the MAC after
+      The algorithms that contain "-etm" calculate the MAC after
       encryption (encrypt-then-mac).  These are considered safer and
-      their use recommended. The supported MACs are:
+      their use recommended. The supported MACs are
         hmac-md5
         hmac-md5-96
         hmac-ripemd160
@@ -146,7 +146,7 @@
         umac-64-etm@openssh.com
         umac-128-etm@openssh.com
       .
-      The default is:
+      The default is
         umac-64-etm@openssh.com,umac-128-etm@openssh.com,
         hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,
         hmac-sha1-etm@openssh.com,
@@ -171,7 +171,7 @@
       PasswordAuthentication
       ----------------------
       Specifies whether password authentication is allowed.  The
-      default is True(“yes”).
+      default is True("yes").
     type: boolean
   permit_empty_passwords:
     description: |
@@ -179,28 +179,28 @@
       --------------------
       When password authentication is allowed, it specifies whether the
       server allows login to accounts with empty password strings.  The
-      default is False (“no”).
+      default is False ("no").
     type: boolean
   permit_root_login:
     description: |
       PermitRootLogin
       ---------------
       Specifies whether root can log in using ssh(1).  The argument
-      must be “yes”, “prohibit-password”, “without-password”,
-      “forced-commands-only”, or “no”.  The default is
-      “prohibit-password”.
+      must be "yes", "prohibit-password", "without-password",
+      "forced-commands-only", or "no".  The default is
+      "prohibit-password".
       .
-      If this option is set to “prohibit-password” or
-      “without-password”, password and keyboard-interactive
+      If this option is set to "prohibit-password" or
+      "without-password", password and keyboard-interactive
       authentication are disabled for root.
       .
-      If this option is set to “forced-commands-only”, root login with
+      If this option is set to "forced-commands-only", root login with
       public key authentication will be allowed, but only if the
       command option has been specified (which may be useful for taking
       remote backups even if root login is normally not allowed).  All
       other authentication methods are disabled for root.
       .
-      If this option is set to “no”, root is not allowed to log in.
+      If this option is set to "no", root is not allowed to log in.
       # TODO Currently its only boolean option, however, support for other
       #      values has been added recently to sshd_config template, now
       #      it may use both booleans and strings.
@@ -219,7 +219,7 @@
       ---------------------
       Specifies whether ~/.ssh/environment and environment= options in
       ~/.ssh/authorized_keys are processed by sshd(8).  The default is
-      False (“no”).  Enabling environment processing may enable users to
+      False ("no").  Enabling environment processing may enable users to
       bypass access restrictions in some configurations using mechanisms
       such as LD_PRELOAD.
     type: boolean
@@ -228,22 +228,22 @@
       Protocol
       --------
       Specifies the protocol versions sshd(8) supports.  The possible
-      values are ‘1’ and ‘2’.  Multiple versions must be comma-
-      separated.  The default is ‘2’.  Protocol 1 suffers from a number
+      values are '1' and '2'.  Multiple versions must be comma-
+      separated.  The default is '2'.  Protocol 1 suffers from a number
       of cryptographic weaknesses and should not be used.  It is only
       offered to support legacy devices.
       .
       Note that the order of the protocol list does not indicate
       preference, because the client selects among multiple protocol
-      versions offered by the server.  Specifying “2,1” is identical to
-      “1,2”.
+      versions offered by the server.  Specifying "2,1" is identical to
+      "1,2".
     type: integer
   public_key_auth:
     description: |
       PubkeyAuthentication
       --------------------
       Specifies whether public key authentication is allowed.  The
-      default is True (“yes”).
+      default is True ("yes").
     type: boolean
   user:
     description: |