diff options
author | jmc <> | 2014-12-02 14:11:01 +0000 |
---|---|---|
committer | jmc <> | 2014-12-02 14:11:01 +0000 |
commit | e7e600eb57a165f5f50250f84829e68d0e33c7c3 (patch) | |
tree | fdbd454e8f8522fb36b37a4b6d5e47bcb60b444a /src/lib/libssl/doc/SSL_CTX_set_tmp_dh_callback.3 | |
parent | 8068f015c2050105c1ab16d99b7b03bc027c72d3 (diff) | |
download | openbsd-e7e600eb57a165f5f50250f84829e68d0e33c7c3.tar.gz openbsd-e7e600eb57a165f5f50250f84829e68d0e33c7c3.tar.bz2 openbsd-e7e600eb57a165f5f50250f84829e68d0e33c7c3.zip |
add some openbsd tags, and a first pass at cleanup;
Diffstat (limited to 'src/lib/libssl/doc/SSL_CTX_set_tmp_dh_callback.3')
-rw-r--r-- | src/lib/libssl/doc/SSL_CTX_set_tmp_dh_callback.3 | 16 |
1 files changed, 9 insertions, 7 deletions
diff --git a/src/lib/libssl/doc/SSL_CTX_set_tmp_dh_callback.3 b/src/lib/libssl/doc/SSL_CTX_set_tmp_dh_callback.3 index f28d083f45..17eed868ee 100644 --- a/src/lib/libssl/doc/SSL_CTX_set_tmp_dh_callback.3 +++ b/src/lib/libssl/doc/SSL_CTX_set_tmp_dh_callback.3 | |||
@@ -1,4 +1,7 @@ | |||
1 | .Dd $Mdocdate: October 12 2014 $ | 1 | .\" |
2 | .\" $OpenBSD: SSL_CTX_set_tmp_dh_callback.3,v 1.2 2014/12/02 14:11:01 jmc Exp $ | ||
3 | .\" | ||
4 | .Dd $Mdocdate: December 2 2014 $ | ||
2 | .Dt SSL_CTX_SET_TMP_DH_CALLBACK 3 | 5 | .Dt SSL_CTX_SET_TMP_DH_CALLBACK 3 |
3 | .Os | 6 | .Os |
4 | .Sh NAME | 7 | .Sh NAME |
@@ -107,11 +110,11 @@ The risk in reusing DH parameters is that an attacker may specialize on a very | |||
107 | often used DH group. | 110 | often used DH group. |
108 | Applications should therefore generate their own DH parameters during the | 111 | Applications should therefore generate their own DH parameters during the |
109 | installation process using the openssl | 112 | installation process using the openssl |
110 | .Xr dhparam 1 | 113 | .Xr openssl 1 |
111 | application. | 114 | application. |
112 | In order to reduce the computer time needed for this generation, | 115 | In order to reduce the computer time needed for this generation, |
113 | it is possible to use DSA parameters instead (see | 116 | it is possible to use DSA parameters instead (see |
114 | .Xr dhparam 1 ) , | 117 | .Xr openssl 1 ) , |
115 | but in this case | 118 | but in this case |
116 | .Dv SSL_OP_SINGLE_DH_USE | 119 | .Dv SSL_OP_SINGLE_DH_USE |
117 | is mandatory. | 120 | is mandatory. |
@@ -132,10 +135,10 @@ which use safe primes and were generated verifiably pseudo-randomly. | |||
132 | These files can be converted into C code using the | 135 | These files can be converted into C code using the |
133 | .Fl C | 136 | .Fl C |
134 | option of the | 137 | option of the |
135 | .Xr dhparam 1 | 138 | .Xr openssl 1 |
136 | application. | 139 | application. |
137 | Authors may also generate their own set of parameters using | 140 | Authors may also generate their own set of parameters using |
138 | .Xr dhparam 1 , | 141 | .Xr openssl 1 , |
139 | but a user may not be sure how the parameters were generated. | 142 | but a user may not be sure how the parameters were generated. |
140 | The generation of DH parameters during installation is therefore recommended. | 143 | The generation of DH parameters during installation is therefore recommended. |
141 | .Pp | 144 | .Pp |
@@ -225,8 +228,7 @@ tmp_dh_callback(SSL *s, int is_export, int keylength) | |||
225 | } | 228 | } |
226 | .Ed | 229 | .Ed |
227 | .Sh SEE ALSO | 230 | .Sh SEE ALSO |
228 | .Xr ciphers 1 , | 231 | .Xr openssl 1 , |
229 | .Xr dhparam 1 , | ||
230 | .Xr ssl 3 , | 232 | .Xr ssl 3 , |
231 | .Xr SSL_CTX_set_cipher_list 3 , | 233 | .Xr SSL_CTX_set_cipher_list 3 , |
232 | .Xr SSL_CTX_set_options 3 , | 234 | .Xr SSL_CTX_set_options 3 , |