summaryrefslogtreecommitdiff
path: root/src/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3
diff options
context:
space:
mode:
authornaddy <>2022-03-31 17:27:26 +0000
committernaddy <>2022-03-31 17:27:26 +0000
commit3d8be07546f5ec331a0f851b0ea88212376ebb95 (patch)
treedd215ed7ee26566711b4b3f92093356c3f542d9e /src/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3
parent31dad1243d69de787b0589750cc4b78379c43734 (diff)
downloadopenbsd-3d8be07546f5ec331a0f851b0ea88212376ebb95.tar.gz
openbsd-3d8be07546f5ec331a0f851b0ea88212376ebb95.tar.bz2
openbsd-3d8be07546f5ec331a0f851b0ea88212376ebb95.zip
man pages: add missing commas between subordinate and main clauses
jmc@ dislikes a comma before "then" in a conditional, so leave those untouched. ok jmc@
Diffstat (limited to 'src/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3')
-rw-r--r--src/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.36
1 files changed, 3 insertions, 3 deletions
diff --git a/src/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3 b/src/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3
index ae0349584a..8be504d3b3 100644
--- a/src/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3
+++ b/src/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: SSL_CTX_set_tmp_dh_callback.3,v 1.9 2022/02/18 23:17:15 jsg Exp $ 1.\" $OpenBSD: SSL_CTX_set_tmp_dh_callback.3,v 1.10 2022/03/31 17:27:18 naddy Exp $
2.\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 2.\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100
3.\" 3.\"
4.\" This file was written by Lutz Jaenicke <jaenicke@openssl.org>. 4.\" This file was written by Lutz Jaenicke <jaenicke@openssl.org>.
@@ -48,7 +48,7 @@
48.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 48.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
49.\" OF THE POSSIBILITY OF SUCH DAMAGE. 49.\" OF THE POSSIBILITY OF SUCH DAMAGE.
50.\" 50.\"
51.Dd $Mdocdate: February 18 2022 $ 51.Dd $Mdocdate: March 31 2022 $
52.Dt SSL_CTX_SET_TMP_DH_CALLBACK 3 52.Dt SSL_CTX_SET_TMP_DH_CALLBACK 3
53.Os 53.Os
54.Sh NAME 54.Sh NAME
@@ -117,7 +117,7 @@ when the application is left, it becomes impossible for attackers to decrypt
117past sessions, even if they get hold of the normal (certified) key, 117past sessions, even if they get hold of the normal (certified) key,
118as this key was only used for signing. 118as this key was only used for signing.
119.Pp 119.Pp
120In order to perform a DH key exchange the server must use a DH group 120In order to perform a DH key exchange, the server must use a DH group
121(DH parameters) and generate a DH key. 121(DH parameters) and generate a DH key.
122The server will always generate a new DH key during the negotiation. 122The server will always generate a new DH key during the negotiation.
123.Pp 123.Pp