diff options
author | naddy <> | 2022-03-31 17:27:26 +0000 |
---|---|---|
committer | naddy <> | 2022-03-31 17:27:26 +0000 |
commit | 3d8be07546f5ec331a0f851b0ea88212376ebb95 (patch) | |
tree | dd215ed7ee26566711b4b3f92093356c3f542d9e /src/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3 | |
parent | 31dad1243d69de787b0589750cc4b78379c43734 (diff) | |
download | openbsd-3d8be07546f5ec331a0f851b0ea88212376ebb95.tar.gz openbsd-3d8be07546f5ec331a0f851b0ea88212376ebb95.tar.bz2 openbsd-3d8be07546f5ec331a0f851b0ea88212376ebb95.zip |
man pages: add missing commas between subordinate and main clauses
jmc@ dislikes a comma before "then" in a conditional, so leave those
untouched.
ok jmc@
Diffstat (limited to 'src/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3')
-rw-r--r-- | src/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3 | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/src/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3 b/src/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3 index ae0349584a..8be504d3b3 100644 --- a/src/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3 +++ b/src/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: SSL_CTX_set_tmp_dh_callback.3,v 1.9 2022/02/18 23:17:15 jsg Exp $ | 1 | .\" $OpenBSD: SSL_CTX_set_tmp_dh_callback.3,v 1.10 2022/03/31 17:27:18 naddy Exp $ |
2 | .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 | 2 | .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Lutz Jaenicke <jaenicke@openssl.org>. | 4 | .\" This file was written by Lutz Jaenicke <jaenicke@openssl.org>. |
@@ -48,7 +48,7 @@ | |||
48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
50 | .\" | 50 | .\" |
51 | .Dd $Mdocdate: February 18 2022 $ | 51 | .Dd $Mdocdate: March 31 2022 $ |
52 | .Dt SSL_CTX_SET_TMP_DH_CALLBACK 3 | 52 | .Dt SSL_CTX_SET_TMP_DH_CALLBACK 3 |
53 | .Os | 53 | .Os |
54 | .Sh NAME | 54 | .Sh NAME |
@@ -117,7 +117,7 @@ when the application is left, it becomes impossible for attackers to decrypt | |||
117 | past sessions, even if they get hold of the normal (certified) key, | 117 | past sessions, even if they get hold of the normal (certified) key, |
118 | as this key was only used for signing. | 118 | as this key was only used for signing. |
119 | .Pp | 119 | .Pp |
120 | In order to perform a DH key exchange the server must use a DH group | 120 | In order to perform a DH key exchange, the server must use a DH group |
121 | (DH parameters) and generate a DH key. | 121 | (DH parameters) and generate a DH key. |
122 | The server will always generate a new DH key during the negotiation. | 122 | The server will always generate a new DH key during the negotiation. |
123 | .Pp | 123 | .Pp |