summaryrefslogtreecommitdiff
path: root/src/lib
diff options
context:
space:
mode:
authorjsg <>2022-02-18 23:17:15 +0000
committerjsg <>2022-02-18 23:17:15 +0000
commitf069b526ab8a9a426e8d02a39c00bb857f492a7d (patch)
tree81960837969719165a72ed3c905f0baa2205c06e /src/lib
parent8a99d590553fa0c8387169b9ba29360c3a52dab8 (diff)
downloadopenbsd-f069b526ab8a9a426e8d02a39c00bb857f492a7d.tar.gz
openbsd-f069b526ab8a9a426e8d02a39c00bb857f492a7d.tar.bz2
openbsd-f069b526ab8a9a426e8d02a39c00bb857f492a7d.zip
Avoid gendered language in man pages when not referring to a specific
person. Rewrite or use singular they. ok thfr@ sthen@ daniel@ ian@ job@ kmos@ jcs@ ratchov@ phessler@ and others I'm likely missing on an earlier version. feedback tj@, feedback and ok jmc@
Diffstat (limited to 'src/lib')
-rw-r--r--src/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.38
1 files changed, 4 insertions, 4 deletions
diff --git a/src/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3 b/src/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3
index 2628c65a13..ae0349584a 100644
--- a/src/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3
+++ b/src/lib/libssl/man/SSL_CTX_set_tmp_dh_callback.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: SSL_CTX_set_tmp_dh_callback.3,v 1.8 2020/03/30 10:28:59 schwarze Exp $ 1.\" $OpenBSD: SSL_CTX_set_tmp_dh_callback.3,v 1.9 2022/02/18 23:17:15 jsg Exp $
2.\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 2.\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100
3.\" 3.\"
4.\" This file was written by Lutz Jaenicke <jaenicke@openssl.org>. 4.\" This file was written by Lutz Jaenicke <jaenicke@openssl.org>.
@@ -48,7 +48,7 @@
48.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 48.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
49.\" OF THE POSSIBILITY OF SUCH DAMAGE. 49.\" OF THE POSSIBILITY OF SUCH DAMAGE.
50.\" 50.\"
51.Dd $Mdocdate: March 30 2020 $ 51.Dd $Mdocdate: February 18 2022 $
52.Dt SSL_CTX_SET_TMP_DH_CALLBACK 3 52.Dt SSL_CTX_SET_TMP_DH_CALLBACK 3
53.Os 53.Os
54.Sh NAME 54.Sh NAME
@@ -113,8 +113,8 @@ Anonymous ciphers (without a permanent server key) also use ephemeral DH keys.
113Using ephemeral DH key exchange yields forward secrecy, 113Using ephemeral DH key exchange yields forward secrecy,
114as the connection can only be decrypted when the DH key is known. 114as the connection can only be decrypted when the DH key is known.
115By generating a temporary DH key inside the server application that is lost 115By generating a temporary DH key inside the server application that is lost
116when the application is left, it becomes impossible for an attacker to decrypt 116when the application is left, it becomes impossible for attackers to decrypt
117past sessions, even if he gets hold of the normal (certified) key, 117past sessions, even if they get hold of the normal (certified) key,
118as this key was only used for signing. 118as this key was only used for signing.
119.Pp 119.Pp
120In order to perform a DH key exchange the server must use a DH group 120In order to perform a DH key exchange the server must use a DH group