summaryrefslogtreecommitdiff
path: root/share/man/man5
diff options
context:
space:
mode:
authorIgor Sobrado <sobrado@cvs.openbsd.org>2009-10-28 08:56:55 +0000
committerIgor Sobrado <sobrado@cvs.openbsd.org>2009-10-28 08:56:55 +0000
commita409c36f2a371abea2e19a9b5f2bc183f5863be3 (patch)
treeba331b65a4dc9373b924cab2fbf242540b5cc60f /share/man/man5
parente5d284e3de4bfeb7abcec05fe5c160d7fd0841cc (diff)
"Diffie-Hellman" is the usual spelling for the cryptographic protocol
first published by Whitfield Diffie and Martin Hellman in 1976. ok jmc@
Diffstat (limited to 'share/man/man5')
-rw-r--r--share/man/man5/moduli.512
1 files changed, 6 insertions, 6 deletions
diff --git a/share/man/man5/moduli.5 b/share/man/man5/moduli.5
index a1321abdf23..b1547bcdb88 100644
--- a/share/man/man5/moduli.5
+++ b/share/man/man5/moduli.5
@@ -1,4 +1,4 @@
-.\" $OpenBSD: moduli.5,v 1.13 2008/06/26 06:59:39 jmc Exp $
+.\" $OpenBSD: moduli.5,v 1.14 2009/10/28 08:56:54 sobrado Exp $
.\"
.\" Copyright (c) 2008 Damien Miller <djm@mindrot.org>
.\"
@@ -13,12 +13,12 @@
.\" WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
-.Dd $Mdocdate: June 26 2008 $
+.Dd $Mdocdate: October 28 2009 $
.Dt MODULI 5
.Os
.Sh NAME
.Nm moduli
-.Nd Diffie Hellman moduli
+.Nd Diffie-Hellman moduli
.Sh DESCRIPTION
The
.Pa /etc/moduli
@@ -39,7 +39,7 @@ A second
pass, using
.Ic ssh-keygen -T ,
provides a high degree of assurance that the numbers are prime and are
-safe for use in Diffie Hellman operations by
+safe for use in Diffie-Hellman operations by
.Xr sshd 8 .
This
.Nm
@@ -104,10 +104,10 @@ The recommended generator for use with this modulus (hexadecimal).
The modulus itself in hexadecimal.
.El
.Pp
-When performing Diffie Hellman Group Exchange,
+When performing Diffie-Hellman Group Exchange,
.Xr sshd 8
first estimates the size of the modulus required to produce enough
-Diffie Hellman output to sufficiently key the selected symmetric cipher.
+Diffie-Hellman output to sufficiently key the selected symmetric cipher.
.Xr sshd 8
then randomly selects a modulus from
.Fa /etc/moduli