summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--share/man/man8/ssl.821
1 files changed, 7 insertions, 14 deletions
diff --git a/share/man/man8/ssl.8 b/share/man/man8/ssl.8
index ca4dd886ab8..003ca7e89b6 100644
--- a/share/man/man8/ssl.8
+++ b/share/man/man8/ssl.8
@@ -1,4 +1,4 @@
-.\" $OpenBSD: ssl.8,v 1.50 2012/05/27 07:04:52 jmc Exp $
+.\" $OpenBSD: ssl.8,v 1.51 2012/06/19 02:34:53 lteo Exp $
.\"
.\" Copyright (c) 1999 Theo de Raadt, Bob Beck
.\" All rights reserved.
@@ -23,7 +23,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: May 27 2012 $
+.Dd $Mdocdate: June 19 2012 $
.Dt SSL 8
.Os
.Sh NAME
@@ -66,7 +66,7 @@ device does not exist or is not readable, many of the routines will fail.
This is most commonly seen by users as the
.Ar RSA
routines failing in applications such as
-.Xr ssh 1 ,
+.Xr ssh 1
and
.Xr httpd 8 .
.Pp
@@ -166,26 +166,19 @@ you can switch to using the new certificate by replacing the self-signed
.Pa /etc/ssl/server.crt
with the certificate signed by your Certificate Authority, and then
restarting
-.Xr httpd 8
+.Xr httpd 8 .
.Sh GENERATING DSA SERVER CERTIFICATES
Generating a
.Ar DSA
certificate involves several steps.
-First, you generate a
+First, generate parameters for
.Ar DSA
-parameter set with a command like the following:
+keys.
+The following command will generate 1024-bit keys:
.Bd -literal -offset indent
# openssl dsaparam 1024 -out dsa1024.pem
.Ed
.Pp
-Would generate
-.Ar DSA
-parameters for 1024 bit
-.Ar DSA
-keys, and save them to the
-file
-.Pa dsa1024.pem .
-.Pp
Once you have the
.Ar DSA
parameters generated, you can generate a certificate