summaryrefslogtreecommitdiff
path: root/doc/cha-auth.texi
diff options
context:
space:
mode:
authorChris Barry <chris@barry.im>2014-11-04 13:17:20 -0500
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2014-11-04 21:49:56 +0100
commite650f963598372431d078063f88368dfd7b45b7a (patch)
tree30dd9304b4eb48b8b787dc47f737d6465fa524f6 /doc/cha-auth.texi
parent4ba1d89c9c6a370ed2b59de311b919f665b121aa (diff)
downloadgnutls-e650f963598372431d078063f88368dfd7b45b7a.tar.gz
Cleaning up some awkward phrasings.
Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
Diffstat (limited to 'doc/cha-auth.texi')
-rw-r--r--doc/cha-auth.texi6
1 files changed, 3 insertions, 3 deletions
diff --git a/doc/cha-auth.texi b/doc/cha-auth.texi
index 4079985307..da1a1141f5 100644
--- a/doc/cha-auth.texi
+++ b/doc/cha-auth.texi
@@ -33,7 +33,7 @@ methods in @acronym{GnuTLS} in various scenarios.
@subsection Two peers with an out-of-band channel
-Let's consider two peers need to communicate over an untrusted channel
+Let's consider two peers who need to communicate over an untrusted channel
(the Internet), but have an out-of-band channel available. The latter
channel is considered safe from eavesdropping and message modification and thus
can be used for an initial bootstrapping of the protocol. The options
@@ -44,7 +44,7 @@ client communicate a shared randomly generated key over the trusted
channel and use it to negotiate further sessions over the untrusted channel.
@item Passwords (see @ref{SRP authentication}). The client communicates
-to the server his username and password of choice and uses it to
+to the server its username and password of choice and uses it to
negotiate further sessions over the untrusted channel.
@item Public keys (see @ref{Certificate authentication}). The client
@@ -101,7 +101,7 @@ the client provided over the initial server-authenticated channel. The
available options are:
@itemize
@item Passwords (see @ref{SRP authentication}). The client communicates
-to the server his username and password of choice on the initial
+to the server its username and password of choice on the initial
server-authenticated connection and uses it to negotiate further sessions.
This is possible because the SRP protocol allows for the server to be
authenticated using a certificate and the client using the