diff options
author | Chris Barry <chris@barry.im> | 2014-11-04 13:17:20 -0500 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2014-11-04 21:49:56 +0100 |
commit | e650f963598372431d078063f88368dfd7b45b7a (patch) | |
tree | 30dd9304b4eb48b8b787dc47f737d6465fa524f6 /doc/cha-auth.texi | |
parent | 4ba1d89c9c6a370ed2b59de311b919f665b121aa (diff) | |
download | gnutls-e650f963598372431d078063f88368dfd7b45b7a.tar.gz |
Cleaning up some awkward phrasings.
Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
Diffstat (limited to 'doc/cha-auth.texi')
-rw-r--r-- | doc/cha-auth.texi | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/doc/cha-auth.texi b/doc/cha-auth.texi index 4079985307..da1a1141f5 100644 --- a/doc/cha-auth.texi +++ b/doc/cha-auth.texi @@ -33,7 +33,7 @@ methods in @acronym{GnuTLS} in various scenarios. @subsection Two peers with an out-of-band channel -Let's consider two peers need to communicate over an untrusted channel +Let's consider two peers who need to communicate over an untrusted channel (the Internet), but have an out-of-band channel available. The latter channel is considered safe from eavesdropping and message modification and thus can be used for an initial bootstrapping of the protocol. The options @@ -44,7 +44,7 @@ client communicate a shared randomly generated key over the trusted channel and use it to negotiate further sessions over the untrusted channel. @item Passwords (see @ref{SRP authentication}). The client communicates -to the server his username and password of choice and uses it to +to the server its username and password of choice and uses it to negotiate further sessions over the untrusted channel. @item Public keys (see @ref{Certificate authentication}). The client @@ -101,7 +101,7 @@ the client provided over the initial server-authenticated channel. The available options are: @itemize @item Passwords (see @ref{SRP authentication}). The client communicates -to the server his username and password of choice on the initial +to the server its username and password of choice on the initial server-authenticated connection and uses it to negotiate further sessions. This is possible because the SRP protocol allows for the server to be authenticated using a certificate and the client using the |