Message ID | 20210119215617.116886-1-tincanteksup@gmail.com |
---|---|
State | Accepted |
Headers | show |
Series | [Openvpn-devel,openvpn-devel] Man page sections corrections | expand |
Acked-by: Gert Doering <gert@greenie.muc.de> Thanks. Well spotted. Your patch has been applied to the master and release/2.5 branch. commit 3b1ded3902b051b3c25f6e77da834ecd1b9f7eca (master) commit 9e2f1bf73aaf48a3a7baf0cda11ef1caf3c69baf (release/2.5) Author: Richard Bonhomme Date: Tue Jan 19 21:56:17 2021 +0000 Man page sections corrections Signed-off-by: Richard Bonhomme <tincanteksup@gmail.com> Acked-by: Gert Doering <gert@greenie.muc.de> Message-Id: <20210119215617.116886-1-tincanteksup@gmail.com> URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg21451.html Signed-off-by: Gert Doering <gert@greenie.muc.de> -- kind regards, Gert Doering
diff --git a/doc/man-sections/renegotiation.rst b/doc/man-sections/renegotiation.rst index b817cfa8..c5484404 100644 --- a/doc/man-sections/renegotiation.rst +++ b/doc/man-sections/renegotiation.rst @@ -35,7 +35,7 @@ separate ephemeral encryption key which is rotated at regular intervals. pseudo-uniform-randomized between ``min`` and ``max``. With the default value of :code:`3600` this results in an effective per - session value in the range of :code:`3240`..:code:`3600` seconds for + session value in the range of :code:`3240` .. :code:`3600` seconds for servers, or just 3600 for clients. When using dual-factor authentication, note that this default value may diff --git a/doc/man-sections/tls-options.rst b/doc/man-sections/tls-options.rst index 5dd20013..28cf6f1e 100644 --- a/doc/man-sections/tls-options.rst +++ b/doc/man-sections/tls-options.rst @@ -422,13 +422,13 @@ certificates and keys: https://github.com/OpenVPN/easy-rsa :code:`DEFAULT:!EXP:!LOW:!MEDIUM:!kDH:!kECDH:!DSS:!PSK:!SRP:!kRSA` when using OpenSSL. - The default for `--tls-ciphersuites` is to use the crypto library's - default. - --tls-ciphersuites l Same as ``--tls-cipher`` but for TLS 1.3 and up. mbed TLS has no TLS 1.3 support yet and only the ``--tls-cipher`` setting is used. + The default for `--tls-ciphersuites` is to use the crypto library's + default. + --tls-client Enable TLS and assume client role during TLS handshake.
Signed-off-by: Richard Bonhomme <tincanteksup@gmail.com> --- doc/man-sections/renegotiation.rst | 2 +- doc/man-sections/tls-options.rst | 6 +++--- 2 files changed, 4 insertions(+), 4 deletions(-)