@@ -129,10 +129,10 @@ client_random:
129129
130130: The 32-byte value of the Random field from the ClientHello message that
131131 established the TLS connection. This value is encoded as 64 hexadecimal
132- characters. Including this field allows a single file to include secrets from
133- multiple connections and for the secrets to be applied to the correct
134- connection, though this depends on being able to match records to the correct
135- ClientHello message.
132+ characters. In a log that can include secrets from multiple connections, this
133+ field is used to correlate multiple secrets from the same connection. This
134+ allows secrets to be matched to the correct connection, provided that records
135+ can be matched to the correct ClientHello message.
136136
137137secret :
138138
@@ -212,7 +212,7 @@ will log secrets strictly in this order.
212212
213213# # Secret Labels for TLS 1.2
214214
215- An implementation of TLS 1.2 {{!TLS12}} (and also earlier versions) use the
215+ Implementations of TLS 1.2 {{!TLS12}} (and also earlier versions) use the
216216label "CLIENT_RANDOM" to identify the "master" secret for the connection.
217217
218218# # Secret Labels for ECH
@@ -414,7 +414,7 @@ Specification Required procedure {{?RFC8126}}. The role of the designated expert
414414in {{Section 17 of ?RFC8447}}. The designated expert {{RFC8126}} ensures that the specification is
415415publicly available. It is sufficient to have an Internet-Draft (that is posted and never published
416416as an RFC) or to cite a document from another standards body, industry consortium, or any other location.
417- An expert may provide more in depth reviews, but their approval should not be taken as an endorsement
417+ An expert may provide more in- depth reviews, but their approval should not be taken as an endorsement
418418of the SSLKEYLOGFILE label.
419419
420420--- back
0 commit comments