During Key Exchange the server proved that he is in control of the private key
associated with a certain public key (the server's certificate). The client
-verifies the server's identity by comparing the signature on the certificate and
-matching it with its trust database. For details about the trust model of SSL/TLS
-please see \ref{section:PKIs}.
+verifies the server's identity by comparing the signature on the certificate
+and matching it with its trust database. For details about the trust model of
+SSL/TLS please see \ref{section:PKIs}.
-In addition to the server providing its identity, a client might do so as well. That
-way mutual trust can be established. Another mechanism providing client authentication
-is Secure Remote Password (SRP). All those mechnisms require special configuration.
+In addition to the server providing its identity, a client might do so as well.
+That way mutual trust can be established. Another mechanism providing client
+authentication is Secure Remote Password (SRP)\todo{reference}. All those
+mechanisms require special configuration.
-Other authentication mechanisms like Pre Shared Keys aren't used in SSL/TLS. Anonymous
-sessions will not be discussed in this paper.
+Other authentication mechanisms like Pre Shared Keys aren't used in SSL/TLS.
+Anonymous sessions will not be discussed in this paper.
\texttt{!PSK:!aNULL}