**commit** 872d91c86086fe7f8e01879b9cfd35b242610b3e
**parent** 04bbe6d6e05d5a423417083c1581cb4b803e09d4
**Author:** Jared Tobin <jared@jtobin.io>
**Date:** Wed, 16 Aug 2023 16:44:41 -0230
Fix Markdown rendering quirk.
**Diffstat:**

1 file changed, 2 insertions(+), 2 deletions(-)

**diff --git a/docs/s5.md b/docs/s5.md**
@@ -212,8 +212,8 @@ This all yields the following table:
such that Alice and Bob will agree on the shared key with probability
3/4. Mallory also has to choose which shared key value he uses; if he
-uses 1, then the attack succeeds with probability 1/2, and if he uses p
-- 1, then it succeeds with probability 1/4.
+uses 1, then the attack succeeds with probability 1/2, and if he uses `p
+- 1`, then it succeeds with probability 1/4.
Here are the interleaved logs of a successful attack. Start mallory with
e.g. the `dhngmitm 1`, `dhngmitm p`, or `dhngmitm (p - 1)` protocol: