The branch OpenSSL_1_1_0-stable has been updated
       via  a3a4bb74cf4129b87739033d74623db5a5ec2ece (commit)
      from  c6720f816f4c9373890939d6ec63a7dc29835fdd (commit)


- Log -----------------------------------------------------------------
commit a3a4bb74cf4129b87739033d74623db5a5ec2ece
Author: Markus Triska <tri...@metalevel.at>
Date:   Fri Dec 9 18:07:09 2016 +0100

    Fix reference to SSL_set_max_proto_version.
    
    CLA: trivial
    Reviewed-by: Kurt Roeckx <k...@openssl.org>
    Reviewed-by: Andy Polyakov <ap...@openssl.org>
    (Merged from https://github.com/openssl/openssl/pull/2059)
    (cherry picked from commit 2884c76a4e4c1f98d17a10e2d0f5dfc43e9cb04a)

-----------------------------------------------------------------------

Summary of changes:
 doc/ssl/SSL_CTX_new.pod | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/doc/ssl/SSL_CTX_new.pod b/doc/ssl/SSL_CTX_new.pod
index 29387d3..7b35bdd 100644
--- a/doc/ssl/SSL_CTX_new.pod
+++ b/doc/ssl/SSL_CTX_new.pod
@@ -150,7 +150,7 @@ Use the I<version-flexible> methods instead of the version 
specific methods.
 If you want to limit the supported protocols for the version flexible
 methods you can use L<SSL_CTX_set_min_proto_version(3)>,
 L<SSL_set_min_proto_version(3)>, L<SSL_CTX_set_max_proto_version(3)> and
-LSSL_set_max_proto_version(3)> functions.
+L<SSL_set_max_proto_version(3)> functions.
 Using these functions it is possible to choose e.g. TLS_server_method()
 and be able to negotiate with all possible clients, but to only
 allow newer protocols like TLS 1.0, TLS 1.1 or TLS 1.2.
_____
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits

Reply via email to