The branch OpenSSL_1_1_0-stable has been updated via a3a4bb74cf4129b87739033d74623db5a5ec2ece (commit) from c6720f816f4c9373890939d6ec63a7dc29835fdd (commit)
- Log ----------------------------------------------------------------- commit a3a4bb74cf4129b87739033d74623db5a5ec2ece Author: Markus Triska <tri...@metalevel.at> Date: Fri Dec 9 18:07:09 2016 +0100 Fix reference to SSL_set_max_proto_version. CLA: trivial Reviewed-by: Kurt Roeckx <k...@openssl.org> Reviewed-by: Andy Polyakov <ap...@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2059) (cherry picked from commit 2884c76a4e4c1f98d17a10e2d0f5dfc43e9cb04a) ----------------------------------------------------------------------- Summary of changes: doc/ssl/SSL_CTX_new.pod | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/doc/ssl/SSL_CTX_new.pod b/doc/ssl/SSL_CTX_new.pod index 29387d3..7b35bdd 100644 --- a/doc/ssl/SSL_CTX_new.pod +++ b/doc/ssl/SSL_CTX_new.pod @@ -150,7 +150,7 @@ Use the I<version-flexible> methods instead of the version specific methods. If you want to limit the supported protocols for the version flexible methods you can use L<SSL_CTX_set_min_proto_version(3)>, L<SSL_set_min_proto_version(3)>, L<SSL_CTX_set_max_proto_version(3)> and -LSSL_set_max_proto_version(3)> functions. +L<SSL_set_max_proto_version(3)> functions. Using these functions it is possible to choose e.g. TLS_server_method() and be able to negotiate with all possible clients, but to only allow newer protocols like TLS 1.0, TLS 1.1 or TLS 1.2. _____ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits