diff options
author | Todd Short <tshort@akamai.com> | 2018-01-31 16:34:20 -0500 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2018-02-01 17:07:56 +0000 |
commit | 658e4879c50dff23c040c681656843a50002e403 (patch) | |
tree | fcc29aa6a8bf7c027a99e436a9023872af46c785 /doc/man3 | |
parent | 88834998dda00a713abe3a17d6caebba2f70318d (diff) | |
download | openssl-658e4879c50dff23c040c681656843a50002e403.zip openssl-658e4879c50dff23c040c681656843a50002e403.tar.gz openssl-658e4879c50dff23c040c681656843a50002e403.tar.bz2 |
Fix doc nits
Reviewed-by: Ben Kaduk <kaduk@mit.edu>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/4964)
Diffstat (limited to 'doc/man3')
-rw-r--r-- | doc/man3/SSL_CTX_set_verify.pod | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/doc/man3/SSL_CTX_set_verify.pod b/doc/man3/SSL_CTX_set_verify.pod index c9b4daf..89760f4 100644 --- a/doc/man3/SSL_CTX_set_verify.pod +++ b/doc/man3/SSL_CTX_set_verify.pod @@ -54,9 +54,9 @@ at the time of the initial handshake, such that post-handshake authentication can be requested by the server. A certificate callback will need to be set via SSL_CTX_set_client_cert_cb() if no certificate is provided at initialization. -SSL_verify_client_post_handshake() causes a Certificate Request message to be +SSL_verify_client_post_handshake() causes a CertificateRequest message to be sent by a server on the given B<ssl> connection. The SSL_VERIFY_PEER flag must -be set, the SSL_VERIFY_POST_HANDSHAKE flag is optional. +be set; the SSL_VERIFY_POST_HANDSHAKE flag is optional. =head1 NOTES @@ -184,8 +184,8 @@ failure will lead to a termination of the TLS/SSL handshake with an alert message, if SSL_VERIFY_PEER is set. After calling SSL_force_post_handshake_auth(), the client will need to add a -certificate to its configuration before it can successfully authenticate. This -must be called before SSL_connect(). +certificate or certificate callback to its configuration before it can +successfully authenticate. This must be called before SSL_connect(). SSL_verify_client_post_handshake() requires that verify flags have been previously set, and that a client sent the post-handshake authentication @@ -194,7 +194,7 @@ invoked. A write operation must take place for the Certificate Request to be sent to the client, this can be done with SSL_do_handshake() or SSL_write_ex(). Only one certificate request may be outstanding at any time. -When post-handshake authentication occurs, a refreshed B<NewSessionTicket> +When post-handshake authentication occurs, a refreshed NewSessionTicket message is sent to the client. =head1 BUGS |