[openssl-commits] [openssl] master update

Richard Levitte levitte at openssl.org
Wed Dec 19 18:01:01 UTC 2018

The branch master has been updated
       via  6f8b858d054c4eb1112531e39da9ceb5fa37e5f1 (commit)
      from  229446dfae66aed32a738063c9062fea8e7049dc (commit)

- Log -----------------------------------------------------------------
commit 6f8b858d054c4eb1112531e39da9ceb5fa37e5f1
Author: Christian Heimes <christian at python.org>
Date:   Mon Dec 17 22:56:17 2018 +0100

    Fix function names in ct(7) documentation
    The correct function name is SSL_CTX_enable_ct, not SSL_CTX_ct_enable.
    Signed-off-by: Christian Heimes <christian at python.org>
    Reviewed-by: Paul Dale <paul.dale at oracle.com>
    Reviewed-by: Richard Levitte <levitte at openssl.org>
    (Merged from https://github.com/openssl/openssl/pull/7916)


Summary of changes:
 doc/man7/ct.pod | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/doc/man7/ct.pod b/doc/man7/ct.pod
index 53e8b05..ca2a43e 100644
--- a/doc/man7/ct.pod
+++ b/doc/man7/ct.pod
@@ -15,7 +15,7 @@ clients, as defined in RFC 6962. This verification can provide some confidence
 that a certificate has been publicly logged in a set of CT logs.
 By default, these checks are disabled. They can be enabled using
-SSL_CTX_ct_enable() or SSL_ct_enable().
+L<SSL_CTX_enable_ct(3)> or L<SSL_enable_ct(3)>.
 This library can also be used to parse and examine CT data structures, such as
 Signed Certificate Timestamps (SCTs), or to read a list of CT logs. There are

More information about the openssl-commits mailing list