[openssl] master update

shane.lontis at oracle.com shane.lontis at oracle.com
Fri Sep 18 00:33:58 UTC 2020


The branch master has been updated
       via  ecf15b16ee8223a9a383b97ee41126fbedf89bb5 (commit)
      from  7f9e74403677a995ded00f070d84297401f6e3fd (commit)


- Log -----------------------------------------------------------------
commit ecf15b16ee8223a9a383b97ee41126fbedf89bb5
Author: Alexander Borkowski <alex-b at opus-b.com>
Date:   Sat Jul 20 07:47:11 2019 +0200

    s_client.pod: Fix grammar in NOTES section.
    
    CLA: trivial
    
    Reviewed-by: Richard Levitte <levitte at openssl.org>
    Reviewed-by: Kurt Roeckx <kurt at roeckx.be>
    Reviewed-by: Ben Kaduk <kaduk at mit.edu>
    Reviewed-by: Shane Lontis <shane.lontis at oracle.com>
    (Merged from https://github.com/openssl/openssl/pull/9421)

-----------------------------------------------------------------------

Summary of changes:
 doc/man1/openssl-s_client.pod.in | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/doc/man1/openssl-s_client.pod.in b/doc/man1/openssl-s_client.pod.in
index 594d26f9bd..bd4ceee5df 100644
--- a/doc/man1/openssl-s_client.pod.in
+++ b/doc/man1/openssl-s_client.pod.in
@@ -872,7 +872,7 @@ server.
 
 This command is a test tool and is designed to continue the
 handshake after any certificate verification errors. As a result it will
-accept any certificate chain (trusted or not) sent by the peer. None test
+accept any certificate chain (trusted or not) sent by the peer. Non-test
 applications should B<not> do this as it makes them vulnerable to a MITM
 attack. This behaviour can be changed by with the B<-verify_return_error>
 option: any verify errors are then returned aborting the handshake.


More information about the openssl-commits mailing list