summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorLutz Jänicke <jaenicke@openssl.org>2004-01-08 07:38:15 +0000
committerLutz Jänicke <jaenicke@openssl.org>2004-01-08 07:38:15 +0000
commitfc56b529249c0a40df035c35c0cac91cae5c6eaa (patch)
tree81ad530685e6bb543922c1d88342d60f7ba56d67
parenta32fc687dedf6d4368dc0fc18320654191c16bb8 (diff)
Updates to s_time manual page
PR: #570 Submitted by: Martin Witzel <MWITZEL@de.ibm.com>
-rw-r--r--doc/apps/s_time.pod8
1 files changed, 7 insertions, 1 deletions
diff --git a/doc/apps/s_time.pod b/doc/apps/s_time.pod
index a7e3c3e5bc..5a38aa2e03 100644
--- a/doc/apps/s_time.pod
+++ b/doc/apps/s_time.pod
@@ -117,6 +117,12 @@ the server determines which cipher suite is used it should take the first
supported cipher in the list sent by the client.
See the L<ciphers(1)|ciphers(1)> command for more information.
+=item B<-time length>
+
+specifies how long (in seconds) B<s_time> should establish connections and
+optionally transfer payload data from a server. Server and client performance
+and the link speed determine how many connections B<s_time> can establish.
+
=back
=head1 NOTES
@@ -127,7 +133,7 @@ To connect to an SSL HTTP server and get the default page the command
openssl s_time -connect servername:443 -www / -CApath yourdir -CAfile yourfile.pem -cipher commoncipher [-ssl3]
would typically be used (https uses port 443). 'commoncipher' is a cipher to
-which both client and server can agree, see the L<cipher(1)|cipher(1)> command
+which both client and server can agree, see the L<ciphers(1)|ciphers(1)> command
for details.
If the handshake fails then there are several possible causes, if it is