diff options
author | Matt Caswell <matt@openssl.org> | 2018-09-06 15:21:42 +0100 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2018-09-07 11:17:55 +0100 |
commit | 77890553760c6e675fee6d254cbdea2712eeb1e1 (patch) | |
tree | 53eaf73762014f6517b60a3155b8977ee5f8cc77 | |
parent | 57d7b988b498ed34e98d1957fbbded8342f2a952 (diff) |
Remove a reference to SSL_force_post_handshake_auth()
That function was removed in favour of SSL_set_post_handshake_auth().
Update the docs accordingly.
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/7139)
-rw-r--r-- | doc/man3/SSL_CTX_set_verify.pod | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/man3/SSL_CTX_set_verify.pod b/doc/man3/SSL_CTX_set_verify.pod index c192f9af6f..21d9ae1018 100644 --- a/doc/man3/SSL_CTX_set_verify.pod +++ b/doc/man3/SSL_CTX_set_verify.pod @@ -186,7 +186,7 @@ Its return value is identical to B<preverify_ok>, so that any verification failure will lead to a termination of the TLS/SSL handshake with an alert message, if SSL_VERIFY_PEER is set. -After calling SSL_force_post_handshake_auth(), the client will need to add a +After calling SSL_set_post_handshake_auth(), the client will need to add a certificate or certificate callback to its configuration before it can successfully authenticate. This must be called before SSL_connect(). |