diff options
author | Gustaf Neumann <neumann@wu-wien.ac.at> | 2020-06-29 21:13:07 +0200 |
---|---|---|
committer | Dr. Matthias St. Pierre <matthias.st.pierre@ncp-e.com> | 2020-07-05 01:49:20 +0200 |
commit | 8c1cbc72105ffd493b48e65f8f5fd3657dedb28c (patch) | |
tree | b1437e0210f80d7de45d8d33903a2f28fe1b82da /doc/man1/openssl-s_time.pod.in | |
parent | 3a19f1a9dd16f5855a7e2a42cd3e7f136f849bd3 (diff) |
Fix typos and repeated words
CLA: trivial
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com>
(Merged from https://github.com/openssl/openssl/pull/12320)
Diffstat (limited to 'doc/man1/openssl-s_time.pod.in')
-rw-r--r-- | doc/man1/openssl-s_time.pod.in | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/doc/man1/openssl-s_time.pod.in b/doc/man1/openssl-s_time.pod.in index 0f9f055591..90e54f03c2 100644 --- a/doc/man1/openssl-s_time.pod.in +++ b/doc/man1/openssl-s_time.pod.in @@ -157,14 +157,14 @@ is that a web client complains it has no certificates or gives an empty list to choose from. This is normally because the server is not sending the clients certificate authority in its "acceptable CA list" when it requests a certificate. By using L<openssl-s_client(1)> the CA list can be -viewed and checked. However some servers only request client authentication +viewed and checked. However, some servers only request client authentication after a specific URL is requested. To obtain the list in this case it is necessary to use the B<-prexit> option of L<openssl-s_client(1)> and send an HTTP request for an appropriate page. If a certificate is specified on the command line using the B<-cert> option it will not be used unless the server specifically requests -a client certificate. Therefore merely including a client certificate +a client certificate. Therefore, merely including a client certificate on the command line is no guarantee that the certificate works. =head1 BUGS |