aboutsummaryrefslogtreecommitdiffstats
path: root/doc/apps/s_client.pod
diff options
context:
space:
mode:
authorLutz Jänicke <jaenicke@openssl.org>2004-01-04 18:59:14 +0000
committerLutz Jänicke <jaenicke@openssl.org>2004-01-04 18:59:14 +0000
commita32fc687dedf6d4368dc0fc18320654191c16bb8 (patch)
tree3e7069c671f187b6df9636ce5d9c7fa9e552fff4 /doc/apps/s_client.pod
parentc0017a5a65c573dad22d4d0612846a3086e246c7 (diff)
downloadopenssl-a32fc687dedf6d4368dc0fc18320654191c16bb8.tar.gz
Add s_time manual page
Submitted by: "Martin Witzel" <MWITZEL@de.ibm.com> PR: #570
Diffstat (limited to 'doc/apps/s_client.pod')
-rw-r--r--doc/apps/s_client.pod6
1 files changed, 3 insertions, 3 deletions
diff --git a/doc/apps/s_client.pod b/doc/apps/s_client.pod
index d061326c1f..8d19079973 100644
--- a/doc/apps/s_client.pod
+++ b/doc/apps/s_client.pod
@@ -8,7 +8,7 @@ s_client - SSL/TLS client program
=head1 SYNOPSIS
B<openssl> B<s_client>
-[B<-connect> host:port>]
+[B<-connect host:port>]
[B<-verify depth>]
[B<-cert filename>]
[B<-key filename>]
@@ -208,7 +208,7 @@ then an HTTP command can be given such as "GET /" to retrieve a web page.
If the handshake fails then there are several possible causes, if it is
nothing obvious like no client certificate then the B<-bugs>, B<-ssl2>,
-B<-ssl3>, B<-tls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1> can be tried
+B<-ssl3>, B<-tls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1> options can be tried
in case it is a buggy server. In particular you should play with these
options B<before> submitting a bug report to an OpenSSL mailing list.
@@ -219,7 +219,7 @@ the clients certificate authority in its "acceptable CA list" when it
requests a certificate. By using B<s_client> the CA list can be viewed
and checked. However some servers only request client authentication
after a specific URL is requested. To obtain the list in this case it
-is necessary to use the B<-prexit> command and send an HTTP request
+is necessary to use the B<-prexit> option and send an HTTP request
for an appropriate page.
If a certificate is specified on the command line using the B<-cert>