Skip to content

Commit 062dbd6

Browse files
authored
Merge pull request #194 from BridgerVoss/documentation_update
Added more clarification in wolfSSL Manual 4.2.3
2 parents c3b6227 + 789cf66 commit 062dbd6

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

wolfSSL/src/chapter03.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -207,7 +207,7 @@ If no command line arguments are given, then the client attempts to connect to t
207207
The client is able to benchmark a connection when using the `-b <num>` argument. When used, the client attempts to connect to the specified server/port the argument number of times and gives the average time in milliseconds that it took to perform `SSL_connect()`. For example:
208208

209209
```sh
210-
/examples/client/client -b 100 -h example.com -p 443 -d
210+
./examples/client/client -b 100 -h example.com -p 443 -d
211211
```
212212

213213
Returns:

wolfSSL/src/chapter04.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ For details on how to use these functions, please see the [Getting Started](chap
4242

4343
### Robust Client and Server Downgrade
4444

45-
Both wolfSSL clients and servers have robust version downgrade capability. If a specific protocol version method is used on either side, then only that version will be negotiated or an error will be returned. For example, a client that uses TLS 1.0 and tries to connect to an SSL 3.0 only server, the connection will fail, likewise connecting to a TLS 1.1 will fail as well.
45+
Both wolfSSL clients and servers have robust version downgrade capability. If a specific protocol version method is used on either side, then only that protocol version will be negotiated or an error will be returned. For example, a client that uses TLS 1.0 and tries to connect to an SSL 3.0 only server, the connection will fail, likewise connecting to a TLS 1.1 will fail as well.
4646

4747
To resolve this issue, a client that uses the [`wolfSSLv23_client_method()`](group__Setup.md#function-wolfsslv23_client_method) function will support the highest protocol version supported by the server by downgrading if necessary. In this case, the client will be able to connect to a server running TLS 1.0 - TLS 1.3 (or a subset or superset that includes SSL 3.0 depending on which protocol versions are configured in wolfSSL). The only versions it can't connect to is SSL 2.0 which has been insecure for years, and SSL 3.0 which has been disabled by default.
4848

0 commit comments

Comments
 (0)