In most cases, "TLSv1.x" naming is used across and documentation, lazy
people tend to grep too much and may not find what they are looking for.

Fixing people is hard.

---
 doc/configuration.txt | 2 +-
 src/ssl_sock.c        | 4 ++--
 2 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/doc/configuration.txt b/doc/configuration.txt
index 48b69a5bd359..8137762e2b9a 100644
--- a/doc/configuration.txt
+++ b/doc/configuration.txt
@@ -10541,7 +10541,7 @@ accept-proxy
   setting of which client is allowed to use the protocol.
 
 allow-0rtt
-  Allow receiving early data when using TLS 1.3. This is disabled by default,
+  Allow receiving early data when using TLSv1.3. This is disabled by default,
   due to security considerations.
 
 alpn <protocols>
diff --git a/src/ssl_sock.c b/src/ssl_sock.c
index 7e8739a633b9..47d561e17e35 100644
--- a/src/ssl_sock.c
+++ b/src/ssl_sock.c
@@ -1996,7 +1996,7 @@ static void ctx_set_TLSv12_func(SSL_CTX *ctx, 
set_context_func c) {
                : SSL_CTX_set_ssl_version(ctx, TLSv1_2_client_method());
 #endif
 }
-/* TLS 1.2 is the last supported version in this context. */
+/* TLSv1.2 is the last supported version in this context. */
 static void ctx_set_TLSv13_func(SSL_CTX *ctx, set_context_func c) {}
 /* Unusable in this context. */
 static void ssl_set_SSLv3_func(SSL *ssl, set_context_func c) {}
@@ -2197,7 +2197,7 @@ static int ssl_sock_switchctx_cbk(SSL *ssl, int *al, void 
*arg)
                                break;
                }
        } else {
-               /* without TLSEXT_TYPE_signature_algorithms extension (< TLS 
1.2) */
+               /* without TLSEXT_TYPE_signature_algorithms extension (< 
TLSv1.2) */
                has_rsa = 1;
        }
        if (has_ecdsa_sig) {  /* in very rare case: has ecdsa sign but not a 
ECDSA cipher */

Reply via email to