You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by jo...@apache.org on 2004/02/28 18:09:55 UTC

cvs commit: httpd-2.0/docs/manual/mod mod_ssl.xml

jorton      2004/02/28 09:09:55

  Modified:    docs/manual/mod mod_ssl.xml
  Log:
  Use SSL_CLIENT_CERT_CHAIN_<n> with an underscore before the <n>.
  
  Revision  Changes    Path
  1.21      +3 -3      httpd-2.0/docs/manual/mod/mod_ssl.xml
  
  Index: mod_ssl.xml
  ===================================================================
  RCS file: /home/cvs/httpd-2.0/docs/manual/mod/mod_ssl.xml,v
  retrieving revision 1.20
  retrieving revision 1.21
  diff -w -d -u -r1.20 -r1.21
  --- mod_ssl.xml	9 Feb 2004 20:16:07 -0000	1.20
  +++ mod_ssl.xml	28 Feb 2004 17:09:55 -0000	1.21
  @@ -74,7 +74,7 @@
   <tr><td><code>SSL_CLIENT_A_SIG</code></td>              <td>string</td>    <td>Algorithm used for the signature of client's certificate</td></tr>
   <tr><td><code>SSL_CLIENT_A_KEY</code></td>              <td>string</td>    <td>Algorithm used for the public key of client's certificate</td></tr>
   <tr><td><code>SSL_CLIENT_CERT</code></td>               <td>string</td>    <td>PEM-encoded client certificate</td></tr>
  -<tr><td><code>SSL_CLIENT_CERT_CHAIN</code><em>n</em></td> <td>string</td>    <td>PEM-encoded certificates in client certificate chain</td></tr>
  +<tr><td><code>SSL_CLIENT_CERT_CHAIN_</code><em>n</em></td> <td>string</td>    <td>PEM-encoded certificates in client certificate chain</td></tr>
   <tr><td><code>SSL_CLIENT_VERIFY</code></td>             <td>string</td>    <td><code>NONE</code>, <code>SUCCESS</code>, <code>GENEROUS</code> or <code>FAILED:</code><em>reason</em></td></tr>
   <tr><td><code>SSL_SERVER_M_VERSION</code></td>          <td>string</td>    <td>The version of the server certificate</td></tr>
   <tr><td><code>SSL_SERVER_M_SERIAL</code></td>           <td>string</td>    <td>The serial of the server certificate</td></tr>
  @@ -969,7 +969,7 @@
       <p>
       When this option is enabled, additional CGI/SSI environment variables are
       created: <code>SSL_SERVER_CERT</code>, <code>SSL_CLIENT_CERT</code> and
  -    <code>SSL_CLIENT_CERT_CHAIN</code><em>n</em> (with <em>n</em> = 0,1,2,..).
  +    <code>SSL_CLIENT_CERT_CHAIN_</code><em>n</em> (with <em>n</em> = 0,1,2,..).
       These contain the PEM-encoded X.509 Certificates of server and client for
       the current HTTPS connection and can be used by CGI scripts for deeper
       Certificate checking. Additionally all other certificates of the client
  @@ -1179,7 +1179,7 @@
                          SSL_CLIENT_A_SIG       SSL_SERVER_A_SIG
                          SSL_CLIENT_A_KEY       SSL_SERVER_A_KEY
                          SSL_CLIENT_CERT        SSL_SERVER_CERT
  -                       SSL_CLIENT_CERT_CHAIN<strong>n</strong>
  +                       SSL_CLIENT_CERT_CHAIN_<strong>n</strong>
                          SSL_CLIENT_VERIFY
   </pre>
   </usage>