mirror of
https://github.com/apache/httpd.git
synced 2025-08-05 16:55:50 +03:00
Fix a number of typos and misspellings. Reported by Ville Skytta.
PR48496. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1029134 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
@@ -524,7 +524,7 @@ int ssl_hook_Access(request_rec *r)
|
||||
* Additionally the following optimization is possible here: When the
|
||||
* currently active verify type is "none" but a client certificate is
|
||||
* already known/present, it's enough to manually force a client
|
||||
* verification but at least skip the I/O-intensive renegotation
|
||||
* verification but at least skip the I/O-intensive renegotiation
|
||||
* handshake.
|
||||
*/
|
||||
if ((dc->nVerifyClient != SSL_CVERIFY_UNSET) ||
|
||||
@@ -664,7 +664,7 @@ int ssl_hook_Access(request_rec *r)
|
||||
*/
|
||||
if (renegotiate) {
|
||||
/*
|
||||
* Now we force the SSL renegotation by sending the Hello Request
|
||||
* Now we force the SSL renegotiation by sending the Hello Request
|
||||
* message to the client. Here we have to do a workaround: Actually
|
||||
* OpenSSL returns immediately after sending the Hello Request (the
|
||||
* intent AFAIK is because the SSL/TLS protocol says it's not a must
|
||||
@@ -2114,7 +2114,7 @@ static void log_tracing_state(MODSSL_INFO_CB_ARG_TYPE ssl, conn_rec *c,
|
||||
}
|
||||
|
||||
/*
|
||||
* Because SSL renegotations can happen at any time (not only after
|
||||
* Because SSL renegotiations can happen at any time (not only after
|
||||
* SSL_accept()), the best way to log the current connection details is
|
||||
* right after a finished handshake.
|
||||
*/
|
||||
|
Reference in New Issue
Block a user