From 70d10d1fb657eb6f8ac8e86c9b6037b53cc907ac Mon Sep 17 00:00:00 2001 From: Christopher Faulet Date: Fri, 6 Nov 2020 12:10:33 +0100 Subject: [PATCH] DOC: config: Fix a typo on ssl_c_chain_der There is a typo on the ssl_c_chain_der sample fetch (s/ssl_c_der_chain/ssl_c_chain_der/). This implies a move of the fetch to keep it at the right place. This should be backported as far as 2.2 or anywhere the commit a598b500b ("MINOR: ssl: add ssl_{c,s}_chain_der fetch methods") is. --- doc/configuration.txt | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/doc/configuration.txt b/doc/configuration.txt index a9707115c1..2a7a9a508b 100644 --- a/doc/configuration.txt +++ b/doc/configuration.txt @@ -17234,18 +17234,18 @@ ssl_c_ca_err_depth : integer verification of the client certificate. If no error is encountered, 0 is returned. -ssl_c_der : binary - Returns the DER formatted certificate presented by the client when the - incoming connection was made over an SSL/TLS transport layer. When used for - an ACL, the value(s) to match against can be passed in hexadecimal form. - -ssl_c_der_chain : binary +ssl_c_chain_der : binary Returns the DER formatted chain certificate presented by the client when the incoming connection was made over an SSL/TLS transport layer. When used for an ACL, the value(s) to match against can be passed in hexadecimal form. One can parse the result with any lib accepting ASN.1 DER data. It currentlly does not support resumed sessions. +ssl_c_der : binary + Returns the DER formatted certificate presented by the client when the + incoming connection was made over an SSL/TLS transport layer. When used for + an ACL, the value(s) to match against can be passed in hexadecimal form. + ssl_c_err : integer When the incoming connection was made over an SSL/TLS transport layer, returns the ID of the first error detected during verification at depth 0, or