DOC: config: Fix a typo on ssl_c_chain_der

There is a typo on the ssl_c_chain_der sample fetch
(s/ssl_c_der_chain/ssl_c_chain_der/). This implies a move of the fetch to keep
it at the right place.

This should be backported as far as 2.2 or anywhere the commit a598b500b
("MINOR: ssl: add ssl_{c,s}_chain_der fetch methods") is.
This commit is contained in:
Christopher Faulet 2020-11-06 12:10:33 +01:00
parent d0447a7c3e
commit 70d10d1fb6
1 changed files with 6 additions and 6 deletions

View File

@ -17234,18 +17234,18 @@ ssl_c_ca_err_depth : integer
verification of the client certificate. If no error is encountered, 0 is verification of the client certificate. If no error is encountered, 0 is
returned. returned.
ssl_c_der : binary ssl_c_chain_der : binary
Returns the DER formatted certificate presented by the client when the
incoming connection was made over an SSL/TLS transport layer. When used for
an ACL, the value(s) to match against can be passed in hexadecimal form.
ssl_c_der_chain : binary
Returns the DER formatted chain certificate presented by the client when the Returns the DER formatted chain certificate presented by the client when the
incoming connection was made over an SSL/TLS transport layer. When used for incoming connection was made over an SSL/TLS transport layer. When used for
an ACL, the value(s) to match against can be passed in hexadecimal form. One an ACL, the value(s) to match against can be passed in hexadecimal form. One
can parse the result with any lib accepting ASN.1 DER data. It currentlly can parse the result with any lib accepting ASN.1 DER data. It currentlly
does not support resumed sessions. does not support resumed sessions.
ssl_c_der : binary
Returns the DER formatted certificate presented by the client when the
incoming connection was made over an SSL/TLS transport layer. When used for
an ACL, the value(s) to match against can be passed in hexadecimal form.
ssl_c_err : integer ssl_c_err : integer
When the incoming connection was made over an SSL/TLS transport layer, When the incoming connection was made over an SSL/TLS transport layer,
returns the ID of the first error detected during verification at depth 0, or returns the ID of the first error detected during verification at depth 0, or