diff options
| author | 2008-07-22 11:20:10 +0000 | |
|---|---|---|
| committer | 2008-07-22 11:20:10 +0000 | |
| commit | bb083478557b90ce6714047fdbdbc5e236feae57 (patch) | |
| tree | 6dcf9a9d5d5c7120dc5d3cb121a18225e76868f6 /usr.sbin/httpd/src/modules/ssl/ssl_engine_kernel.c | |
| parent | Spelling, negotation -> negotiation. (diff) | |
| download | wireguard-openbsd-bb083478557b90ce6714047fdbdbc5e236feae57.tar.xz wireguard-openbsd-bb083478557b90ce6714047fdbdbc5e236feae57.zip | |
more negotation -> negotiation; ok sthen@
Diffstat (limited to 'usr.sbin/httpd/src/modules/ssl/ssl_engine_kernel.c')
| -rw-r--r-- | usr.sbin/httpd/src/modules/ssl/ssl_engine_kernel.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/usr.sbin/httpd/src/modules/ssl/ssl_engine_kernel.c b/usr.sbin/httpd/src/modules/ssl/ssl_engine_kernel.c index fdc07837b13..15a1e124418 100644 --- a/usr.sbin/httpd/src/modules/ssl/ssl_engine_kernel.c +++ b/usr.sbin/httpd/src/modules/ssl/ssl_engine_kernel.c @@ -845,7 +845,7 @@ int ssl_hook_Access(request_rec *r) * Additionally the following optimization is possible here: When the * currently active verify type is "none" but a client certificate is * already known/present, it's enough to manually force a client - * verification but at least skip the I/O-intensive renegotation + * verification but at least skip the I/O-intensive renegotiation * handshake. */ if (dc->nVerifyClient != SSL_CVERIFY_UNSET) { @@ -951,7 +951,7 @@ int ssl_hook_Access(request_rec *r) */ if (renegotiate) { /* - * Now we force the SSL renegotation by sending the Hello Request + * Now we force the SSL renegotiation by sending the Hello Request * message to the client. Here we have to do a workaround: Actually * OpenSSL returns immediately after sending the Hello Request (the * intent AFAIK is because the SSL/TLS protocol says it's not a must @@ -1944,7 +1944,7 @@ void ssl_callback_LogTracingState(const SSL *ssl, int where, int rc) } /* - * Because SSL renegotations can happen at any time (not only after + * Because SSL renegotiations can happen at any time (not only after * SSL_accept()), the best way to log the current connection details is * right after a finished handshake. */ |
