Update manual pages
This commit is contained in:
parent
65837806f5
commit
3bcc416e13
|
@ -1,6 +1,6 @@
|
||||||
.\" Man page generated from reStructuredText.
|
.\" Man page generated from reStructuredText.
|
||||||
.
|
.
|
||||||
.TH "H2LOAD" "1" "May 26, 2017" "1.23.0" "nghttp2"
|
.TH "H2LOAD" "1" "Jul 02, 2017" "1.24.0" "nghttp2"
|
||||||
.SH NAME
|
.SH NAME
|
||||||
h2load \- HTTP/2 benchmarking tool
|
h2load \- HTTP/2 benchmarking tool
|
||||||
.
|
.
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
.\" Man page generated from reStructuredText.
|
.\" Man page generated from reStructuredText.
|
||||||
.
|
.
|
||||||
.TH "NGHTTP" "1" "May 26, 2017" "1.23.0" "nghttp2"
|
.TH "NGHTTP" "1" "Jul 02, 2017" "1.24.0" "nghttp2"
|
||||||
.SH NAME
|
.SH NAME
|
||||||
nghttp \- HTTP/2 client
|
nghttp \- HTTP/2 client
|
||||||
.
|
.
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
.\" Man page generated from reStructuredText.
|
.\" Man page generated from reStructuredText.
|
||||||
.
|
.
|
||||||
.TH "NGHTTPD" "1" "May 26, 2017" "1.23.0" "nghttp2"
|
.TH "NGHTTPD" "1" "Jul 02, 2017" "1.24.0" "nghttp2"
|
||||||
.SH NAME
|
.SH NAME
|
||||||
nghttpd \- HTTP/2 server
|
nghttpd \- HTTP/2 server
|
||||||
.
|
.
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
.\" Man page generated from reStructuredText.
|
.\" Man page generated from reStructuredText.
|
||||||
.
|
.
|
||||||
.TH "NGHTTPX" "1" "May 26, 2017" "1.23.0" "nghttp2"
|
.TH "NGHTTPX" "1" "Jul 02, 2017" "1.24.0" "nghttp2"
|
||||||
.SH NAME
|
.SH NAME
|
||||||
nghttpx \- HTTP/2 proxy
|
nghttpx \- HTTP/2 proxy
|
||||||
.
|
.
|
||||||
|
@ -604,11 +604,14 @@ enabled for backend connections.
|
||||||
.INDENT 0.0
|
.INDENT 0.0
|
||||||
.TP
|
.TP
|
||||||
.B \-\-cacert=<PATH>
|
.B \-\-cacert=<PATH>
|
||||||
Set path to trusted CA certificate file used in backend
|
Set path to trusted CA certificate file. It is used in
|
||||||
TLS connections. The file must be in PEM format. It
|
backend TLS connections to verify peer\(aqs certificate.
|
||||||
can contain multiple certificates. If the linked
|
It is also used to verify OCSP response from the script
|
||||||
OpenSSL is configured to load system wide certificates,
|
set by \fI\%\-\-fetch\-ocsp\-response\-file\fP\&. The file must be in
|
||||||
they are loaded at startup regardless of this option.
|
PEM format. It can contain multiple certificates. If
|
||||||
|
the linked OpenSSL is configured to load system wide
|
||||||
|
certificates, they are loaded at startup regardless of
|
||||||
|
this option.
|
||||||
.UNINDENT
|
.UNINDENT
|
||||||
.INDENT 0.0
|
.INDENT 0.0
|
||||||
.TP
|
.TP
|
||||||
|
@ -691,10 +694,14 @@ done in case\-insensitive manner. The versions between
|
||||||
\fI\%\-\-tls\-min\-proto\-version\fP and \fI\%\-\-tls\-max\-proto\-version\fP are
|
\fI\%\-\-tls\-min\-proto\-version\fP and \fI\%\-\-tls\-max\-proto\-version\fP are
|
||||||
enabled. If the protocol list advertised by client does
|
enabled. If the protocol list advertised by client does
|
||||||
not overlap this range, you will receive the error
|
not overlap this range, you will receive the error
|
||||||
message "unknown protocol". The available versions are:
|
message "unknown protocol". If a protocol version lower
|
||||||
|
than TLSv1.2 is specified, make sure that the compatible
|
||||||
|
ciphers are included in \fI\%\-\-ciphers\fP option. The default
|
||||||
|
cipher list only includes ciphers compatible with
|
||||||
|
TLSv1.2 or above. The available versions are:
|
||||||
TLSv1.2, TLSv1.1, and TLSv1.0
|
TLSv1.2, TLSv1.1, and TLSv1.0
|
||||||
.sp
|
.sp
|
||||||
Default: \fBTLSv1.1\fP
|
Default: \fBTLSv1.2\fP
|
||||||
.UNINDENT
|
.UNINDENT
|
||||||
.INDENT 0.0
|
.INDENT 0.0
|
||||||
.TP
|
.TP
|
||||||
|
|
|
@ -558,11 +558,14 @@ SSL/TLS
|
||||||
|
|
||||||
.. option:: --cacert=<PATH>
|
.. option:: --cacert=<PATH>
|
||||||
|
|
||||||
Set path to trusted CA certificate file used in backend
|
Set path to trusted CA certificate file. It is used in
|
||||||
TLS connections. The file must be in PEM format. It
|
backend TLS connections to verify peer's certificate.
|
||||||
can contain multiple certificates. If the linked
|
It is also used to verify OCSP response from the script
|
||||||
OpenSSL is configured to load system wide certificates,
|
set by :option:`--fetch-ocsp-response-file`\. The file must be in
|
||||||
they are loaded at startup regardless of this option.
|
PEM format. It can contain multiple certificates. If
|
||||||
|
the linked OpenSSL is configured to load system wide
|
||||||
|
certificates, they are loaded at startup regardless of
|
||||||
|
this option.
|
||||||
|
|
||||||
.. option:: --private-key-passwd-file=<PATH>
|
.. option:: --private-key-passwd-file=<PATH>
|
||||||
|
|
||||||
|
@ -636,10 +639,14 @@ SSL/TLS
|
||||||
:option:`--tls-min-proto-version` and :option:`\--tls-max-proto-version` are
|
:option:`--tls-min-proto-version` and :option:`\--tls-max-proto-version` are
|
||||||
enabled. If the protocol list advertised by client does
|
enabled. If the protocol list advertised by client does
|
||||||
not overlap this range, you will receive the error
|
not overlap this range, you will receive the error
|
||||||
message "unknown protocol". The available versions are:
|
message "unknown protocol". If a protocol version lower
|
||||||
|
than TLSv1.2 is specified, make sure that the compatible
|
||||||
|
ciphers are included in :option:`--ciphers` option. The default
|
||||||
|
cipher list only includes ciphers compatible with
|
||||||
|
TLSv1.2 or above. The available versions are:
|
||||||
TLSv1.2, TLSv1.1, and TLSv1.0
|
TLSv1.2, TLSv1.1, and TLSv1.0
|
||||||
|
|
||||||
Default: ``TLSv1.1``
|
Default: ``TLSv1.2``
|
||||||
|
|
||||||
.. option:: --tls-max-proto-version=<VER>
|
.. option:: --tls-max-proto-version=<VER>
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue