Update manual pages

This commit is contained in:
Tatsuhiro Tsujikawa 2017-07-02 13:40:21 +09:00
parent 65837806f5
commit 3bcc416e13
5 changed files with 32 additions and 18 deletions

View File

@ -1,6 +1,6 @@
.\" Man page generated from reStructuredText. .\" Man page generated from reStructuredText.
. .
.TH "H2LOAD" "1" "May 26, 2017" "1.23.0" "nghttp2" .TH "H2LOAD" "1" "Jul 02, 2017" "1.24.0" "nghttp2"
.SH NAME .SH NAME
h2load \- HTTP/2 benchmarking tool h2load \- HTTP/2 benchmarking tool
. .

View File

@ -1,6 +1,6 @@
.\" Man page generated from reStructuredText. .\" Man page generated from reStructuredText.
. .
.TH "NGHTTP" "1" "May 26, 2017" "1.23.0" "nghttp2" .TH "NGHTTP" "1" "Jul 02, 2017" "1.24.0" "nghttp2"
.SH NAME .SH NAME
nghttp \- HTTP/2 client nghttp \- HTTP/2 client
. .

View File

@ -1,6 +1,6 @@
.\" Man page generated from reStructuredText. .\" Man page generated from reStructuredText.
. .
.TH "NGHTTPD" "1" "May 26, 2017" "1.23.0" "nghttp2" .TH "NGHTTPD" "1" "Jul 02, 2017" "1.24.0" "nghttp2"
.SH NAME .SH NAME
nghttpd \- HTTP/2 server nghttpd \- HTTP/2 server
. .

View File

@ -1,6 +1,6 @@
.\" Man page generated from reStructuredText. .\" Man page generated from reStructuredText.
. .
.TH "NGHTTPX" "1" "May 26, 2017" "1.23.0" "nghttp2" .TH "NGHTTPX" "1" "Jul 02, 2017" "1.24.0" "nghttp2"
.SH NAME .SH NAME
nghttpx \- HTTP/2 proxy nghttpx \- HTTP/2 proxy
. .
@ -604,11 +604,14 @@ enabled for backend connections.
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-\-cacert=<PATH> .B \-\-cacert=<PATH>
Set path to trusted CA certificate file used in backend Set path to trusted CA certificate file. It is used in
TLS connections. The file must be in PEM format. It backend TLS connections to verify peer\(aqs certificate.
can contain multiple certificates. If the linked It is also used to verify OCSP response from the script
OpenSSL is configured to load system wide certificates, set by \fI\%\-\-fetch\-ocsp\-response\-file\fP\&. The file must be in
they are loaded at startup regardless of this option. PEM format. It can contain multiple certificates. If
the linked OpenSSL is configured to load system wide
certificates, they are loaded at startup regardless of
this option.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -691,10 +694,14 @@ done in case\-insensitive manner. The versions between
\fI\%\-\-tls\-min\-proto\-version\fP and \fI\%\-\-tls\-max\-proto\-version\fP are \fI\%\-\-tls\-min\-proto\-version\fP and \fI\%\-\-tls\-max\-proto\-version\fP are
enabled. If the protocol list advertised by client does enabled. If the protocol list advertised by client does
not overlap this range, you will receive the error not overlap this range, you will receive the error
message "unknown protocol". The available versions are: message "unknown protocol". If a protocol version lower
than TLSv1.2 is specified, make sure that the compatible
ciphers are included in \fI\%\-\-ciphers\fP option. The default
cipher list only includes ciphers compatible with
TLSv1.2 or above. The available versions are:
TLSv1.2, TLSv1.1, and TLSv1.0 TLSv1.2, TLSv1.1, and TLSv1.0
.sp .sp
Default: \fBTLSv1.1\fP Default: \fBTLSv1.2\fP
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP

View File

@ -558,11 +558,14 @@ SSL/TLS
.. option:: --cacert=<PATH> .. option:: --cacert=<PATH>
Set path to trusted CA certificate file used in backend Set path to trusted CA certificate file. It is used in
TLS connections. The file must be in PEM format. It backend TLS connections to verify peer's certificate.
can contain multiple certificates. If the linked It is also used to verify OCSP response from the script
OpenSSL is configured to load system wide certificates, set by :option:`--fetch-ocsp-response-file`\. The file must be in
they are loaded at startup regardless of this option. PEM format. It can contain multiple certificates. If
the linked OpenSSL is configured to load system wide
certificates, they are loaded at startup regardless of
this option.
.. option:: --private-key-passwd-file=<PATH> .. option:: --private-key-passwd-file=<PATH>
@ -636,10 +639,14 @@ SSL/TLS
:option:`--tls-min-proto-version` and :option:`\--tls-max-proto-version` are :option:`--tls-min-proto-version` and :option:`\--tls-max-proto-version` are
enabled. If the protocol list advertised by client does enabled. If the protocol list advertised by client does
not overlap this range, you will receive the error not overlap this range, you will receive the error
message "unknown protocol". The available versions are: message "unknown protocol". If a protocol version lower
than TLSv1.2 is specified, make sure that the compatible
ciphers are included in :option:`--ciphers` option. The default
cipher list only includes ciphers compatible with
TLSv1.2 or above. The available versions are:
TLSv1.2, TLSv1.1, and TLSv1.0 TLSv1.2, TLSv1.1, and TLSv1.0
Default: ``TLSv1.1`` Default: ``TLSv1.2``
.. option:: --tls-max-proto-version=<VER> .. option:: --tls-max-proto-version=<VER>