Return-Path: Delivered-To: apmail-httpd-cvs-archive@www.apache.org Received: (qmail 38417 invoked from network); 13 Jul 2004 18:44:23 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (209.237.227.199) by minotaur-2.apache.org with SMTP; 13 Jul 2004 18:44:23 -0000 Received: (qmail 40990 invoked by uid 500); 13 Jul 2004 18:44:22 -0000 Delivered-To: apmail-httpd-cvs-archive@httpd.apache.org Received: (qmail 40805 invoked by uid 500); 13 Jul 2004 18:44:21 -0000 Mailing-List: contact cvs-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: list-post: Delivered-To: mailing list cvs@httpd.apache.org Received: (qmail 40792 invoked by uid 500); 13 Jul 2004 18:44:21 -0000 Delivered-To: apmail-httpd-2.0-cvs@apache.org Received: (qmail 40789 invoked by uid 99); 13 Jul 2004 18:44:21 -0000 X-ASF-Spam-Status: No, hits=0.5 required=10.0 tests=ALL_TRUSTED,NO_REAL_NAME X-Spam-Check-By: apache.org Received: from [209.237.227.194] (HELO minotaur.apache.org) (209.237.227.194) by apache.org (qpsmtpd/0.27.1) with SMTP; Tue, 13 Jul 2004 11:44:21 -0700 Received: (qmail 38386 invoked by uid 1285); 13 Jul 2004 18:44:20 -0000 Date: 13 Jul 2004 18:44:20 -0000 Message-ID: <20040713184420.38385.qmail@minotaur.apache.org> From: bnicholes@apache.org To: httpd-2.0-cvs@apache.org Subject: cvs commit: httpd-2.0 STATUS X-Virus-Checked: Checked X-Spam-Rating: minotaur-2.apache.org 1.6.2 0/1000/N bnicholes 2004/07/13 11:44:20 Modified: . Tag: APACHE_2_0_BRANCH STATUS Log: Update the backport description Revision Changes Path No revision No revision 1.751.2.955 +2 -2 httpd-2.0/STATUS Index: STATUS =================================================================== RCS file: /home/cvs/httpd-2.0/STATUS,v retrieving revision 1.751.2.954 retrieving revision 1.751.2.955 diff -u -r1.751.2.954 -r1.751.2.955 --- STATUS 13 Jul 2004 18:14:21 -0000 1.751.2.954 +++ STATUS 13 Jul 2004 18:44:20 -0000 1.751.2.955 @@ -213,7 +213,7 @@ *) Provide TLS/SSL upgrade functionality in mod_ssl allowing an unsecure connection to be upgraded to a secure connection upon request by the client. The full patch file is available at http://www.apache.org/~bnicholes/ - as well as a test version of wget. This functionality is mainly used by + as well as a test client tlsupgrade.c. This functionality is mainly used by IPP clients today. modules/ssl/mod_ssl.c: r1.75, r1.97 modules/ssl/mod_ssl.h: r1.123