From 09a44469a2c0bb9d9242620708252cbebdc8143b Mon Sep 17 00:00:00 2001
From: Luca Toscano /www/
(or any subdirectory thereof)
that consist of three numbers.
The
The
/someapplication/image.gif;jsessionid=123456789
/someapplication/image.gif?PHPSESSIONID=12345678
This causes cachable resources to be stored separately for each session, which +
This causes cacheable resources to be stored separately for each session, which
is often not desired.
CacheIgnoreURLSessionIdentifiers None
clears the list of ignored
diff --git a/docs/manual/mod/mod_ldap.xml b/docs/manual/mod/mod_ldap.xml
index 3c89c84cc7..675780ffef 100644
--- a/docs/manual/mod/mod_ldap.xml
+++ b/docs/manual/mod/mod_ldap.xml
@@ -340,7 +340,7 @@ LDAPTrustedGlobalCert KEY_BASE64 "/certs/key1.pem" [password]
Both CA and client certificates may be specified globally (LDAPTrustedGlobalCert) or per-connection (LDAPTrustedClientCert). When any settings are specified per-connection, the global - settings are superceded.
+ settings are superseded.The documentation for the SDK claims to support both SSL and
STARTTLS, however STARTTLS does not seem to work on all versions
diff --git a/docs/manual/mod/mod_lua.xml b/docs/manual/mod/mod_lua.xml
index 077fddc3ff..5ff9c11a9b 100644
--- a/docs/manual/mod/mod_lua.xml
+++ b/docs/manual/mod/mod_lua.xml
@@ -936,11 +936,11 @@ r:htpassword(string [,algorithm [,cost]]) -- Creates a password hash from a stri
The choice of digest function determines how a digest is created
from a record unit. SSL supports the following:$N
in the substitution string!
qslast|QSL
Interpret the last (right-most) question mark as the query string
- delimeter, instead of the first (left-most) as normally used.
+ delimiter, instead of the first (left-most) as normally used.
Available in 2.4.19 and later.
details
...
diff --git a/docs/manual/mod/mod_ssl.xml b/docs/manual/mod/mod_ssl.xml
index 596876c005..f19994d64f 100644
--- a/docs/manual/mod/mod_ssl.xml
+++ b/docs/manual/mod/mod_ssl.xml
@@ -1946,7 +1946,7 @@ As of release 2.4.21, all configurations which enable either one of the
will use the new SSLProxyCheckPeerName
or SSLProxyCheckPeerCN
options
-will supress all remote server certificate name validation. Only the following
+will suppress all remote server certificate name validation. Only the following
configuration will trigger the legacy certificate CN comparison in 2.4.21 and
later releases;
diff --git a/docs/manual/socache.xml b/docs/manual/socache.xml
index d0338b8c8e..61499b0d30 100644
--- a/docs/manual/socache.xml
+++ b/docs/manual/socache.xml
@@ -67,7 +67,7 @@