From: Bill Stoddard
Date: Mon, 31 Jan 2005 17:59:13 +0000 (+0000)
Subject: Make the doc agree with the implementation
X-Git-Tag: 2.1.3~90
X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=886e08c0248156ff1506821ee80feda828631e2c;p=thirdparty%2Fapache%2Fhttpd.git
Make the doc agree with the implementation
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@149276 13f79535-47bb-0310-9956-ffa450edef68
---
diff --git a/docs/manual/mod/core.xml b/docs/manual/mod/core.xml
index a9d1ebb4add..b6b3920acf4 100644
--- a/docs/manual/mod/core.xml
+++ b/docs/manual/mod/core.xml
@@ -1691,21 +1691,18 @@ client
server config
- This directive specifies the number of bytes from 0
- to the value of the compile-time constant
- DEFAULT_LIMIT_REQUEST_FIELDSIZE
(8190 as
- distributed) that will be allowed in an HTTP request
- header.
+ This directive specifies the number of bytes
+ that will be allowed in an HTTP request header.
The LimitRequestFieldSize directive
- allows the server administrator to reduce the limit on the allowed
- size of an HTTP request header field below the normal input buffer
- size compiled with the server. A server needs this value to be
- large enough to hold any one header field from a normal client
- request. The size of a normal request header field will vary
- greatly among different client implementations, often depending
- upon the extent to which a user has configured their browser to
- support detailed content negotiation.
+ allows the server administrator to reduce or increase the limit
+ on the allowed size of an HTTP request header field. A server
+ needs this value to be large enough to hold any one header field
+ from a normal client request. The size of a normal request header
+ field will vary greatly among different client implementations,
+ often depending upon the extent to which a user has configured
+ their browser to support detailed content negotiation. SPENGO
+ authentication headers can be up to 12392 bytes.
This directive gives the server administrator greater
control over abnormal client request behavior, which may be
@@ -1732,15 +1729,12 @@ from the client
server config
- This directive sets the number of bytes from 0 to
- the value of the compile-time constant
- DEFAULT_LIMIT_REQUEST_LINE
(8190 as distributed)
- that will be allowed on the HTTP request-line.
+ This directive sets the number of bytes that will be
+ allowed on the HTTP request-line.
The LimitRequestLine directive allows
- the server administrator to reduce the limit on the allowed size
- of a client's HTTP request-line below the normal input buffer size
- compiled with the server. Since the request-line consists of the
+ the server administrator to reduce or increase the limit on the allowed size
+ of a client's HTTP request-line. Since the request-line consists of the
HTTP method, URI, and protocol version, the
LimitRequestLine directive places a
restriction on the length of a request-URI allowed for a request