summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorschwarze <>2020-04-14 11:57:31 +0000
committerschwarze <>2020-04-14 11:57:31 +0000
commit3d90fe8773bfac85323e3bb04f61a128481a8ea4 (patch)
tree843dcf81c22e548b3930788b1c32723252b28bad
parentc820cf08e2df8ac92aebe63a3bfd6612b3a6d8d8 (diff)
downloadopenbsd-3d90fe8773bfac85323e3bb04f61a128481a8ea4.tar.gz
openbsd-3d90fe8773bfac85323e3bb04f61a128481a8ea4.tar.bz2
openbsd-3d90fe8773bfac85323e3bb04f61a128481a8ea4.zip
Delete the three sentences listing the ciphers currently included
in LOW, MEDIUM, and HIGH. That's going to change repeatedly and the extra maintenance effort for keeping it up to date is a waste because people can trivially run "openssl ciphers -v LOW" to look it up. Besides, updating it will usually be forgotten; the LOW entry was already wrong. Suggested by jsing@.
-rw-r--r--src/lib/libssl/man/SSL_CTX_set_cipher_list.317
1 files changed, 2 insertions, 15 deletions
diff --git a/src/lib/libssl/man/SSL_CTX_set_cipher_list.3 b/src/lib/libssl/man/SSL_CTX_set_cipher_list.3
index a41b680c23..643cad08f6 100644
--- a/src/lib/libssl/man/SSL_CTX_set_cipher_list.3
+++ b/src/lib/libssl/man/SSL_CTX_set_cipher_list.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: SSL_CTX_set_cipher_list.3,v 1.11 2020/04/11 14:01:59 schwarze Exp $ 1.\" $OpenBSD: SSL_CTX_set_cipher_list.3,v 1.12 2020/04/14 11:57:31 schwarze Exp $
2.\" full merge up to: OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 2.\" full merge up to: OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100
3.\" 3.\"
4.\" This file is a derived work. 4.\" This file is a derived work.
@@ -65,7 +65,7 @@
65.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 65.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
66.\" OF THE POSSIBILITY OF SUCH DAMAGE. 66.\" OF THE POSSIBILITY OF SUCH DAMAGE.
67.\" 67.\"
68.Dd $Mdocdate: April 11 2020 $ 68.Dd $Mdocdate: April 14 2020 $
69.Dt SSL_CTX_SET_CIPHER_LIST 3 69.Dt SSL_CTX_SET_CIPHER_LIST 3
70.Os 70.Os
71.Sh NAME 71.Sh NAME
@@ -268,11 +268,6 @@ Cipher suites using HMAC based on GOST R 34.11-94
268for message authentication. 268for message authentication.
269.It Cm HIGH 269.It Cm HIGH
270Cipher suites of high strength. 270Cipher suites of high strength.
271Currently, these are cipher suites using
272.Cm CHACHA20 ,
273.Cm AES ,
274.Cm CAMELLIA ,
275or GOST-28178-89-CNT symmetric encryption.
276.It Cm IDEA 271.It Cm IDEA
277Cipher suites using IDEA for symmetric encryption. 272Cipher suites using IDEA for symmetric encryption.
278LibreSSL does not provide any such cipher suites. 273LibreSSL does not provide any such cipher suites.
@@ -286,18 +281,10 @@ Cipher suites using VKO 34.10 key exchange, specified in RFC 4357.
286Cipher suites using RSA key exchange. 281Cipher suites using RSA key exchange.
287.It Cm LOW 282.It Cm LOW
288Cipher suites of low strength. 283Cipher suites of low strength.
289Currently, these are cipher suites using
290.Cm DES
291or
292.Cm RC4
293symmetric encryption.
294.It Cm MD5 284.It Cm MD5
295Cipher suites using MD5 for message authentication. 285Cipher suites using MD5 for message authentication.
296.It Cm MEDIUM 286.It Cm MEDIUM
297Cipher suites of medium strength. 287Cipher suites of medium strength.
298Currently, these are cipher suites using
299.Cm 3DES
300symmetric encryption.
301.It Cm NULL 288.It Cm NULL
302An alias for 289An alias for
303.Cm eNULL . 290.Cm eNULL .