summaryrefslogtreecommitdiff
path: root/src/lib/libssl/doc/SSL_CTX_set_options.3
diff options
context:
space:
mode:
authordoug <>2015-07-17 07:04:41 +0000
committerdoug <>2015-07-17 07:04:41 +0000
commit489dbb57ee3abd9d28ef0c63007d420b6a34b1f4 (patch)
treea3867fae7dea1b800ba72ab3973817fa74caaaab /src/lib/libssl/doc/SSL_CTX_set_options.3
parent674f02353e7f32c4cbe82e8eaa5b4220714a9bba (diff)
downloadopenbsd-489dbb57ee3abd9d28ef0c63007d420b6a34b1f4.tar.gz
openbsd-489dbb57ee3abd9d28ef0c63007d420b6a34b1f4.tar.bz2
openbsd-489dbb57ee3abd9d28ef0c63007d420b6a34b1f4.zip
Remove workaround for TLS padding bug from SSLeay days.
OpenSSL doesn't remember which clients were impacted and the functionality has been broken in their stable releases for 2 years. Based on OpenSSL commit a8e4ac6a2fe67c19672ecf0c6aeafa15801ce3a5. ok jsing@
Diffstat (limited to 'src/lib/libssl/doc/SSL_CTX_set_options.3')
-rw-r--r--src/lib/libssl/doc/SSL_CTX_set_options.38
1 files changed, 5 insertions, 3 deletions
diff --git a/src/lib/libssl/doc/SSL_CTX_set_options.3 b/src/lib/libssl/doc/SSL_CTX_set_options.3
index 53a7a6c9c0..922522a33c 100644
--- a/src/lib/libssl/doc/SSL_CTX_set_options.3
+++ b/src/lib/libssl/doc/SSL_CTX_set_options.3
@@ -1,7 +1,7 @@
1.\" 1.\"
2.\" $OpenBSD: SSL_CTX_set_options.3,v 1.6 2015/06/15 05:32:58 doug Exp $ 2.\" $OpenBSD: SSL_CTX_set_options.3,v 1.7 2015/07/17 07:04:40 doug Exp $
3.\" 3.\"
4.Dd $Mdocdate: June 15 2015 $ 4.Dd $Mdocdate: July 17 2015 $
5.Dt SSL_CTX_SET_OPTIONS 3 5.Dt SSL_CTX_SET_OPTIONS 3
6.Os 6.Os
7.Sh NAME 7.Sh NAME
@@ -125,7 +125,9 @@ this option has no effect.
125.It Dv SSL_OP_TLS_D5_BUG 125.It Dv SSL_OP_TLS_D5_BUG
126\&... 126\&...
127.It Dv SSL_OP_TLS_BLOCK_PADDING_BUG 127.It Dv SSL_OP_TLS_BLOCK_PADDING_BUG
128\&... 128As of
129.Ox 5.8 ,
130this option has no effect.
129.It Dv SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS 131.It Dv SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS
130Disables a countermeasure against a SSL 3.0/TLS 1.0 protocol vulnerability 132Disables a countermeasure against a SSL 3.0/TLS 1.0 protocol vulnerability
131affecting CBC ciphers, which cannot be handled by some broken SSL 133affecting CBC ciphers, which cannot be handled by some broken SSL