diff options
author | doug <> | 2015-07-17 07:04:41 +0000 |
---|---|---|
committer | doug <> | 2015-07-17 07:04:41 +0000 |
commit | 489dbb57ee3abd9d28ef0c63007d420b6a34b1f4 (patch) | |
tree | a3867fae7dea1b800ba72ab3973817fa74caaaab /src/lib/libssl/doc/SSL_CTX_set_options.3 | |
parent | 674f02353e7f32c4cbe82e8eaa5b4220714a9bba (diff) | |
download | openbsd-489dbb57ee3abd9d28ef0c63007d420b6a34b1f4.tar.gz openbsd-489dbb57ee3abd9d28ef0c63007d420b6a34b1f4.tar.bz2 openbsd-489dbb57ee3abd9d28ef0c63007d420b6a34b1f4.zip |
Remove workaround for TLS padding bug from SSLeay days.
OpenSSL doesn't remember which clients were impacted and the
functionality has been broken in their stable releases for 2 years.
Based on OpenSSL commit a8e4ac6a2fe67c19672ecf0c6aeafa15801ce3a5.
ok jsing@
Diffstat (limited to 'src/lib/libssl/doc/SSL_CTX_set_options.3')
-rw-r--r-- | src/lib/libssl/doc/SSL_CTX_set_options.3 | 8 |
1 files changed, 5 insertions, 3 deletions
diff --git a/src/lib/libssl/doc/SSL_CTX_set_options.3 b/src/lib/libssl/doc/SSL_CTX_set_options.3 index 53a7a6c9c0..922522a33c 100644 --- a/src/lib/libssl/doc/SSL_CTX_set_options.3 +++ b/src/lib/libssl/doc/SSL_CTX_set_options.3 | |||
@@ -1,7 +1,7 @@ | |||
1 | .\" | 1 | .\" |
2 | .\" $OpenBSD: SSL_CTX_set_options.3,v 1.6 2015/06/15 05:32:58 doug Exp $ | 2 | .\" $OpenBSD: SSL_CTX_set_options.3,v 1.7 2015/07/17 07:04:40 doug Exp $ |
3 | .\" | 3 | .\" |
4 | .Dd $Mdocdate: June 15 2015 $ | 4 | .Dd $Mdocdate: July 17 2015 $ |
5 | .Dt SSL_CTX_SET_OPTIONS 3 | 5 | .Dt SSL_CTX_SET_OPTIONS 3 |
6 | .Os | 6 | .Os |
7 | .Sh NAME | 7 | .Sh NAME |
@@ -125,7 +125,9 @@ this option has no effect. | |||
125 | .It Dv SSL_OP_TLS_D5_BUG | 125 | .It Dv SSL_OP_TLS_D5_BUG |
126 | \&... | 126 | \&... |
127 | .It Dv SSL_OP_TLS_BLOCK_PADDING_BUG | 127 | .It Dv SSL_OP_TLS_BLOCK_PADDING_BUG |
128 | \&... | 128 | As of |
129 | .Ox 5.8 , | ||
130 | this option has no effect. | ||
129 | .It Dv SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS | 131 | .It Dv SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS |
130 | Disables a countermeasure against a SSL 3.0/TLS 1.0 protocol vulnerability | 132 | Disables a countermeasure against a SSL 3.0/TLS 1.0 protocol vulnerability |
131 | affecting CBC ciphers, which cannot be handled by some broken SSL | 133 | affecting CBC ciphers, which cannot be handled by some broken SSL |