diff options
| author | doug <> | 2015-07-17 07:04:41 +0000 |
|---|---|---|
| committer | doug <> | 2015-07-17 07:04:41 +0000 |
| commit | 489dbb57ee3abd9d28ef0c63007d420b6a34b1f4 (patch) | |
| tree | a3867fae7dea1b800ba72ab3973817fa74caaaab /src/lib/libssl/doc | |
| parent | 674f02353e7f32c4cbe82e8eaa5b4220714a9bba (diff) | |
| download | openbsd-489dbb57ee3abd9d28ef0c63007d420b6a34b1f4.tar.gz openbsd-489dbb57ee3abd9d28ef0c63007d420b6a34b1f4.tar.bz2 openbsd-489dbb57ee3abd9d28ef0c63007d420b6a34b1f4.zip | |
Remove workaround for TLS padding bug from SSLeay days.
OpenSSL doesn't remember which clients were impacted and the
functionality has been broken in their stable releases for 2 years.
Based on OpenSSL commit a8e4ac6a2fe67c19672ecf0c6aeafa15801ce3a5.
ok jsing@
Diffstat (limited to 'src/lib/libssl/doc')
| -rw-r--r-- | src/lib/libssl/doc/SSL_CTX_set_options.3 | 8 |
1 files changed, 5 insertions, 3 deletions
diff --git a/src/lib/libssl/doc/SSL_CTX_set_options.3 b/src/lib/libssl/doc/SSL_CTX_set_options.3 index 53a7a6c9c0..922522a33c 100644 --- a/src/lib/libssl/doc/SSL_CTX_set_options.3 +++ b/src/lib/libssl/doc/SSL_CTX_set_options.3 | |||
| @@ -1,7 +1,7 @@ | |||
| 1 | .\" | 1 | .\" |
| 2 | .\" $OpenBSD: SSL_CTX_set_options.3,v 1.6 2015/06/15 05:32:58 doug Exp $ | 2 | .\" $OpenBSD: SSL_CTX_set_options.3,v 1.7 2015/07/17 07:04:40 doug Exp $ |
| 3 | .\" | 3 | .\" |
| 4 | .Dd $Mdocdate: June 15 2015 $ | 4 | .Dd $Mdocdate: July 17 2015 $ |
| 5 | .Dt SSL_CTX_SET_OPTIONS 3 | 5 | .Dt SSL_CTX_SET_OPTIONS 3 |
| 6 | .Os | 6 | .Os |
| 7 | .Sh NAME | 7 | .Sh NAME |
| @@ -125,7 +125,9 @@ this option has no effect. | |||
| 125 | .It Dv SSL_OP_TLS_D5_BUG | 125 | .It Dv SSL_OP_TLS_D5_BUG |
| 126 | \&... | 126 | \&... |
| 127 | .It Dv SSL_OP_TLS_BLOCK_PADDING_BUG | 127 | .It Dv SSL_OP_TLS_BLOCK_PADDING_BUG |
| 128 | \&... | 128 | As of |
| 129 | .Ox 5.8 , | ||
| 130 | this option has no effect. | ||
| 129 | .It Dv SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS | 131 | .It Dv SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS |
| 130 | Disables a countermeasure against a SSL 3.0/TLS 1.0 protocol vulnerability | 132 | Disables a countermeasure against a SSL 3.0/TLS 1.0 protocol vulnerability |
| 131 | affecting CBC ciphers, which cannot be handled by some broken SSL | 133 | affecting CBC ciphers, which cannot be handled by some broken SSL |
