diff options
author | schwarze <> | 2020-04-14 11:57:31 +0000 |
---|---|---|
committer | schwarze <> | 2020-04-14 11:57:31 +0000 |
commit | 40641eb8e0b7c5ea7648472995adcbfacd8859af (patch) | |
tree | 843dcf81c22e548b3930788b1c32723252b28bad /src/lib | |
parent | 4768641a7cf528f114b3540019a9d2f90ec48c00 (diff) | |
download | openbsd-40641eb8e0b7c5ea7648472995adcbfacd8859af.tar.gz openbsd-40641eb8e0b7c5ea7648472995adcbfacd8859af.tar.bz2 openbsd-40641eb8e0b7c5ea7648472995adcbfacd8859af.zip |
Delete the three sentences listing the ciphers currently included
in LOW, MEDIUM, and HIGH. That's going to change repeatedly and
the extra maintenance effort for keeping it up to date is a waste
because people can trivially run "openssl ciphers -v LOW" to look
it up. Besides, updating it will usually be forgotten; the LOW
entry was already wrong.
Suggested by jsing@.
Diffstat (limited to 'src/lib')
-rw-r--r-- | src/lib/libssl/man/SSL_CTX_set_cipher_list.3 | 17 |
1 files changed, 2 insertions, 15 deletions
diff --git a/src/lib/libssl/man/SSL_CTX_set_cipher_list.3 b/src/lib/libssl/man/SSL_CTX_set_cipher_list.3 index a41b680c23..643cad08f6 100644 --- a/src/lib/libssl/man/SSL_CTX_set_cipher_list.3 +++ b/src/lib/libssl/man/SSL_CTX_set_cipher_list.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: SSL_CTX_set_cipher_list.3,v 1.11 2020/04/11 14:01:59 schwarze Exp $ | 1 | .\" $OpenBSD: SSL_CTX_set_cipher_list.3,v 1.12 2020/04/14 11:57:31 schwarze Exp $ |
2 | .\" full merge up to: OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 | 2 | .\" full merge up to: OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: April 11 2020 $ | 68 | .Dd $Mdocdate: April 14 2020 $ |
69 | .Dt SSL_CTX_SET_CIPHER_LIST 3 | 69 | .Dt SSL_CTX_SET_CIPHER_LIST 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -268,11 +268,6 @@ Cipher suites using HMAC based on GOST R 34.11-94 | |||
268 | for message authentication. | 268 | for message authentication. |
269 | .It Cm HIGH | 269 | .It Cm HIGH |
270 | Cipher suites of high strength. | 270 | Cipher suites of high strength. |
271 | Currently, these are cipher suites using | ||
272 | .Cm CHACHA20 , | ||
273 | .Cm AES , | ||
274 | .Cm CAMELLIA , | ||
275 | or GOST-28178-89-CNT symmetric encryption. | ||
276 | .It Cm IDEA | 271 | .It Cm IDEA |
277 | Cipher suites using IDEA for symmetric encryption. | 272 | Cipher suites using IDEA for symmetric encryption. |
278 | LibreSSL does not provide any such cipher suites. | 273 | LibreSSL does not provide any such cipher suites. |
@@ -286,18 +281,10 @@ Cipher suites using VKO 34.10 key exchange, specified in RFC 4357. | |||
286 | Cipher suites using RSA key exchange. | 281 | Cipher suites using RSA key exchange. |
287 | .It Cm LOW | 282 | .It Cm LOW |
288 | Cipher suites of low strength. | 283 | Cipher suites of low strength. |
289 | Currently, these are cipher suites using | ||
290 | .Cm DES | ||
291 | or | ||
292 | .Cm RC4 | ||
293 | symmetric encryption. | ||
294 | .It Cm MD5 | 284 | .It Cm MD5 |
295 | Cipher suites using MD5 for message authentication. | 285 | Cipher suites using MD5 for message authentication. |
296 | .It Cm MEDIUM | 286 | .It Cm MEDIUM |
297 | Cipher suites of medium strength. | 287 | Cipher suites of medium strength. |
298 | Currently, these are cipher suites using | ||
299 | .Cm 3DES | ||
300 | symmetric encryption. | ||
301 | .It Cm NULL | 288 | .It Cm NULL |
302 | An alias for | 289 | An alias for |
303 | .Cm eNULL . | 290 | .Cm eNULL . |