diff options
author | beck <> | 2023-07-03 06:22:07 +0000 |
---|---|---|
committer | beck <> | 2023-07-03 06:22:07 +0000 |
commit | 659aa2178d089822ccf693dbe92409198a5e6eba (patch) | |
tree | 44924c51d45a2c3360c6c969a1a8a3605db5bb42 /src | |
parent | a85cbed79eb84739306350203cd9a95f63a6baa0 (diff) | |
download | openbsd-659aa2178d089822ccf693dbe92409198a5e6eba.tar.gz openbsd-659aa2178d089822ccf693dbe92409198a5e6eba.tar.bz2 openbsd-659aa2178d089822ccf693dbe92409198a5e6eba.zip |
Remove the tls1.0 and 1.1 related options from the openssl(1) toolkit
ok tb@
Diffstat (limited to 'src')
-rw-r--r-- | src/usr.bin/openssl/openssl.1 | 37 | ||||
-rw-r--r-- | src/usr.bin/openssl/s_client.c | 70 | ||||
-rw-r--r-- | src/usr.bin/openssl/s_server.c | 72 |
3 files changed, 20 insertions, 159 deletions
diff --git a/src/usr.bin/openssl/openssl.1 b/src/usr.bin/openssl/openssl.1 index 45ae95fa5b..9868955691 100644 --- a/src/usr.bin/openssl/openssl.1 +++ b/src/usr.bin/openssl/openssl.1 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: openssl.1,v 1.148 2023/06/08 09:40:17 schwarze Exp $ | 1 | .\" $OpenBSD: openssl.1,v 1.149 2023/07/03 06:22:07 beck Exp $ |
2 | .\" ==================================================================== | 2 | .\" ==================================================================== |
3 | .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | 3 | .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. |
4 | .\" | 4 | .\" |
@@ -110,7 +110,7 @@ | |||
110 | .\" copied and put under another distribution licence | 110 | .\" copied and put under another distribution licence |
111 | .\" [including the GNU Public Licence.] | 111 | .\" [including the GNU Public Licence.] |
112 | .\" | 112 | .\" |
113 | .Dd $Mdocdate: June 8 2023 $ | 113 | .Dd $Mdocdate: July 3 2023 $ |
114 | .Dt OPENSSL 1 | 114 | .Dt OPENSSL 1 |
115 | .Os | 115 | .Os |
116 | .Sh NAME | 116 | .Sh NAME |
@@ -911,8 +911,6 @@ Specify the directories to process. | |||
911 | .Sh CIPHERS | 911 | .Sh CIPHERS |
912 | .Nm openssl ciphers | 912 | .Nm openssl ciphers |
913 | .Op Fl hsVv | 913 | .Op Fl hsVv |
914 | .Op Fl tls1 | ||
915 | .Op Fl tls1_1 | ||
916 | .Op Fl tls1_2 | 914 | .Op Fl tls1_2 |
917 | .Op Fl tls1_3 | 915 | .Op Fl tls1_3 |
918 | .Op Ar control | 916 | .Op Ar control |
@@ -936,7 +934,7 @@ The options are as follows: | |||
936 | Print a brief usage message. | 934 | Print a brief usage message. |
937 | .It Fl s | 935 | .It Fl s |
938 | Only list ciphers that are supported by the TLS method. | 936 | Only list ciphers that are supported by the TLS method. |
939 | .It Fl tls1 | tls1_1 | tls1_2 | tls1_3 | 937 | .It Fl tls1_2 | tls1_3 |
940 | In combination with the | 938 | In combination with the |
941 | .Fl s | 939 | .Fl s |
942 | option, list the ciphers which could be used | 940 | option, list the ciphers which could be used |
@@ -4265,7 +4263,6 @@ Verify the input data and output the recovered data. | |||
4265 | .Op Fl crlf | 4263 | .Op Fl crlf |
4266 | .Op Fl debug | 4264 | .Op Fl debug |
4267 | .Op Fl dtls | 4265 | .Op Fl dtls |
4268 | .Op Fl dtls1 | ||
4269 | .Op Fl dtls1_2 | 4266 | .Op Fl dtls1_2 |
4270 | .Op Fl extended_crl | 4267 | .Op Fl extended_crl |
4271 | .Op Fl groups Ar list | 4268 | .Op Fl groups Ar list |
@@ -4286,8 +4283,6 @@ Verify the input data and output the recovered data. | |||
4286 | .Op Fl no_ign_eof | 4283 | .Op Fl no_ign_eof |
4287 | .Op Fl no_legacy_server_connect | 4284 | .Op Fl no_legacy_server_connect |
4288 | .Op Fl no_ticket | 4285 | .Op Fl no_ticket |
4289 | .Op Fl no_tls1 | ||
4290 | .Op Fl no_tls1_1 | ||
4291 | .Op Fl no_tls1_2 | 4286 | .Op Fl no_tls1_2 |
4292 | .Op Fl no_tls1_3 | 4287 | .Op Fl no_tls1_3 |
4293 | .Op Fl pass Ar arg | 4288 | .Op Fl pass Ar arg |
@@ -4307,8 +4302,6 @@ Verify the input data and output the recovered data. | |||
4307 | .Op Fl state | 4302 | .Op Fl state |
4308 | .Op Fl status | 4303 | .Op Fl status |
4309 | .Op Fl timeout | 4304 | .Op Fl timeout |
4310 | .Op Fl tls1 | ||
4311 | .Op Fl tls1_1 | ||
4312 | .Op Fl tls1_2 | 4305 | .Op Fl tls1_2 |
4313 | .Op Fl tls1_3 | 4306 | .Op Fl tls1_3 |
4314 | .Op Fl tlsextdebug | 4307 | .Op Fl tlsextdebug |
@@ -4412,8 +4405,6 @@ as required by some servers. | |||
4412 | Print extensive debugging information, including a hex dump of all traffic. | 4405 | Print extensive debugging information, including a hex dump of all traffic. |
4413 | .It Fl dtls | 4406 | .It Fl dtls |
4414 | Permit any version of DTLS. | 4407 | Permit any version of DTLS. |
4415 | .It Fl dtls1 | ||
4416 | Permit only DTLS1.0. | ||
4417 | .It Fl dtls1_2 | 4408 | .It Fl dtls1_2 |
4418 | Permit only DTLS1.2. | 4409 | Permit only DTLS1.2. |
4419 | .It Fl groups Ar list | 4410 | .It Fl groups Ar list |
@@ -4455,8 +4446,8 @@ Can be used to override the implicit | |||
4455 | .Fl ign_eof | 4446 | .Fl ign_eof |
4456 | after | 4447 | after |
4457 | .Fl quiet . | 4448 | .Fl quiet . |
4458 | .It Fl no_tls1 | no_tls1_1 | no_tls1_2 | no_tls1_3 | 4449 | .It Fl no_tls1_2 | no_tls1_3 |
4459 | Disable the use of TLS1.0, 1.1, 1.2 and 1.3 respectively. | 4450 | Disable the use of TLS1.2 and 1.3 respectively. |
4460 | .It Fl no_ticket | 4451 | .It Fl no_ticket |
4461 | Disable RFC 4507 session ticket support. | 4452 | Disable RFC 4507 session ticket support. |
4462 | .It Fl pass Ar arg | 4453 | .It Fl pass Ar arg |
@@ -4529,8 +4520,8 @@ Send a certificate status request to the server (OCSP stapling). | |||
4529 | The server response (if any) is printed out. | 4520 | The server response (if any) is printed out. |
4530 | .It Fl timeout | 4521 | .It Fl timeout |
4531 | Enable send/receive timeout on DTLS connections. | 4522 | Enable send/receive timeout on DTLS connections. |
4532 | .It Fl tls1 | tls1_1 | tls1_2 | tls1_3 | 4523 | .It Fl tls1_2 | tls1_3 |
4533 | Permit only TLS1.0, 1.1, 1.2 or 1.3 respectively. | 4524 | Permit only TLS1.2 or 1.3 respectively. |
4534 | .It Fl tlsextdebug | 4525 | .It Fl tlsextdebug |
4535 | Print a hex dump of any TLS extensions received from the server. | 4526 | Print a hex dump of any TLS extensions received from the server. |
4536 | .It Fl use_srtp Ar profiles | 4527 | .It Fl use_srtp Ar profiles |
@@ -4599,8 +4590,6 @@ will be used. | |||
4599 | .Op Fl no_dhe | 4590 | .Op Fl no_dhe |
4600 | .Op Fl no_ecdhe | 4591 | .Op Fl no_ecdhe |
4601 | .Op Fl no_ticket | 4592 | .Op Fl no_ticket |
4602 | .Op Fl no_tls1 | ||
4603 | .Op Fl no_tls1_1 | ||
4604 | .Op Fl no_tls1_2 | 4593 | .Op Fl no_tls1_2 |
4605 | .Op Fl no_tls1_3 | 4594 | .Op Fl no_tls1_3 |
4606 | .Op Fl no_tmp_rsa | 4595 | .Op Fl no_tmp_rsa |
@@ -4616,8 +4605,6 @@ will be used. | |||
4616 | .Op Fl status_url Ar url | 4605 | .Op Fl status_url Ar url |
4617 | .Op Fl status_verbose | 4606 | .Op Fl status_verbose |
4618 | .Op Fl timeout | 4607 | .Op Fl timeout |
4619 | .Op Fl tls1 | ||
4620 | .Op Fl tls1_1 | ||
4621 | .Op Fl tls1_2 | 4608 | .Op Fl tls1_2 |
4622 | .Op Fl tls1_3 | 4609 | .Op Fl tls1_3 |
4623 | .Op Fl tlsextdebug | 4610 | .Op Fl tlsextdebug |
@@ -4749,8 +4736,6 @@ If this fails, a static set of parameters hard coded into the | |||
4749 | program will be used. | 4736 | program will be used. |
4750 | .It Fl dtls | 4737 | .It Fl dtls |
4751 | Permit any version of DTLS. | 4738 | Permit any version of DTLS. |
4752 | .It Fl dtls1 | ||
4753 | Permit only DTLS1.0. | ||
4754 | .It Fl dtls1_2 | 4739 | .It Fl dtls1_2 |
4755 | Permit only DTLS1.2. | 4740 | Permit only DTLS1.2. |
4756 | .It Fl groups Ar list | 4741 | .It Fl groups Ar list |
@@ -4813,8 +4798,8 @@ Disable ephemeral DH cipher suites. | |||
4813 | Disable ephemeral ECDH cipher suites. | 4798 | Disable ephemeral ECDH cipher suites. |
4814 | .It Fl no_ticket | 4799 | .It Fl no_ticket |
4815 | Disable RFC 4507 session ticket support. | 4800 | Disable RFC 4507 session ticket support. |
4816 | .It Fl no_tls1 | no_tls1_1 | no_tls1_2 | no_tls1_3 | 4801 | .It Fl no_tls1_2 | no_tls1_3 |
4817 | Disable the use of TLS1.0, 1.1, 1.2, and 1.3, respectively. | 4802 | Disable the use of TLS1.2, and 1.3, respectively. |
4818 | .It Fl no_tmp_rsa | 4803 | .It Fl no_tmp_rsa |
4819 | Disable temporary RSA key generation. | 4804 | Disable temporary RSA key generation. |
4820 | .It Fl nocert | 4805 | .It Fl nocert |
@@ -4849,8 +4834,8 @@ Enables certificate status request support (OCSP stapling) and gives a verbose | |||
4849 | printout of the OCSP response. | 4834 | printout of the OCSP response. |
4850 | .It Fl timeout | 4835 | .It Fl timeout |
4851 | Enable send/receive timeout on DTLS connections. | 4836 | Enable send/receive timeout on DTLS connections. |
4852 | .It Fl tls1 | tls1_1 | tls1_2 | tls1_3 | 4837 | .It Fl tls1_2 | tls1_3 |
4853 | Permit only TLS1.0, 1.1, 1.2, or 1.3, respectively. | 4838 | Permit only TLS1.2, or 1.3, respectively. |
4854 | .It Fl tlsextdebug | 4839 | .It Fl tlsextdebug |
4855 | Print a hex dump of any TLS extensions received from the server. | 4840 | Print a hex dump of any TLS extensions received from the server. |
4856 | .It Fl use_srtp Ar profiles | 4841 | .It Fl use_srtp Ar profiles |
diff --git a/src/usr.bin/openssl/s_client.c b/src/usr.bin/openssl/s_client.c index 82a8128243..21bb632810 100644 --- a/src/usr.bin/openssl/s_client.c +++ b/src/usr.bin/openssl/s_client.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s_client.c,v 1.60 2023/03/06 14:32:06 tb Exp $ */ | 1 | /* $OpenBSD: s_client.c,v 1.61 2023/07/03 06:22:07 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -296,18 +296,6 @@ s_client_opt_protocol_version_dtls(void) | |||
296 | } | 296 | } |
297 | #endif | 297 | #endif |
298 | 298 | ||
299 | #ifndef OPENSSL_NO_DTLS1 | ||
300 | static int | ||
301 | s_client_opt_protocol_version_dtls1(void) | ||
302 | { | ||
303 | cfg.meth = DTLS_client_method(); | ||
304 | cfg.min_version = DTLS1_VERSION; | ||
305 | cfg.max_version = DTLS1_VERSION; | ||
306 | cfg.socket_type = SOCK_DGRAM; | ||
307 | return (0); | ||
308 | } | ||
309 | #endif | ||
310 | |||
311 | #ifndef OPENSSL_NO_DTLS1_2 | 299 | #ifndef OPENSSL_NO_DTLS1_2 |
312 | static int | 300 | static int |
313 | s_client_opt_protocol_version_dtls1_2(void) | 301 | s_client_opt_protocol_version_dtls1_2(void) |
@@ -321,22 +309,6 @@ s_client_opt_protocol_version_dtls1_2(void) | |||
321 | #endif | 309 | #endif |
322 | 310 | ||
323 | static int | 311 | static int |
324 | s_client_opt_protocol_version_tls1(void) | ||
325 | { | ||
326 | cfg.min_version = TLS1_VERSION; | ||
327 | cfg.max_version = TLS1_VERSION; | ||
328 | return (0); | ||
329 | } | ||
330 | |||
331 | static int | ||
332 | s_client_opt_protocol_version_tls1_1(void) | ||
333 | { | ||
334 | cfg.min_version = TLS1_1_VERSION; | ||
335 | cfg.max_version = TLS1_1_VERSION; | ||
336 | return (0); | ||
337 | } | ||
338 | |||
339 | static int | ||
340 | s_client_opt_protocol_version_tls1_2(void) | 312 | s_client_opt_protocol_version_tls1_2(void) |
341 | { | 313 | { |
342 | cfg.min_version = TLS1_2_VERSION; | 314 | cfg.min_version = TLS1_2_VERSION; |
@@ -505,14 +477,6 @@ static const struct option s_client_options[] = { | |||
505 | .opt.func = s_client_opt_protocol_version_dtls, | 477 | .opt.func = s_client_opt_protocol_version_dtls, |
506 | }, | 478 | }, |
507 | #endif | 479 | #endif |
508 | #ifndef OPENSSL_NO_DTLS1 | ||
509 | { | ||
510 | .name = "dtls1", | ||
511 | .desc = "Just use DTLSv1", | ||
512 | .type = OPTION_FUNC, | ||
513 | .opt.func = s_client_opt_protocol_version_dtls1, | ||
514 | }, | ||
515 | #endif | ||
516 | #ifndef OPENSSL_NO_DTLS1_2 | 480 | #ifndef OPENSSL_NO_DTLS1_2 |
517 | { | 481 | { |
518 | .name = "dtls1_2", | 482 | .name = "dtls1_2", |
@@ -660,20 +624,6 @@ static const struct option s_client_options[] = { | |||
660 | .value = SSL_OP_NO_TICKET, | 624 | .value = SSL_OP_NO_TICKET, |
661 | }, | 625 | }, |
662 | { | 626 | { |
663 | .name = "no_tls1", | ||
664 | .desc = "Disable the use of TLSv1", | ||
665 | .type = OPTION_VALUE_OR, | ||
666 | .opt.value = &cfg.off, | ||
667 | .value = SSL_OP_NO_TLSv1, | ||
668 | }, | ||
669 | { | ||
670 | .name = "no_tls1_1", | ||
671 | .desc = "Disable the use of TLSv1.1", | ||
672 | .type = OPTION_VALUE_OR, | ||
673 | .opt.value = &cfg.off, | ||
674 | .value = SSL_OP_NO_TLSv1_1, | ||
675 | }, | ||
676 | { | ||
677 | .name = "no_tls1_2", | 627 | .name = "no_tls1_2", |
678 | .desc = "Disable the use of TLSv1.2", | 628 | .desc = "Disable the use of TLSv1.2", |
679 | .type = OPTION_VALUE_OR, | 629 | .type = OPTION_VALUE_OR, |
@@ -806,18 +756,6 @@ static const struct option s_client_options[] = { | |||
806 | }, | 756 | }, |
807 | #endif | 757 | #endif |
808 | { | 758 | { |
809 | .name = "tls1", | ||
810 | .desc = "Just use TLSv1", | ||
811 | .type = OPTION_FUNC, | ||
812 | .opt.func = s_client_opt_protocol_version_tls1, | ||
813 | }, | ||
814 | { | ||
815 | .name = "tls1_1", | ||
816 | .desc = "Just use TLSv1.1", | ||
817 | .type = OPTION_FUNC, | ||
818 | .opt.func = s_client_opt_protocol_version_tls1_1, | ||
819 | }, | ||
820 | { | ||
821 | .name = "tls1_2", | 759 | .name = "tls1_2", |
822 | .desc = "Just use TLSv1.2", | 760 | .desc = "Just use TLSv1.2", |
823 | .type = OPTION_FUNC, | 761 | .type = OPTION_FUNC, |
@@ -880,17 +818,17 @@ sc_usage(void) | |||
880 | "[-4 | -6] [-alpn protocols] [-bugs] [-CAfile file]\n" | 818 | "[-4 | -6] [-alpn protocols] [-bugs] [-CAfile file]\n" |
881 | " [-CApath directory] [-cert file] [-certform der | pem] [-check_ss_sig]\n" | 819 | " [-CApath directory] [-cert file] [-certform der | pem] [-check_ss_sig]\n" |
882 | " [-cipher cipherlist] [-connect host[:port]] [-crl_check]\n" | 820 | " [-cipher cipherlist] [-connect host[:port]] [-crl_check]\n" |
883 | " [-crl_check_all] [-crlf] [-debug] [-dtls] [-dtls1] [-dtls1_2] [-extended_crl]\n" | 821 | " [-crl_check_all] [-crlf] [-debug] [-dtls] [-dtls1_2] [-extended_crl]\n" |
884 | " [-groups list] [-host host] [-ign_eof] [-ignore_critical]\n" | 822 | " [-groups list] [-host host] [-ign_eof] [-ignore_critical]\n" |
885 | " [-issuer_checks] [-key keyfile] [-keyform der | pem]\n" | 823 | " [-issuer_checks] [-key keyfile] [-keyform der | pem]\n" |
886 | " [-keymatexport label] [-keymatexportlen len] [-legacy_server_connect]\n" | 824 | " [-keymatexport label] [-keymatexportlen len] [-legacy_server_connect]\n" |
887 | " [-msg] [-mtu mtu] [-nbio] [-nbio_test] [-no_comp] [-no_ign_eof]\n" | 825 | " [-msg] [-mtu mtu] [-nbio] [-nbio_test] [-no_comp] [-no_ign_eof]\n" |
888 | " [-no_legacy_server_connect] [-no_ticket] [-no_tls1] [-no_tls1_1]\n" | 826 | " [-no_legacy_server_connect] [-no_ticket] \n" |
889 | " [-no_tls1_2] [-no_tls1_3] [-pass arg] [-pause] [-policy_check]\n" | 827 | " [-no_tls1_2] [-no_tls1_3] [-pass arg] [-pause] [-policy_check]\n" |
890 | " [-port port] [-prexit] [-proxy host:port] [-quiet] [-reconnect]\n" | 828 | " [-port port] [-prexit] [-proxy host:port] [-quiet] [-reconnect]\n" |
891 | " [-servername name] [-serverpref] [-sess_in file] [-sess_out file]\n" | 829 | " [-servername name] [-serverpref] [-sess_in file] [-sess_out file]\n" |
892 | " [-showcerts] [-starttls protocol] [-state] [-status] [-timeout]\n" | 830 | " [-showcerts] [-starttls protocol] [-state] [-status] [-timeout]\n" |
893 | " [-tls1] [-tls1_1] [-tls1_2] [-tls1_3] [-tlsextdebug]\n" | 831 | " [-tls1_2] [-tls1_3] [-tlsextdebug]\n" |
894 | " [-use_srtp profiles] [-verify depth] [-verify_return_error]\n" | 832 | " [-use_srtp profiles] [-verify depth] [-verify_return_error]\n" |
895 | " [-x509_strict] [-xmpphost host]\n"); | 833 | " [-x509_strict] [-xmpphost host]\n"); |
896 | fprintf(stderr, "\n"); | 834 | fprintf(stderr, "\n"); |
diff --git a/src/usr.bin/openssl/s_server.c b/src/usr.bin/openssl/s_server.c index a7f6146c4c..12eb90699e 100644 --- a/src/usr.bin/openssl/s_server.c +++ b/src/usr.bin/openssl/s_server.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s_server.c,v 1.56 2023/03/06 14:32:06 tb Exp $ */ | 1 | /* $OpenBSD: s_server.c,v 1.57 2023/07/03 06:22:07 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -341,18 +341,6 @@ s_server_opt_protocol_version_dtls(void) | |||
341 | } | 341 | } |
342 | #endif | 342 | #endif |
343 | 343 | ||
344 | #ifndef OPENSSL_NO_DTLS1 | ||
345 | static int | ||
346 | s_server_opt_protocol_version_dtls1(void) | ||
347 | { | ||
348 | cfg.meth = DTLS_server_method(); | ||
349 | cfg.min_version = DTLS1_VERSION; | ||
350 | cfg.max_version = DTLS1_VERSION; | ||
351 | cfg.socket_type = SOCK_DGRAM; | ||
352 | return (0); | ||
353 | } | ||
354 | #endif | ||
355 | |||
356 | #ifndef OPENSSL_NO_DTLS1_2 | 344 | #ifndef OPENSSL_NO_DTLS1_2 |
357 | static int | 345 | static int |
358 | s_server_opt_protocol_version_dtls1_2(void) | 346 | s_server_opt_protocol_version_dtls1_2(void) |
@@ -366,22 +354,6 @@ s_server_opt_protocol_version_dtls1_2(void) | |||
366 | #endif | 354 | #endif |
367 | 355 | ||
368 | static int | 356 | static int |
369 | s_server_opt_protocol_version_tls1(void) | ||
370 | { | ||
371 | cfg.min_version = TLS1_VERSION; | ||
372 | cfg.max_version = TLS1_VERSION; | ||
373 | return (0); | ||
374 | } | ||
375 | |||
376 | static int | ||
377 | s_server_opt_protocol_version_tls1_1(void) | ||
378 | { | ||
379 | cfg.min_version = TLS1_1_VERSION; | ||
380 | cfg.max_version = TLS1_1_VERSION; | ||
381 | return (0); | ||
382 | } | ||
383 | |||
384 | static int | ||
385 | s_server_opt_protocol_version_tls1_2(void) | 357 | s_server_opt_protocol_version_tls1_2(void) |
386 | { | 358 | { |
387 | cfg.min_version = TLS1_2_VERSION; | 359 | cfg.min_version = TLS1_2_VERSION; |
@@ -648,14 +620,6 @@ static const struct option s_server_options[] = { | |||
648 | .opt.func = s_server_opt_protocol_version_dtls, | 620 | .opt.func = s_server_opt_protocol_version_dtls, |
649 | }, | 621 | }, |
650 | #endif | 622 | #endif |
651 | #ifndef OPENSSL_NO_DTLS1 | ||
652 | { | ||
653 | .name = "dtls1", | ||
654 | .desc = "Just use DTLSv1", | ||
655 | .type = OPTION_FUNC, | ||
656 | .opt.func = s_server_opt_protocol_version_dtls1, | ||
657 | }, | ||
658 | #endif | ||
659 | #ifndef OPENSSL_NO_DTLS1_2 | 623 | #ifndef OPENSSL_NO_DTLS1_2 |
660 | { | 624 | { |
661 | .name = "dtls1_2", | 625 | .name = "dtls1_2", |
@@ -817,20 +781,6 @@ static const struct option s_server_options[] = { | |||
817 | .value = SSL_OP_NO_SSLv3, | 781 | .value = SSL_OP_NO_SSLv3, |
818 | }, | 782 | }, |
819 | { | 783 | { |
820 | .name = "no_tls1", | ||
821 | .desc = "Just disable TLSv1", | ||
822 | .type = OPTION_VALUE_OR, | ||
823 | .opt.value = &cfg.off, | ||
824 | .value = SSL_OP_NO_TLSv1, | ||
825 | }, | ||
826 | { | ||
827 | .name = "no_tls1_1", | ||
828 | .desc = "Just disable TLSv1.1", | ||
829 | .type = OPTION_VALUE_OR, | ||
830 | .opt.value = &cfg.off, | ||
831 | .value = SSL_OP_NO_TLSv1_1, | ||
832 | }, | ||
833 | { | ||
834 | .name = "no_tls1_2", | 784 | .name = "no_tls1_2", |
835 | .desc = "Just disable TLSv1.2", | 785 | .desc = "Just disable TLSv1.2", |
836 | .type = OPTION_VALUE_OR, | 786 | .type = OPTION_VALUE_OR, |
@@ -935,18 +885,6 @@ static const struct option s_server_options[] = { | |||
935 | }, | 885 | }, |
936 | #endif | 886 | #endif |
937 | { | 887 | { |
938 | .name = "tls1", | ||
939 | .desc = "Just talk TLSv1", | ||
940 | .type = OPTION_FUNC, | ||
941 | .opt.func = s_server_opt_protocol_version_tls1, | ||
942 | }, | ||
943 | { | ||
944 | .name = "tls1_1", | ||
945 | .desc = "Just talk TLSv1.1", | ||
946 | .type = OPTION_FUNC, | ||
947 | .opt.func = s_server_opt_protocol_version_tls1_1, | ||
948 | }, | ||
949 | { | ||
950 | .name = "tls1_2", | 888 | .name = "tls1_2", |
951 | .desc = "Just talk TLSv1.2", | 889 | .desc = "Just talk TLSv1.2", |
952 | .type = OPTION_FUNC, | 890 | .type = OPTION_FUNC, |
@@ -1050,17 +988,17 @@ sv_usage(void) | |||
1050 | " [-context id] [-crl_check] [-crl_check_all] [-crlf]\n" | 988 | " [-context id] [-crl_check] [-crl_check_all] [-crlf]\n" |
1051 | " [-dcert file] [-dcertform der | pem] [-debug]\n" | 989 | " [-dcert file] [-dcertform der | pem] [-debug]\n" |
1052 | " [-dhparam file] [-dkey file] [-dkeyform der | pem]\n" | 990 | " [-dhparam file] [-dkey file] [-dkeyform der | pem]\n" |
1053 | " [-dpass arg] [-dtls] [-dtls1] [-dtls1_2] [-groups list] [-HTTP]\n" | 991 | " [-dpass arg] [-dtls] [-dtls1_2] [-groups list] [-HTTP]\n" |
1054 | " [-id_prefix arg] [-key keyfile] [-key2 keyfile]\n" | 992 | " [-id_prefix arg] [-key keyfile] [-key2 keyfile]\n" |
1055 | " [-keyform der | pem] [-keymatexport label]\n" | 993 | " [-keyform der | pem] [-keymatexport label]\n" |
1056 | " [-keymatexportlen len] [-msg] [-mtu mtu] [-naccept num]\n" | 994 | " [-keymatexportlen len] [-msg] [-mtu mtu] [-naccept num]\n" |
1057 | " [-named_curve arg] [-nbio] [-nbio_test] [-no_cache]\n" | 995 | " [-named_curve arg] [-nbio] [-nbio_test] [-no_cache]\n" |
1058 | " [-no_dhe] [-no_ecdhe] [-no_ticket] [-no_tls1]\n" | 996 | " [-no_dhe] [-no_ecdhe] [-no_ticket] \n" |
1059 | " [-no_tls1_1] [-no_tls1_2] [-no_tls1_3] [-no_tmp_rsa]\n" | 997 | " [-no_tls1_2] [-no_tls1_3] [-no_tmp_rsa]\n" |
1060 | " [-nocert] [-pass arg] [-quiet] [-servername name]\n" | 998 | " [-nocert] [-pass arg] [-quiet] [-servername name]\n" |
1061 | " [-servername_fatal] [-serverpref] [-state] [-status]\n" | 999 | " [-servername_fatal] [-serverpref] [-state] [-status]\n" |
1062 | " [-status_timeout nsec] [-status_url url]\n" | 1000 | " [-status_timeout nsec] [-status_url url]\n" |
1063 | " [-status_verbose] [-timeout] [-tls1] [-tls1_1]\n" | 1001 | " [-status_verbose] [-timeout] \n" |
1064 | " [-tls1_2] [-tls1_3] [-tlsextdebug] [-use_srtp profiles]\n" | 1002 | " [-tls1_2] [-tls1_3] [-tlsextdebug] [-use_srtp profiles]\n" |
1065 | " [-Verify depth] [-verify depth] [-verify_return_error]\n" | 1003 | " [-Verify depth] [-verify depth] [-verify_return_error]\n" |
1066 | " [-WWW] [-www]\n"); | 1004 | " [-WWW] [-www]\n"); |