mirror of
https://github.com/openssl/openssl.git
synced 2025-01-24 13:55:42 +08:00
Correct the UnsafeLegacyServerConnect docs
This option is no longer set by default from OpenSSL 3.0. Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Ben Kaduk <kaduk@mit.edu> (Merged from https://github.com/openssl/openssl/pull/17748)
This commit is contained in:
parent
37be6feeeb
commit
3d4dd8f272
@ -496,7 +496,6 @@ Equivalent to B<SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION>.
|
||||
|
||||
B<UnsafeLegacyServerConnect>: permits the use of unsafe legacy renegotiation
|
||||
for OpenSSL clients only. Equivalent to B<SSL_OP_LEGACY_SERVER_CONNECT>.
|
||||
Set by default.
|
||||
|
||||
B<EncryptThenMac>: use encrypt-then-mac extension, enabled by
|
||||
default. Inverse of B<SSL_OP_NO_ENCRYPT_THEN_MAC>: that is,
|
||||
@ -731,6 +730,9 @@ B<MinProtocol> and B<MaxProtocol> where added in OpenSSL 1.1.0.
|
||||
|
||||
B<AllowNoDHEKEX> and B<PrioritizeChaCha> were added in OpenSSL 1.1.1.
|
||||
|
||||
The B<UnsafeLegacyServerConnect> option is no longer set by default from
|
||||
OpenSSL 3.0.
|
||||
|
||||
=head1 COPYRIGHT
|
||||
|
||||
Copyright 2012-2021 The OpenSSL Project Authors. All Rights Reserved.
|
||||
|
Loading…
Reference in New Issue
Block a user