diff options
author | Andy Polyakov <appro@openssl.org> | 2012-04-26 07:20:06 +0000 |
---|---|---|
committer | Andy Polyakov <appro@openssl.org> | 2012-04-26 07:20:06 +0000 |
commit | 396f8b71acc2013a1547848bf6121869c383d8f2 (patch) | |
tree | 2f82198f3b9026cf3b60d91e35c7e58e2bc8ad02 | |
parent | 43d5b4ff31242a11f79b8506ef0fa2a7489459c7 (diff) | |
download | openssl-396f8b71acc2013a1547848bf6121869c383d8f2.tar.gz |
CHANGES: fix typos and clarify.
-rw-r--r-- | CHANGES | 8 |
1 files changed, 5 insertions, 3 deletions
@@ -291,14 +291,16 @@ Changes between 1.0.1a and 1.0.1b [xx XXX xxxx] - *) OpenSSL 1.0.0 set SSL_OP_ALL to 0x80000FFFL and OpenSSL 1.0.1 and + *) OpenSSL 1.0.0 sets SSL_OP_ALL to 0x80000FFFL and OpenSSL 1.0.1 and 1.0.1a set SSL_OP_NO_TLSv1_1 to 0x00000400L which would unfortunately mean any application compiled against OpenSSL 1.0.0 headers setting SSL_OP_ALL would also set SSL_OP_NO_TLSv1_1, unintentionally disablng - TLS 1.1 also. Fix this by changing the value ot SSL_OP_NO_TLSv1_1 to + TLS 1.1 also. Fix this by changing the value of SSL_OP_NO_TLSv1_1 to 0x10000000L Any application which was previously compiled against OpenSSL 1.0.1 or 1.0.1a headers and which cares about SSL_OP_NO_TLSv1_1 - will need to be recompiled as a result. + will need to be recompiled as a result. Letting be results in + inability to disable specifically TLS 1.1 and in client context, + in unlike event, limit maximum offered version to TLS 1.0 [see below]. [Steve Henson] *) In order to ensure interoperabilty SSL_OP_NO_protocolX does not |