From 9c80a8810759c9ed19606547c5aaa47aa1699be4 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Lo=C3=AFc=20Hoguin?= ssl_opt() = {alpn_preferred_protocols, [binary()]}
- | {beast_mitigation, one_n_minus_one | zero_n | disabled}
| {cacertfile, string()}
| {cacerts, [public_key:der_encoded()]}
| {cert, public_key:der_encoded()}
@@ -111,18 +110,15 @@ http://www.gnu.org/software/src-highlite -->
| {keyfile, string()}
| {log_alert, boolean()}
| {next_protocols_advertised, [binary()]}
- | {padding_check, boolean()}
| {partial_chain, fun(([public_key:der_encoded()]) -> {trusted_ca, public_key:der_encoded()} | unknown_ca)}
| {password, string()}
| {psk_identity, string()}
| {reuse_session, fun()}
| {reuse_sessions, boolean()}
| {secure_renegotiate, boolean()}
- | {signature_algs, [{atom(), atom()}]}
| {sni_fun, fun()}
| {sni_hosts, [{string(), ssl_opt()}]}
| {user_lookup_fun, {fun(), any()}}
- | {v2_hello_compatible, boolean()}
| {verify, ssl:verify_type()}
| {verify_fun, {fun(), any()}}
| {versions, [atom()]}.
@@ -154,14 +150,6 @@ alpn_preferred_protocols
- Change the BEAST mitigation strategy for SSL-3.0 and TLS-1.0 to interoperate with legacy software. -
-- Allow disabling the block cipher padding check for TLS-1.0 to be able to interoperate with legacy software. -
-- The TLS signature algorithm extension may be used, from TLS 1.2, to negotiate which signature algorithm to use during the TLS handshake. -
-- Accept clients that send hello messages in SSL-2.0 format while offering supported SSL/TLS versions. -
-