diff options
Diffstat (limited to 'lib/ssl/doc/src')
| -rw-r--r-- | lib/ssl/doc/src/ssl.xml | 40 | ||||
| -rw-r--r-- | lib/ssl/doc/src/ssl_app.xml | 4 | ||||
| -rw-r--r-- | lib/ssl/doc/src/ssl_session_cache_api.xml | 20 | 
3 files changed, 46 insertions, 18 deletions
| diff --git a/lib/ssl/doc/src/ssl.xml b/lib/ssl/doc/src/ssl.xml index 249fee5760..9e6d294f09 100644 --- a/lib/ssl/doc/src/ssl.xml +++ b/lib/ssl/doc/src/ssl.xml @@ -38,7 +38,9 @@        <item>ssl requires the crypto and public_key applications.</item>        <item>Supported SSL/TLS-versions are SSL-3.0, TLS-1.0,        TLS-1.1 and TLS-1.2.</item> -      <item>For security reasons sslv2 is not supported.</item> +      <item>For security reasons SSL-2.0 is not supported.</item> +      <item>For security reasons SSL-3.0 is no longer supported by default, +      but may be configured.</item>        <item>Ephemeral Diffie-Hellman cipher suites are supported        but not Diffie Hellman Certificates cipher suites.</item>        <item>Elliptic Curve cipher suites are supported if crypto @@ -136,7 +138,7 @@      </c></p>     <p><c>cipher() = rc4_128 | des_cbc | '3des_ede_cbc' -      | aes_128_cbc | aes_256_cbc </c></p> +      | aes_128_cbc | aes_256_cbc | aes_128_gcm | aes_256_gcm </c></p>     <p> <c>hash() = md5 | sha      </c></p> @@ -302,7 +304,7 @@ fun(OtpCert :: #'OTPCertificate'{}, Event :: {bad_cert, Reason :: atom() | {revo        </item> -      <tag>{partial_chain, fun(Chain::[DerCert]) -> {trusted_ca, DerCert} | unknown_ca </tag> +      <tag>{partial_chain, fun(Chain::[DerCert]) -> {trusted_ca, DerCert} | unknown_ca }</tag>        <item>  	Claim an intermediat CA in the chain as trusted. TLS will then perform the public_key:pkix_path_validation/3  	with the selected CA as trusted anchor and the rest of the chain. @@ -311,7 +313,7 @@ fun(OtpCert :: #'OTPCertificate'{}, Event :: {bad_cert, Reason :: atom() | {revo        <tag>{versions, [protocol()]}</tag>        <item>TLS protocol versions that will be supported by started clients and servers.        This option overrides the application environment option <c>protocol_version</c>. If the -      environment option is not set it defaults to all versions supported by the SSL application. See also +      environment option is not set it defaults to all versions, except SSL-3.0, supported by the SSL application. See also        <seealso marker="ssl:ssl_app">ssl(6)</seealso>        </item> @@ -928,19 +930,37 @@ fun(srp, Username :: string(), UserState :: term()) ->      </func>      <func> -      <name>versions() -> -	[{SslAppVer, SupportedSslVer, AvailableSslVsn}]</name> +      <name>versions() -> [versions_info()]</name>        <fsummary>Returns version information relevant for the  	ssl application.</fsummary>        <type> -	<v>SslAppVer = string()</v> -      	<v>SupportedSslVer = [protocol()]</v> -      	<v>AvailableSslVsn = [protocol()]</v> +	<v>versions_info() = {app_vsn, string()} | {supported | available, [protocol()] </v>        </type>        <desc>  	<p>  	  Returns version information relevant for the -	  ssl application.</p> +	  ssl application. +	</p> +	<taglist> +	  <tag>app_vsn</tag> +	  <item> The application version of the OTP ssl application.</item> + +	  <tag>supported</tag> + +	  <item>TLS/SSL versions supported by default. +	  Overridden by a versions option on +	  <seealso marker="#connect-2"> connect/[2,3,4]</seealso>, <seealso +	  marker="#listen-2"> listen/2</seealso> and <seealso +	  marker="#ssl_accept-2">ssl_accept/[1,2,3]</seealso>. For the +	  negotiated TLS/SSL version see <seealso +	  marker="#connection_info-1">ssl:connection_info/1 +	  </seealso></item> +	   +	  <tag>available</tag> +	  <item>All TLS/SSL versions that the Erlang ssl application +	  can support. Note that TLS 1.2 requires sufficient support +	  from the crypto application. </item> +	</taglist>        </desc>      </func>      <func> diff --git a/lib/ssl/doc/src/ssl_app.xml b/lib/ssl/doc/src/ssl_app.xml index f1377cabda..e3a3fc27f2 100644 --- a/lib/ssl/doc/src/ssl_app.xml +++ b/lib/ssl/doc/src/ssl_app.xml @@ -75,10 +75,10 @@            </p>        </item> -      <tag><c><![CDATA[session_cb_init_args = list() <optional>]]></c></tag> +      <tag><c><![CDATA[session_cb_init_args = proplist:proplist() <optional>]]></c></tag>        <item>  	<p> -	  List of arguments to the init function in session cache +	  List of additional user defined arguments to the init function in session cache  	  callback module, defaults to [].  	</p>        </item> diff --git a/lib/ssl/doc/src/ssl_session_cache_api.xml b/lib/ssl/doc/src/ssl_session_cache_api.xml index 82de1784ca..cb97bbfbb2 100644 --- a/lib/ssl/doc/src/ssl_session_cache_api.xml +++ b/lib/ssl/doc/src/ssl_session_cache_api.xml @@ -4,7 +4,7 @@  <erlref>    <header>      <copyright> -      <year>1999</year><year>2013</year> +      <year>1999</year><year>2014</year>        <holder>Ericsson AB. All Rights Reserved.</holder>      </copyright>      <legalnotice> @@ -79,17 +79,25 @@      </func>      <func> -      <name>init() -> opaque() </name> +      <name>init(Args) -> opaque() </name>        <fsummary>Return cache reference</fsummary>        <type> -	<v></v> +	<v>Args = proplists:proplist()</v> +	<d>Will always include the property {role, client | server}. Currently this +	is the only predefined property, there may also be user defined properties. +	<seealso marker="ssl_app"> See also application environment variable +	session_cb_init_args</seealso> +	</d>        </type>        <desc>  	<p>Performs possible initializations of the cache and returns  	a reference to it that will be used as parameter to the other -	api functions. Will be called by the cache handling processes -	init function, hence putting the same requirements on it as -	a normal process init function. +	API functions. Will be called by the cache handling processes +	init function, hence putting the same requirements on it as a +	normal process init function. Note that this function will be +	called twice when starting the ssl application, once with the +	role client and once with the role server, as the ssl application +	must be prepared to take on both roles.  	</p>        </desc>      </func> | 
