Don't disable TLS v1.2 by default any more.
This commit is contained in:
parent
6b00cd746a
commit
6bd173fced
3 changed files with 0 additions and 8 deletions
|
@ -1044,9 +1044,6 @@ bad:
|
|||
SSL_CTX_set_psk_client_callback(ctx, psk_client_cb);
|
||||
}
|
||||
#endif
|
||||
/* HACK while TLS v1.2 is disabled by default */
|
||||
if (!(off & SSL_OP_NO_TLSv1_2))
|
||||
SSL_CTX_clear_options(ctx, SSL_OP_NO_TLSv1_2);
|
||||
if (bugs)
|
||||
SSL_CTX_set_options(ctx,SSL_OP_ALL|off);
|
||||
else
|
||||
|
|
|
@ -1463,9 +1463,6 @@ bad:
|
|||
SSL_CTX_set_quiet_shutdown(ctx,1);
|
||||
if (bugs) SSL_CTX_set_options(ctx,SSL_OP_ALL);
|
||||
if (hack) SSL_CTX_set_options(ctx,SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG);
|
||||
/* HACK while TLS v1.2 is disabled by default */
|
||||
if (!(off & SSL_OP_NO_TLSv1_2))
|
||||
SSL_CTX_clear_options(ctx, SSL_OP_NO_TLSv1_2);
|
||||
SSL_CTX_set_options(ctx,off);
|
||||
/* DTLS: partial reads end up discarding unread UDP bytes :-(
|
||||
* Setting read ahead solves this problem.
|
||||
|
|
|
@ -1717,8 +1717,6 @@ SSL_CTX *SSL_CTX_new(const SSL_METHOD *meth)
|
|||
* deployed might change this.
|
||||
*/
|
||||
ret->options |= SSL_OP_LEGACY_SERVER_CONNECT;
|
||||
/* Disable TLS v1.2 by default for now */
|
||||
ret->options |= SSL_OP_NO_TLSv1_2;
|
||||
|
||||
return(ret);
|
||||
err:
|
||||
|
|
Loading…
Reference in a new issue