From 2b8fa1d56cd3a41d666994a1b2ed9df0f5e5d1ec Mon Sep 17 00:00:00 2001 From: Kurt Roeckx Date: Wed, 2 Mar 2016 22:39:40 +0100 Subject: Deprecate the use of version-specific methods Reviewed-by: Viktor Dukhovni MR: #1824 --- doc/ssl/SSL_CTX_new.pod | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) (limited to 'doc') diff --git a/doc/ssl/SSL_CTX_new.pod b/doc/ssl/SSL_CTX_new.pod index 6590711..f2cdc71 100644 --- a/doc/ssl/SSL_CTX_new.pod +++ b/doc/ssl/SSL_CTX_new.pod @@ -92,7 +92,7 @@ These are the general-purpose I SSL/TLS methods. The actual protocol version used will be negotiated to the highest version mutually supported by the client and the server. The supported protocols are SSLv3, TLSv1, TLSv1.1 and TLSv1.2. -Most applications should use these method, and avoid the version specific +Applications should use these methods, and avoid the version-specific methods described below. =item SSLv23_method(), SSLv23_server_method(), SSLv23_client_method() @@ -196,6 +196,8 @@ SSLv23_method(), SSLv23_server_method() and SSLv23_client_method() were deprecated and the preferred TLS_method(), TLS_server_method() and TLS_client_method() functions were introduced in OpenSSL 1.1.0. +All version-specific methods were deprecated in OpenSSL 1.1.0. + =head1 SEE ALSO L, L, L, -- cgit v1.1