diff options
author | Lutz Jänicke <jaenicke@openssl.org> | 2001-07-23 12:57:37 +0000 |
---|---|---|
committer | Lutz Jänicke <jaenicke@openssl.org> | 2001-07-23 12:57:37 +0000 |
commit | 3e3dac9f97a4f8ee5954f8ff9bec4c616e090146 (patch) | |
tree | 6d9456f6babee1df5fc383893684fa4d38d6ded1 /doc | |
parent | 397ba0f08a9a8f65c730c23ea4372b3abced9b8b (diff) |
Additional inline reference.
Diffstat (limited to 'doc')
-rw-r--r-- | doc/ssl/SSL_CTX_set_cipher_list.pod | 6 |
1 files changed, 4 insertions, 2 deletions
diff --git a/doc/ssl/SSL_CTX_set_cipher_list.pod b/doc/ssl/SSL_CTX_set_cipher_list.pod index 0fec568296..ed64f64157 100644 --- a/doc/ssl/SSL_CTX_set_cipher_list.pod +++ b/doc/ssl/SSL_CTX_set_cipher_list.pod @@ -41,10 +41,12 @@ RSA export ciphers with a keylength of 512 bits for the RSA key require a temporary 512 bit RSA key, as typically the supplied key has a length of 1024 bit (see L<SSL_CTX_set_tmp_rsa_callback(3)|SSL_CTX_set_tmp_rsa_callback(3)>). -RSA ciphers using EDH need a certificate and key and additional DH-parameters. +RSA ciphers using EDH need a certificate and key and additional DH-parameters +(see L<SSL_CTX_set_tmp_dh_callback(3)|SSL_CTX_set_tmp_dh_callback(3)>). A DSA cipher can only be chosen, when a DSA certificate is available. -DSA ciphers always use DH key exchange and therefore need DH-parameters. +DSA ciphers always use DH key exchange and therefore need DH-parameters +(see L<SSL_CTX_set_tmp_dh_callback(3)|SSL_CTX_set_tmp_dh_callback(3)>). When these conditions are not met for any cipher in the list (e.g. a client only supports export RSA ciphers with a asymmetric key length |