Skip to content
Snippets Groups Projects
Select Git revision
  • benchmark-tools
  • postgres-lambda
  • master default
  • REL9_4_25
  • REL9_5_20
  • REL9_6_16
  • REL_10_11
  • REL_11_6
  • REL_12_1
  • REL_12_0
  • REL_12_RC1
  • REL_12_BETA4
  • REL9_4_24
  • REL9_5_19
  • REL9_6_15
  • REL_10_10
  • REL_11_5
  • REL_12_BETA3
  • REL9_4_23
  • REL9_5_18
  • REL9_6_14
  • REL_10_9
  • REL_11_4
23 results

fe-secure.c

Blame
    • PostgreSQL Daemon's avatar
      750a0e67
      · 750a0e67
      PostgreSQL Daemon authored
      From the SSL_CTX_new man page:
      
      "SSLv23_method(void), SSLv23_server_method(void), SSLv23_client_method(void)
      
       A TLS/SSL connection established with these methods will understand the SSLv2,
       SSLv3, and TLSv1 protocol. A client will send out SSLv2 client hello messages
       and will indicate that it also understands SSLv3 and TLSv1. A server will
       understand SSLv2, SSLv3, and TLSv1 client hello messages. This is the best
       choice when compatibility is a concern."
      
      This will maintain backwards compatibility for those us that don't use
      TLS connections ...
      750a0e67
      History
      PostgreSQL Daemon authored
      From the SSL_CTX_new man page:
      
      "SSLv23_method(void), SSLv23_server_method(void), SSLv23_client_method(void)
      
       A TLS/SSL connection established with these methods will understand the SSLv2,
       SSLv3, and TLSv1 protocol. A client will send out SSLv2 client hello messages
       and will indicate that it also understands SSLv3 and TLSv1. A server will
       understand SSLv2, SSLv3, and TLSv1 client hello messages. This is the best
       choice when compatibility is a concern."
      
      This will maintain backwards compatibility for those us that don't use
      TLS connections ...