diff options
author | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2014-02-14 07:50:00 +0100 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2014-02-14 07:50:00 +0100 |
commit | 57685713037341dd19ffd9971364c10b4e344f1e (patch) | |
tree | cb465e14219d929c91b6351062a6c0c4a7cfc1cb | |
parent | cf68b1009c891c88231cfbcd249769f8dd22641c (diff) | |
download | gnutls-57685713037341dd19ffd9971364c10b4e344f1e.tar.gz |
do not mention GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT in documentation
-rw-r--r-- | lib/includes/gnutls/x509.h | 7 |
1 files changed, 1 insertions, 6 deletions
diff --git a/lib/includes/gnutls/x509.h b/lib/includes/gnutls/x509.h index ad562fb7ba..f67200805c 100644 --- a/lib/includes/gnutls/x509.h +++ b/lib/includes/gnutls/x509.h @@ -703,10 +703,6 @@ int gnutls_pkcs7_delete_crl(gnutls_pkcs7_t pkcs7, int indx); * unless you know what this means. * @GNUTLS_VERIFY_DISABLE_TRUSTED_TIME_CHECKS: If set a signer in the trusted * list is never checked for expiration or activation. - * @GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT: Allow trusted CA certificates - * with version 1. This is safer than %GNUTLS_VERIFY_ALLOW_ANY_X509_V1_CA_CRT, - * and should be used instead. That way only signers in your trusted list - * will be allowed to have certificates of version 1. This is the default. * @GNUTLS_VERIFY_DO_NOT_ALLOW_X509_V1_CA_CRT: Do not allow trusted CA * certificates that have version 1. This option is to be used * to deprecate all certificates of version 1. @@ -721,8 +717,7 @@ int gnutls_pkcs7_delete_crl(gnutls_pkcs7_t pkcs7, int indx); * @GNUTLS_VERIFY_ALLOW_ANY_X509_V1_CA_CRT: Allow CA certificates that * have version 1 (both root and intermediate). This might be * dangerous since those haven't the basicConstraints - * extension. Must be used in combination with - * %GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT. + * extension. * @GNUTLS_VERIFY_ALLOW_SIGN_RSA_MD2: Allow certificates to be signed * using the broken MD2 algorithm. * @GNUTLS_VERIFY_ALLOW_SIGN_RSA_MD5: Allow certificates to be signed |