summaryrefslogtreecommitdiff
path: root/src/openvpn/crypto.c
diff options
context:
space:
mode:
authorJörg Frings-Fürst <debian@jff.email>2022-02-09 16:35:11 +0100
committerJörg Frings-Fürst <debian@jff.email>2022-02-09 16:35:11 +0100
commit9d320b2bf4b83f6e2a3c679a399b88dfe57b879e (patch)
treec2862c0ce46b80f565a18a25fa96145ef59ad0b2 /src/openvpn/crypto.c
parent1aff45d6fdfbc63a0256a831a8f8644a84708e9f (diff)
parent8e924e2c919e6fbeae0045b67ac54b9697306d7d (diff)
Update upstream source from tag 'upstream/2.5.5'
Update to upstream version '2.5.5' with Debian dir add1ff02b39ff7fc38c6c53654ab9263533c4f27
Diffstat (limited to 'src/openvpn/crypto.c')
-rw-r--r--src/openvpn/crypto.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/openvpn/crypto.c b/src/openvpn/crypto.c
index 619cd96..6945cc0 100644
--- a/src/openvpn/crypto.c
+++ b/src/openvpn/crypto.c
@@ -729,7 +729,7 @@ warn_insecure_key_type(const char *ciphername, const cipher_kt_t *cipher)
" bit (%d bit). This allows attacks like SWEET32. Mitigate by "
"using a --cipher with a larger block size (e.g. AES-256-CBC). "
"Support for these insecure ciphers will be removed in "
- "OpenVPN 2.6.",
+ "OpenVPN 2.7.",
ciphername, cipher_kt_block_size(cipher)*8);
}
}