aboutsummaryrefslogtreecommitdiffstats
path: root/interimap.1
diff options
context:
space:
mode:
Diffstat (limited to 'interimap.1')
-rw-r--r--interimap.122
1 files changed, 4 insertions, 18 deletions
diff --git a/interimap.1 b/interimap.1
index 621d968..60493f3 100644
--- a/interimap.1
+++ b/interimap.1
@@ -305,18 +305,6 @@ for type \fItype\fR=tunnel.
(Default: \(lqNO\(rq.)
.TP
-.I use-binary
-Whether to use the Binary Content extension [RFC3516] in FETCH and
-APPEND commands.
-This is useful for binary attachments for instance, as it avoids the
-overhead caused by base64 encodings. Moreover if the IMAP COMPRESS
-extension is enabled, full flush points are placed around large non-text
-literals to empty the compression dictionary.
-This option is only available in the default section, and is ignored if
-either server does not advertize \(lqBINARY\(rq in its capability list.
-(Default: \(lqYES\(rq.)
-
-.TP
.I SSL_cipher_list
The cipher list to send to the server. Although the server determines
which cipher suite is used, it should take the first supported cipher in
@@ -329,8 +317,8 @@ Fingerprint of the server certificate (or its public key) in the form
\fIALGO\fR$\fIDIGEST_HEX\fR, where \fIALGO\fR is the used algorithm
(default \(lqsha256\(rq).
Attempting to connect to a server with a non-matching certificate
-fingerprint causes \fBInterIMAP\fR to abort the connection immediately
-after the SSL/TLS handshake.
+fingerprint causes \fBInterIMAP\fR to abort the connection during the
+SSL/TLS handshake.
.TP
.I SSL_verify
@@ -364,11 +352,9 @@ MULTIAPPEND [RFC3502] (recommended),
.IP \[bu]
COMPRESS=DEFLATE [RFC4978] (recommended),
.IP \[bu]
-SASL-IR [RFC4959] SASL Initial Client Response,
-.IP \[bu]
-UNSELECT [RFC3691], and
+SASL-IR [RFC4959] SASL Initial Client Response, and
.IP \[bu]
-BINARY [RFC3516].
+UNSELECT [RFC3691].
.SH KNOWN BUGS AND LIMITATIONS