@@ -5813,44 +5813,18 @@ See the [list of SSL OP Flags][] for details.
5813
5813
<td>Instructs OpenSSL to disable a SSL 3.0/TLS 1.0 vulnerability
5814
5814
workaround added in OpenSSL 0.9.6d.</td>
5815
5815
</tr >
5816
- <tr >
5817
- <td><code>SSL_OP_EPHEMERAL_RSA</code></td>
5818
- <td>Instructs OpenSSL to always use the tmp_rsa key when performing RSA
5819
- operations.</td>
5820
- </tr >
5821
5816
<tr >
5822
5817
<td><code>SSL_OP_LEGACY_SERVER_CONNECT</code></td>
5823
5818
<td>Allows initial connection to servers that do not support RI.</td>
5824
5819
</tr >
5825
- <tr >
5826
- <td><code>SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER</code></td>
5827
- <td></td>
5828
- </tr >
5829
- <tr >
5830
- <td><code>SSL_OP_MICROSOFT_SESS_ID_BUG</code></td>
5831
- <td></td>
5832
- </tr >
5833
- <tr >
5834
- <td><code>SSL_OP_MSIE_SSLV2_RSA_PADDING</code></td>
5835
- <td>Instructs OpenSSL to disable the workaround for a man-in-the-middle
5836
- protocol-version vulnerability in the SSL 2.0 server implementation.</td>
5837
- </tr >
5838
5820
<tr >
5839
5821
<td><code>SSL_OP_NETSCAPE_CA_DN_BUG</code></td>
5840
5822
<td></td>
5841
5823
</tr >
5842
- <tr >
5843
- <td><code>SSL_OP_NETSCAPE_CHALLENGE_BUG</code></td>
5844
- <td></td>
5845
- </tr >
5846
5824
<tr >
5847
5825
<td><code>SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG</code></td>
5848
5826
<td></td>
5849
5827
</tr >
5850
- <tr >
5851
- <td><code>SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG</code></td>
5852
- <td></td>
5853
- </tr >
5854
5828
<tr >
5855
5829
<td><code>SSL_OP_NO_COMPRESSION</code></td>
5856
5830
<td>Instructs OpenSSL to disable support for SSL/TLS compression.</td>
@@ -5900,14 +5874,6 @@ See the [list of SSL OP Flags][] for details.
5900
5874
<td><code>SSL_OP_NO_TLSv1_3</code></td>
5901
5875
<td>Instructs OpenSSL to turn off TLS v1.3</td>
5902
5876
</tr >
5903
- <tr >
5904
- <td><code>SSL_OP_PKCS1_CHECK_1</code></td>
5905
- <td></td>
5906
- </tr >
5907
- <tr >
5908
- <td><code>SSL_OP_PKCS1_CHECK_2</code></td>
5909
- <td></td>
5910
- </tr >
5911
5877
<tr >
5912
5878
<td><code>SSL_OP_PRIORITIZE_CHACHA</code></td>
5913
5879
<td>Instructs OpenSSL server to prioritize ChaCha20-Poly1305
@@ -5916,32 +5882,6 @@ See the [list of SSL OP Flags][] for details.
5916
5882
<code>SSL_OP_CIPHER_SERVER_PREFERENCE</code>
5917
5883
is not enabled.</td>
5918
5884
</tr >
5919
- <tr >
5920
- <td><code>SSL_OP_SINGLE_DH_USE</code></td>
5921
- <td>Instructs OpenSSL to always create a new key when using
5922
- temporary/ephemeral DH parameters.</td>
5923
- </tr >
5924
- <tr >
5925
- <td><code>SSL_OP_SINGLE_ECDH_USE</code></td>
5926
- <td>Instructs OpenSSL to always create a new key when using
5927
- temporary/ephemeral ECDH parameters.</td>
5928
- </tr >
5929
- <tr >
5930
- <td><code>SSL_OP_SSLEAY_080_CLIENT_DH_BUG</code></td>
5931
- <td></td>
5932
- </tr >
5933
- <tr >
5934
- <td><code>SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG</code></td>
5935
- <td></td>
5936
- </tr >
5937
- <tr >
5938
- <td><code>SSL_OP_TLS_BLOCK_PADDING_BUG</code></td>
5939
- <td></td>
5940
- </tr >
5941
- <tr >
5942
- <td><code>SSL_OP_TLS_D5_BUG</code></td>
5943
- <td></td>
5944
- </tr >
5945
5885
<tr >
5946
5886
<td><code>SSL_OP_TLS_ROLLBACK_BUG</code></td>
5947
5887
<td>Instructs OpenSSL to disable version rollback attack detection.</td>
0 commit comments