Skip to content

Commit 257c5ac

Browse files
tniessendanielleadams
authored andcommitted
doc: remove useless SSL_OP_* options
These 14 options do not have any effect in any supported version of OpenSSL. PR-URL: #46954 Reviewed-By: Ben Noordhuis <[email protected]> Reviewed-By: Filip Skokan <[email protected]> Reviewed-By: Colin Ihrig <[email protected]> Reviewed-By: Luigi Pinca <[email protected]>
1 parent f7423bd commit 257c5ac

File tree

1 file changed

+0
-60
lines changed

1 file changed

+0
-60
lines changed

doc/api/crypto.md

-60
Original file line numberDiff line numberDiff line change
@@ -5813,44 +5813,18 @@ See the [list of SSL OP Flags][] for details.
58135813
<td>Instructs OpenSSL to disable a SSL 3.0/TLS 1.0 vulnerability
58145814
workaround added in OpenSSL 0.9.6d.</td>
58155815
</tr>
5816-
<tr>
5817-
<td><code>SSL_OP_EPHEMERAL_RSA</code></td>
5818-
<td>Instructs OpenSSL to always use the tmp_rsa key when performing RSA
5819-
operations.</td>
5820-
</tr>
58215816
<tr>
58225817
<td><code>SSL_OP_LEGACY_SERVER_CONNECT</code></td>
58235818
<td>Allows initial connection to servers that do not support RI.</td>
58245819
</tr>
5825-
<tr>
5826-
<td><code>SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER</code></td>
5827-
<td></td>
5828-
</tr>
5829-
<tr>
5830-
<td><code>SSL_OP_MICROSOFT_SESS_ID_BUG</code></td>
5831-
<td></td>
5832-
</tr>
5833-
<tr>
5834-
<td><code>SSL_OP_MSIE_SSLV2_RSA_PADDING</code></td>
5835-
<td>Instructs OpenSSL to disable the workaround for a man-in-the-middle
5836-
protocol-version vulnerability in the SSL 2.0 server implementation.</td>
5837-
</tr>
58385820
<tr>
58395821
<td><code>SSL_OP_NETSCAPE_CA_DN_BUG</code></td>
58405822
<td></td>
58415823
</tr>
5842-
<tr>
5843-
<td><code>SSL_OP_NETSCAPE_CHALLENGE_BUG</code></td>
5844-
<td></td>
5845-
</tr>
58465824
<tr>
58475825
<td><code>SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG</code></td>
58485826
<td></td>
58495827
</tr>
5850-
<tr>
5851-
<td><code>SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG</code></td>
5852-
<td></td>
5853-
</tr>
58545828
<tr>
58555829
<td><code>SSL_OP_NO_COMPRESSION</code></td>
58565830
<td>Instructs OpenSSL to disable support for SSL/TLS compression.</td>
@@ -5900,14 +5874,6 @@ See the [list of SSL OP Flags][] for details.
59005874
<td><code>SSL_OP_NO_TLSv1_3</code></td>
59015875
<td>Instructs OpenSSL to turn off TLS v1.3</td>
59025876
</tr>
5903-
<tr>
5904-
<td><code>SSL_OP_PKCS1_CHECK_1</code></td>
5905-
<td></td>
5906-
</tr>
5907-
<tr>
5908-
<td><code>SSL_OP_PKCS1_CHECK_2</code></td>
5909-
<td></td>
5910-
</tr>
59115877
<tr>
59125878
<td><code>SSL_OP_PRIORITIZE_CHACHA</code></td>
59135879
<td>Instructs OpenSSL server to prioritize ChaCha20-Poly1305
@@ -5916,32 +5882,6 @@ See the [list of SSL OP Flags][] for details.
59165882
<code>SSL_OP_CIPHER_SERVER_PREFERENCE</code>
59175883
is not enabled.</td>
59185884
</tr>
5919-
<tr>
5920-
<td><code>SSL_OP_SINGLE_DH_USE</code></td>
5921-
<td>Instructs OpenSSL to always create a new key when using
5922-
temporary/ephemeral DH parameters.</td>
5923-
</tr>
5924-
<tr>
5925-
<td><code>SSL_OP_SINGLE_ECDH_USE</code></td>
5926-
<td>Instructs OpenSSL to always create a new key when using
5927-
temporary/ephemeral ECDH parameters.</td>
5928-
</tr>
5929-
<tr>
5930-
<td><code>SSL_OP_SSLEAY_080_CLIENT_DH_BUG</code></td>
5931-
<td></td>
5932-
</tr>
5933-
<tr>
5934-
<td><code>SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG</code></td>
5935-
<td></td>
5936-
</tr>
5937-
<tr>
5938-
<td><code>SSL_OP_TLS_BLOCK_PADDING_BUG</code></td>
5939-
<td></td>
5940-
</tr>
5941-
<tr>
5942-
<td><code>SSL_OP_TLS_D5_BUG</code></td>
5943-
<td></td>
5944-
</tr>
59455885
<tr>
59465886
<td><code>SSL_OP_TLS_ROLLBACK_BUG</code></td>
59475887
<td>Instructs OpenSSL to disable version rollback attack detection.</td>

0 commit comments

Comments
 (0)