Skip to content

Commit db81af6

Browse files
authored
doc: remove useless SSL_OP_* options
These 14 options do not have any effect in any supported version of OpenSSL. PR-URL: #46954 Reviewed-By: Ben Noordhuis <[email protected]> Reviewed-By: Filip Skokan <[email protected]> Reviewed-By: Colin Ihrig <[email protected]> Reviewed-By: Luigi Pinca <[email protected]>
1 parent 2d9bf91 commit db81af6

File tree

1 file changed

+0
-60
lines changed

1 file changed

+0
-60
lines changed

doc/api/crypto.md

Lines changed: 0 additions & 60 deletions
Original file line numberDiff line numberDiff line change
@@ -5829,44 +5829,18 @@ See the [list of SSL OP Flags][] for details.
58295829
<td>Instructs OpenSSL to disable a SSL 3.0/TLS 1.0 vulnerability
58305830
workaround added in OpenSSL 0.9.6d.</td>
58315831
</tr>
5832-
<tr>
5833-
<td><code>SSL_OP_EPHEMERAL_RSA</code></td>
5834-
<td>Instructs OpenSSL to always use the tmp_rsa key when performing RSA
5835-
operations.</td>
5836-
</tr>
58375832
<tr>
58385833
<td><code>SSL_OP_LEGACY_SERVER_CONNECT</code></td>
58395834
<td>Allows initial connection to servers that do not support RI.</td>
58405835
</tr>
5841-
<tr>
5842-
<td><code>SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER</code></td>
5843-
<td></td>
5844-
</tr>
5845-
<tr>
5846-
<td><code>SSL_OP_MICROSOFT_SESS_ID_BUG</code></td>
5847-
<td></td>
5848-
</tr>
5849-
<tr>
5850-
<td><code>SSL_OP_MSIE_SSLV2_RSA_PADDING</code></td>
5851-
<td>Instructs OpenSSL to disable the workaround for a man-in-the-middle
5852-
protocol-version vulnerability in the SSL 2.0 server implementation.</td>
5853-
</tr>
58545836
<tr>
58555837
<td><code>SSL_OP_NETSCAPE_CA_DN_BUG</code></td>
58565838
<td></td>
58575839
</tr>
5858-
<tr>
5859-
<td><code>SSL_OP_NETSCAPE_CHALLENGE_BUG</code></td>
5860-
<td></td>
5861-
</tr>
58625840
<tr>
58635841
<td><code>SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG</code></td>
58645842
<td></td>
58655843
</tr>
5866-
<tr>
5867-
<td><code>SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG</code></td>
5868-
<td></td>
5869-
</tr>
58705844
<tr>
58715845
<td><code>SSL_OP_NO_COMPRESSION</code></td>
58725846
<td>Instructs OpenSSL to disable support for SSL/TLS compression.</td>
@@ -5916,14 +5890,6 @@ See the [list of SSL OP Flags][] for details.
59165890
<td><code>SSL_OP_NO_TLSv1_3</code></td>
59175891
<td>Instructs OpenSSL to turn off TLS v1.3</td>
59185892
</tr>
5919-
<tr>
5920-
<td><code>SSL_OP_PKCS1_CHECK_1</code></td>
5921-
<td></td>
5922-
</tr>
5923-
<tr>
5924-
<td><code>SSL_OP_PKCS1_CHECK_2</code></td>
5925-
<td></td>
5926-
</tr>
59275893
<tr>
59285894
<td><code>SSL_OP_PRIORITIZE_CHACHA</code></td>
59295895
<td>Instructs OpenSSL server to prioritize ChaCha20-Poly1305
@@ -5932,32 +5898,6 @@ See the [list of SSL OP Flags][] for details.
59325898
<code>SSL_OP_CIPHER_SERVER_PREFERENCE</code>
59335899
is not enabled.</td>
59345900
</tr>
5935-
<tr>
5936-
<td><code>SSL_OP_SINGLE_DH_USE</code></td>
5937-
<td>Instructs OpenSSL to always create a new key when using
5938-
temporary/ephemeral DH parameters.</td>
5939-
</tr>
5940-
<tr>
5941-
<td><code>SSL_OP_SINGLE_ECDH_USE</code></td>
5942-
<td>Instructs OpenSSL to always create a new key when using
5943-
temporary/ephemeral ECDH parameters.</td>
5944-
</tr>
5945-
<tr>
5946-
<td><code>SSL_OP_SSLEAY_080_CLIENT_DH_BUG</code></td>
5947-
<td></td>
5948-
</tr>
5949-
<tr>
5950-
<td><code>SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG</code></td>
5951-
<td></td>
5952-
</tr>
5953-
<tr>
5954-
<td><code>SSL_OP_TLS_BLOCK_PADDING_BUG</code></td>
5955-
<td></td>
5956-
</tr>
5957-
<tr>
5958-
<td><code>SSL_OP_TLS_D5_BUG</code></td>
5959-
<td></td>
5960-
</tr>
59615901
<tr>
59625902
<td><code>SSL_OP_TLS_ROLLBACK_BUG</code></td>
59635903
<td>Instructs OpenSSL to disable version rollback attack detection.</td>

0 commit comments

Comments
 (0)