@@ -5829,44 +5829,18 @@ See the [list of SSL OP Flags][] for details.
5829
5829
<td>Instructs OpenSSL to disable a SSL 3.0/TLS 1.0 vulnerability
5830
5830
workaround added in OpenSSL 0.9.6d.</td>
5831
5831
</tr >
5832
- <tr >
5833
- <td><code>SSL_OP_EPHEMERAL_RSA</code></td>
5834
- <td>Instructs OpenSSL to always use the tmp_rsa key when performing RSA
5835
- operations.</td>
5836
- </tr >
5837
5832
<tr >
5838
5833
<td><code>SSL_OP_LEGACY_SERVER_CONNECT</code></td>
5839
5834
<td>Allows initial connection to servers that do not support RI.</td>
5840
5835
</tr >
5841
- <tr >
5842
- <td><code>SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER</code></td>
5843
- <td></td>
5844
- </tr >
5845
- <tr >
5846
- <td><code>SSL_OP_MICROSOFT_SESS_ID_BUG</code></td>
5847
- <td></td>
5848
- </tr >
5849
- <tr >
5850
- <td><code>SSL_OP_MSIE_SSLV2_RSA_PADDING</code></td>
5851
- <td>Instructs OpenSSL to disable the workaround for a man-in-the-middle
5852
- protocol-version vulnerability in the SSL 2.0 server implementation.</td>
5853
- </tr >
5854
5836
<tr >
5855
5837
<td><code>SSL_OP_NETSCAPE_CA_DN_BUG</code></td>
5856
5838
<td></td>
5857
5839
</tr >
5858
- <tr >
5859
- <td><code>SSL_OP_NETSCAPE_CHALLENGE_BUG</code></td>
5860
- <td></td>
5861
- </tr >
5862
5840
<tr >
5863
5841
<td><code>SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG</code></td>
5864
5842
<td></td>
5865
5843
</tr >
5866
- <tr >
5867
- <td><code>SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG</code></td>
5868
- <td></td>
5869
- </tr >
5870
5844
<tr >
5871
5845
<td><code>SSL_OP_NO_COMPRESSION</code></td>
5872
5846
<td>Instructs OpenSSL to disable support for SSL/TLS compression.</td>
@@ -5916,14 +5890,6 @@ See the [list of SSL OP Flags][] for details.
5916
5890
<td><code>SSL_OP_NO_TLSv1_3</code></td>
5917
5891
<td>Instructs OpenSSL to turn off TLS v1.3</td>
5918
5892
</tr >
5919
- <tr >
5920
- <td><code>SSL_OP_PKCS1_CHECK_1</code></td>
5921
- <td></td>
5922
- </tr >
5923
- <tr >
5924
- <td><code>SSL_OP_PKCS1_CHECK_2</code></td>
5925
- <td></td>
5926
- </tr >
5927
5893
<tr >
5928
5894
<td><code>SSL_OP_PRIORITIZE_CHACHA</code></td>
5929
5895
<td>Instructs OpenSSL server to prioritize ChaCha20-Poly1305
@@ -5932,32 +5898,6 @@ See the [list of SSL OP Flags][] for details.
5932
5898
<code>SSL_OP_CIPHER_SERVER_PREFERENCE</code>
5933
5899
is not enabled.</td>
5934
5900
</tr >
5935
- <tr >
5936
- <td><code>SSL_OP_SINGLE_DH_USE</code></td>
5937
- <td>Instructs OpenSSL to always create a new key when using
5938
- temporary/ephemeral DH parameters.</td>
5939
- </tr >
5940
- <tr >
5941
- <td><code>SSL_OP_SINGLE_ECDH_USE</code></td>
5942
- <td>Instructs OpenSSL to always create a new key when using
5943
- temporary/ephemeral ECDH parameters.</td>
5944
- </tr >
5945
- <tr >
5946
- <td><code>SSL_OP_SSLEAY_080_CLIENT_DH_BUG</code></td>
5947
- <td></td>
5948
- </tr >
5949
- <tr >
5950
- <td><code>SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG</code></td>
5951
- <td></td>
5952
- </tr >
5953
- <tr >
5954
- <td><code>SSL_OP_TLS_BLOCK_PADDING_BUG</code></td>
5955
- <td></td>
5956
- </tr >
5957
- <tr >
5958
- <td><code>SSL_OP_TLS_D5_BUG</code></td>
5959
- <td></td>
5960
- </tr >
5961
5901
<tr >
5962
5902
<td><code>SSL_OP_TLS_ROLLBACK_BUG</code></td>
5963
5903
<td>Instructs OpenSSL to disable version rollback attack detection.</td>
0 commit comments