@@ -5813,44 +5813,18 @@ See the [list of SSL OP Flags][] for details.
58135813 <td>Instructs OpenSSL to disable a SSL 3.0/TLS 1.0 vulnerability
58145814 workaround added in OpenSSL 0.9.6d.</td>
58155815 </tr >
5816- <tr >
5817- <td><code>SSL_OP_EPHEMERAL_RSA</code></td>
5818- <td>Instructs OpenSSL to always use the tmp_rsa key when performing RSA
5819- operations.</td>
5820- </tr >
58215816 <tr >
58225817 <td><code>SSL_OP_LEGACY_SERVER_CONNECT</code></td>
58235818 <td>Allows initial connection to servers that do not support RI.</td>
58245819 </tr >
5825- <tr >
5826- <td><code>SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER</code></td>
5827- <td></td>
5828- </tr >
5829- <tr >
5830- <td><code>SSL_OP_MICROSOFT_SESS_ID_BUG</code></td>
5831- <td></td>
5832- </tr >
5833- <tr >
5834- <td><code>SSL_OP_MSIE_SSLV2_RSA_PADDING</code></td>
5835- <td>Instructs OpenSSL to disable the workaround for a man-in-the-middle
5836- protocol-version vulnerability in the SSL 2.0 server implementation.</td>
5837- </tr >
58385820 <tr >
58395821 <td><code>SSL_OP_NETSCAPE_CA_DN_BUG</code></td>
58405822 <td></td>
58415823 </tr >
5842- <tr >
5843- <td><code>SSL_OP_NETSCAPE_CHALLENGE_BUG</code></td>
5844- <td></td>
5845- </tr >
58465824 <tr >
58475825 <td><code>SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG</code></td>
58485826 <td></td>
58495827 </tr >
5850- <tr >
5851- <td><code>SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG</code></td>
5852- <td></td>
5853- </tr >
58545828 <tr >
58555829 <td><code>SSL_OP_NO_COMPRESSION</code></td>
58565830 <td>Instructs OpenSSL to disable support for SSL/TLS compression.</td>
@@ -5900,14 +5874,6 @@ See the [list of SSL OP Flags][] for details.
59005874 <td><code>SSL_OP_NO_TLSv1_3</code></td>
59015875 <td>Instructs OpenSSL to turn off TLS v1.3</td>
59025876 </tr >
5903- <tr >
5904- <td><code>SSL_OP_PKCS1_CHECK_1</code></td>
5905- <td></td>
5906- </tr >
5907- <tr >
5908- <td><code>SSL_OP_PKCS1_CHECK_2</code></td>
5909- <td></td>
5910- </tr >
59115877 <tr >
59125878 <td><code>SSL_OP_PRIORITIZE_CHACHA</code></td>
59135879 <td>Instructs OpenSSL server to prioritize ChaCha20-Poly1305
@@ -5916,32 +5882,6 @@ See the [list of SSL OP Flags][] for details.
59165882 <code>SSL_OP_CIPHER_SERVER_PREFERENCE</code>
59175883 is not enabled.</td>
59185884 </tr >
5919- <tr >
5920- <td><code>SSL_OP_SINGLE_DH_USE</code></td>
5921- <td>Instructs OpenSSL to always create a new key when using
5922- temporary/ephemeral DH parameters.</td>
5923- </tr >
5924- <tr >
5925- <td><code>SSL_OP_SINGLE_ECDH_USE</code></td>
5926- <td>Instructs OpenSSL to always create a new key when using
5927- temporary/ephemeral ECDH parameters.</td>
5928- </tr >
5929- <tr >
5930- <td><code>SSL_OP_SSLEAY_080_CLIENT_DH_BUG</code></td>
5931- <td></td>
5932- </tr >
5933- <tr >
5934- <td><code>SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG</code></td>
5935- <td></td>
5936- </tr >
5937- <tr >
5938- <td><code>SSL_OP_TLS_BLOCK_PADDING_BUG</code></td>
5939- <td></td>
5940- </tr >
5941- <tr >
5942- <td><code>SSL_OP_TLS_D5_BUG</code></td>
5943- <td></td>
5944- </tr >
59455885 <tr >
59465886 <td><code>SSL_OP_TLS_ROLLBACK_BUG</code></td>
59475887 <td>Instructs OpenSSL to disable version rollback attack detection.</td>
0 commit comments