|
@@ -555,11 +555,14 @@ struct ssl_session_st
|
|
|
#define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG 0x00000008L
|
|
|
#define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG 0x00000010L
|
|
|
#define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020L
|
|
|
-#define SSL_OP_MSIE_SSLV2_RSA_PADDING 0x00000040L /* no effect since 0.9.7h and 0.9.8b */
|
|
|
+#define SSL_OP_SAFARI_ECDHE_ECDSA_BUG 0x00000040L
|
|
|
#define SSL_OP_SSLEAY_080_CLIENT_DH_BUG 0x00000080L
|
|
|
#define SSL_OP_TLS_D5_BUG 0x00000100L
|
|
|
#define SSL_OP_TLS_BLOCK_PADDING_BUG 0x00000200L
|
|
|
|
|
|
+/* Hasn't done anything since OpenSSL 0.9.7h, retained for compatibility */
|
|
|
+#define SSL_OP_MSIE_SSLV2_RSA_PADDING 0x0
|
|
|
+
|
|
|
/* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added
|
|
|
* in OpenSSL 0.9.6d. Usually (depending on the application protocol)
|
|
|
* the workaround is not needed. Unfortunately some broken SSL/TLS
|
|
@@ -641,6 +644,12 @@ struct ssl_session_st
|
|
|
* TLS only.) "Released" buffers are put onto a free-list in the context
|
|
|
* or just freed (depending on the context's setting for freelist_max_len). */
|
|
|
#define SSL_MODE_RELEASE_BUFFERS 0x00000010L
|
|
|
+/* Send the current time in the Random fields of the ClientHello and
|
|
|
+ * ServerHello records for compatibility with hypothetical implementations
|
|
|
+ * that require it.
|
|
|
+ */
|
|
|
+#define SSL_MODE_SEND_CLIENTHELLO_TIME 0x00000020L
|
|
|
+#define SSL_MODE_SEND_SERVERHELLO_TIME 0x00000040L
|
|
|
|
|
|
/* Note: SSL[_CTX]_set_{options,mode} use |= op on the previous value,
|
|
|
* they cannot be used to clear bits. */
|