Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
4b08eaf5
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
10
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
4b08eaf5
编写于
1月 10, 2000
作者:
D
Dr. Stephen Henson
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Update docs.
上级
25f923dd
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
43 addition
and
7 deletion
+43
-7
doc/man/s_server.pod
doc/man/s_server.pod
+43
-7
未找到文件。
doc/man/s_server.pod
浏览文件 @
4b08eaf5
...
...
@@ -36,6 +36,7 @@ B<openssl> B<s_client>
[B<-no_tls1>]
[B<-no_dhe>]
[B<-bugs>]
[B<-hack>]
[B<-www>]
[B<-WWW>]
...
...
@@ -159,6 +160,11 @@ servers and permit them to use SSL v3, SSL v2 or TLS as appropriate.
there are several known bug in SSL and TLS implementations. Adding this
option enables various workarounds.
=item B<-hack>
this option enables a further workaround for some some early Netscape
SSL code (?).
=item B<-cipher cipherlist>
this allows the cipher list sent by the client to be modified. See the
...
...
@@ -182,10 +188,40 @@ requested the file ./page.html will be loaded.
=head1 CONNECTED COMMANDS
If a connection request is established with an SSL client and neither the
B<-www> nor the B<-WWW> option has been used then any data received from
the server is displayed and any key presses will be sent to the server. If
the line begins with an B<R> then the session will be renegotiated. If the
line begins with a B<Q> the connection will be closed down.
B<-www> nor the B<-WWW> option has been used then normally any data received
from the client is displayed and any key presses will be sent to the client.
Certain single letter commands are also recognised which perform special
operations: these are listed below.
=over 4
=item B<q>
end the current SSL connection but still accept new connections.
=item B<Q>
end the current SSL connection and exit.
=item B<r>
renegotiate the SSL session.
=item B<R>
renegotiate the SSL session and request a client certificate.
=item B<P>
send some plain text down the underlying TCP connection: this should
cause the client to disconnect due to a protocol violation.
=item B<S>
print out some session cache status information.
=back
=head1 NOTES
...
...
@@ -201,8 +237,8 @@ suites, so they cannot connect to servers which don't use a certificate
carrying an RSA key or a version of OpenSSL with RSA disabled.
Although specifying an empty list of CAs when requesting a client certificate
is strictly speaking a protocol violation, some SSL clients
assume any CA is
acceptable. This is useful for debugging purposes.
is strictly speaking a protocol violation, some SSL clients
interpret this to
mean any CA is
acceptable. This is useful for debugging purposes.
The session parameters can printed out using the B<sess_id> program.
...
...
@@ -214,7 +250,7 @@ hard to read and not a model of how things should be done. A typical
SSL server program would be much simpler.
The output of common ciphers is wrong: it just gives the list of ciphers that
OpenSSL recogni
s
es and the client supports.
OpenSSL recogni
z
es and the client supports.
There should be a way for the B<s_server> program to print out details of any
unknown cipher suites a client says it supports.
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录