Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
51008ffc
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
大约 1 年 前同步成功
通知
9
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
体验新版 GitCode,发现更多精彩内容 >>
提交
51008ffc
编写于
10月 17, 2001
作者:
B
Bodo Möller
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
document SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION
上级
3811eed8
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
13 addition
and
5 deletion
+13
-5
doc/ssl/SSL_CTX_set_options.pod
doc/ssl/SSL_CTX_set_options.pod
+13
-5
未找到文件。
doc/ssl/SSL_CTX_set_options.pod
浏览文件 @
51008ffc
...
@@ -106,7 +106,7 @@ All of the above bug workarounds.
...
@@ -106,7 +106,7 @@ All of the above bug workarounds.
=back
=back
It is safe and recommended to use
SSL_OP_ALL
to enable the bug workaround
It is safe and recommended to use
B<SSL_OP_ALL>
to enable the bug workaround
options.
options.
The following B<modifying> options are available:
The following B<modifying> options are available:
...
@@ -134,7 +134,7 @@ the DH parameters were not generated using "strong" primes
...
@@ -134,7 +134,7 @@ the DH parameters were not generated using "strong" primes
(e.g. when using DSA-parameters, see L<dhparam(1)|dhparam(1)>).
(e.g. when using DSA-parameters, see L<dhparam(1)|dhparam(1)>).
If "strong" primes were used, it is not strictly necessary to generate
If "strong" primes were used, it is not strictly necessary to generate
a new DH key during each handshake but it is also recommended.
a new DH key during each handshake but it is also recommended.
SSL_OP_SINGLE_DH_USE
should therefore be enabled whenever
B<SSL_OP_SINGLE_DH_USE>
should therefore be enabled whenever
temporary/ephemeral DH parameters are used.
temporary/ephemeral DH parameters are used.
=item SSL_OP_EPHEMERAL_RSA
=item SSL_OP_EPHEMERAL_RSA
...
@@ -187,6 +187,12 @@ Do not use the SSLv3 protocol.
...
@@ -187,6 +187,12 @@ Do not use the SSLv3 protocol.
Do not use the TLSv1 protocol.
Do not use the TLSv1 protocol.
=item SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION
When performing renegotiation as a server, always start a new session
(i.e., session resumption requests are only accepted in the initial
handshake). This option is not needed for clients.
=back
=back
=head1 RETURN VALUES
=head1 RETURN VALUES
...
@@ -205,10 +211,12 @@ L<dhparam(1)|dhparam(1)>
...
@@ -205,10 +211,12 @@ L<dhparam(1)|dhparam(1)>
=head1 HISTORY
=head1 HISTORY
SSL_OP_CIPHER_SERVER_PREFERENCE has been added in OpenSSL 0.9.7.
B<SSL_OP_CIPHER_SERVER_PREFERENCE> and
B<SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION> have been added in
OpenSSL 0.9.7.
SSL_OP_TLS_ROLLBACK_BUG
has been added in OpenSSL 0.9.6 and was automatically
B<SSL_OP_TLS_ROLLBACK_BUG>
has been added in OpenSSL 0.9.6 and was automatically
enabled with
SSL_OP_ALL. As of 0.9.7 it is no longer included in SSL_OP_ALL
enabled with
B<SSL_OP_ALL>. As of 0.9.7, it is no longer included in B<SSL_OP_ALL>
and must be explicitly set.
and must be explicitly set.
=cut
=cut
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录