Lines Matching +full:performance +full:- +full:affecting

6 SSL_CONF_cmd - send configuration command
30 prefix for command line commands is B<-> and that is reflected below.
34 =item B<-bugs>
38 =item B<-no_comp>
44 =item B<-comp>
54 =item B<-no_ticket>
58 =item B<-serverpref>
64 =item B<-client_renegotiation>
66 Allows servers to accept client-initiated renegotiation. Equivalent to
70 =item B<-legacy_renegotiation>
75 =item B<-no_renegotiation>
80 =item B<-no_resumption_on_reneg>
84 =item B<-legacy_server_connect>, B<-no_legacy_server_connect>
89 =item B<-prioritize_chacha>
94 Only used by servers. Requires B<-serverpref>.
96 =item B<-allow_no_dhe_kex>
98 In TLSv1.3 allow a non-(ec)dhe based key exchange mode on resumption. This means
101 =item B<-prefer_no_dhe_kex>
103 In TLSv1.3, on resumption let the server prefer a non-(ec)dhe based key
104 exchange mode over an (ec)dhe based one. Requires B<-allow_no_dhe_kex>.
107 =item B<-strict>
112 =item B<-sigalgs> I<algs>
128 further algorithms via the TLS-SIGALG capability.
130 in the B<algorithm+hash> form are case-insensitive.
131 See L<provider-base(7)>.
140 =item B<-client_sigalgs> I<algs>
149 The syntax of B<algs> is identical to B<-sigalgs>. If not set, then the
150 value set for B<-sigalgs> will be used instead.
152 =item B<-groups> I<groups>
161 …upported Groups|https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameter…
165 Such an alias could be a B<NIST> name (e.g. B<P-256>), an OpenSSL OID name
167 Group names are case-insensitive in OpenSSL 3.5 and later.
176 $ openssl list -tls1_2 -tls-groups
177 $ openssl list -tls1_3 -tls-groups
179 The recommended groups (in order of decreasing performance) for TLS 1.3 are presently:
188 performance penalty.
197 =item B<-curves> I<groups>
199 This is a synonym for the B<-groups> command.
201 =item B<-named_curve> I<curve>
209 curve can be either the B<NIST> name (e.g. B<P-256>) or an OpenSSL OID name
213 Curve names are case-insensitive in OpenSSL 3.5 and later.
215 =item B<-tx_cert_comp>
219 =item B<-no_tx_cert_comp>
223 =item B<-rx_cert_comp>
227 =item B<-no_rx_cert_comp>
231 =item B<-comp>
233 =item B<-cipher> I<ciphers>
240 =item B<-ciphersuites> I<1.3ciphers>
243 colon-separated list of TLSv1.3 ciphersuite names in order of preference. This
245 See L<openssl-ciphers(1)> for more information.
247 =item B<-min_protocol> I<minprot>, B<-max_protocol> I<maxprot>
261 =item B<-record_padding> I<padding>
273 =item B<-debug_broken_protocol>
277 =item B<-no_middlebox>
290 =item B<-cert> I<file>
298 =item B<-key> I<file>
302 if no B<-key> option is set then a private key is not loaded unless the
305 =item B<-dhparam> I<file>
311 =item B<-no_ssl3>, B<-no_tls1>, B<-no_tls1_1>, B<-no_tls1_2>, B<-no_tls1_3>
316 respectively. These options are deprecated, use B<-min_protocol> and
317 B<-max_protocol> instead.
319 =item B<-anti_replay>, B<-no_anti_replay>
325 time. Anti-Replay is on by default unless overridden by a configuration file and
326 is only used by servers. Anti-replay measures are required for compliance with
328 risks in other ways and in such cases the built-in OpenSSL functionality is not
329 required. Switching off anti-replay is equivalent to B<SSL_OP_NO_ANTI_REPLAY>.
355 colon-separated list of TLSv1.3 ciphersuite names in order of preference. This
357 See L<openssl-ciphers(1)> for more information.
428 in the B<algorithm+hash> form are case-insensitive.
430 TLS_SIGALG capability. See L<provider-base(7)/CAPABILITIES>.
463 …upported Groups|https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameter…
466 Such an alias could be a B<NIST> name (e.g. B<P-256>), an OpenSSL OID name
468 Group names are case-insensitive in OpenSSL 3.5 and later.
474 $ openssl list -tls1_2 -tls-groups
475 $ openssl list -tls1_3 -tls-groups
494 The SSL and TLS bounds apply only to TLS-based contexts, while the DTLS bounds
495 apply only to DTLS-based contexts.
506 The SSL and TLS bounds apply only to TLS-based contexts, while the DTLS bounds
507 apply only to DTLS-based contexts.
519 If a protocol is preceded by B<-> that version is disabled.
544 If a flag string is preceded B<-> it is disabled.
549 the B<-flag> syntax is needed to disable it.
552 B<SSL_OP_NO_TICKET>: that is B<-SessionTicket> is the same as setting
559 SSL 3.0/TLS 1.0 protocol vulnerability affecting CBC ciphers. It
592 B<EncryptThenMac>: use encrypt-then-mac extension, enabled by
594 B<-EncryptThenMac> is the same as setting B<SSL_OP_NO_ENCRYPT_THEN_MAC>.
596 B<AllowNoDHEKEX>: In TLSv1.3 allow a non-(ec)dhe based key exchange mode on
601 non-(ec)dhe based key exchange mode over an (ec)dhe based one. Requires
615 servers. Anti-replay measures are required to comply with the TLSv1.3
617 other ways and in such cases the built-in OpenSSL functionality is not required.
618 Disabling anti-replay is equivalent to setting B<SSL_OP_NO_ANTI_REPLAY>.
622 B<-ExtendedMasterSecret> is the same as setting B<SSL_OP_NO_EXTENDED_MASTER_SECRET>.
626 B<-CANames> is the same as setting B<SSL_OP_DISABLE_TLSEXT_CA_NAMES>.
637 B<-TxCertificateCompression> is the same as setting B<SSL_OP_NO_TX_CERTIFICATE_COMPRESSION>.
641 B<-RxCertificateCompression> is the same as setting B<SSL_OP_NO_RX_CERTIFICATE_COMPRESSION>.
644 a performance boost when used with KTLS hardware offload. Note that invalid TLS
672 not require a certificate from the client post-handshake. A certificate will
674 provide a mechanism to request a certificate post-handshake. Servers only.
678 requires a certificate from the client post-handshake: an error occurs if the
681 to request a certificate post-handshake. Servers only. TLSv1.3 only.
727 SSL_CONF_cmd(ctx, "Protocol", "-SSLv3");
734 SSL_CONF_cmd(ctx, "Protocol", "-SSLv3");
744 -2 (unrecognised command) continue with processing of application specific
754 number of arguments as they have been processed by SSL_CONF_cmd(). If -2 is
756 can be checked instead. If -3 is returned a required argument is missing
773 A return value of -2 means B<option> is not recognised.
775 A return value of -3 means B<option> is recognised and the command requires a
798 SSL_CONF_cmd(ctx, "Protocol", "-SSLv3");
803 "-SSLv3", but if some versions were disables this will re-enable them before
806 SSL_CONF_cmd(ctx, "Protocol", "ALL,-SSLv3");
815 SSL_CONF_cmd(ctx, "Protocol", "-ALL,TLSv1.2");
819 SSL_CONF_cmd(ctx, "Options", "-SessionTicket");
825 Set supported curves to P-256, P-384:
827 SSL_CONF_cmd(ctx, "Curves", "P-256:P-384");
862 OpenSSL 3.5 introduces support for post-quantum (PQ) TLS key exchange via the
864 These are based on the underlying B<ML-KEM-512>, B<ML-KEM-768> and
865 B<ML-KEM-1024> algorithms from FIPS 203.
870 They offer CPU performance comparable to the associated ECDH group, though at
872 The third group, B<SecP384r1MLKEM1024> is substantially more CPU-intensive,
873 largely as a result of the high CPU cost of ECDH for the underlying B<P-384>
878 As of OpenSSL 3.5 key exchange group names are case-insensitive.
882 Copyright 2012-2025 The OpenSSL Project Authors. All Rights Reserved.