Lines Matching full:s0
156 [\fB\-certform\fR \fB\s-1DER\s0\fR|\fB\s-1PEM\s0\fR|\fBP12\fR]
162 [\fB\-keyform\fR \fB\s-1DER\s0\fR|\fB\s-1PEM\s0\fR|\fBP12\fR|\fB\s-1ENGINE\s0\fR]
165 [\fB\-dcertform\fR \fB\s-1DER\s0\fR|\fB\s-1PEM\s0\fR|\fBP12\fR]
168 [\fB\-dkeyform\fR \fB\s-1DER\s0\fR|\fB\s-1PEM\s0\fR|\fBP12\fR|\fB\s-1ENGINE\s0\fR]
192 [\fB\-CRLform\fR \fB\s-1DER\s0\fR|\fB\s-1PEM\s0\fR]
347 [\fB\-xcertform\fR \fB\s-1DER\s0\fR|\fB\s-1PEM\s0\fR]>
348 [\fB\-xkeyform\fR \fB\s-1DER\s0\fR|\fB\s-1PEM\s0\fR]>
363 This command implements a generic \s-1SSL/TLS\s0 server which
364 listens for connections on a given port using \s-1SSL/TLS.\s0
375 The \s-1TCP\s0 port to listen on for connections. If not specified 4433 is used.
378 The optional \s-1TCP\s0 host and port to listen on for connections. If not specified, *:4433 is use…
393 Sets the \s-1SSL\s0 context id. It can be given any string value. If this option
404 anonymous cipher suite or \s-1PSK\s0) this option has no effect.
409 for example the \s-1DSS\s0 cipher suites require a certificate containing a \s-1DSS\s0
410 (\s-1DSA\s0) key. If not specified then the filename \fIserver.pem\fR will be used.
414 .IP "\fB\-certform\fR \fB\s-1DER\s0\fR|\fB\s-1PEM\s0\fR|\fBP12\fR" 4
420 A file or \s-1URI\s0 of untrusted certificates to use when attempting to build the
422 The input can be in \s-1PEM, DER,\s0 or PKCS#12 format.
429 A file containing one or more blocks of \s-1PEM\s0 data. Each \s-1PEM\s0 block
430 must encode a \s-1TLS\s0 ServerHello extension (2 bytes type, 2 bytes length,
432 an empty \s-1TLS\s0 ClientHello extension matching the type, the corresponding
441 .IP "\fB\-keyform\fR \fB\s-1DER\s0\fR|\fB\s-1PEM\s0\fR|\fBP12\fR|\fB\s-1ENGINE\s0\fR" 4
456 a certain type. Some cipher suites need a certificate carrying an \s-1RSA\s0 key
457 and some a \s-1DSS\s0 (\s-1DSA\s0) key. By using \s-1RSA\s0 and \s-1DSS\s0 certificates and keys
458 a server can support clients which only support \s-1RSA\s0 or \s-1DSS\s0 cipher suites
462 A file or \s-1URI\s0 of untrusted certificates to use when attempting to build the
465 The input can be in \s-1PEM, DER,\s0 or PKCS#12 format.
466 .IP "\fB\-dcertform\fR \fB\s-1DER\s0\fR|\fB\s-1PEM\s0\fR|\fBP12\fR" 4
470 .IP "\fB\-dkeyform\fR \fB\s-1DER\s0\fR|\fB\s-1PEM\s0\fR|\fBP12\fR|\fB\s-1ENGINE\s0\fR" 4
484 This option translated a line feed from the terminal into \s-1CR+LF.\s0
490 Print output from \s-1SSL/TLS\s0 security framework.
493 Print more output from \s-1SSL/TLS\s0 security framework
502 Prints the \s-1SSL\s0 session states.
505 The \s-1CRL\s0 file to use.
506 .IP "\fB\-CRLform\fR \fB\s-1DER\s0\fR|\fB\s-1PEM\s0\fR" 4
508 The \s-1CRL\s0 file format; unspecified by default.
512 Download CRLs from distribution points given in \s-1CDP\s0 extensions of certificates
515 A file in \s-1PEM\s0 format \s-1CA\s0 containing trusted certificates to use
525 The \s-1URI\s0 of a store containing trusted certificates to use
529 A file in \s-1PEM\s0 format containing trusted certificates to use
539 The \s-1URI\s0 of a store containing trusted certificates to use
541 The \s-1URI\s0 may indicate a single certificate, as well as a collection of them.
543 \&\fB\-chainCApath\fR, depending on if the \s-1URI\s0 indicates a directory or a
550 \&\s-1DH\s0).
556 Disable caching and tickets if ephemeral (\s-1EC\s0)DH is used.
559 Print a hex dump of any \s-1TLS\s0 extensions received from the server.
564 The output is in \s-1HTML\s0 format so this option can be used with a web browser.
565 The special \s-1URL\s0 \f(CW\*(C`/renegcert\*(C'\fR turns on client cert validation, and \f(CW\*(C`…
571 current directory, for example if the \s-1URL\s0 \f(CW\*(C`https://myhost/page.html\*(C'\fR is
574 any \s-1HTTP\s0 response headers (including status response line).
580 In addition, the special \s-1URL\s0 \f(CW\*(C`/stats\*(C'\fR will return status
589 Disable \s-1TLS\s0 Extension \s-1CA\s0 Names. You may want to disable it for security reasons
590 or for compatibility with some Windows \s-1TLS\s0 implementations crashing when this
594 Some \s-1TLS\s0 implementations do not send the mandatory close_notify alert on
602 Servername for HostName \s-1TLS\s0 extension.
608 Generate \s-1SSL/TLS\s0 session IDs prefixed by \fIval\fR. This is mostly useful
609 for testing any \s-1SSL/TLS\s0 code (e.g. proxies) that wish to deal with multiple
634 Ignore input \s-1EOF\s0 (default: when \fB\-quiet\fR).
637 Do not ignore input \s-1EOF.\s0
643 Enables certificate status request support (aka \s-1OCSP\s0 stapling).
646 Enables certificate status request support (aka \s-1OCSP\s0 stapling) and gives
647 a verbose printout of the \s-1OCSP\s0 response.
650 Sets the timeout for \s-1OCSP\s0 response to \fIint\fR seconds.
653 The \s-1HTTP\s0(S) proxy server to use for reaching the \s-1OCSP\s0 server unless \fB\-no_proxy\fR
659 in case no \s-1TLS\s0 is used, otherwise \f(CW\*(C`https_proxy\*(C'\fR if set, else \f(CW\*(C`HTTPS…
662 List of \s-1IP\s0 addresses and/or \s-1DNS\s0 names of servers
663 not to use an \s-1HTTP\s0(S) proxy for, separated by commas and/or whitespace
668 Sets a fallback responder \s-1URL\s0 to use if no responder \s-1URL\s0 is present in the
671 The optional userinfo and fragment \s-1URL\s0 components are ignored.
675 Overrides any \s-1OCSP\s0 responder URLs from the certificate and always provides the
676 \&\s-1OCSP\s0 Response stored in the file. The file must be in \s-1DER\s0 format.
679 Configure \s-1SSL_CTX\s0 using the given configuration value.
727 There are several known bugs in \s-1SSL\s0 and \s-1TLS\s0 implementations. Adding this
731 Disable negotiation of \s-1TLS\s0 compression.
732 \&\s-1TLS\s0 compression is not recommended and is off by default as of
736 Enable negotiation of \s-1TLS\s0 compression.
738 \&\s-1TLS\s0 compression is not recommended and is off by default as of
757 Set the \fB\s-1SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION\s0\fR option.
764 Specifies the elliptic curve to use. \s-1NOTE:\s0 this is single curve, not a list.
789 The \s-1DH\s0 parameter file to use. The ephemeral \s-1DH\s0 cipher suites generate keys
790 using a set of \s-1DH\s0 parameters. If not specified then an attempt is made to
802 Set link-layer \s-1MTU.\s0
805 Expect the client to send \s-1PSK\s0 identity \fIval\fR when using a \s-1PSK\s0
806 cipher suite, and warn if they do not. By default, the expected \s-1PSK\s0
810 Use the \s-1PSK\s0 identity hint \fIval\fR when using a \s-1PSK\s0 cipher suite.
813 Use the \s-1PSK\s0 key \fIval\fR when using a \s-1PSK\s0 cipher suite. The key is
816 This option must be provided in order to use a \s-1PSK\s0 cipher.
819 Use the pem encoded \s-1SSL_SESSION\s0 data stored in \fIfile\fR as the basis of a \s-1PSK.\s0
823 The verifier file for \s-1SRP.\s0
831 This option can only be used in conjunction with one of the \s-1DTLS\s0 options above.
832 With this option, this command will listen on a \s-1UDP\s0 port for incoming
841 Use \s-1SCTP\s0 for the transport protocol instead of \s-1UDP\s0 in \s-1DTLS.\s0 Must be used in
843 available where OpenSSL has support for \s-1SCTP\s0 enabled.
847 endpoint-pair shared secrets for \s-1DTLS/SCTP.\s0 This allows communication with
850 available where OpenSSL has support for \s-1SCTP\s0 enabled.
853 Offer \s-1SRTP\s0 key management with a colon-separated profile list.
856 If this option is set then no \s-1DH\s0 parameters will be loaded effectively
857 disabling the ephemeral \s-1DH\s0 cipher suites.
861 or Next Protocol Negotiation (\s-1NPN\s0) extension, respectively. \s-1ALPN\s0 is the
862 \&\s-1IETF\s0 standard and replaces \s-1NPN.\s0
865 Protocol names are printable \s-1ASCII\s0 strings, for example \*(L"http/1.1\*(R" or
870 If this option is set and \s-1KTLS\s0 is enabled, \fBSSL_sendfile()\fR will be used
871 instead of \fBBIO_write()\fR to send the \s-1HTTP\s0 response requested by a client.
875 Appends \s-1TLS\s0 secrets to the specified keylog file such that external programs
876 (like Wireshark) can decrypt \s-1TLS\s0 connections.
908 See \*(L"\s-1TLS\s0 Version Options\*(R" in \fBopenssl\fR\|(1).
911 These specify the use of \s-1DTLS\s0 instead of \s-1TLS.\s0
912 See \*(L"\s-1TLS\s0 Version Options\*(R" in \fBopenssl\fR\|(1).
915 See \*(L"\s-1SUPPORTED COMMAND LINE COMMANDS\*(R"\s0 in \fBSSL_CONF_cmd\fR\|(3) for details.
916 …\fIfile\fR, \fB\-xcertform\fR \fB\s-1DER\s0\fR|\fB\s-1PEM\s0\fR, \fB\-xkeyform\fR \fB\s-1DER\s0\fR…
949 If a connection request is established with an \s-1SSL\s0 client and neither the
958 End the current \s-1SSL\s0 connection but still accept new connections.
961 End the current \s-1SSL\s0 connection and exit.
964 Renegotiate the \s-1SSL\s0 session (TLSv1.2 and below only).
967 Renegotiate the \s-1SSL\s0 session and request a client certificate (TLSv1.2 and below
971 Send some plain text down the underlying \s-1TCP\s0 connection: this should
987 This command can be used to debug \s-1SSL\s0 clients. To accept connections
997 is strictly speaking a protocol violation, some \s-1SSL\s0 clients interpret this to
998 mean any \s-1CA\s0 is acceptable. This is useful for debugging purposes.
1006 A typical \s-1SSL\s0 server program would be much simpler.
1039 in the file \s-1LICENSE\s0 in the source distribution or at