亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? s_client.pod

?? Openssl 0.9.8e 最新版OpenSSL
?? POD
字號:
=pod=head1 NAMEs_client - SSL/TLS client program=head1 SYNOPSISB<openssl> B<s_client>[B<-connect host:port>][B<-verify depth>][B<-cert filename>][B<-certform DER|PEM>][B<-key filename>][B<-keyform DER|PEM>][B<-pass arg>][B<-CApath directory>][B<-CAfile filename>][B<-reconnect>][B<-pause>][B<-showcerts>][B<-debug>][B<-msg>][B<-nbio_test>][B<-state>][B<-nbio>][B<-crlf>][B<-ign_eof>][B<-quiet>][B<-ssl2>][B<-ssl3>][B<-tls1>][B<-no_ssl2>][B<-no_ssl3>][B<-no_tls1>][B<-bugs>][B<-cipher cipherlist>][B<-starttls protocol>][B<-engine id>][B<-rand file(s)>]=head1 DESCRIPTIONThe B<s_client> command implements a generic SSL/TLS client which connectsto a remote host using SSL/TLS. It is a I<very> useful diagnostic tool forSSL servers.=head1 OPTIONS=over 4=item B<-connect host:port>This specifies the host and optional port to connect to. If not specifiedthen an attempt is made to connect to the local host on port 4433.=item B<-cert certname>The certificate to use, if one is requested by the server. The default isnot to use a certificate.=item B<-certform format>The certificate format to use: DER or PEM. PEM is the default.=item B<-key keyfile>The private key to use. If not specified then the certificate file willbe used.=item B<-keyform format>The private format to use: DER or PEM. PEM is the default.=item B<-pass arg>the private key password source. For more information about the format of B<arg>see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)|openssl(1)>.=item B<-verify depth>The verify depth to use. This specifies the maximum length of theserver certificate chain and turns on server certificate verification.Currently the verify operation continues after errors so all the problemswith a certificate chain can be seen. As a side effect the connectionwill never fail due to a server certificate verify failure.=item B<-CApath directory>The directory to use for server certificate verification. This directorymust be in "hash format", see B<verify> for more information. These arealso used when building the client certificate chain.=item B<-CAfile file>A file containing trusted certificates to use during server authenticationand to use when attempting to build the client certificate chain.=item B<-reconnect>reconnects to the same server 5 times using the same session ID, this canbe used as a test that session caching is working.=item B<-pause>pauses 1 second between each read and write call.=item B<-showcerts>display the whole server certificate chain: normally only the servercertificate itself is displayed.=item B<-prexit>print session information when the program exits. This will always attemptto print out information even if the connection fails. Normally informationwill only be printed out once if the connection succeeds. This option is usefulbecause the cipher in use may be renegotiated or the connection may failbecause a client certificate is required or is requested only after anattempt is made to access a certain URL. Note: the output produced by thisoption is not always accurate because a connection might never have beenestablished.=item B<-state>prints out the SSL session states.=item B<-debug>print extensive debugging information including a hex dump of all traffic.=item B<-msg>show all protocol messages with hex dump.=item B<-nbio_test>tests non-blocking I/O=item B<-nbio>turns on non-blocking I/O=item B<-crlf>this option translated a line feed from the terminal into CR+LF as requiredby some servers.=item B<-ign_eof>inhibit shutting down the connection when end of file is reached in theinput.=item B<-quiet>inhibit printing of session and certificate information.  This implicitlyturns on B<-ign_eof> as well.=item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>these options disable the use of certain SSL or TLS protocols. By defaultthe initial handshake uses a method which should be compatible with allservers and permit them to use SSL v3, SSL v2 or TLS as appropriate.Unfortunately there are a lot of ancient and broken servers in use whichcannot handle this technique and will fail to connect. Some servers onlywork if TLS is turned off with the B<-no_tls> option others will onlysupport SSL v2 and may need the B<-ssl2> option.=item B<-bugs>there are several known bug in SSL and TLS implementations. Adding thisoption enables various workarounds.=item B<-cipher cipherlist>this allows the cipher list sent by the client to be modified. Althoughthe server determines which cipher suite is used it should take the firstsupported cipher in the list sent by the client. See the B<ciphers>command for more information.=item B<-starttls protocol>send the protocol-specific message(s) to switch to TLS for communication.B<protocol> is a keyword for the intended protocol.  Currently, the onlysupported keywords are "smtp", "pop3", "imap", and "ftp".=item B<-engine id>specifying an engine (by it's unique B<id> string) will cause B<s_client>to attempt to obtain a functional reference to the specified engine,thus initialising it if needed. The engine will then be set as the defaultfor all available algorithms.=item B<-rand file(s)>a file or files containing random data used to seed the random numbergenerator, or an EGD socket (see L<RAND_egd(3)|RAND_egd(3)>).Multiple files can be specified separated by a OS-dependent character.The separator is B<;> for MS-Windows, B<,> for OpenVMS, and B<:> forall others.=back=head1 CONNECTED COMMANDSIf a connection is established with an SSL server then any data receivedfrom the server is displayed and any key presses will be sent to theserver. When used interactively (which means neither B<-quiet> nor B<-ign_eof>have been given), the session will be renegotiated if the line begins with anB<R>, and if the line begins with a B<Q> or if end of file is reached, theconnection will be closed down.=head1 NOTESB<s_client> can be used to debug SSL servers. To connect to an SSL HTTPserver the command: openssl s_client -connect servername:443would typically be used (https uses port 443). If the connection succeedsthen an HTTP command can be given such as "GET /" to retrieve a web page.If the handshake fails then there are several possible causes, if it isnothing obvious like no client certificate then the B<-bugs>, B<-ssl2>,B<-ssl3>, B<-tls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1> options can be triedin case it is a buggy server. In particular you should play with theseoptions B<before> submitting a bug report to an OpenSSL mailing list.A frequent problem when attempting to get client certificates workingis that a web client complains it has no certificates or gives an emptylist to choose from. This is normally because the server is not sendingthe clients certificate authority in its "acceptable CA list" when itrequests a certificate. By using B<s_client> the CA list can be viewedand checked. However some servers only request client authenticationafter a specific URL is requested. To obtain the list in this case itis necessary to use the B<-prexit> option and send an HTTP requestfor an appropriate page.If a certificate is specified on the command line using the B<-cert>option it will not be used unless the server specifically requestsa client certificate. Therefor merely including a client certificateon the command line is no guarantee that the certificate works.If there are problems verifying a server certificate then theB<-showcerts> option can be used to show the whole chain.=head1 BUGSBecause this program has a lot of options and also because some ofthe techniques used are rather old, the C source of s_client is ratherhard to read and not a model of how things should be done. A typicalSSL client program would be much simpler.The B<-verify> option should really exit if the server verificationfails.The B<-prexit> option is a bit of a hack. We should really reportinformation whenever a session is renegotiated.=head1 SEE ALSOL<sess_id(1)|sess_id(1)>, L<s_server(1)|s_server(1)>, L<ciphers(1)|ciphers(1)>=cut

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲国产综合91精品麻豆| 国产成人精品一区二| 色视频一区二区| 亚洲一区在线视频| 欧美另类videos死尸| 日韩一区欧美二区| 欧美电影免费观看高清完整版在| 美脚の诱脚舐め脚责91 | 欧美tickling挠脚心丨vk| 九九精品一区二区| 中文字幕av免费专区久久| 99久久777色| 亚洲国产成人av好男人在线观看| 3751色影院一区二区三区| 麻豆精品一区二区av白丝在线| 精品久久久久久无| 91啪亚洲精品| 香蕉成人啪国产精品视频综合网| 日韩欧美高清在线| 成人免费看视频| 一区二区三区四区亚洲| 欧美一区二区女人| 成人午夜电影小说| 五月天一区二区三区| 久久久久久久久久久99999| 91丝袜呻吟高潮美腿白嫩在线观看| 一区二区三区在线不卡| 日韩一级精品视频在线观看| 成人99免费视频| 亚洲地区一二三色| 久久精品欧美日韩精品| 欧美三级在线播放| 国产精品一卡二| 石原莉奈在线亚洲三区| 国产精品美女久久久久久2018| 欧美综合一区二区三区| 国产河南妇女毛片精品久久久| 亚洲男人都懂的| 久久这里都是精品| 在线观看日韩精品| 国产成人av电影在线| 亚洲国产一区二区视频| 久久久久久一级片| 91麻豆精品国产91久久久| 成人av免费在线观看| 美脚の诱脚舐め脚责91| 亚洲国产精品久久久久秋霞影院 | 日产欧产美韩系列久久99| 中文在线资源观看网站视频免费不卡| 精品视频一区 二区 三区| 国产精品一二三四五| 美女网站色91| 亚洲综合在线五月| 国产精品乱码一区二区三区软件 | 国产日韩欧美精品在线| 在线观看亚洲专区| 99精品国产99久久久久久白柏| 经典一区二区三区| 日本一道高清亚洲日美韩| 亚洲欧洲综合另类| 国产精品视频在线看| 精品精品国产高清a毛片牛牛| 欧美色成人综合| 91福利精品第一导航| 波多野结衣欧美| 国产成人欧美日韩在线电影| 裸体一区二区三区| 青青草一区二区三区| 午夜国产精品一区| 亚洲一区二区四区蜜桃| 一区二区在线免费| 一区二区成人在线观看| 亚洲自拍偷拍欧美| 亚洲综合网站在线观看| 亚洲色图第一区| 亚洲精品中文在线影院| 综合激情网...| 亚洲色欲色欲www| 亚洲欧美综合网| 国产精品不卡在线| 亚洲精品大片www| 一区二区三区丝袜| 午夜不卡av免费| 视频在线观看91| 日产国产欧美视频一区精品| 日本女优在线视频一区二区| 美女高潮久久久| 韩国三级中文字幕hd久久精品| 国精产品一区一区三区mba桃花| 国产一区二区在线观看视频| 国产乱子轮精品视频| 国产成人亚洲综合a∨猫咪| 国产不卡视频在线播放| av一区二区三区在线| 色偷偷成人一区二区三区91| 在线观看日韩av先锋影音电影院| 91免费看`日韩一区二区| 欧美性三三影院| 欧美一区二区三区不卡| 久久综合九色综合久久久精品综合 | 精品亚洲成av人在线观看| 国产精品亚洲人在线观看| 99久久综合精品| 欧美日韩国产免费一区二区 | 欧美日韩成人激情| 日韩欧美一级特黄在线播放| 国产日产欧美精品一区二区三区| 国产精品对白交换视频| 亚洲国产视频在线| 国产一区二区三区高清播放| 成人国产一区二区三区精品| 欧美最猛性xxxxx直播| 精品久久五月天| 成人欧美一区二区三区小说| 三级一区在线视频先锋| 国产精品一区二区无线| 在线精品视频一区二区| 久久亚洲精品小早川怜子| 综合久久综合久久| 久久精品99国产国产精| 91麻豆精东视频| 日韩欧美亚洲另类制服综合在线| 国产精品日日摸夜夜摸av| 亚洲成人免费在线观看| 国产成人激情av| 欧美精品免费视频| 亚洲国产精品激情在线观看| 天天综合色天天综合色h| 国产福利91精品一区二区三区| 欧美日韩在线观看一区二区 | 中文久久乱码一区二区| 午夜电影网一区| 91亚洲男人天堂| 欧美精品一区二区在线观看| 亚洲图片欧美视频| jizzjizzjizz欧美| 精品国产乱码久久久久久图片 | 在线观看免费一区| 欧美国产日韩精品免费观看| 日韩电影一二三区| 日本黄色一区二区| 久久久久国产免费免费| 欧美aaaaa成人免费观看视频| 色猫猫国产区一区二在线视频| 精品噜噜噜噜久久久久久久久试看 | 日韩中文字幕91| 一本大道久久a久久综合婷婷| 国产网红主播福利一区二区| 日本成人中文字幕在线视频| 欧美亚洲日本一区| 日韩美女啊v在线免费观看| 国产精品一区专区| 日韩欧美国产综合一区| 日本欧美一区二区三区乱码| 欧美影院精品一区| 亚洲自拍偷拍网站| 一本到三区不卡视频| 中文字幕视频一区| www.亚洲在线| 欧美激情一区三区| 成人爱爱电影网址| 久久久久久久久99精品| 激情综合网天天干| 精品粉嫩aⅴ一区二区三区四区| 日韩精品亚洲一区二区三区免费| 99re热这里只有精品免费视频 | 欧美日韩国产色站一区二区三区| 亚洲免费观看高清在线观看| 99久久伊人久久99| 国产精品网站导航| 99精品国产99久久久久久白柏| 国产精品激情偷乱一区二区∴| 成人免费视频一区| 国产精品天美传媒| 91在线高清观看| 一区二区三区精品视频在线| 91网上在线视频| 亚洲免费成人av| 欧美在线免费视屏| 午夜精品久久一牛影视| 欧美大胆人体bbbb| 国产一区二区调教| 欧美国产精品一区二区| 99久久婷婷国产| 亚洲一区二区三区在线播放| 911精品国产一区二区在线| 免费的成人av| 国产日韩欧美一区二区三区乱码 | 国产在线视频一区二区| 久久嫩草精品久久久精品一| 粉嫩嫩av羞羞动漫久久久| 国产精品久久久久aaaa| 欧洲视频一区二区| 另类小说色综合网站| 中文字幕乱码亚洲精品一区 | 日产欧产美韩系列久久99| 精品成人a区在线观看| 91在线看国产| 青青草一区二区三区| 欧美国产日韩精品免费观看|