亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? s_server.pod

?? openssl包含TLS
?? POD
字號:
=pod=head1 NAMEs_server - SSL/TLS server program=head1 SYNOPSISB<openssl> B<s_server>[B<-accept port>][B<-context id>][B<-verify depth>][B<-Verify depth>][B<-cert filename>][B<-key keyfile>][B<-dcert filename>][B<-dkey keyfile>][B<-dhparam filename>][B<-nbio>][B<-nbio_test>][B<-crlf>][B<-debug>][B<-msg>][B<-state>][B<-CApath directory>][B<-CAfile filename>][B<-nocert>][B<-cipher cipherlist>][B<-quiet>][B<-no_tmp_rsa>][B<-ssl2>][B<-ssl3>][B<-tls1>][B<-no_ssl2>][B<-no_ssl3>][B<-no_tls1>][B<-no_dhe>][B<-bugs>][B<-hack>][B<-www>][B<-WWW>][B<-HTTP>][B<-engine id>][B<-id_prefix arg>][B<-rand file(s)>]=head1 DESCRIPTIONThe B<s_server> command implements a generic SSL/TLS server which listensfor connections on a given port using SSL/TLS.=head1 OPTIONS=over 4=item B<-accept port>the TCP port to listen on for connections. If not specified 4433 is used.=item B<-context id>sets the SSL context id. It can be given any string value. If this optionis not present a default value will be used.=item B<-cert certname>The certificate to use, most servers cipher suites require the use of acertificate and some require a certificate with a certain public key type:for example the DSS cipher suites require a certificate containing a DSS(DSA) key. If not specified then the filename "server.pem" will be used.=item B<-key keyfile>The private key to use. If not specified then the certificate file willbe used.=item B<-dcert filename>, B<-dkey keyname>specify an additional certificate and private key, these behave in thesame manner as the B<-cert> and B<-key> options except there is no defaultif they are not specified (no additional certificate and key is used). Asnoted above some cipher suites require a certificate containing a key ofa certain type. Some cipher suites need a certificate carrying an RSA keyand some a DSS (DSA) key. By using RSA and DSS certificates and keysa server can support clients which only support RSA or DSS cipher suitesby using an appropriate certificate.=item B<-nocert>if this option is set then no certificate is used. This restricts thecipher suites available to the anonymous ones (currently just anonymousDH).=item B<-dhparam filename>the DH parameter file to use. The ephemeral DH cipher suites generate keysusing a set of DH parameters. If not specified then an attempt is made toload the parameters from the server certificate file. If this fails thena static set of parameters hard coded into the s_server program will be used.=item B<-no_dhe>if this option is set then no DH parameters will be loaded effectivelydisabling the ephemeral DH cipher suites.=item B<-no_tmp_rsa>certain export cipher suites sometimes use a temporary RSA key, this optiondisables temporary RSA key generation.=item B<-verify depth>, B<-Verify depth>The verify depth to use. This specifies the maximum length of theclient certificate chain and makes the server request a certificate fromthe client. With the B<-verify> option a certificate is requested but theclient does not have to send one, with the B<-Verify> option the clientmust supply a certificate or an error occurs.=item B<-CApath directory>The directory to use for client certificate verification. This directorymust be in "hash format", see B<verify> for more information. These arealso used when building the server certificate chain.=item B<-CAfile file>A file containing trusted certificates to use during client authenticationand to use when attempting to build the server certificate chain. The listis also used in the list of acceptable client CAs passed to the client whena certificate is requested.=item B<-state>prints out the SSL session states.=item B<-debug>print extensive debugging information including a hex dump of all traffic.=item B<-msg>show all protocol messages with hex dump.=item B<-nbio_test>tests non blocking I/O=item B<-nbio>turns on non blocking I/O=item B<-crlf>this option translated a line feed from the terminal into CR+LF.=item B<-quiet>inhibit printing of session and certificate information.=item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>these options disable the use of certain SSL or TLS protocols. By defaultthe initial handshake uses a method which should be compatible with allservers and permit them to use SSL v3, SSL v2 or TLS as appropriate.=item B<-bugs>there are several known bug in SSL and TLS implementations. Adding thisoption enables various workarounds.=item B<-hack>this option enables a further workaround for some some early NetscapeSSL code (?).=item B<-cipher cipherlist>this allows the cipher list used by the server to be modified.  Whenthe client sends a list of supported ciphers the first client cipheralso included in the server list is used. Because the client specifiesthe preference order, the order of the server cipherlist irrelevant. Seethe B<ciphers> command for more information.=item B<-www>sends a status message back to the client when it connects. This includeslots of information about the ciphers used and various session parameters.The output is in HTML format so this option will normally be used with aweb browser.=item B<-WWW>emulates a simple web server. Pages will be resolved relative to thecurrent directory, for example if the URL https://myhost/page.html isrequested the file ./page.html will be loaded.=item B<-HTTP>emulates a simple web server. Pages will be resolved relative to thecurrent directory, for example if the URL https://myhost/page.html isrequested the file ./page.html will be loaded. The files loaded areassumed to contain a complete and correct HTTP response (lines thatare part of the HTTP response line and headers must end with CRLF).=item B<-engine id>specifying an engine (by it's unique B<id> string) will cause B<s_server>to attempt to obtain a functional reference to the specified engine,thus initialising it if needed. The engine will then be set as the defaultfor all available algorithms.=item B<-id_prefix arg>generate SSL/TLS session IDs prefixed by B<arg>. This is mostly usefulfor testing any SSL/TLS code (eg. proxies) that wish to deal with multipleservers, when each of which might be generating a unique range of sessionIDs (eg. with a certain prefix).=item B<-rand file(s)>a file or files containing random data used to seed the random numbergenerator, or an EGD socket (see L<RAND_egd(3)|RAND_egd(3)>).Multiple files can be specified separated by a OS-dependent character.The separator is B<;> for MS-Windows, B<,> for OpenVMS, and B<:> forall others.=back=head1 CONNECTED COMMANDSIf a connection request is established with an SSL client and neither theB<-www> nor the B<-WWW> option has been used then normally any data receivedfrom the client is displayed and any key presses will be sent to the client. Certain single letter commands are also recognized which perform specialoperations: these are listed below.=over 4=item B<q>end the current SSL connection but still accept new connections.=item B<Q>end the current SSL connection and exit.=item B<r>renegotiate the SSL session.=item B<R>renegotiate the SSL session and request a client certificate.=item B<P>send some plain text down the underlying TCP connection: this shouldcause the client to disconnect due to a protocol violation.=item B<S>print out some session cache status information.=back=head1 NOTESB<s_server> can be used to debug SSL clients. To accept connections froma web browser the command: openssl s_server -accept 443 -wwwcan be used for example.Most web browsers (in particular Netscape and MSIE) only support RSA ciphersuites, so they cannot connect to servers which don't use a certificatecarrying an RSA key or a version of OpenSSL with RSA disabled.Although specifying an empty list of CAs when requesting a client certificateis strictly speaking a protocol violation, some SSL clients interpret this tomean any CA is acceptable. This is useful for debugging purposes.The session parameters can printed out using the B<sess_id> program.=head1 BUGSBecause this program has a lot of options and also because some ofthe techniques used are rather old, the C source of s_server is ratherhard to read and not a model of how things should be done. A typicalSSL server program would be much simpler.The output of common ciphers is wrong: it just gives the list of ciphers thatOpenSSL recognizes and the client supports.There should be a way for the B<s_server> program to print out details of anyunknown cipher suites a client says it supports.=head1 SEE ALSOL<sess_id(1)|sess_id(1)>, L<s_client(1)|s_client(1)>, L<ciphers(1)|ciphers(1)>=cut

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲成人动漫在线免费观看| 麻豆国产精品一区二区三区| 国产69精品久久久久777| 欧美挠脚心视频网站| 婷婷久久综合九色综合绿巨人| 色综合天天做天天爱| 国产亚洲综合色| 日韩av网站免费在线| 日韩免费看网站| 免费观看一级欧美片| 日韩视频在线永久播放| 国产在线一区观看| 久久久影视传媒| 国产成人一级电影| 欧美一区二区久久| 国产一区二区三区久久悠悠色av | 亚洲图片一区二区| 欧美在线免费视屏| 丝袜诱惑制服诱惑色一区在线观看| 91精品国产入口在线| 日本一不卡视频| 欧美va在线播放| 成人福利视频网站| 亚洲欧美自拍偷拍| 精品国产乱码久久久久久免费| 中文字幕精品一区二区三区精品| 91亚洲精品乱码久久久久久蜜桃| 夜夜嗨av一区二区三区| 欧美视频一区二区三区四区| 一区二区久久久久| 精品久久人人做人人爰| 国产69精品久久777的优势| 国产精品大尺度| 欧美一区二区视频在线观看2020| 久久激情综合网| 国产欧美一区二区精品久导航| 色综合久久天天| 免费在线观看一区二区三区| 国产欧美日韩卡一| 成人黄色片在线观看| 日本亚洲三级在线| 欧美激情一区在线观看| 欧洲在线/亚洲| 成人在线视频一区| 亚洲午夜电影在线| 久久久综合视频| 91精品国模一区二区三区| 不卡免费追剧大全电视剧网站| 亚洲一级在线观看| 欧美一区二区三区思思人| 成人黄动漫网站免费app| 亚洲gay无套男同| 日本一区二区三区四区在线视频 | 亚洲午夜三级在线| 精品国产免费视频| 91福利小视频| 国产福利视频一区二区三区| 国产精品久久久爽爽爽麻豆色哟哟| 欧美色偷偷大香| 成人天堂资源www在线| 日韩精品成人一区二区在线| 亚洲人成精品久久久久| 久久久久国产精品厨房| 欧美日韩日日骚| 国产91在线观看丝袜| 九九热在线视频观看这里只有精品| 亚洲色欲色欲www| 国产日韩欧美高清在线| 69堂成人精品免费视频| 色呦呦一区二区三区| 国产成人免费9x9x人网站视频| 久久99久久精品欧美| 亚洲成av人在线观看| 亚洲三级免费电影| 国产精品全国免费观看高清 | 成人三级伦理片| 精品盗摄一区二区三区| 欧美96一区二区免费视频| 亚洲午夜羞羞片| 亚洲精品国产一区二区三区四区在线| 日韩三级av在线播放| 欧美一区二区三区系列电影| 欧美午夜宅男影院| 色哟哟欧美精品| 国产精品一二三四区| 日本亚洲最大的色成网站www| 一二三区精品福利视频| 久久久国产一区二区三区四区小说 | 国产欧美日韩不卡| 精品国产乱码久久久久久牛牛 | 精品久久久久香蕉网| 欧美日本一区二区在线观看| 69堂成人精品免费视频| 欧美日韩中文另类| 欧美性色黄大片| jiyouzz国产精品久久| 色噜噜偷拍精品综合在线| jlzzjlzz亚洲女人18| eeuss鲁一区二区三区| aaa欧美色吧激情视频| 国产成人免费在线| 成人毛片在线观看| caoporm超碰国产精品| 国产**成人网毛片九色| 色8久久精品久久久久久蜜| 色婷婷亚洲精品| av一区二区不卡| 欧美日韩国产小视频在线观看| 欧美另类一区二区三区| 欧美日韩一区二区在线观看| 欧美成人伊人久久综合网| 欧美岛国在线观看| 国产欧美日韩麻豆91| 一区二区三区免费在线观看| 亚洲午夜激情av| 美女视频黄 久久| 激情综合网最新| 精品制服美女丁香| 成人午夜精品一区二区三区| 国产成人av影院| 欧美日韩一级片在线观看| 777久久久精品| 久久久久久毛片| 亚洲午夜一区二区三区| 青青草成人在线观看| 国内精品久久久久影院一蜜桃| 99久久国产免费看| 欧美精品自拍偷拍| 亚洲欧洲无码一区二区三区| 一区二区三区在线影院| 午夜精品久久久| 国产成人一区二区精品非洲| 91影视在线播放| 911精品产国品一二三产区| 国产欧美日韩在线观看| 亚洲综合久久久久| 久久国产福利国产秒拍| 欧美亚洲国产一区二区三区va| 欧美成人aa大片| 亚洲女人****多毛耸耸8| 中文字幕亚洲电影| 麻豆成人免费电影| 91在线丨porny丨国产| 日韩视频在线你懂得| 亚洲激情图片一区| 极品少妇一区二区三区精品视频 | 国产69精品久久久久777| av亚洲产国偷v产偷v自拍| 欧美一区二区三区免费视频| 国产精品沙发午睡系列990531| 天天综合天天做天天综合| 天天影视网天天综合色在线播放| 国产自产2019最新不卡| 在线播放一区二区三区| 伊人色综合久久天天| bt欧美亚洲午夜电影天堂| 久久网这里都是精品| 激情亚洲综合在线| 欧美一区二区在线免费播放| 亚洲h在线观看| 精品视频在线视频| 亚洲国产精品久久人人爱蜜臀 | 最新国产精品久久精品| 国产成人欧美日韩在线电影| 欧美精品一区二区三区蜜臀| 男人的j进女人的j一区| 欧美一区二区三区精品| 日本中文在线一区| 欧美日韩久久不卡| 午夜成人在线视频| 欧美日韩国产免费一区二区| 亚洲电影视频在线| 欧美日韩免费观看一区三区| 性感美女极品91精品| 欧美精品日韩精品| 免费观看一级特黄欧美大片| 欧美一区二区视频网站| 久久激五月天综合精品| 久久男人中文字幕资源站| 国产黄色91视频| 国产精品久久久久一区二区三区| 99久久国产免费看| 亚洲午夜免费电影| 在线成人高清不卡| 韩国在线一区二区| 中文字幕av不卡| 91高清视频在线| 日韩在线一区二区| 精品sm在线观看| 9人人澡人人爽人人精品| 亚洲精选一二三| 777久久久精品| 国产精品中文欧美| 亚洲日本一区二区| 国产清纯美女被跳蛋高潮一区二区久久w | 国产三级精品视频| 色综合久久中文字幕综合网| 午夜精品久久久久久不卡8050| 日韩欧美一卡二卡| eeuss国产一区二区三区|