亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? s_server.pod

?? Linu下的openssl源碼 版本0.9.8b
?? POD
字號(hào):
=pod=head1 NAMEs_server - SSL/TLS server program=head1 SYNOPSISB<openssl> B<s_server>[B<-accept port>][B<-context id>][B<-verify depth>][B<-Verify depth>][B<-cert filename>][B<-certform DER|PEM>][B<-key keyfile>][B<-keyform DER|PEM>][B<-pass arg>][B<-dcert filename>][B<-dcertform DER|PEM>][B<-dkey keyfile>][B<-dkeyform DER|PEM>][B<-dpass arg>][B<-dhparam filename>][B<-nbio>][B<-nbio_test>][B<-crlf>][B<-debug>][B<-msg>][B<-state>][B<-CApath directory>][B<-CAfile filename>][B<-nocert>][B<-cipher cipherlist>][B<-quiet>][B<-no_tmp_rsa>][B<-ssl2>][B<-ssl3>][B<-tls1>][B<-no_ssl2>][B<-no_ssl3>][B<-no_tls1>][B<-no_dhe>][B<-bugs>][B<-hack>][B<-www>][B<-WWW>][B<-HTTP>][B<-engine id>][B<-id_prefix arg>][B<-rand file(s)>]=head1 DESCRIPTIONThe B<s_server> command implements a generic SSL/TLS server which listensfor connections on a given port using SSL/TLS.=head1 OPTIONS=over 4=item B<-accept port>the TCP port to listen on for connections. If not specified 4433 is used.=item B<-context id>sets the SSL context id. It can be given any string value. If this optionis not present a default value will be used.=item B<-cert certname>The certificate to use, most servers cipher suites require the use of acertificate and some require a certificate with a certain public key type:for example the DSS cipher suites require a certificate containing a DSS(DSA) key. If not specified then the filename "server.pem" will be used.=item B<-certform format>The certificate format to use: DER or PEM. PEM is the default.=item B<-key keyfile>The private key to use. If not specified then the certificate file willbe used.=item B<-keyform format>The private format to use: DER or PEM. PEM is the default.=item B<-pass arg>the private key password source. For more information about the format of B<arg>see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)|openssl(1)>.=item B<-dcert filename>, B<-dkey keyname>specify an additional certificate and private key, these behave in thesame manner as the B<-cert> and B<-key> options except there is no defaultif they are not specified (no additional certificate and key is used). Asnoted above some cipher suites require a certificate containing a key ofa certain type. Some cipher suites need a certificate carrying an RSA keyand some a DSS (DSA) key. By using RSA and DSS certificates and keysa server can support clients which only support RSA or DSS cipher suitesby using an appropriate certificate.=item B<-dcertform format>, B<-dkeyform format>, B<-dpass arg>addtional certificate and private key format and passphrase respectively.=item B<-nocert>if this option is set then no certificate is used. This restricts thecipher suites available to the anonymous ones (currently just anonymousDH).=item B<-dhparam filename>the DH parameter file to use. The ephemeral DH cipher suites generate keysusing a set of DH parameters. If not specified then an attempt is made toload the parameters from the server certificate file. If this fails thena static set of parameters hard coded into the s_server program will be used.=item B<-no_dhe>if this option is set then no DH parameters will be loaded effectivelydisabling the ephemeral DH cipher suites.=item B<-no_tmp_rsa>certain export cipher suites sometimes use a temporary RSA key, this optiondisables temporary RSA key generation.=item B<-verify depth>, B<-Verify depth>The verify depth to use. This specifies the maximum length of theclient certificate chain and makes the server request a certificate fromthe client. With the B<-verify> option a certificate is requested but theclient does not have to send one, with the B<-Verify> option the clientmust supply a certificate or an error occurs.=item B<-CApath directory>The directory to use for client certificate verification. This directorymust be in "hash format", see B<verify> for more information. These arealso used when building the server certificate chain.=item B<-CAfile file>A file containing trusted certificates to use during client authenticationand to use when attempting to build the server certificate chain. The listis also used in the list of acceptable client CAs passed to the client whena certificate is requested.=item B<-state>prints out the SSL session states.=item B<-debug>print extensive debugging information including a hex dump of all traffic.=item B<-msg>show all protocol messages with hex dump.=item B<-nbio_test>tests non blocking I/O=item B<-nbio>turns on non blocking I/O=item B<-crlf>this option translated a line feed from the terminal into CR+LF.=item B<-quiet>inhibit printing of session and certificate information.=item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>these options disable the use of certain SSL or TLS protocols. By defaultthe initial handshake uses a method which should be compatible with allservers and permit them to use SSL v3, SSL v2 or TLS as appropriate.=item B<-bugs>there are several known bug in SSL and TLS implementations. Adding thisoption enables various workarounds.=item B<-hack>this option enables a further workaround for some some early NetscapeSSL code (?).=item B<-cipher cipherlist>this allows the cipher list used by the server to be modified.  Whenthe client sends a list of supported ciphers the first client cipheralso included in the server list is used. Because the client specifiesthe preference order, the order of the server cipherlist irrelevant. Seethe B<ciphers> command for more information.=item B<-www>sends a status message back to the client when it connects. This includeslots of information about the ciphers used and various session parameters.The output is in HTML format so this option will normally be used with aweb browser.=item B<-WWW>emulates a simple web server. Pages will be resolved relative to thecurrent directory, for example if the URL https://myhost/page.html isrequested the file ./page.html will be loaded.=item B<-HTTP>emulates a simple web server. Pages will be resolved relative to thecurrent directory, for example if the URL https://myhost/page.html isrequested the file ./page.html will be loaded. The files loaded areassumed to contain a complete and correct HTTP response (lines thatare part of the HTTP response line and headers must end with CRLF).=item B<-engine id>specifying an engine (by it's unique B<id> string) will cause B<s_server>to attempt to obtain a functional reference to the specified engine,thus initialising it if needed. The engine will then be set as the defaultfor all available algorithms.=item B<-id_prefix arg>generate SSL/TLS session IDs prefixed by B<arg>. This is mostly usefulfor testing any SSL/TLS code (eg. proxies) that wish to deal with multipleservers, when each of which might be generating a unique range of sessionIDs (eg. with a certain prefix).=item B<-rand file(s)>a file or files containing random data used to seed the random numbergenerator, or an EGD socket (see L<RAND_egd(3)|RAND_egd(3)>).Multiple files can be specified separated by a OS-dependent character.The separator is B<;> for MS-Windows, B<,> for OpenVMS, and B<:> forall others.=back=head1 CONNECTED COMMANDSIf a connection request is established with an SSL client and neither theB<-www> nor the B<-WWW> option has been used then normally any data receivedfrom the client is displayed and any key presses will be sent to the client. Certain single letter commands are also recognized which perform specialoperations: these are listed below.=over 4=item B<q>end the current SSL connection but still accept new connections.=item B<Q>end the current SSL connection and exit.=item B<r>renegotiate the SSL session.=item B<R>renegotiate the SSL session and request a client certificate.=item B<P>send some plain text down the underlying TCP connection: this shouldcause the client to disconnect due to a protocol violation.=item B<S>print out some session cache status information.=back=head1 NOTESB<s_server> can be used to debug SSL clients. To accept connections froma web browser the command: openssl s_server -accept 443 -wwwcan be used for example.Most web browsers (in particular Netscape and MSIE) only support RSA ciphersuites, so they cannot connect to servers which don't use a certificatecarrying an RSA key or a version of OpenSSL with RSA disabled.Although specifying an empty list of CAs when requesting a client certificateis strictly speaking a protocol violation, some SSL clients interpret this tomean any CA is acceptable. This is useful for debugging purposes.The session parameters can printed out using the B<sess_id> program.=head1 BUGSBecause this program has a lot of options and also because some ofthe techniques used are rather old, the C source of s_server is ratherhard to read and not a model of how things should be done. A typicalSSL server program would be much simpler.The output of common ciphers is wrong: it just gives the list of ciphers thatOpenSSL recognizes and the client supports.There should be a way for the B<s_server> program to print out details of anyunknown cipher suites a client says it supports.=head1 SEE ALSOL<sess_id(1)|sess_id(1)>, L<s_client(1)|s_client(1)>, L<ciphers(1)|ciphers(1)>=cut

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
午夜精品福利在线| 日韩—二三区免费观看av| 亚洲欧洲日本在线| 26uuu国产日韩综合| 国产精品卡一卡二卡三| 久久久亚洲欧洲日产国码αv| 国产日韩欧美激情| 久久久久久久精| 亚洲另类一区二区| 国产精品亚洲成人| 欧美中文字幕亚洲一区二区va在线 | 成人小视频在线观看| 91精品91久久久中77777| ww亚洲ww在线观看国产| 亚洲精品欧美激情| 国产一本一道久久香蕉| 欧美日韩国产精品自在自线| 亚洲欧洲日韩综合一区二区| 国产一区二区三区在线观看免费 | 国产午夜精品一区二区三区嫩草| 中文一区二区在线观看| 捆绑紧缚一区二区三区视频| 国产 欧美在线| 亚洲精品一区二区三区99| 日本怡春院一区二区| 欧美三级韩国三级日本一级| 亚洲欧美综合色| 国产.欧美.日韩| 欧美激情中文字幕| 国内精品自线一区二区三区视频| 在线播放中文字幕一区| 亚洲综合一区二区三区| 色乱码一区二区三区88| 亚洲人妖av一区二区| av午夜一区麻豆| 亚洲最色的网站| 久久99在线观看| 91麻豆精品国产无毒不卡在线观看| 亚洲图片欧美视频| 91精品免费在线观看| 国产一区二区三区香蕉| 久久免费偷拍视频| 成人免费观看av| 亚洲欧美日韩一区二区三区在线观看 | 欧美日韩激情一区二区三区| 中文字幕亚洲区| 一本到高清视频免费精品| 亚洲国产视频一区| 91精品国模一区二区三区| 国产综合久久久久影院| 欧美影院一区二区三区| 国产一区二区三区在线观看免费 | 欧美视频精品在线观看| 99久久久免费精品国产一区二区| 韩国一区二区视频| 日本 国产 欧美色综合| 亚洲一二三四久久| 亚洲人一二三区| 亚洲四区在线观看| 亚洲同性同志一二三专区| 久久品道一品道久久精品| 欧美成人精精品一区二区频| 欧美一级欧美一级在线播放| 欧美区视频在线观看| 欧美日韩成人高清| 正在播放亚洲一区| 日韩视频一区二区三区| 精品日韩av一区二区| 日韩精品专区在线| 久久一夜天堂av一区二区三区| 日韩视频一区二区| 久久久.com| 日韩一区中文字幕| 亚洲视频一区二区在线| 亚洲欧美日韩在线| 亚洲成在人线在线播放| 日本午夜一区二区| 国产主播一区二区| 99久久综合国产精品| 在线观看欧美黄色| 日韩三级伦理片妻子的秘密按摩| 久久久亚洲精华液精华液精华液| 国产精品美女久久久久久久久久久 | wwwwxxxxx欧美| 国产精品传媒在线| 亚洲aⅴ怡春院| 国产精品一二二区| 欧美怡红院视频| 欧美精品一区在线观看| 亚洲精品国产精品乱码不99| 日本成人在线网站| 91丨porny丨首页| 日韩欧美中文字幕精品| 中文字幕亚洲成人| 久久国产精品区| 日本电影欧美片| 久久久久久免费| 亚洲超丰满肉感bbw| 成人免费视频app| 日韩视频不卡中文| 亚洲一区二区三区在线| 国产69精品一区二区亚洲孕妇| 欧美日韩夫妻久久| 中文字幕欧美一区| 韩国女主播成人在线| 欧美日精品一区视频| 国产精品每日更新在线播放网址| 六月丁香综合在线视频| 91国模大尺度私拍在线视频| 国产精品激情偷乱一区二区∴| 免费三级欧美电影| 欧美精三区欧美精三区| 最新高清无码专区| 9l国产精品久久久久麻豆| 久久夜色精品一区| 国产综合一区二区| 精品国产91九色蝌蚪| 日本不卡高清视频| 欧美精品久久天天躁| 一区二区三区四区av| 91亚洲国产成人精品一区二三| 国产精品美日韩| 国产精品一级片在线观看| 精品成人一区二区| 国产一区二区不卡| 久久精品人人做| 全国精品久久少妇| 精品乱人伦一区二区三区| 国产一区在线观看视频| 久久久久国产一区二区三区四区 | 亚洲成av人片观看| 7777女厕盗摄久久久| 亚洲1区2区3区视频| 日韩欧美在线观看一区二区三区| 蜜桃一区二区三区在线| 欧美videos大乳护士334| 国产iv一区二区三区| 最近中文字幕一区二区三区| 欧美日韩中文国产| 九色综合狠狠综合久久| 国产精品午夜免费| 欧美亚洲动漫精品| 国产在线精品一区二区三区不卡 | 欧美日韩精品免费观看视频| 久久精品二区亚洲w码| 国产精品欧美精品| 欧美日本在线看| 成人精品一区二区三区中文字幕| 亚洲男同性视频| 精品美女一区二区| 欧洲av一区二区嗯嗯嗯啊| 日本v片在线高清不卡在线观看| 久久这里只有精品首页| 欧美三区在线观看| 国产91精品免费| 另类小说综合欧美亚洲| 国产精品乱码人人做人人爱| 91精品婷婷国产综合久久竹菊| 成人性色生活片| 久久国产免费看| 首页亚洲欧美制服丝腿| 国产精品青草综合久久久久99| 日韩午夜激情av| 欧美日韩一区中文字幕| eeuss鲁片一区二区三区在线观看 eeuss鲁片一区二区三区在线看 | 久久久久久电影| 欧美一区二区三区视频在线观看| 色欧美88888久久久久久影院| 久久se精品一区二区| 日韩国产欧美视频| 亚洲特级片在线| 国产精品麻豆欧美日韩ww| 精品国产91洋老外米糕| 日韩欧美精品在线视频| 欧美精品九九99久久| 91久久精品一区二区三| 91免费在线视频观看| 色婷婷av一区二区三区软件| 不卡电影免费在线播放一区| 国产成人在线影院| 国产精品资源站在线| 国产另类ts人妖一区二区| 99久久精品国产麻豆演员表| 激情综合色综合久久综合| 久久精品国产亚洲aⅴ| 国产综合一区二区| 国产成人在线免费观看| 成人高清视频在线| a在线播放不卡| 欧美性生活大片视频| 欧美军同video69gay| 日韩一区二区免费视频| 精品999久久久| 国产精品国产三级国产普通话99| 国产欧美日韩一区二区三区在线观看 | 欧美伦理视频网站| 精品99一区二区| 亚洲精品乱码久久久久久日本蜜臀| 亚洲电影第三页| 玖玖九九国产精品|