亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? s_client.pod

?? openssl
?? POD
字號:
=pod=head1 NAMEs_client - SSL/TLS client program=head1 SYNOPSISB<openssl> B<s_client>[B<-connect host:port>][B<-verify depth>][B<-cert filename>][B<-certform DER|PEM>][B<-key filename>][B<-keyform DER|PEM>][B<-pass arg>][B<-CApath directory>][B<-CAfile filename>][B<-reconnect>][B<-pause>][B<-showcerts>][B<-debug>][B<-msg>][B<-nbio_test>][B<-state>][B<-nbio>][B<-crlf>][B<-ign_eof>][B<-quiet>][B<-ssl2>][B<-ssl3>][B<-tls1>][B<-no_ssl2>][B<-no_ssl3>][B<-no_tls1>][B<-bugs>][B<-cipher cipherlist>][B<-starttls protocol>][B<-engine id>][B<-tlsextdebug>][B<-no_ticket>][B<-sess_out filename>][B<-sess_in filename>][B<-rand file(s)>]=head1 DESCRIPTIONThe B<s_client> command implements a generic SSL/TLS client which connectsto a remote host using SSL/TLS. It is a I<very> useful diagnostic tool forSSL servers.=head1 OPTIONS=over 4=item B<-connect host:port>This specifies the host and optional port to connect to. If not specifiedthen an attempt is made to connect to the local host on port 4433.=item B<-cert certname>The certificate to use, if one is requested by the server. The default isnot to use a certificate.=item B<-certform format>The certificate format to use: DER or PEM. PEM is the default.=item B<-key keyfile>The private key to use. If not specified then the certificate file willbe used.=item B<-keyform format>The private format to use: DER or PEM. PEM is the default.=item B<-pass arg>the private key password source. For more information about the format of B<arg>see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)|openssl(1)>.=item B<-verify depth>The verify depth to use. This specifies the maximum length of theserver certificate chain and turns on server certificate verification.Currently the verify operation continues after errors so all the problemswith a certificate chain can be seen. As a side effect the connectionwill never fail due to a server certificate verify failure.=item B<-CApath directory>The directory to use for server certificate verification. This directorymust be in "hash format", see B<verify> for more information. These arealso used when building the client certificate chain.=item B<-CAfile file>A file containing trusted certificates to use during server authenticationand to use when attempting to build the client certificate chain.=item B<-reconnect>reconnects to the same server 5 times using the same session ID, this canbe used as a test that session caching is working.=item B<-pause>pauses 1 second between each read and write call.=item B<-showcerts>display the whole server certificate chain: normally only the servercertificate itself is displayed.=item B<-prexit>print session information when the program exits. This will always attemptto print out information even if the connection fails. Normally informationwill only be printed out once if the connection succeeds. This option is usefulbecause the cipher in use may be renegotiated or the connection may failbecause a client certificate is required or is requested only after anattempt is made to access a certain URL. Note: the output produced by thisoption is not always accurate because a connection might never have beenestablished.=item B<-state>prints out the SSL session states.=item B<-debug>print extensive debugging information including a hex dump of all traffic.=item B<-msg>show all protocol messages with hex dump.=item B<-nbio_test>tests non-blocking I/O=item B<-nbio>turns on non-blocking I/O=item B<-crlf>this option translated a line feed from the terminal into CR+LF as requiredby some servers.=item B<-ign_eof>inhibit shutting down the connection when end of file is reached in theinput.=item B<-quiet>inhibit printing of session and certificate information.  This implicitlyturns on B<-ign_eof> as well.=item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>these options disable the use of certain SSL or TLS protocols. By defaultthe initial handshake uses a method which should be compatible with allservers and permit them to use SSL v3, SSL v2 or TLS as appropriate.Unfortunately there are a lot of ancient and broken servers in use whichcannot handle this technique and will fail to connect. Some servers onlywork if TLS is turned off with the B<-no_tls> option others will onlysupport SSL v2 and may need the B<-ssl2> option.=item B<-bugs>there are several known bug in SSL and TLS implementations. Adding thisoption enables various workarounds.=item B<-cipher cipherlist>this allows the cipher list sent by the client to be modified. Althoughthe server determines which cipher suite is used it should take the firstsupported cipher in the list sent by the client. See the B<ciphers>command for more information.=item B<-starttls protocol>send the protocol-specific message(s) to switch to TLS for communication.B<protocol> is a keyword for the intended protocol.  Currently, the onlysupported keywords are "smtp", "pop3", "imap", and "ftp".=item B<-tlsextdebug>print out a hex dump of any TLS extensions received from the server. Note: thisoption is only available if extension support is explicitly enabled at compiletime=item B<-no_ticket>disable RFC4507bis session ticket support. Note: this option is only availableif extension support is explicitly enabled at compile time=item B<-sess_out filename>output SSL session to B<filename>=item B<-sess_in sess.pem>load SSL session from B<filename>. The client will attempt to resume aconnection from this session.=item B<-engine id>specifying an engine (by it's unique B<id> string) will cause B<s_client>to attempt to obtain a functional reference to the specified engine,thus initialising it if needed. The engine will then be set as the defaultfor all available algorithms.=item B<-rand file(s)>a file or files containing random data used to seed the random numbergenerator, or an EGD socket (see L<RAND_egd(3)|RAND_egd(3)>).Multiple files can be specified separated by a OS-dependent character.The separator is B<;> for MS-Windows, B<,> for OpenVMS, and B<:> forall others.=back=head1 CONNECTED COMMANDSIf a connection is established with an SSL server then any data receivedfrom the server is displayed and any key presses will be sent to theserver. When used interactively (which means neither B<-quiet> nor B<-ign_eof>have been given), the session will be renegotiated if the line begins with anB<R>, and if the line begins with a B<Q> or if end of file is reached, theconnection will be closed down.=head1 NOTESB<s_client> can be used to debug SSL servers. To connect to an SSL HTTPserver the command: openssl s_client -connect servername:443would typically be used (https uses port 443). If the connection succeedsthen an HTTP command can be given such as "GET /" to retrieve a web page.If the handshake fails then there are several possible causes, if it isnothing obvious like no client certificate then the B<-bugs>, B<-ssl2>,B<-ssl3>, B<-tls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1> options can be triedin case it is a buggy server. In particular you should play with theseoptions B<before> submitting a bug report to an OpenSSL mailing list.A frequent problem when attempting to get client certificates workingis that a web client complains it has no certificates or gives an emptylist to choose from. This is normally because the server is not sendingthe clients certificate authority in its "acceptable CA list" when itrequests a certificate. By using B<s_client> the CA list can be viewedand checked. However some servers only request client authenticationafter a specific URL is requested. To obtain the list in this case itis necessary to use the B<-prexit> option and send an HTTP requestfor an appropriate page.If a certificate is specified on the command line using the B<-cert>option it will not be used unless the server specifically requestsa client certificate. Therefor merely including a client certificateon the command line is no guarantee that the certificate works.If there are problems verifying a server certificate then theB<-showcerts> option can be used to show the whole chain.Since the SSLv23 client hello cannot include compression methods or extensionsthese will only be supported if its use is disabled, for example by using theB<-no_sslv2> option.TLS extensions are only supported in OpenSSL 0.9.8 if they are explictlyenabled at compile time using for example the B<enable-tlsext> switch.=head1 BUGSBecause this program has a lot of options and also because some ofthe techniques used are rather old, the C source of s_client is ratherhard to read and not a model of how things should be done. A typicalSSL client program would be much simpler.The B<-verify> option should really exit if the server verificationfails.The B<-prexit> option is a bit of a hack. We should really reportinformation whenever a session is renegotiated.=head1 SEE ALSOL<sess_id(1)|sess_id(1)>, L<s_server(1)|s_server(1)>, L<ciphers(1)|ciphers(1)>=cut

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产米奇在线777精品观看| 日韩一区二区三区电影在线观看 | 最好看的中文字幕久久| 亚洲第一成人在线| 国产成人av电影| 欧美男人的天堂一二区| 自拍偷拍亚洲综合| 国模一区二区三区白浆| 欧美色老头old∨ideo| 欧美极品另类videosde| 久久精品国产一区二区| 欧美性做爰猛烈叫床潮| 国产精品美女久久久久久久久| 爽好多水快深点欧美视频| 97久久超碰国产精品| 欧美精品一区二区三区蜜臀 | 亚洲伊人伊色伊影伊综合网| 国产揄拍国内精品对白| 678五月天丁香亚洲综合网| 亚洲精品中文字幕乱码三区| 丁香网亚洲国际| 久久蜜臀中文字幕| 国内欧美视频一区二区| 精品久久五月天| 日产国产高清一区二区三区| 欧美日韩中文另类| 亚洲在线免费播放| 在线视频一区二区三| 亚洲色欲色欲www| 处破女av一区二区| 久久女同性恋中文字幕| 精品在线播放午夜| 日韩精品在线网站| 久久精品99国产精品| 精品国产乱码久久久久久久 | 国模娜娜一区二区三区| 日韩欧美中文一区| 久久电影网电视剧免费观看| 日韩欧美在线综合网| 久久精品国产99久久6| 欧美一级专区免费大片| 日本不卡视频在线| 久久中文娱乐网| 国内精品第一页| 久久蜜桃一区二区| 成人永久免费视频| 一区二区三区毛片| 欧美精品aⅴ在线视频| 日韩和欧美一区二区| 日韩精品一区二区三区蜜臀| 国产综合成人久久大片91| 久久嫩草精品久久久精品| 国产suv一区二区三区88区| 中文子幕无线码一区tr| 日本久久电影网| 爽好多水快深点欧美视频| 欧美岛国在线观看| 国产成人啪免费观看软件| 亚洲视频一二三| 欧美乱妇15p| 国内不卡的二区三区中文字幕| 国产精品天美传媒| 欧美性大战久久| 国产资源在线一区| 亚洲视频综合在线| 欧美一区二区三区日韩视频| 国产盗摄视频一区二区三区| 亚洲免费观看高清完整版在线 | 4438亚洲最大| 国产一区二区三区在线观看免费 | 18成人在线观看| 欧美专区日韩专区| 国产在线视视频有精品| 综合久久久久综合| 精品福利在线导航| 91福利资源站| 国产精品夜夜爽| 亚洲成人1区2区| 国产精品美女视频| 日韩欧美国产综合| 在线免费不卡视频| 国产大陆a不卡| 日韩精品国产欧美| 亚洲男女一区二区三区| 久久精品视频一区二区| 欧美日韩一二三| 不卡的av网站| 久久成人av少妇免费| 亚洲一区二区三区四区五区黄| 精品国产一区久久| 欧美三级视频在线观看| 成人精品视频.| 激情综合网av| 石原莉奈一区二区三区在线观看| 最好看的中文字幕久久| 久久精子c满五个校花| 91精品国产综合久久精品| 色综合天天综合色综合av | 国产成人自拍网| 免费人成网站在线观看欧美高清| 亚洲欧美偷拍三级| 欧美激情综合五月色丁香 | 欧美国产视频在线| 精品国产乱子伦一区| 欧美高清视频不卡网| 日本道精品一区二区三区| 成人高清免费观看| 国产精品99久久久| 国产一区二区中文字幕| 国内偷窥港台综合视频在线播放| 奇米色777欧美一区二区| 丝袜美腿一区二区三区| 亚洲一区二区视频在线观看| 中文字幕一区二区三区在线不卡| 国产午夜精品理论片a级大结局| 欧美大片日本大片免费观看| 欧美一区午夜视频在线观看| 91精品久久久久久久久99蜜臂| 欧美最新大片在线看 | 国产成人精品免费| 国产剧情一区在线| 国模少妇一区二区三区| 国内久久精品视频| 国产成人精品亚洲777人妖| 极品少妇xxxx精品少妇偷拍| 久久99精品久久久久久久久久久久| 日本不卡中文字幕| 久热成人在线视频| 国产伦精品一区二区三区免费 | 日韩视频在线观看一区二区| 日韩视频永久免费| 久久蜜桃av一区二区天堂| 欧美国产欧美综合| 亚洲激情第一区| 午夜视频在线观看一区二区| 日韩国产欧美在线观看| 激情综合网av| av电影在线观看完整版一区二区| 色综合欧美在线| 欧美一级高清片| 国产欧美日韩在线观看| 亚洲精品乱码久久久久久| 婷婷一区二区三区| 国产盗摄视频一区二区三区| 色悠悠亚洲一区二区| 91精品国产欧美一区二区| 久久久一区二区| 亚洲精选视频在线| 久久99九九99精品| 一本色道久久综合亚洲精品按摩| 欧美日韩中文国产| 久久久亚洲高清| 亚洲国产日韩a在线播放| 国产综合久久久久影院| 在线免费视频一区二区| 精品嫩草影院久久| 亚洲欧美国产77777| 激情综合网天天干| 欧美亚日韩国产aⅴ精品中极品| 精品少妇一区二区三区日产乱码 | 欧美日本一区二区三区| 久久精品一级爱片| 午夜精品免费在线观看| 懂色av中文字幕一区二区三区 | 成人免费不卡视频| 91精品欧美福利在线观看| 国产精品久久久久久久久果冻传媒| 午夜激情综合网| 成人18精品视频| 精品国产成人在线影院 | 国产精品嫩草影院com| 午夜亚洲国产au精品一区二区| 成人丝袜视频网| 欧美一区二区黄| 午夜精品久久久久久久99水蜜桃 | 欧美一卡二卡在线观看| 黄色资源网久久资源365| 99re在线精品| 亚洲第一成人在线| 日本最新不卡在线| 在线观看成人小视频| 国产精品沙发午睡系列990531| 91亚洲精品久久久蜜桃| 国产亚洲1区2区3区| 久久精品噜噜噜成人av农村| 欧美在线视频全部完| 中文字幕在线不卡一区| 国产精品456| 精品国内片67194| 美脚の诱脚舐め脚责91| 7777精品伊人久久久大香线蕉超级流畅 | 亚洲国产精品嫩草影院| av电影一区二区| 欧美激情一区不卡| 国产精品亚洲一区二区三区在线 | 国产网红主播福利一区二区| 韩国女主播一区二区三区| 欧美一区二区三区日韩视频| 日韩精品免费视频人成| 在线播放日韩导航|