diff options
-rw-r--r-- | doc/luaossl.pdf | bin | 282537 -> 283945 bytes | |||
-rw-r--r-- | doc/luaossl.tex | 16 |
2 files changed, 14 insertions, 2 deletions
diff --git a/doc/luaossl.pdf b/doc/luaossl.pdf index 4237910..3ec6d7e 100644 --- a/doc/luaossl.pdf +++ b/doc/luaossl.pdf | |||
Binary files differ | |||
diff --git a/doc/luaossl.tex b/doc/luaossl.tex index 2302e3a..f993961 100644 --- a/doc/luaossl.tex +++ b/doc/luaossl.tex | |||
@@ -747,8 +747,8 @@ name & \href{https://www.openssl.org/docs/ssl/SSL_CTX_set_options.html}{descript | |||
747 | \small{\texttt{OP\_NO\_SSLv2}} & Do not use the SSLv2 protocol. \\ | 747 | \small{\texttt{OP\_NO\_SSLv2}} & Do not use the SSLv2 protocol. \\ |
748 | \small{\texttt{OP\_NO\_SSLv3}} & Do not use the SSLv3 protocol. \\ | 748 | \small{\texttt{OP\_NO\_SSLv3}} & Do not use the SSLv3 protocol. \\ |
749 | \small{\texttt{OP\_NO\_TLSv1}} & Do not use the TLSv1.0 protocol. \\ | 749 | \small{\texttt{OP\_NO\_TLSv1}} & Do not use the TLSv1.0 protocol. \\ |
750 | \small{\texttt{OP\_NO\_TLSv1\_2}} & Do not use the TLSv1.1 protocol. \\ | 750 | \small{\texttt{OP\_NO\_TLSv1\_2}} & Do not use the TLSv1.2 protocol. \\ |
751 | \small{\texttt{OP\_NO\_TLSv1\_1}} & Do not use the TLSv1.2 protocol. \\ | 751 | \small{\texttt{OP\_NO\_TLSv1\_1}} & Do not use the TLSv1.1 protocol. \\ |
752 | \small{\texttt{OP\_NETSCAPE\_CA\_DN\_BUG}} & $\ldots$ \\ | 752 | \small{\texttt{OP\_NETSCAPE\_CA\_DN\_BUG}} & $\ldots$ \\ |
753 | \small{\texttt{OP\_NETSCAPE\_DEMO\_CIPHER\_CHANGE\_BUG}} & $\ldots$ \\ | 753 | \small{\texttt{OP\_NETSCAPE\_DEMO\_CIPHER\_CHANGE\_BUG}} & $\ldots$ \\ |
754 | \small{\texttt{OP\_CRYPTOPRO\_TLSEXT\_BUG}} & $\ldots$ \\ | 754 | \small{\texttt{OP\_CRYPTOPRO\_TLSEXT\_BUG}} & $\ldots$ \\ |
@@ -801,6 +801,12 @@ Sets \module{openssl.pkey} object $key$ as the ephemeral key during key exchange | |||
801 | 801 | ||
802 | \emph{In addition, to attain Perfect Forward Secrecy the options \texttt{OP\_SINGLE\_DH\_USE} and \texttt{OP\_SINGLE\_ECDH\_USE} must be set so that OpenSSL discards and regenerates the secret keying parameters for each key exchange.} | 802 | \emph{In addition, to attain Perfect Forward Secrecy the options \texttt{OP\_SINGLE\_DH\_USE} and \texttt{OP\_SINGLE\_ECDH\_USE} must be set so that OpenSSL discards and regenerates the secret keying parameters for each key exchange.} |
803 | 803 | ||
804 | \subsubsection[\fn{context:setAlpnProtos}]{\fn{context:setAlpnProtos($table$)}} | ||
805 | |||
806 | Sets the advertised ALPN protocols. $table$ is an array of protocol string identifiers. | ||
807 | |||
808 | \emph{Only supported since OpenSSL 1.0.2.} | ||
809 | |||
804 | \end{Module} | 810 | \end{Module} |
805 | 811 | ||
806 | 812 | ||
@@ -876,6 +882,12 @@ TLS1\_2\_VERSION & 16-bit TLSv1.2 identifier (0x0303). \\ | |||
876 | 882 | ||
877 | Returns the SSL/TLS version supported by the client, which should be greater than or equal to the negotiated version. See \fn{ssl:getVersion}. | 883 | Returns the SSL/TLS version supported by the client, which should be greater than or equal to the negotiated version. See \fn{ssl:getVersion}. |
878 | 884 | ||
885 | \subsubsection[\fn{ssl:getAlpnSelected}]{\fn{ssl:getAlpnSelected()}} | ||
886 | |||
887 | Returns the negotiated ALPN protocol as a string. | ||
888 | |||
889 | \emph{Only supported since OpenSSL 1.0.2.} | ||
890 | |||
879 | \end{Module} | 891 | \end{Module} |
880 | 892 | ||
881 | 893 | ||