summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorinoguchi <>2019-07-12 10:21:08 +0000
committerinoguchi <>2019-07-12 10:21:08 +0000
commit1db1069d1b9ecde8b795c0cadab6f84368986bc7 (patch)
tree1d5dac68d0bbcc19c2ec73fa8da434af3e12ca88
parent8bdcdce4ae33e4cef15864c11df84176c17a095a (diff)
downloadopenbsd-1db1069d1b9ecde8b795c0cadab6f84368986bc7.tar.gz
openbsd-1db1069d1b9ecde8b795c0cadab6f84368986bc7.tar.bz2
openbsd-1db1069d1b9ecde8b795c0cadab6f84368986bc7.zip
Fix manual openssl(1) s_server
- Add undocumented options below. -alpn, -cert2, -certform, -dcertform, -dkeyform, -dpass, -dtls1, -key2, -keyform, -keymatexport, -keymatexportlen, -mtu, -named_curve, -no_cache, -no_ecdhe, -no_ticket, -pass, -port, -servername, -servername_fatal, -status, -status_timeout, -status_url, -status_verbose, -timeout, -tlsextdebug, -use_srtp, -verify_return_error - Remove -hack, -psk and -psk_hint since not exist in source code. I didn't add these 5 options since these were no-op. -chain, -legacy_renegotiation, -nextprotoneg, -no_comp, -no_ssl2 This option was removed from manual in the past. -no_ssl3 ok and suggestions from jmc@
-rw-r--r--src/usr.bin/openssl/openssl.1112
1 files changed, 94 insertions, 18 deletions
diff --git a/src/usr.bin/openssl/openssl.1 b/src/usr.bin/openssl/openssl.1
index 1cf58eb6c5..6e83385966 100644
--- a/src/usr.bin/openssl/openssl.1
+++ b/src/usr.bin/openssl/openssl.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: openssl.1,v 1.110 2019/07/11 10:31:48 inoguchi Exp $ 1.\" $OpenBSD: openssl.1,v 1.111 2019/07/12 10:21:08 inoguchi Exp $
2.\" ==================================================================== 2.\" ====================================================================
3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. 3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
4.\" 4.\"
@@ -110,7 +110,7 @@
110.\" copied and put under another distribution licence 110.\" copied and put under another distribution licence
111.\" [including the GNU Public Licence.] 111.\" [including the GNU Public Licence.]
112.\" 112.\"
113.Dd $Mdocdate: July 11 2019 $ 113.Dd $Mdocdate: July 12 2019 $
114.Dt OPENSSL 1 114.Dt OPENSSL 1
115.Os 115.Os
116.Sh NAME 116.Sh NAME
@@ -3899,42 +3899,67 @@ will be used.
3899.nr nS 1 3899.nr nS 1
3900.Nm "openssl s_server" 3900.Nm "openssl s_server"
3901.Op Fl accept Ar port 3901.Op Fl accept Ar port
3902.Op Fl alpn Ar protocols
3902.Op Fl bugs 3903.Op Fl bugs
3903.Op Fl CAfile Ar file 3904.Op Fl CAfile Ar file
3904.Op Fl CApath Ar directory 3905.Op Fl CApath Ar directory
3905.Op Fl cert Ar file 3906.Op Fl cert Ar file
3907.Op Fl cert2 Ar file
3908.Op Fl certform Cm der | pem
3906.Op Fl cipher Ar cipherlist 3909.Op Fl cipher Ar cipherlist
3907.Op Fl context Ar id 3910.Op Fl context Ar id
3908.Op Fl crl_check 3911.Op Fl crl_check
3909.Op Fl crl_check_all 3912.Op Fl crl_check_all
3910.Op Fl crlf 3913.Op Fl crlf
3911.Op Fl dcert Ar file 3914.Op Fl dcert Ar file
3915.Op Fl dcertform Cm der | pem
3912.Op Fl debug 3916.Op Fl debug
3913.Op Fl dhparam Ar file 3917.Op Fl dhparam Ar file
3914.Op Fl dkey Ar file 3918.Op Fl dkey Ar file
3915.Op Fl hack 3919.Op Fl dkeyform Cm der | pem
3920.Op Fl dpass Ar arg
3921.Op Fl dtls1
3916.Op Fl HTTP 3922.Op Fl HTTP
3917.Op Fl id_prefix Ar arg 3923.Op Fl id_prefix Ar arg
3918.Op Fl key Ar keyfile 3924.Op Fl key Ar keyfile
3925.Op Fl key2 Ar keyfile
3926.Op Fl keyform Cm der | pem
3927.Op Fl keymatexport Ar label
3928.Op Fl keymatexportlen Ar len
3919.Op Fl msg 3929.Op Fl msg
3930.Op Fl mtu Ar mtu
3931.Op Fl named_curve Ar arg
3920.Op Fl nbio 3932.Op Fl nbio
3921.Op Fl nbio_test 3933.Op Fl nbio_test
3934.Op Fl no_cache
3922.Op Fl no_dhe 3935.Op Fl no_dhe
3936.Op Fl no_ecdhe
3937.Op Fl no_ticket
3923.Op Fl no_tls1 3938.Op Fl no_tls1
3924.Op Fl no_tls1_1 3939.Op Fl no_tls1_1
3925.Op Fl no_tls1_2 3940.Op Fl no_tls1_2
3926.Op Fl no_tmp_rsa 3941.Op Fl no_tmp_rsa
3927.Op Fl nocert 3942.Op Fl nocert
3928.Op Fl psk Ar key 3943.Op Fl pass Ar arg
3929.Op Fl psk_hint Ar hint 3944.Op Fl port Ar port
3930.Op Fl quiet 3945.Op Fl quiet
3946.Op Fl servername Ar name
3947.Op Fl servername_fatal
3931.Op Fl serverpref 3948.Op Fl serverpref
3932.Op Fl state 3949.Op Fl state
3950.Op Fl status
3951.Op Fl status_timeout Ar nsec
3952.Op Fl status_url Ar url
3953.Op Fl status_verbose
3954.Op Fl timeout
3933.Op Fl tls1 3955.Op Fl tls1
3934.Op Fl tls1_1 3956.Op Fl tls1_1
3935.Op Fl tls1_2 3957.Op Fl tls1_2
3958.Op Fl tlsextdebug
3959.Op Fl use_srtp Ar profiles
3936.Op Fl Verify Ar depth 3960.Op Fl Verify Ar depth
3937.Op Fl verify Ar depth 3961.Op Fl verify Ar depth
3962.Op Fl verify_return_error
3938.Op Fl WWW 3963.Op Fl WWW
3939.Op Fl www 3964.Op Fl www
3940.nr nS 0 3965.nr nS 0
@@ -3969,11 +3994,15 @@ Print out some session cache status information.
3969.Pp 3994.Pp
3970The options are as follows: 3995The options are as follows:
3971.Bl -tag -width Ds 3996.Bl -tag -width Ds
3972.It Fl accept Ar port 3997.It Fl accept Ar port , Fl port Ar port
3973Listen on TCP 3998Listen on TCP
3974.Ar port 3999.Ar port
3975for connections. 4000for connections.
3976The default is port 4433. 4001The default is port 4433.
4002.It Fl alpn Ar protocols
4003Enable the Application-Layer Protocol Negotiation.
4004.Ar protocols
4005is a comma-separated list of supported protocol names.
3977.It Fl bugs 4006.It Fl bugs
3978Enable various workarounds for buggy implementations. 4007Enable various workarounds for buggy implementations.
3979.It Fl CAfile Ar file 4008.It Fl CAfile Ar file
@@ -4001,6 +4030,12 @@ For example, the DSS cipher suites require a certificate containing a DSS
4001If not specified, the file 4030If not specified, the file
4002.Pa server.pem 4031.Pa server.pem
4003will be used. 4032will be used.
4033.It Fl cert2 Ar file
4034The certificate to use for servername.
4035.It Fl certform Cm der | pem
4036The certificate format.
4037The default is
4038.Cm pem .
4004.It Fl cipher Ar cipherlist 4039.It Fl cipher Ar cipherlist
4005Modify the cipher list used by the server. 4040Modify the cipher list used by the server.
4006This allows the cipher list used by the server to be modified. 4041This allows the cipher list used by the server to be modified.
@@ -4032,6 +4067,9 @@ options except there is no default if they are not specified
4032By using RSA and DSS certificates and keys, 4067By using RSA and DSS certificates and keys,
4033a server can support clients which only support RSA or DSS cipher suites 4068a server can support clients which only support RSA or DSS cipher suites
4034by using an appropriate certificate. 4069by using an appropriate certificate.
4070.It Fl dcertform Cm der | pem , Fl dkeyform Cm der | pem , Fl dpass Ar arg
4071Additional certificate and private key format, and private key password source,
4072respectively.
4035.It Fl debug 4073.It Fl debug
4036Print extensive debugging information, including a hex dump of all traffic. 4074Print extensive debugging information, including a hex dump of all traffic.
4037.It Fl dhparam Ar file 4075.It Fl dhparam Ar file
@@ -4043,8 +4081,8 @@ load the parameters from the server certificate file.
4043If this fails, a static set of parameters hard coded into the 4081If this fails, a static set of parameters hard coded into the
4044.Nm s_server 4082.Nm s_server
4045program will be used. 4083program will be used.
4046.It Fl hack 4084.It Fl dtls1
4047Enables a further workaround for some early Netscape SSL code. 4085Permit only DTLS1.0.
4048.It Fl HTTP 4086.It Fl HTTP
4049Emulate a simple web server. 4087Emulate a simple web server.
4050Pages are resolved relative to the current directory. 4088Pages are resolved relative to the current directory.
@@ -4065,14 +4103,34 @@ when each of which might be generating a unique range of session IDs.
4065.It Fl key Ar keyfile 4103.It Fl key Ar keyfile
4066The private key to use. 4104The private key to use.
4067If not specified, the certificate file will be used. 4105If not specified, the certificate file will be used.
4106.It Fl key2 Ar keyfile
4107The private key to use for servername.
4108.It Fl keyform Cm der | pem
4109The private key format.
4110The default is
4111.Cm pem .
4112.It Fl keymatexport Ar label
4113Export keying material using label.
4114.It Fl keymatexportlen Ar len
4115Export len bytes of keying material (default 20).
4068.It Fl msg 4116.It Fl msg
4069Show all protocol messages with hex dump. 4117Show all protocol messages with hex dump.
4118.It Fl mtu Ar mtu
4119Set the link layer MTU.
4120.It Fl named_curve Ar arg
4121Specify the elliptic curve name to use for ephemeral ECDH keys.
4070.It Fl nbio 4122.It Fl nbio
4071Turn on non-blocking I/O. 4123Turn on non-blocking I/O.
4072.It Fl nbio_test 4124.It Fl nbio_test
4073Test non-blocking I/O. 4125Test non-blocking I/O.
4126.It Fl no_cache
4127Disable session caching.
4074.It Fl no_dhe 4128.It Fl no_dhe
4075Disable ephemeral DH cipher suites. 4129Disable ephemeral DH cipher suites.
4130.It Fl no_ecdhe
4131Disable ephemeral ECDH cipher suites.
4132.It Fl no_ticket
4133Disable RFC 4507 session ticket support.
4076.It Fl no_tls1 | no_tls1_1 | no_tls1_2 4134.It Fl no_tls1 | no_tls1_1 | no_tls1_2
4077Disable the use of TLS1.0, 1.1, and 1.2, respectively. 4135Disable the use of TLS1.0, 1.1, and 1.2, respectively.
4078.It Fl no_tmp_rsa 4136.It Fl no_tmp_rsa
@@ -4081,24 +4139,42 @@ Disable temporary RSA key generation.
4081Do not use a certificate. 4139Do not use a certificate.
4082This restricts the cipher suites available to the anonymous ones 4140This restricts the cipher suites available to the anonymous ones
4083(currently just anonymous DH). 4141(currently just anonymous DH).
4084.It Fl psk Ar key 4142.It Fl pass Ar arg
4085Use the PSK key 4143The private key password source.
4086.Ar key
4087when using a PSK cipher suite.
4088The key is given as a hexadecimal number without the leading 0x,
4089for example -psk 1a2b3c4d.
4090.It Fl psk_hint Ar hint
4091Use the PSK identity hint
4092.Ar hint
4093when using a PSK cipher suite.
4094.It Fl quiet 4144.It Fl quiet
4095Inhibit printing of session and certificate information. 4145Inhibit printing of session and certificate information.
4146.It Fl servername Ar name
4147Set the TLS Server Name Indication (SNI) extension with
4148.Ar name .
4149.It Fl servername_fatal
4150Send fatal alert if servername does not match.
4151The default is warning alert.
4096.It Fl serverpref 4152.It Fl serverpref
4097Use server's cipher preferences. 4153Use server's cipher preferences.
4098.It Fl state 4154.It Fl state
4099Print the SSL session states. 4155Print the SSL session states.
4156.It Fl status
4157Enables certificate status request support (OCSP stapling).
4158.It Fl status_timeout Ar nsec
4159Sets the timeout for OCSP response in seconds.
4160.It Fl status_url Ar url
4161Sets a fallback responder URL to use if no responder URL is present in the
4162server certificate.
4163Without this option, an error is returned if the server certificate does not
4164contain a responder address.
4165.It Fl status_verbose
4166Enables certificate status request support (OCSP stapling) and gives a verbose
4167printout of the OCSP response.
4168.It Fl timeout
4169Enable send/receive timeout on DTLS connections.
4100.It Fl tls1 | tls1_1 | tls1_2 4170.It Fl tls1 | tls1_1 | tls1_2
4101Permit only TLS1.0, 1.1, or 1.2, respectively. 4171Permit only TLS1.0, 1.1, or 1.2, respectively.
4172.It Fl tlsextdebug
4173Print a hex dump of any TLS extensions received from the server.
4174.It Fl use_srtp Ar profiles
4175Offer SRTP key management with a colon-separated profile list.
4176.It Fl verify_return_error
4177Return verification error.
4102.It Fl WWW 4178.It Fl WWW
4103Emulate a simple web server. 4179Emulate a simple web server.
4104Pages are resolved relative to the current directory. 4180Pages are resolved relative to the current directory.