• Home
  • History
  • Annotate
Name Date Size #Lines LOC

..03-May-2022-

Makefile.amH A D08-May-20083 KiB9968

Makefile.inH A D03-May-202227.1 KiB807697

README.couriertlsH A D09-Jul-20002.4 KiB6959

aclocal.m4H A D11-Feb-2011313.7 KiB9,0018,076

argparse.cH A D30-Jul-2000877 5341

argparse.hH A D09-Jul-2000361 2210

config.h.inH A D11-Feb-20113.7 KiB14195

configureH A D03-May-2022416.6 KiB14,83712,379

configure.c++20H A D03-May-2022416.6 KiB14,83712,379

configure.inH A D30-May-201010.2 KiB538435

couriertcpd.1H A D11-Feb-201122.4 KiB733704

couriertls.1H A D11-Feb-20117 KiB227202

libcouriergnutls.cH A D01-May-201048.2 KiB2,3471,927

libcouriertls.cH A D03-May-202229.3 KiB1,5671,258

libcouriertls.hH A D07-Jul-200811.2 KiB36488

spipe.cH A D05-Jan-20031.9 KiB9456

spipe.hH A D05-Jan-2003210 157

starttls.cH A D27-Jun-200913.5 KiB803652

tcpd.cH A D30-Jul-200933.1 KiB1,9811,595

tcpdaccess.cH A D18-May-20051,020 7054

tcpremoteinfo.cH A D21-Feb-20022.7 KiB165139

tcpremoteinfo.hH A D21-May-2000548 3217

testsuiteH A D24-Jun-2002621 3834

tlscache.cH A D15-Jul-200212.3 KiB716536

tlscache.hH A D24-Jun-20022.6 KiB8319

tlscachetest.cH A D28-May-20061.3 KiB7457

tlsclient.cH A D30-Jun-200810 KiB543427

tlsclient.hH A D29-Jun-20081.1 KiB5637

tlsinfo.cH A D11-Jul-2002696 3423

tlspasswordcache.cH A D10-Nov-200717 KiB955758

tlspasswordcache.hH A D05-Jun-20031.3 KiB5325

README.couriertls

1# couriertls uses the following variables to initialize SSL/TLS:
2#
3# WARNING: Peer certificate verification has NOT yet been tested.  Proceed
4# at your own risk.  Only the basic SSL/TLS functionality is known to be
5# working. Keep this in mind as you play with the following variables.
6#
7# TLS_PROTOCOL sets the protocol version.  The possible versions are:
8#
9# SSL2 - SSLv2
10# SSL3 - SSLv3
11# TLS1 - TLS1
12
13TLS_PROTOCOL=TLS1
14
15# TLS_CIPHER_LIST optionally sets the list of ciphers to be used by the
16# OpenSSL library.  In most situations you can leave TLS_CIPHER_LIST
17# undefined
18#
19# TLS_CIPHER_LIST="ALL:!ADH:RC4+RSA:+SSLv2:@STRENGTH"
20
21# TLS_TIMEOUT is currently not implemented, and reserved for future use.
22# This is supposed to be an inactivity timeout, but its not yet implemented.
23
24# TLS_DHCERTFILE - PEM file that stores our Diffie-Hellman cipher pair.
25# When OpenSSL is compiled to use Diffie-Hellman ciphers instead of RSA
26# you must generate a DH pair that will be used.  In most situations the
27# DH pair is to be treated as confidential, and the file specified by
28# TLS_DHCERTFILE must not be world-readable.
29#
30# TLS_DHCERTFILE=
31
32# TLS_CERTFILE - certificate to use.  TLS_CERTFILE is required for SSL/TLS
33# servers, and is optional for SSL/TLS clients.  TLS_CERTFILE is usually
34# treated as confidential, and must not be world-readable.
35#
36# TLS_CERTFILE=
37
38
39# TLS_PEERCERTDIR, TLS_OURCACERT - when it is required that all peer
40# certificates are signed by a specific certificate authority, set
41# TLS_OURCACERT to the name of the file containing the certificate authority
42# root key, and set TLS_PEERCERTDIR to the name of the directory containing
43# the allowed certificates.
44#
45# TLS_PEERCERTDIR=
46# TLS_OURCACERT=
47
48#
49# TLS_VERIFYPEER - how to verify peer certificates.  The possible values of
50# this setting are:
51#
52# NONE - do not verify anything
53#
54# PEER - verify the peer certificate, if one's presented
55#
56# REQUIREPEER - require a peer certificate, fail if one's not presented
57#
58# SSL/TLS servers will usually set TLS_VERIFYPEER to NONE.  SSL/TLS clients
59# will usually set TLS_VERIFYPEER to REQUIREPEER.
60#
61# TLS_VERIFYPEER=PEER
62
63# TLS_ALLOWSELFSIGNEDCERT - this is an alternative to clients using
64# TLS_VERIFYPEER=NONE.  TLS_ALLOWSELFSIGNEDCERT ignores server certificates
65# that are not signed by a recognized certificate authority.  This allows
66# clients to simply verify that a server certificate is available.
67#
68# TLS_ALLOWSELFSIGNEDCERT=1
69