|
Name |
|
Date |
Size |
#Lines |
LOC |
| .. | | 03-May-2022 | - |
| Makefile.am | H A D | 08-May-2008 | 3 KiB | 99 | 68 |
| Makefile.in | H A D | 03-May-2022 | 27.1 KiB | 807 | 697 |
| README.couriertls | H A D | 09-Jul-2000 | 2.4 KiB | 69 | 59 |
| aclocal.m4 | H A D | 11-Feb-2011 | 313.7 KiB | 9,001 | 8,076 |
| argparse.c | H A D | 30-Jul-2000 | 877 | 53 | 41 |
| argparse.h | H A D | 09-Jul-2000 | 361 | 22 | 10 |
| config.h.in | H A D | 11-Feb-2011 | 3.7 KiB | 141 | 95 |
| configure | H A D | 03-May-2022 | 416.6 KiB | 14,837 | 12,379 |
| configure.c++20 | H A D | 03-May-2022 | 416.6 KiB | 14,837 | 12,379 |
| configure.in | H A D | 30-May-2010 | 10.2 KiB | 538 | 435 |
| couriertcpd.1 | H A D | 11-Feb-2011 | 22.4 KiB | 733 | 704 |
| couriertls.1 | H A D | 11-Feb-2011 | 7 KiB | 227 | 202 |
| libcouriergnutls.c | H A D | 01-May-2010 | 48.2 KiB | 2,347 | 1,927 |
| libcouriertls.c | H A D | 03-May-2022 | 29.3 KiB | 1,567 | 1,258 |
| libcouriertls.h | H A D | 07-Jul-2008 | 11.2 KiB | 364 | 88 |
| spipe.c | H A D | 05-Jan-2003 | 1.9 KiB | 94 | 56 |
| spipe.h | H A D | 05-Jan-2003 | 210 | 15 | 7 |
| starttls.c | H A D | 27-Jun-2009 | 13.5 KiB | 803 | 652 |
| tcpd.c | H A D | 30-Jul-2009 | 33.1 KiB | 1,981 | 1,595 |
| tcpdaccess.c | H A D | 18-May-2005 | 1,020 | 70 | 54 |
| tcpremoteinfo.c | H A D | 21-Feb-2002 | 2.7 KiB | 165 | 139 |
| tcpremoteinfo.h | H A D | 21-May-2000 | 548 | 32 | 17 |
| testsuite | H A D | 24-Jun-2002 | 621 | 38 | 34 |
| tlscache.c | H A D | 15-Jul-2002 | 12.3 KiB | 716 | 536 |
| tlscache.h | H A D | 24-Jun-2002 | 2.6 KiB | 83 | 19 |
| tlscachetest.c | H A D | 28-May-2006 | 1.3 KiB | 74 | 57 |
| tlsclient.c | H A D | 30-Jun-2008 | 10 KiB | 543 | 427 |
| tlsclient.h | H A D | 29-Jun-2008 | 1.1 KiB | 56 | 37 |
| tlsinfo.c | H A D | 11-Jul-2002 | 696 | 34 | 23 |
| tlspasswordcache.c | H A D | 10-Nov-2007 | 17 KiB | 955 | 758 |
| tlspasswordcache.h | H A D | 05-Jun-2003 | 1.3 KiB | 53 | 25 |
README.couriertls
1# couriertls uses the following variables to initialize SSL/TLS:
2#
3# WARNING: Peer certificate verification has NOT yet been tested. Proceed
4# at your own risk. Only the basic SSL/TLS functionality is known to be
5# working. Keep this in mind as you play with the following variables.
6#
7# TLS_PROTOCOL sets the protocol version. The possible versions are:
8#
9# SSL2 - SSLv2
10# SSL3 - SSLv3
11# TLS1 - TLS1
12
13TLS_PROTOCOL=TLS1
14
15# TLS_CIPHER_LIST optionally sets the list of ciphers to be used by the
16# OpenSSL library. In most situations you can leave TLS_CIPHER_LIST
17# undefined
18#
19# TLS_CIPHER_LIST="ALL:!ADH:RC4+RSA:+SSLv2:@STRENGTH"
20
21# TLS_TIMEOUT is currently not implemented, and reserved for future use.
22# This is supposed to be an inactivity timeout, but its not yet implemented.
23
24# TLS_DHCERTFILE - PEM file that stores our Diffie-Hellman cipher pair.
25# When OpenSSL is compiled to use Diffie-Hellman ciphers instead of RSA
26# you must generate a DH pair that will be used. In most situations the
27# DH pair is to be treated as confidential, and the file specified by
28# TLS_DHCERTFILE must not be world-readable.
29#
30# TLS_DHCERTFILE=
31
32# TLS_CERTFILE - certificate to use. TLS_CERTFILE is required for SSL/TLS
33# servers, and is optional for SSL/TLS clients. TLS_CERTFILE is usually
34# treated as confidential, and must not be world-readable.
35#
36# TLS_CERTFILE=
37
38
39# TLS_PEERCERTDIR, TLS_OURCACERT - when it is required that all peer
40# certificates are signed by a specific certificate authority, set
41# TLS_OURCACERT to the name of the file containing the certificate authority
42# root key, and set TLS_PEERCERTDIR to the name of the directory containing
43# the allowed certificates.
44#
45# TLS_PEERCERTDIR=
46# TLS_OURCACERT=
47
48#
49# TLS_VERIFYPEER - how to verify peer certificates. The possible values of
50# this setting are:
51#
52# NONE - do not verify anything
53#
54# PEER - verify the peer certificate, if one's presented
55#
56# REQUIREPEER - require a peer certificate, fail if one's not presented
57#
58# SSL/TLS servers will usually set TLS_VERIFYPEER to NONE. SSL/TLS clients
59# will usually set TLS_VERIFYPEER to REQUIREPEER.
60#
61# TLS_VERIFYPEER=PEER
62
63# TLS_ALLOWSELFSIGNEDCERT - this is an alternative to clients using
64# TLS_VERIFYPEER=NONE. TLS_ALLOWSELFSIGNEDCERT ignores server certificates
65# that are not signed by a recognized certificate authority. This allows
66# clients to simply verify that a server certificate is available.
67#
68# TLS_ALLOWSELFSIGNEDCERT=1
69