remove ssl(3)
This commit is contained in:
parent
2d105c2d32
commit
8bebe3ab19
1 changed files with 0 additions and 124 deletions
124
sys/man/3/ssl
124
sys/man/3/ssl
|
@ -1,124 +0,0 @@
|
||||||
.TH SSL 3
|
|
||||||
.SH NAME
|
|
||||||
ssl \- SSL record layer
|
|
||||||
.SH SYNOPSIS
|
|
||||||
.nf
|
|
||||||
.B bind -a #D /net
|
|
||||||
|
|
||||||
.B /net/ssl/clone
|
|
||||||
.BI /net/ssl/ n
|
|
||||||
.BI /net/ssl/ n /ctl
|
|
||||||
.BI /net/ssl/ n /data
|
|
||||||
.BI /net/ssl/ n /encalgs
|
|
||||||
.BI /net/ssl/ n /hashalgs
|
|
||||||
.BI /net/ssl/ n /secretin
|
|
||||||
.BI /net/ssl/ n /secretout
|
|
||||||
.fi
|
|
||||||
.SH DESCRIPTION
|
|
||||||
The SSL device provides the interface to the Secure Socket Layer
|
|
||||||
device implementing the record layer protocol of SSLv2
|
|
||||||
(but not the handshake protocol, which is responsible for
|
|
||||||
mutual authentication and key exchange.)
|
|
||||||
The
|
|
||||||
.I ssl
|
|
||||||
device can be thought of as a filter providing optional encryption
|
|
||||||
and anti-tampering.
|
|
||||||
.PP
|
|
||||||
The top level directory contains a
|
|
||||||
.B clone
|
|
||||||
file and subdirectories numbered from zero to the number of connections
|
|
||||||
configured.
|
|
||||||
Opening the
|
|
||||||
.B clone
|
|
||||||
file reserves a connection. The file descriptor returned from the
|
|
||||||
.IR open (2)
|
|
||||||
will point to the control file,
|
|
||||||
.BR ctl ,
|
|
||||||
of the newly allocated connection. Reading the
|
|
||||||
.B ctl
|
|
||||||
file returns a text
|
|
||||||
string representing the number of the
|
|
||||||
connection.
|
|
||||||
.PP
|
|
||||||
A connection is controlled by writing text strings to the associated
|
|
||||||
.B ctl
|
|
||||||
file. After a connection has been established data may be read from
|
|
||||||
and written to the data file.
|
|
||||||
.PP
|
|
||||||
The SSL protocol provides a stream connection that preserves
|
|
||||||
.BR read / write
|
|
||||||
boundaries. As long as reads always specify buffers that are
|
|
||||||
of equal or greater lengths than the writes at the other end of the
|
|
||||||
connection, one write will correspond to one read.
|
|
||||||
.PP
|
|
||||||
Options are set by writing control messages to the
|
|
||||||
.B ctl
|
|
||||||
file of the connection.
|
|
||||||
.PP
|
|
||||||
The following control messages are supported:
|
|
||||||
.TP
|
|
||||||
.BI fd \ open-file-descriptor
|
|
||||||
Run the SSL protocol over the existing file descriptor.
|
|
||||||
.TP
|
|
||||||
.BI alg \ cryptoalgs
|
|
||||||
Connections start in
|
|
||||||
.B alg clear
|
|
||||||
which means no encryption or digesting.
|
|
||||||
Writing
|
|
||||||
.B alg sha
|
|
||||||
to the control file turns on SHA-1 digest authentication
|
|
||||||
for the data channel.
|
|
||||||
Similarly, writing
|
|
||||||
.B alg rc4_128
|
|
||||||
enables encryption.
|
|
||||||
Both can be turned on at once by
|
|
||||||
.BR "alg sha rc4_128" .
|
|
||||||
The digest mode
|
|
||||||
.B sha
|
|
||||||
may be replaced by
|
|
||||||
.BR md5 .
|
|
||||||
The encryption mode
|
|
||||||
.B rc4_128
|
|
||||||
may be replaced by
|
|
||||||
.BR rc4_40 ,
|
|
||||||
.BR rc4_128 ,
|
|
||||||
.BR rc4_256 ,
|
|
||||||
.BR des_40_ecb ,
|
|
||||||
.BR des_40_cbc ,
|
|
||||||
.BR des_56_ecb ,
|
|
||||||
and
|
|
||||||
.BR des_56_cbc .
|
|
||||||
The mode may be changed at any time during the connection.
|
|
||||||
.TP
|
|
||||||
.BI secretin \ base64-secret
|
|
||||||
The secret for decrypting and authenticating incoming messages
|
|
||||||
can be specified either as a base64 encoded string by writing to the
|
|
||||||
control file, or as a binary byte string using the interface below.
|
|
||||||
.TP
|
|
||||||
.BI secretout \ base64-secret
|
|
||||||
The secret for encrypting and hashing outgoing messages
|
|
||||||
can be specified either as a base64 encoded string by writing to the
|
|
||||||
control file, or as a binary byte string using the interface below.
|
|
||||||
.PP
|
|
||||||
Before enabling digesting or encryption, shared secrets must be agreed upon with
|
|
||||||
the remote side, one for each direction of transmission,
|
|
||||||
and loaded as shown above or by writing to the files
|
|
||||||
.I secretin
|
|
||||||
and
|
|
||||||
.IR secretout .
|
|
||||||
If either the incoming or outgoing secret is not specified, the other secret
|
|
||||||
is assumed to work for both directions.
|
|
||||||
.PP
|
|
||||||
The encryption and hash algoritms actually included in the kernel
|
|
||||||
may be smaller than the set presented here. Reading
|
|
||||||
.I encalgs
|
|
||||||
and
|
|
||||||
.I hashalgs
|
|
||||||
will give the actual space-separated list of algorithms implemented.
|
|
||||||
.SH "SEE ALSO"
|
|
||||||
.IR listen (8),
|
|
||||||
.IR dial (2)
|
|
||||||
.SH SOURCE
|
|
||||||
.B /sys/src/9/port/devssl.c
|
|
||||||
.SH BUGS
|
|
||||||
Messages longer than 4096 bytes are truncated.
|
|
Loading…
Reference in a new issue