mirror of
https://github.com/openssl/openssl.git
synced 2024-11-27 05:21:51 +08:00
92c03668c0
The change to a more configuration based approach to enable FIPS mode operation highlights a shortcoming in the default should do something approach we've taken for bad configuration files. Currently, a bad configuration file will be automatically loaded and once the badness is detected, it will silently stop processing the configuration and continue normal operations. This is good for remote servers, allowing changes to be made without bricking things. It's bad when a user thinks they've configured what they want but got something wrong and it still appears to work. Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/16171)
24 lines
486 B
INI
24 lines
486 B
INI
# Example configuration file
|
|
|
|
# Comment out the next line to ignore configuration errors
|
|
config_diagnostics = 1
|
|
|
|
# Port to listen on
|
|
Port = 4433
|
|
|
|
# Disable TLS v1.2 for test.
|
|
# Protocol = ALL, -TLSv1.2
|
|
# Only support 3 curves
|
|
Curves = P-521:P-384:P-256
|
|
|
|
# Restricted signature algorithms
|
|
SignatureAlgorithms = RSA+SHA512:ECDSA+SHA512
|
|
Certificate=server.pem
|
|
PrivateKey=server.pem
|
|
ChainCAFile=root.pem
|
|
VerifyCAFile=root.pem
|
|
|
|
# Request certificate
|
|
VerifyMode=Request
|
|
ClientCAFile=root.pem
|