s_server
- Last Updated: January 16, 2024
- 2 minute read
- OpenEdge
- Version 12.8
- Documentation
| Operating system | Syntax |
|---|---|
|
UNIX
Windows |
|
- -accept port value
- Provides the port number that the server uses for the TLS handshake.
- -CAfile CA file path
- Provides the path for the CA certificate for client
authentication.Note: The supported file extension for the certificate is
.p12. Make sure that you provide the absolute path, for example,C:\xyz\abc.p12. - -CAPass CA password
- Provides the password for the CA certificate.
- -cert certificate path
- Provides the path where the server certificate resides. Note: The supported file extensions for the certificate are .jks and
.p12. Make sure that you provide the absolute path, for example,C:\xyz\123.p12. - -certPass certificate password
- Provides the password for the server certificate.
- -protocol
- Specifies the protocol that the server uses.
- -debug debug value
- Turns on the debugging, the valid values are
allandssl. The following are the values that you can choose forssl:record—Enables tracing for each record. The valid values areplaintextfor hex dump of record andpacketfor raw TLS packets.handshake—Displays each handshake message. The valid values aredatafor hex dump of each handshake message andverbosefor handshake message printing.keygen—Displays the key generation data.session—Displays the details of the session activity.-
defaultctx—Displays the default TLS initialization. sslctx—Displays the SSL context tracing.sessioncache—Displays the session cache tracing.-
keymanager—Displays the key manager tracing. trustmanager—Displays the trust manager tracing.
Note: If you have provided a filename using the-logoption, the above details are updated in the file. Otherwise, they are displayed in response to theproenvcommand. - -log log directory path
- Specifies the path where the s_server.log file is generated.
- -verify
- (Optional) Validates the client certificate when the server starts.
Example:
proenv> sslj s_server -accept 8888 -cert server.p12 -certPass password
-CAfile ca.p12 -CAPass password -debug ssl:handshake -log C:\Progress\WRK\-verify -TLSv1.1Note: For more information on an example on
creating and managing a .p12 keystore, see Introduction to OpenEdge
Management.