diff options
author | David Hook <dgh@cryptoworkshop.com> | 2013-05-30 08:06:41 +0400 |
---|---|---|
committer | David Hook <dgh@cryptoworkshop.com> | 2013-05-30 08:06:41 +0400 |
commit | 6e94dc011adb4effdd9f6f50ccb17d1a1adc5d1c (patch) | |
tree | ae0b902c99ace60e530b82b6c232e945949840fc | |
parent | aadacbcf58e9e49add08aed9a22f4698f96b6339 (diff) |
updated to use html.
-rw-r--r-- | docs/tls/GnuTLSSetup.html | 27 | ||||
-rw-r--r-- | docs/tls/OpenSSLSetup.html | 27 |
2 files changed, 54 insertions, 0 deletions
diff --git a/docs/tls/GnuTLSSetup.html b/docs/tls/GnuTLSSetup.html new file mode 100644 index 00000000..02ec634f --- /dev/null +++ b/docs/tls/GnuTLSSetup.html @@ -0,0 +1,27 @@ +<html> +<body> +<h3>Instructions for setting up a GnuTLS server for use with DTLSClientTest</h3> +<ul> +<li> Download GnuTLS from <a href="http://www.gnutls.org/download.html">http://www.gnutls.org/download.html</a></li> + +<li> Unpack to folder and add ${GNUTLS_HOME}/bin to PATH</li> + +<li> Make a working folder somewhere and copy the <a href="../../src/test/resources/org/bouncycastle/crypto/tls/test/">x509-*.pem</a> from this link to there.</li> + +<li> Go to working folder and start GnuTLS server (defaults to port 5556): +<ul> +<li>TLS: +<pre> + gnutls-serv --http --x509cafile x509-ca.pem --x509keyfile x509-server-key.pem --x509certfile x509-server.pem +</pre></li> +<li>DTLS: +<pre> + gnutls-serv --echo --udp --mtu 1500 --x509cafile x509-ca.pem --x509keyfile x509-server-key.pem --x509certfile x509-server.pem +</pre></li> +</ul> +</li> +<li> Further information in GnuTLS documentation at <a href="http://www.gnutls.org/documentation.html">http://www.gnutls.org/documentation.html</a> + see "7.2. Invoking gnutls-serv", section titled "gnutls-serv Examples" if you want to generate your own keys and certificates.</li> +</ul> +</body> +</html> diff --git a/docs/tls/OpenSSLSetup.html b/docs/tls/OpenSSLSetup.html new file mode 100644 index 00000000..2d0d6333 --- /dev/null +++ b/docs/tls/OpenSSLSetup.html @@ -0,0 +1,27 @@ +<html> +<body> +<h3>Instructions for setting up an OpenSSL server for use with DTLSClientTest</h3> +<ul> +<li>Download and Install OpenSSL (exercise for the reader)</li> + +<li> Unpack to folder and add ${GNUTLS_HOME}/bin to PATH</li> + +<li> Make a working folder somewhere and copy the <a href="../../src/test/resources/org/bouncycastle/crypto/tls/test/">x509-*.pem</a> from this link to there.</li> + +<li>Go to working folder and start OpenSSL server: +<ul> +<li>TLS: +<pre> + openssl s_server -accept 5556 -debug -msg -state -tls1_1 -www -CAfile x509-ca.pem -cert x509-server.pem -key x509-server-key.pem +</pre></li> +<li>DTLS: +<pre> + openssl s_server -accept 5556 -mtu 1500 -debug -msg -state -dtls1 -CAfile x509-ca.pem -cert x509-server.pem -key x509-server-key.pem +</pre></li> +</ul> +</li> +</ul> +NOTE: This is mainly of use to test the handshake. There doesn't appear to be an 'echo server' option with DTLS, but it will print + to stdout anything you send it, and lines you type into stdin (at the server) will be sent to the client. +</body> +</html> |