Update man pages
This commit is contained in:
parent
7e1a0d204b
commit
8a3eb3f066
|
@ -1,6 +1,6 @@
|
||||||
.\" Man page generated from reStructuredText.
|
.\" Man page generated from reStructuredText.
|
||||||
.
|
.
|
||||||
.TH "H2LOAD" "1" "Dec 27, 2016" "1.18.0" "nghttp2"
|
.TH "H2LOAD" "1" "Jan 09, 2017" "1.19.0-DEV" "nghttp2"
|
||||||
.SH NAME
|
.SH NAME
|
||||||
h2load \- HTTP/2 benchmarking tool
|
h2load \- HTTP/2 benchmarking tool
|
||||||
.
|
.
|
||||||
|
@ -123,6 +123,8 @@ Add/Override a header to the requests.
|
||||||
.B \-\-ciphers=<SUITE>
|
.B \-\-ciphers=<SUITE>
|
||||||
Set allowed cipher list. The format of the string is
|
Set allowed cipher list. The format of the string is
|
||||||
described in OpenSSL ciphers(1).
|
described in OpenSSL ciphers(1).
|
||||||
|
.sp
|
||||||
|
Default: \fBECDHE\-ECDSA\-CHACHA20\-POLY1305:ECDHE\-RSA\-CHACHA20\-POLY1305:ECDHE\-ECDSA\-AES128\-GCM\-SHA256:ECDHE\-RSA\-AES128\-GCM\-SHA256:ECDHE\-ECDSA\-AES256\-GCM\-SHA384:ECDHE\-RSA\-AES256\-GCM\-SHA384:DHE\-RSA\-AES128\-GCM\-SHA256:DHE\-RSA\-AES256\-GCM\-SHA384:ECDHE\-ECDSA\-AES128\-SHA256:ECDHE\-RSA\-AES128\-SHA256:ECDHE\-ECDSA\-AES128\-SHA:ECDHE\-RSA\-AES256\-SHA384:ECDHE\-RSA\-AES128\-SHA:ECDHE\-ECDSA\-AES256\-SHA384:ECDHE\-ECDSA\-AES256\-SHA:ECDHE\-RSA\-AES256\-SHA:DHE\-RSA\-AES128\-SHA256:DHE\-RSA\-AES128\-SHA:DHE\-RSA\-AES256\-SHA256:DHE\-RSA\-AES256\-SHA:ECDHE\-ECDSA\-DES\-CBC3\-SHA:ECDHE\-RSA\-DES\-CBC3\-SHA:EDH\-RSA\-DES\-CBC3\-SHA:AES128\-GCM\-SHA256:AES256\-GCM\-SHA384:AES128\-SHA256:AES256\-SHA256:AES128\-SHA:AES256\-SHA:DES\-CBC3\-SHA:!DSS\fP
|
||||||
.UNINDENT
|
.UNINDENT
|
||||||
.INDENT 0.0
|
.INDENT 0.0
|
||||||
.TP
|
.TP
|
||||||
|
|
|
@ -96,6 +96,8 @@ OPTIONS
|
||||||
Set allowed cipher list. The format of the string is
|
Set allowed cipher list. The format of the string is
|
||||||
described in OpenSSL ciphers(1).
|
described in OpenSSL ciphers(1).
|
||||||
|
|
||||||
|
Default: ``ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS``
|
||||||
|
|
||||||
.. option:: -p, --no-tls-proto=<PROTOID>
|
.. option:: -p, --no-tls-proto=<PROTOID>
|
||||||
|
|
||||||
Specify ALPN identifier of the protocol to be used when
|
Specify ALPN identifier of the protocol to be used when
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
.\" Man page generated from reStructuredText.
|
.\" Man page generated from reStructuredText.
|
||||||
.
|
.
|
||||||
.TH "NGHTTP" "1" "Dec 27, 2016" "1.18.0" "nghttp2"
|
.TH "NGHTTP" "1" "Jan 09, 2017" "1.19.0-DEV" "nghttp2"
|
||||||
.SH NAME
|
.SH NAME
|
||||||
nghttp \- HTTP/2 client
|
nghttp \- HTTP/2 client
|
||||||
.
|
.
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
.\" Man page generated from reStructuredText.
|
.\" Man page generated from reStructuredText.
|
||||||
.
|
.
|
||||||
.TH "NGHTTPD" "1" "Dec 27, 2016" "1.18.0" "nghttp2"
|
.TH "NGHTTPD" "1" "Jan 09, 2017" "1.19.0-DEV" "nghttp2"
|
||||||
.SH NAME
|
.SH NAME
|
||||||
nghttpd \- HTTP/2 server
|
nghttpd \- HTTP/2 server
|
||||||
.
|
.
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
.\" Man page generated from reStructuredText.
|
.\" Man page generated from reStructuredText.
|
||||||
.
|
.
|
||||||
.TH "NGHTTPX" "1" "Dec 27, 2016" "1.18.0" "nghttp2"
|
.TH "NGHTTPX" "1" "Jan 09, 2017" "1.19.0-DEV" "nghttp2"
|
||||||
.SH NAME
|
.SH NAME
|
||||||
nghttpx \- HTTP/2 proxy
|
nghttpx \- HTTP/2 proxy
|
||||||
.
|
.
|
||||||
|
@ -218,6 +218,10 @@ specify "healthmon" parameter. This is disabled by
|
||||||
default. Any requests which come through this address
|
default. Any requests which come through this address
|
||||||
are replied with 200 HTTP status, without no body.
|
are replied with 200 HTTP status, without no body.
|
||||||
.sp
|
.sp
|
||||||
|
To accept PROXY protocol version 1 on frontend
|
||||||
|
connection, specify "proxyproto" parameter. This is
|
||||||
|
disabled by default.
|
||||||
|
.sp
|
||||||
Default: \fB*,3000\fP
|
Default: \fB*,3000\fP
|
||||||
.UNINDENT
|
.UNINDENT
|
||||||
.INDENT 0.0
|
.INDENT 0.0
|
||||||
|
@ -253,11 +257,6 @@ timeouts when connecting and making CONNECT request can
|
||||||
be specified by \fI\%\-\-backend\-read\-timeout\fP and
|
be specified by \fI\%\-\-backend\-read\-timeout\fP and
|
||||||
\fI\%\-\-backend\-write\-timeout\fP options.
|
\fI\%\-\-backend\-write\-timeout\fP options.
|
||||||
.UNINDENT
|
.UNINDENT
|
||||||
.INDENT 0.0
|
|
||||||
.TP
|
|
||||||
.B \-\-accept\-proxy\-protocol
|
|
||||||
Accept PROXY protocol version 1 on frontend connection.
|
|
||||||
.UNINDENT
|
|
||||||
.SS Performance
|
.SS Performance
|
||||||
.INDENT 0.0
|
.INDENT 0.0
|
||||||
.TP
|
.TP
|
||||||
|
@ -529,8 +528,18 @@ Default: \fB2m\fP
|
||||||
.INDENT 0.0
|
.INDENT 0.0
|
||||||
.TP
|
.TP
|
||||||
.B \-\-ciphers=<SUITE>
|
.B \-\-ciphers=<SUITE>
|
||||||
Set allowed cipher list. The format of the string is
|
Set allowed cipher list for frontend connection. The
|
||||||
described in OpenSSL ciphers(1).
|
format of the string is described in OpenSSL ciphers(1).
|
||||||
|
.sp
|
||||||
|
Default: \fBECDHE\-ECDSA\-CHACHA20\-POLY1305:ECDHE\-RSA\-CHACHA20\-POLY1305:ECDHE\-ECDSA\-AES128\-GCM\-SHA256:ECDHE\-RSA\-AES128\-GCM\-SHA256:ECDHE\-ECDSA\-AES256\-GCM\-SHA384:ECDHE\-RSA\-AES256\-GCM\-SHA384:DHE\-RSA\-AES128\-GCM\-SHA256:DHE\-RSA\-AES256\-GCM\-SHA384:ECDHE\-ECDSA\-AES128\-SHA256:ECDHE\-RSA\-AES128\-SHA256:ECDHE\-ECDSA\-AES128\-SHA:ECDHE\-RSA\-AES256\-SHA384:ECDHE\-RSA\-AES128\-SHA:ECDHE\-ECDSA\-AES256\-SHA384:ECDHE\-ECDSA\-AES256\-SHA:ECDHE\-RSA\-AES256\-SHA:DHE\-RSA\-AES128\-SHA256:DHE\-RSA\-AES128\-SHA:DHE\-RSA\-AES256\-SHA256:DHE\-RSA\-AES256\-SHA:ECDHE\-ECDSA\-DES\-CBC3\-SHA:ECDHE\-RSA\-DES\-CBC3\-SHA:EDH\-RSA\-DES\-CBC3\-SHA:AES128\-GCM\-SHA256:AES256\-GCM\-SHA384:AES128\-SHA256:AES256\-SHA256:AES128\-SHA:AES256\-SHA:DES\-CBC3\-SHA:!DSS\fP
|
||||||
|
.UNINDENT
|
||||||
|
.INDENT 0.0
|
||||||
|
.TP
|
||||||
|
.B \-\-client\-ciphers=<SUITE>
|
||||||
|
Set allowed cipher list for backend connection. The
|
||||||
|
format of the string is described in OpenSSL ciphers(1).
|
||||||
|
.sp
|
||||||
|
Default: \fBECDHE\-ECDSA\-CHACHA20\-POLY1305:ECDHE\-RSA\-CHACHA20\-POLY1305:ECDHE\-ECDSA\-AES128\-GCM\-SHA256:ECDHE\-RSA\-AES128\-GCM\-SHA256:ECDHE\-ECDSA\-AES256\-GCM\-SHA384:ECDHE\-RSA\-AES256\-GCM\-SHA384:DHE\-RSA\-AES128\-GCM\-SHA256:DHE\-RSA\-AES256\-GCM\-SHA384:ECDHE\-ECDSA\-AES128\-SHA256:ECDHE\-RSA\-AES128\-SHA256:ECDHE\-ECDSA\-AES128\-SHA:ECDHE\-RSA\-AES256\-SHA384:ECDHE\-RSA\-AES128\-SHA:ECDHE\-ECDSA\-AES256\-SHA384:ECDHE\-ECDSA\-AES256\-SHA:ECDHE\-RSA\-AES256\-SHA:DHE\-RSA\-AES128\-SHA256:DHE\-RSA\-AES128\-SHA:DHE\-RSA\-AES256\-SHA256:DHE\-RSA\-AES256\-SHA:ECDHE\-ECDSA\-DES\-CBC3\-SHA:ECDHE\-RSA\-DES\-CBC3\-SHA:EDH\-RSA\-DES\-CBC3\-SHA:AES128\-GCM\-SHA256:AES256\-GCM\-SHA384:AES128\-SHA256:AES256\-SHA256:AES128\-SHA:AES256\-SHA:DES\-CBC3\-SHA:!DSS\fP
|
||||||
.UNINDENT
|
.UNINDENT
|
||||||
.INDENT 0.0
|
.INDENT 0.0
|
||||||
.TP
|
.TP
|
||||||
|
@ -820,9 +829,18 @@ Default: \fB1s\fP
|
||||||
.INDENT 0.0
|
.INDENT 0.0
|
||||||
.TP
|
.TP
|
||||||
.B \-\-no\-http2\-cipher\-black\-list
|
.B \-\-no\-http2\-cipher\-black\-list
|
||||||
Allow black listed cipher suite on HTTP/2 connection.
|
Allow black listed cipher suite on frontend HTTP/2
|
||||||
See \fI\%https://tools.ietf.org/html/rfc7540#appendix\-A\fP for
|
connection. See
|
||||||
the complete HTTP/2 cipher suites black list.
|
\fI\%https://tools.ietf.org/html/rfc7540#appendix\-A\fP for the
|
||||||
|
complete HTTP/2 cipher suites black list.
|
||||||
|
.UNINDENT
|
||||||
|
.INDENT 0.0
|
||||||
|
.TP
|
||||||
|
.B \-\-client\-no\-http2\-cipher\-black\-list
|
||||||
|
Allow black listed cipher suite on backend HTTP/2
|
||||||
|
connection. See
|
||||||
|
\fI\%https://tools.ietf.org/html/rfc7540#appendix\-A\fP for the
|
||||||
|
complete HTTP/2 cipher suites black list.
|
||||||
.UNINDENT
|
.UNINDENT
|
||||||
.INDENT 0.0
|
.INDENT 0.0
|
||||||
.TP
|
.TP
|
||||||
|
@ -836,6 +854,39 @@ argument <CERT>, or certificate option in configuration
|
||||||
file. For additional certificates, use \fI\%\-\-subcert\fP
|
file. For additional certificates, use \fI\%\-\-subcert\fP
|
||||||
option. This option requires OpenSSL >= 1.0.2.
|
option. This option requires OpenSSL >= 1.0.2.
|
||||||
.UNINDENT
|
.UNINDENT
|
||||||
|
.INDENT 0.0
|
||||||
|
.TP
|
||||||
|
.B \-\-psk\-secrets=<PATH>
|
||||||
|
Read list of PSK identity and secrets from <PATH>. This
|
||||||
|
is used for frontend connection. The each line of input
|
||||||
|
file is formatted as <identity>:<hex\-secret>, where
|
||||||
|
<identity> is PSK identity, and <hex\-secret> is secret
|
||||||
|
in hex. An empty line, and line which starts with \(aq#\(aq
|
||||||
|
are skipped. The default enabled cipher list might not
|
||||||
|
contain any PSK cipher suite. In that case, desired PSK
|
||||||
|
cipher suites must be enabled using \fI\%\-\-ciphers\fP option.
|
||||||
|
The desired PSK cipher suite may be black listed by
|
||||||
|
HTTP/2. To use those cipher suites with HTTP/2,
|
||||||
|
consider to use \fI\%\-\-no\-http2\-cipher\-black\-list\fP option.
|
||||||
|
But be aware its implications.
|
||||||
|
.UNINDENT
|
||||||
|
.INDENT 0.0
|
||||||
|
.TP
|
||||||
|
.B \-\-client\-psk\-secrets=<PATH>
|
||||||
|
Read PSK identity and secrets from <PATH>. This is used
|
||||||
|
for backend connection. The each line of input file is
|
||||||
|
formatted as <identity>:<hex\-secret>, where <identity>
|
||||||
|
is PSK identity, and <hex\-secret> is secret in hex. An
|
||||||
|
empty line, and line which starts with \(aq#\(aq are skipped.
|
||||||
|
The first identity and secret pair encountered is used.
|
||||||
|
The default enabled cipher list might not contain any
|
||||||
|
PSK cipher suite. In that case, desired PSK cipher
|
||||||
|
suites must be enabled using \fI\%\-\-client\-ciphers\fP option.
|
||||||
|
The desired PSK cipher suite may be black listed by
|
||||||
|
HTTP/2. To use those cipher suites with HTTP/2,
|
||||||
|
consider to use \fI\%\-\-client\-no\-http2\-cipher\-black\-list\fP
|
||||||
|
option. But be aware its implications.
|
||||||
|
.UNINDENT
|
||||||
.SS HTTP/2 and SPDY
|
.SS HTTP/2 and SPDY
|
||||||
.INDENT 0.0
|
.INDENT 0.0
|
||||||
.TP
|
.TP
|
||||||
|
@ -1255,7 +1306,7 @@ backend server, the custom error pages are not used.
|
||||||
.B \-\-server\-name=<NAME>
|
.B \-\-server\-name=<NAME>
|
||||||
Change server response header field value to <NAME>.
|
Change server response header field value to <NAME>.
|
||||||
.sp
|
.sp
|
||||||
Default: \fBnghttpx nghttp2/1.18.0\fP
|
Default: \fBnghttpx nghttp2/1.19.0\-DEV\fP
|
||||||
.UNINDENT
|
.UNINDENT
|
||||||
.INDENT 0.0
|
.INDENT 0.0
|
||||||
.TP
|
.TP
|
||||||
|
|
|
@ -202,6 +202,10 @@ Connections
|
||||||
default. Any requests which come through this address
|
default. Any requests which come through this address
|
||||||
are replied with 200 HTTP status, without no body.
|
are replied with 200 HTTP status, without no body.
|
||||||
|
|
||||||
|
To accept PROXY protocol version 1 on frontend
|
||||||
|
connection, specify "proxyproto" parameter. This is
|
||||||
|
disabled by default.
|
||||||
|
|
||||||
|
|
||||||
Default: ``*,3000``
|
Default: ``*,3000``
|
||||||
|
|
||||||
|
@ -235,10 +239,6 @@ Connections
|
||||||
be specified by :option:`--backend-read-timeout` and
|
be specified by :option:`--backend-read-timeout` and
|
||||||
:option:`--backend-write-timeout` options.
|
:option:`--backend-write-timeout` options.
|
||||||
|
|
||||||
.. option:: --accept-proxy-protocol
|
|
||||||
|
|
||||||
Accept PROXY protocol version 1 on frontend connection.
|
|
||||||
|
|
||||||
|
|
||||||
Performance
|
Performance
|
||||||
~~~~~~~~~~~
|
~~~~~~~~~~~
|
||||||
|
@ -487,8 +487,17 @@ SSL/TLS
|
||||||
|
|
||||||
.. option:: --ciphers=<SUITE>
|
.. option:: --ciphers=<SUITE>
|
||||||
|
|
||||||
Set allowed cipher list. The format of the string is
|
Set allowed cipher list for frontend connection. The
|
||||||
described in OpenSSL ciphers(1).
|
format of the string is described in OpenSSL ciphers(1).
|
||||||
|
|
||||||
|
Default: ``ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS``
|
||||||
|
|
||||||
|
.. option:: --client-ciphers=<SUITE>
|
||||||
|
|
||||||
|
Set allowed cipher list for backend connection. The
|
||||||
|
format of the string is described in OpenSSL ciphers(1).
|
||||||
|
|
||||||
|
Default: ``ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS``
|
||||||
|
|
||||||
.. option:: --ecdh-curves=<LIST>
|
.. option:: --ecdh-curves=<LIST>
|
||||||
|
|
||||||
|
@ -747,9 +756,17 @@ SSL/TLS
|
||||||
|
|
||||||
.. option:: --no-http2-cipher-black-list
|
.. option:: --no-http2-cipher-black-list
|
||||||
|
|
||||||
Allow black listed cipher suite on HTTP/2 connection.
|
Allow black listed cipher suite on frontend HTTP/2
|
||||||
See https://tools.ietf.org/html/rfc7540#appendix-A for
|
connection. See
|
||||||
the complete HTTP/2 cipher suites black list.
|
https://tools.ietf.org/html/rfc7540#appendix-A for the
|
||||||
|
complete HTTP/2 cipher suites black list.
|
||||||
|
|
||||||
|
.. option:: --client-no-http2-cipher-black-list
|
||||||
|
|
||||||
|
Allow black listed cipher suite on backend HTTP/2
|
||||||
|
connection. See
|
||||||
|
https://tools.ietf.org/html/rfc7540#appendix-A for the
|
||||||
|
complete HTTP/2 cipher suites black list.
|
||||||
|
|
||||||
.. option:: --tls-sct-dir=<DIR>
|
.. option:: --tls-sct-dir=<DIR>
|
||||||
|
|
||||||
|
@ -762,6 +779,37 @@ SSL/TLS
|
||||||
file. For additional certificates, use :option:`--subcert`
|
file. For additional certificates, use :option:`--subcert`
|
||||||
option. This option requires OpenSSL >= 1.0.2.
|
option. This option requires OpenSSL >= 1.0.2.
|
||||||
|
|
||||||
|
.. option:: --psk-secrets=<PATH>
|
||||||
|
|
||||||
|
Read list of PSK identity and secrets from <PATH>. This
|
||||||
|
is used for frontend connection. The each line of input
|
||||||
|
file is formatted as <identity>:<hex-secret>, where
|
||||||
|
<identity> is PSK identity, and <hex-secret> is secret
|
||||||
|
in hex. An empty line, and line which starts with '#'
|
||||||
|
are skipped. The default enabled cipher list might not
|
||||||
|
contain any PSK cipher suite. In that case, desired PSK
|
||||||
|
cipher suites must be enabled using :option:`--ciphers` option.
|
||||||
|
The desired PSK cipher suite may be black listed by
|
||||||
|
HTTP/2. To use those cipher suites with HTTP/2,
|
||||||
|
consider to use :option:`--no-http2-cipher-black-list` option.
|
||||||
|
But be aware its implications.
|
||||||
|
|
||||||
|
.. option:: --client-psk-secrets=<PATH>
|
||||||
|
|
||||||
|
Read PSK identity and secrets from <PATH>. This is used
|
||||||
|
for backend connection. The each line of input file is
|
||||||
|
formatted as <identity>:<hex-secret>, where <identity>
|
||||||
|
is PSK identity, and <hex-secret> is secret in hex. An
|
||||||
|
empty line, and line which starts with '#' are skipped.
|
||||||
|
The first identity and secret pair encountered is used.
|
||||||
|
The default enabled cipher list might not contain any
|
||||||
|
PSK cipher suite. In that case, desired PSK cipher
|
||||||
|
suites must be enabled using :option:`--client-ciphers` option.
|
||||||
|
The desired PSK cipher suite may be black listed by
|
||||||
|
HTTP/2. To use those cipher suites with HTTP/2,
|
||||||
|
consider to use :option:`--client-no-http2-cipher-black-list`
|
||||||
|
option. But be aware its implications.
|
||||||
|
|
||||||
|
|
||||||
HTTP/2 and SPDY
|
HTTP/2 and SPDY
|
||||||
~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~
|
||||||
|
@ -1134,7 +1182,7 @@ HTTP
|
||||||
|
|
||||||
Change server response header field value to <NAME>.
|
Change server response header field value to <NAME>.
|
||||||
|
|
||||||
Default: ``nghttpx nghttp2/1.18.0``
|
Default: ``nghttpx nghttp2/1.19.0-DEV``
|
||||||
|
|
||||||
.. option:: --no-server-rewrite
|
.. option:: --no-server-rewrite
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue