haproxy htst -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
defaults
mode tcp
haproxy htst -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
defaults
mode tcp
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
defaults
mode http
haproxy h2 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
defaults
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
log ${Slog_1_addr}:${Slog_1_port} len 2048 local0 debug err
defaults
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
stats socket "${tmpdir}/h1/stats" level admin
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
crt-base ${testdir}
stats socket "${tmpdir}/h1/stats" level admin
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
crt-base ${testdir}
stats socket "${tmpdir}/h1/stats" level admin
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
stats socket "${tmpdir}/h1/stats" level admin
crt-base ${testdir}
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
stats socket "${tmpdir}/h1/stats" level admin
crt-base ${testdir}
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
stats socket "${tmpdir}/h1/stats" level admin
crt-base ${testdir}/ocsp_update
haproxy h2 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
stats socket "${tmpdir}/h2/stats" level admin
crt-base ${testdir}/ocsp_update
haproxy h3 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
stats socket "${tmpdir}/h3/stats" level admin
crt-base ${testdir}/ocsp_update
haproxy h4 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
stats socket "${tmpdir}/h4/stats" level admin
crt-base ${testdir}/ocsp_update
haproxy h5 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
stats socket "${tmpdir}/h5/stats" level admin
crt-base ${testdir}/ocsp_update
haproxy h6 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
stats socket "${tmpdir}/h6/stats" level admin
crt-base ${testdir}
haproxy h7 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
stats socket "${tmpdir}/h7/stats" level admin
crt-base ${testdir}
haproxy h8 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
stats socket "${tmpdir}/h8/stats" level admin
crt-base ${testdir}/ocsp_update
haproxy h9 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
stats socket "${tmpdir}/h9/stats" level admin
crt-base ${testdir}/ocsp_update
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
stats socket "${tmpdir}/h1/stats" level admin
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
stats socket "${tmpdir}/h1/stats" level admin
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
stats socket "${tmpdir}/h1/stats" level admin
crt-base ${testdir}
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
stats socket "${tmpdir}/h1/stats" level admin
crt-base ${testdir}
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
ssl-load-extra-del-ext
stats socket "${tmpdir}/h1/stats" level admin
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
stats socket "${tmpdir}/h1/stats" level admin
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
stats socket "${tmpdir}/h1/stats" level admin
nbthread 1
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
stats socket "${tmpdir}/h1/stats" level admin
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
defaults
mode http
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
defaults
mode http
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
crt-base ${testdir}
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
crt-base ${testdir}
stats socket "${tmpdir}/h1/stats" level admin
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
crt-base ${testdir}
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
defaults
mode http
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
stats socket "${tmpdir}/h1/stats" level admin
crt-base ${testdir}
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
stats socket "${tmpdir}/h1/stats" level admin
.if openssl_version_atleast(3.0.0)
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
crt-base ${testdir}
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 2048
defaults
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
crt-base ${testdir}
stats socket "${tmpdir}/h1/stats" level admin
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
crt-base ${testdir}
stats socket "${tmpdir}/h1/stats" level admin
haproxy h1 -conf {
global
+ .if !ssllib_name_startswith(AWS-LC)
tune.ssl.default-dh-param 2048
+ .endif
tune.ssl.capture-buffer-size 1
defaults