亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ssl-talk-faq.txt

?? Netscape公司提供的安全套接字層
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
    Layer) protocol. SSLRef 3.0 is intended to aid and accelerate
    developers' efforts to provide security within TCP/IP applications.
    It can also be used to qualify other implementations of version 3.0
    of the SSL protocol.

    SSLRef 3.0 consists of a software library, distributed as ANSI C
    source-code, that can be compiled on Windows 95/NT and Solaris
    platforms, and then linked into TCP/IP application programs. SSLREF
    3.0 also was designed to be easily ported to a wide variety of
    other platforms and operating systems.

    More information on SSLRef can be found at
        <http://home.netscape.com/newsref/std/sslref.html>

    If you are a US or Canadian citizen you can download SSLRef 3.0 at
        <http://wwwus.netscape.com/eng/US-Current/>


7.1.2) How can I license SSLRef 3.0? What does it cost? With what restrictions?

    The SSLRef 3.0 distribution includes a license for non-commercial
    use. For commercial licensing, send mail to <sslref@netscape.com>.

    The SSLRef 3.0 commercial license is Part Number 70-01128-00 and the
    price is $30,000. The license agreement is a flat one-time fee, not
    a recurring royalty.

    SSLRef 3.0 may not be exported. However, the encryption options in
    SSLRef 3.0 can be limited to make exportable products.

    SSLRef 3.0 does not include an RSA/BSAFE licencse for required
    cryptographic functions. Most users would use BSAFE or RSAREF.

        For BSAFE information contact RSA at
            <http://www.rsa.com/>

        For RSAREF information contact Consensus Development at
            <http://www.consensus.com/rsaref/>


------------------------------

7.2) SSL PLUS QUESTIONS

This sub-section contains information specific to the SSL Plus: SSL
3.0 Integration Suite(tm) software toolkit developed by Consensus
Development Corporation of Berkeley, California
<http://www.consensus.com/>.


7.2.1) What is the relationship between SSLRef and SSL Plus?

    SSLRef 3.0 was written by Netscape Development Corporation and
    Consensus Development Corporation. SSL Plus is a derivative of
    SSLRef 3.0, is fully supported and offers unique value-added
    features.

    SSL Plus 1.0 includes support, updates, upgrade to TLS when spec is
    completed, a VeriSign certificate request tool, a "signer" file
    format for storing keys and certificates, is qualified for
    additional platforms, and system integration services are available.

    SSLRef 3.0 offers 5 ciphersuites:

      * Unprotected
        (SSL_NULL_WITH_NULL_NULL)

      * RSA authenticated, unencrypted, with MD5
        (SSL_RSA_WITH_NULL_MD5)

      * RSA authenticated with exportable RC4 encryption, and MD5
        (SSL_RSA_EXPORT_WITH_RC4_40_MD5)

      * RSA authenticated with DES encryption, and SHA
        (SSL_RSA_WITH_DES_CBC_SHA)

      * Diffie-Hellman anonymous key exchange with DES encryption,
        and SHA
        (SSL_DH_anon_WITH_DES_CBC_SHA)

    SSL Plus 1.0 adds support for an additional 6 ciphersuites (with
    more planned for the future):

      * RSA authenticated, unencrypted, with SHA
        (SSL_RSA_WITH_NULL_SHA)

      * RSA authenticated with non-exportable RC4 encryption, with
        MD5 or SHA
        (SSL_SSL_RSA_WITH_RC4_128_MD5 & SSL_RSA_WITH_RC4_128_SHA)

      * RSA authenticated with Triple-DES encryption, with SHA
        (SSL_RSA_WITH_3DES_EDE_CBC_SHA)

      * Diffie-Hellman anonymous key exchange with RC4 encryption,
        with MD5
        (SSL_DH_anon_WITH_RC4_128_MD5 &
         SSL_DH_anon_WITH_3DES_EDE_CBC_SHA)

      * Diffie-Hellman anonymous key exchange with Triple-DES
        encryption and SHA
        (SSL_DH_anon_WITH_RC4_128_MD5 &
         SSL_DH_anon_WITH_3DES_EDE_CBC_SHA)

    For more information on SSL Plus features see
        <http://www.consensus.com/SSLPlus/sslplus_stats.html>


7.2.2) What is the relationship with SSL Plus and SSLRef 2.0?

    There is no relationship between SSLRef 2.0 and SSL Plus -- SSL Plus
    is based on the SSLRef 3.0 which was not based on SSLRef 2.0.


7.2.3) How can I license SSL Plus? What does it cost? With what
restrictions?

    A non-commercial license of SSL Plus is not available, only
    commercial licenses. However, evaluation versions are available upon
    signing a non-disclosure and beta test agreement.

    The price for SSL Plus is $40,000, and includes a one-year standard
    support contract. Premium support is available for an additional
    fee.  The license agreement is a flat one-time fee, not a recurring
    royalty.

    SSL Plus toolkit may not be exported. However, products built with
    SSL Plus may limit the encryption options to exportable algorithms
    and thus be able to be exported.

    SSL Plus does not include an RSA/BSAFE license for cryptographic
    functions required.  Most users would use BSAFE or RSAREF:

        For BSAFE information contact RSA at
            <http://www.rsa.com/>

        For RSAREF information contact Consensus Development at
            <http://www.consensus.com/rsaref/>


    Copies of the evaluation NDA and beta agreement, the standard
    product license agreement, and standard support contract for
    SSL Plus are located at
        <http://www.consensus.com/sslplus/sslplus_contracts.html>


7.2.4) Is there any relationship between SSL Plus and Winsock 1.1 or
Winsock 2.0? Which Winsock would you recommend using to test our
SSL? Does it matter if Winsock 1.1 or 2.0 architecture is used?

    No -- SSL Plus is designed to be transport independent and work with
    both socket and stream styles of I/O. SSL Plus includes some
    examples of using WinSock 1.1 in the Win32 builds of our sample
    code. However, we recommend that you write your own callback code if
    you want better handling of your I/O than what our sample routines
    provide.


7.2.5) How does the data flow within the application, WinSock, SSL,
TCP/IP stack layers?

    The short answer is that you insert SSL Plus between your I/O and
    your application code.

    Basically, you call SSL Plus instead of your read and write. SSL
    Plus does its stuff and calls your callback code to do the I/O. Data
    comes through your I/O routines, through SSL Plus, and then finally
    to your application.  SSL Plus only manages the data flowing through
    the connection; it does not handle setting up and tearing down the
    underlying network connection; your application should open the
    network connection, then hand it off to SSL Plus for SSL handshaking
    and data transfer. (This step is not shown in the diagram).

    Normal:

         -------------
        | Application |
         -------------
             ^
             | I/O Calls
             v
         -------------
        | WinSock     |
         -------------
             ^
             | TCP Calls
             v
         -------------
        | Internet    |
         -------------


    SSL Plus:

         -------------
        | Application |
         -------------
             ^
             | SSL I/O Calls
             v
         -------------     I/O Callbacks   --------------------
        | SSL Plus    | <---------------->| Your Callback Code |
         -------------                     --------------------
                                                    ^
                                                    | I/O Calls
                                                    v
                                               -------------
                                              | WinSock     |
                                               -------------
                                                    ^
                                                    | TCP Calls
                                                    v
                                               -------------
                                              | Internet    |
                                               -------------


7.2.6) A part of my impression is that with the WinSock 2.0
architecture, the application need only chose an appropriate SSL
enabled service provider. Does SSL Plus support this?

    As you noted, with WinSock 2.0 there is some disussion of
    functionality that allows you to create a module that you could add
    to WinSock 2.0.

    At this time we do not believe that this functionality is actually
    shipping (as Microsoft was supporting PCT but is now supporting
    SSL 3), but we do know that it is part of their plans. See the
    MS-ISF (Microsoft Internet Security Framework) description at
        <http://www.microsoft.com/intdev/security/>

    We can't speak to when or if Microsoft will add it to their system
    software, or if another third-party offers such a module.

    Meanwhile, there has been some discussion on what changes might be
    required under WinSock 2.0 to do SSL located at
        <http://home.netscape.com/newsref/std/ssl_integration.html>

    In the future (post version 1.1, see our features page) we may offer
    either more robust sample callback code for WinSock 1.1 and/or 2, or
    we may actually write our own WinSock 1.1 substitute or 2.0 module
    that you call as you would call WinSock and avoid the callbacks
    all together. Neither would be available before the end of the year.


7.2.7) Does SSL Plus support yielding?

    SSL Plus 1.0 includes support for processor yielding during
    cryptographic operations. Because developers provide their own I/O
    routines, they can do yielding during I/O. Our examples do not
    demonstrate I/O yielding.


7.2.8) I don't understand the nomenclatures of constants such as
"SSL_RSA_EXPORT_WITH_RC4_40_MD5" -- where are they defined?

    They are found in include/cryptype.h, but are actually defined
    by the SSL 3.0 spec.


7.2.9) Where are these cipher suites defined?

    In the file ciphers.c there is an array of values and implementation
    pointers for supported cipher suites.


7.2.10) Can I change the order of the values in ciphers.c?

    Yes. The order affects the preference; in general, the highest one
    on the client's list which the server supports will be selected.


7.2.11) Can this be done programmatically in the API?

    No, it is configured at compile time. We will be adding runtime
    support in the near future because it will be needed for future test
    frameworks.


7.2.12) Does SSL Plus support compression?

    Not at this time. If there is a specific customer requirement, or if
    a compression cipher suite is defined we expect to support it in the
    future, but otherwise we have no plans here.


7.2.13) In sslrec.c function SSLWriteRecord(), the data buffer is
copied, encrypted, then enqueued on the SSL write queue. The function
then returns. What thread services the write queue? How is the
thread created?

    The write queue is serviced by the public function called
    SSLServiceWriteQueue(). It is called in a number of places in
    ssltrspt.c, including with every call to SSLWrite(). Data to be
    written is sent to the I/O layer as you exit out of the write
    function (for example, right near the bottom of SSLWrite).

    If SSLWrite() returns SSLWouldBlockError, then make a call to
    SSLServiceWriteQueue() to service the write queue. (You could
    instead make a call to SSLWrite() with more data to be written, but
    this is unlikely.)

    The write queue is not serviced by a separate execution thread. The
    write queue mechanism was designed to support non-blocking I/O
    without undue overhead.


------------------------------

7.3) SSLEAY QUESTIONS

This sub-section contains information specific to the SSLeay
toolkit developed by Eric Young <eay@mincom.com>


7.3.1) Where is the SSLeay FAQ?

    There is a very complete SSLeay FAQ at:
        <http://www.psy.uq.oz.au/~ftp/Crypto/>

------------------------------------------------------------------------
..Christopher Allen                  Consensus Development Corporation..
..<ChristopherA@consensus.com>                 1563 Solano Avenue #355..
..                                             Berkeley, CA 94707-2116..
..Home of "SSL Plus:                      o510/559-1500  f510/559-1505..
.. Security Integration Suite(tm)" <http://www.consensus.com/SSLPlus/>..

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产亚洲女人久久久久毛片| 久久综合成人精品亚洲另类欧美| 欧美激情一区在线| 国产中文一区二区三区| 91在线云播放| 一区二区三区四区在线免费观看| 国产99精品国产| 国产精品麻豆久久久| 成人一区二区三区视频在线观看| 中文字幕 久热精品 视频在线| 成人av在线一区二区三区| 一区二区在线观看av| 91麻豆精品国产| 丝袜美腿成人在线| 久久精品夜色噜噜亚洲aⅴ| 欧洲一区二区三区免费视频| 久久国产精品99精品国产| 亚洲人妖av一区二区| 欧美日本在线视频| 91蜜桃视频在线| 国产成人在线视频网址| 水蜜桃久久夜色精品一区的特点| 久久精品这里都是精品| 99精品久久久久久| 青青草国产成人99久久| 亚洲乱码中文字幕综合| 国产日韩欧美一区二区三区综合| 欧美日韩国产综合久久| 欧美在线你懂得| 91免费视频网| 99久久婷婷国产综合精品| 国产精一品亚洲二区在线视频| 国产精品一二三四五| 国产一区二区电影| 美女网站视频久久| 日韩av电影一区| 青青草原综合久久大伊人精品 | 波多野结衣的一区二区三区| 国产成人午夜高潮毛片| 福利视频网站一区二区三区| 国产精品亚洲一区二区三区妖精| 开心九九激情九九欧美日韩精美视频电影| 亚洲一区精品在线| 丝袜亚洲精品中文字幕一区| 亚洲综合一二区| 日韩影院精彩在线| 激情深爱一区二区| 成人深夜在线观看| 91黄色激情网站| 欧美日韩在线播放一区| 欧美精品一级二级| 精品99一区二区三区| 1000精品久久久久久久久| 亚洲伊人伊色伊影伊综合网| 秋霞电影一区二区| 99精品视频一区二区三区| 欧美日韩在线播放三区| 精品国产伦一区二区三区免费| 国产精品久久久久三级| 午夜精品福利在线| 成人午夜在线播放| 日韩三级视频在线看| 亚洲欧美日韩人成在线播放| 麻豆精品久久精品色综合| 91丨porny丨最新| 欧美成人a在线| 亚洲韩国精品一区| 国内成人免费视频| 91麻豆精品国产91久久久使用方法| 欧美激情一区二区三区蜜桃视频| 麻豆国产精品官网| 欧美群妇大交群中文字幕| 亚洲日本丝袜连裤袜办公室| 久久电影国产免费久久电影| 欧美日韩成人在线| 国产精品毛片高清在线完整版| 综合av第一页| av爱爱亚洲一区| 亚洲你懂的在线视频| 国产91精品久久久久久久网曝门| 欧美日韩日本视频| 日韩和的一区二区| 欧美在线观看视频一区二区| 亚洲成av人片www| av电影在线观看不卡| 亚洲另类一区二区| 日韩成人一级大片| 欧美一区二区三区四区五区| 久久丁香综合五月国产三级网站| 日韩欧美在线网站| 国产成人av电影在线播放| 欧美成人性福生活免费看| 美女一区二区三区| 久久久九九九九| 成人性生交大合| 一区二区三区视频在线看| 成人深夜在线观看| 亚洲电影第三页| 国产日韩一级二级三级| 色素色在线综合| 国产在线播放一区三区四| 亚洲午夜成aⅴ人片| 欧美videos大乳护士334| 成人精品一区二区三区中文字幕 | 亚洲三级在线免费| 欧美一区二区三区视频| 国产传媒久久文化传媒| 欧美激情中文字幕一区二区| 欧美一区二区三区视频在线观看| 成人激情免费视频| 免费日本视频一区| 亚洲国产欧美在线| 亚洲欧美另类图片小说| 777午夜精品免费视频| 一本久久精品一区二区| 国产一区二区毛片| 国产美女精品一区二区三区| 亚洲二区视频在线| 亚洲最色的网站| 亚洲午夜视频在线| 亚洲日本在线天堂| 亚洲一区二区三区四区不卡| 亚洲猫色日本管| 国产精品色在线观看| 日本一区二区三区国色天香| 精品成人一区二区三区四区| 91精品国产欧美日韩| 日韩视频免费直播| 91精品国产综合久久久蜜臀粉嫩| 91久久精品网| 欧美日韩一本到| 国产精品无遮挡| 亚洲色图视频网站| 亚洲精品国产一区二区三区四区在线| 亚洲欧洲在线观看av| 亚洲在线免费播放| 国产美女精品人人做人人爽| 日日夜夜免费精品视频| 国产伦精品一区二区三区免费| 丁香网亚洲国际| 欧美午夜精品一区二区三区| 精品欧美一区二区久久| 欧美大胆人体bbbb| 亚洲精品免费在线| 老司机免费视频一区二区| 制服丝袜成人动漫| 久久综合资源网| 久久久久久久国产精品影院| 国产精品乱人伦中文| 美女看a上一区| 99精品视频一区二区三区| 精品久久久久久亚洲综合网| 亚洲三级小视频| 丰满放荡岳乱妇91ww| 欧美tickling挠脚心丨vk| 亚洲高清免费视频| va亚洲va日韩不卡在线观看| 欧美一三区三区四区免费在线看 | 亚洲欧美激情小说另类| 国产一区91精品张津瑜| 成人av网址在线观看| 91精品国产91久久久久久一区二区| 自拍偷拍国产精品| 91网站在线播放| 一个色妞综合视频在线观看| 一本大道久久a久久精二百| 国产亚洲成av人在线观看导航| 精品一区二区免费| 91成人在线观看喷潮| 最新日韩av在线| 国产美女在线精品| 亚洲国产成人午夜在线一区| 国产一级精品在线| 国产精品久久久久7777按摩| 97超碰欧美中文字幕| 天天综合色天天综合| 91国偷自产一区二区开放时间 | 日韩av一区二区三区| 精品国产伦一区二区三区免费 | 成人在线视频一区| 一区二区三区不卡视频| 在线观看国产精品网站| 日本欧美久久久久免费播放网| 成人妖精视频yjsp地址| 一区二区三区欧美激情| 欧美电影免费观看高清完整版| 国产suv精品一区二区三区| 亚洲成人免费视| 日本一二三不卡| 51精品秘密在线观看| 麻豆成人在线观看| 久久精品免费在线观看| 亚洲精品国产高清久久伦理二区| 蜜桃av一区二区在线观看| 一区二区三区欧美| 亚洲国产精品久久久男人的天堂| 亚洲综合丁香婷婷六月香| 日本亚洲视频在线| 国产精品综合在线视频| 国产成人8x视频一区二区|