亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? ssl.h

?? 一個FTP下載的源代碼。代碼質(zhì)量非常高
?? H
?? 第 1 頁 / 共 5 頁
字號:
	/* Default password callback. */	pem_password_cb *default_passwd_callback;	/* Default password callback user data. */	void *default_passwd_callback_userdata;	/* get client cert callback */	int (*client_cert_cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey);	CRYPTO_EX_DATA ex_data;	const EVP_MD *rsa_md5;/* For SSLv2 - name is 'ssl2-md5' */	const EVP_MD *md5;	/* For SSLv3/TLSv1 'ssl3-md5' */	const EVP_MD *sha1;   /* For SSLv3/TLSv1 'ssl3->sha1' */	STACK_OF(X509) *extra_certs;	STACK_OF(SSL_COMP) *comp_methods; /* stack of SSL_COMP, SSLv3/TLSv1 */	/* Default values used when no per-SSL value is defined follow */	void (*info_callback)(const SSL *ssl,int type,int val); /* used if SSL's info_callback is NULL */	/* what we put in client cert requests */	STACK_OF(X509_NAME) *client_CA;	/* Default values to use in SSL structures follow (these are copied by SSL_new) */	unsigned long options;	unsigned long mode;	long max_cert_list;	struct cert_st /* CERT */ *cert;	int read_ahead;	/* callback that allows applications to peek at protocol messages */	void (*msg_callback)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg);	void *msg_callback_arg;	int verify_mode;	int verify_depth;	unsigned int sid_ctx_length;	unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH];	int (*default_verify_callback)(int ok,X509_STORE_CTX *ctx); /* called 'verify_callback' in the SSL */	/* Default generate session ID callback. */	GEN_SESSION_CB generate_session_id;	int purpose;		/* Purpose setting */	int trust;		/* Trust setting */	int quiet_shutdown;	};#define SSL_SESS_CACHE_OFF			0x0000#define SSL_SESS_CACHE_CLIENT			0x0001#define SSL_SESS_CACHE_SERVER			0x0002#define SSL_SESS_CACHE_BOTH	(SSL_SESS_CACHE_CLIENT|SSL_SESS_CACHE_SERVER)#define SSL_SESS_CACHE_NO_AUTO_CLEAR		0x0080/* enough comments already ... see SSL_CTX_set_session_cache_mode(3) */#define SSL_SESS_CACHE_NO_INTERNAL_LOOKUP	0x0100#define SSL_SESS_CACHE_NO_INTERNAL_STORE	0x0200#define SSL_SESS_CACHE_NO_INTERNAL \	(SSL_SESS_CACHE_NO_INTERNAL_LOOKUP|SSL_SESS_CACHE_NO_INTERNAL_STORE)  struct lhash_st *SSL_CTX_sessions(SSL_CTX *ctx);#define SSL_CTX_sess_number(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_NUMBER,0,NULL)#define SSL_CTX_sess_connect(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CONNECT,0,NULL)#define SSL_CTX_sess_connect_good(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CONNECT_GOOD,0,NULL)#define SSL_CTX_sess_connect_renegotiate(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CONNECT_RENEGOTIATE,0,NULL)#define SSL_CTX_sess_accept(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_ACCEPT,0,NULL)#define SSL_CTX_sess_accept_renegotiate(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_ACCEPT_RENEGOTIATE,0,NULL)#define SSL_CTX_sess_accept_good(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_ACCEPT_GOOD,0,NULL)#define SSL_CTX_sess_hits(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_HIT,0,NULL)#define SSL_CTX_sess_cb_hits(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CB_HIT,0,NULL)#define SSL_CTX_sess_misses(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_MISSES,0,NULL)#define SSL_CTX_sess_timeouts(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_TIMEOUTS,0,NULL)#define SSL_CTX_sess_cache_full(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CACHE_FULL,0,NULL)#define SSL_CTX_sess_set_new_cb(ctx,cb)	((ctx)->new_session_cb=(cb))#define SSL_CTX_sess_get_new_cb(ctx)	((ctx)->new_session_cb)#define SSL_CTX_sess_set_remove_cb(ctx,cb)	((ctx)->remove_session_cb=(cb))#define SSL_CTX_sess_get_remove_cb(ctx)	((ctx)->remove_session_cb)#define SSL_CTX_sess_set_get_cb(ctx,cb)	((ctx)->get_session_cb=(cb))#define SSL_CTX_sess_get_get_cb(ctx)	((ctx)->get_session_cb)#define SSL_CTX_set_info_callback(ctx,cb)	((ctx)->info_callback=(cb))#define SSL_CTX_get_info_callback(ctx)		((ctx)->info_callback)#define SSL_CTX_set_client_cert_cb(ctx,cb)	((ctx)->client_cert_cb=(cb))#define SSL_CTX_get_client_cert_cb(ctx)		((ctx)->client_cert_cb)#define SSL_NOTHING	1#define SSL_WRITING	2#define SSL_READING	3#define SSL_X509_LOOKUP	4/* These will only be used when doing non-blocking IO */#define SSL_want_nothing(s)	(SSL_want(s) == SSL_NOTHING)#define SSL_want_read(s)	(SSL_want(s) == SSL_READING)#define SSL_want_write(s)	(SSL_want(s) == SSL_WRITING)#define SSL_want_x509_lookup(s)	(SSL_want(s) == SSL_X509_LOOKUP)struct ssl_st	{	/* protocol version	 * (one of SSL2_VERSION, SSL3_VERSION, TLS1_VERSION)	 */	int version;	int type; /* SSL_ST_CONNECT or SSL_ST_ACCEPT */	SSL_METHOD *method; /* SSLv3 */	/* There are 2 BIO's even though they are normally both the	 * same.  This is so data can be read and written to different	 * handlers */#ifndef OPENSSL_NO_BIO	BIO *rbio; /* used by SSL_read */	BIO *wbio; /* used by SSL_write */	BIO *bbio; /* used during session-id reuse to concatenate		    * messages */#else	char *rbio; /* used by SSL_read */	char *wbio; /* used by SSL_write */	char *bbio;#endif	/* This holds a variable that indicates what we were doing	 * when a 0 or -1 is returned.  This is needed for	 * non-blocking IO so we know what request needs re-doing when	 * in SSL_accept or SSL_connect */	int rwstate;	/* true when we are actually in SSL_accept() or SSL_connect() */	int in_handshake;	int (*handshake_func)();	/* Imagine that here's a boolean member "init" that is	 * switched as soon as SSL_set_{accept/connect}_state	 * is called for the first time, so that "state" and	 * "handshake_func" are properly initialized.  But as	 * handshake_func is == 0 until then, we use this	 * test instead of an "init" member.	 */	int server;	/* are we the server side? - mostly used by SSL_clear*/	int new_session;/* 1 if we are to use a new session.	                 * 2 if we are a server and are inside a handshake	                 *   (i.e. not just sending a HelloRequest)	                 * NB: For servers, the 'new' session may actually be a previously	                 * cached session or even the previous session unless	                 * SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION is set */	int quiet_shutdown;/* don't send shutdown packets */	int shutdown;	/* we have shut things down, 0x01 sent, 0x02			 * for received */	int state;	/* where we are */	int rstate;	/* where we are when reading */	BUF_MEM *init_buf;	/* buffer used during init */	void *init_msg;   	/* pointer to handshake message body, set by ssl3_get_message() */	int init_num;		/* amount read/written */	int init_off;		/* amount read/written */	/* used internally to point at a raw packet */	unsigned char *packet;	unsigned int packet_length;	struct ssl2_state_st *s2; /* SSLv2 variables */	struct ssl3_state_st *s3; /* SSLv3 variables */	int read_ahead;		/* Read as many input bytes as possible	               	 	 * (for non-blocking reads) */	/* callback that allows applications to peek at protocol messages */	void (*msg_callback)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg);	void *msg_callback_arg;	int hit;		/* reusing a previous session */	int purpose;		/* Purpose setting */	int trust;		/* Trust setting */	/* crypto */	STACK_OF(SSL_CIPHER) *cipher_list;	STACK_OF(SSL_CIPHER) *cipher_list_by_id;	/* These are the ones being used, the ones in SSL_SESSION are	 * the ones to be 'copied' into these ones */	EVP_CIPHER_CTX *enc_read_ctx;		/* cryptographic state */	const EVP_MD *read_hash;		/* used for mac generation */#ifndef OPENSSL_NO_COMP	COMP_CTX *expand;			/* uncompress */#else	char *expand;#endif	EVP_CIPHER_CTX *enc_write_ctx;		/* cryptographic state */	const EVP_MD *write_hash;		/* used for mac generation */#ifndef OPENSSL_NO_COMP	COMP_CTX *compress;			/* compression */#else	char *compress;	#endif	/* session info */	/* client cert? */	/* This is used to hold the server certificate used */	struct cert_st /* CERT */ *cert;	/* the session_id_context is used to ensure sessions are only reused	 * in the appropriate context */	unsigned int sid_ctx_length;	unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH];	/* This can also be in the session once a session is established */	SSL_SESSION *session;	/* Default generate session ID callback. */	GEN_SESSION_CB generate_session_id;	/* Used in SSL2 and SSL3 */	int verify_mode;	/* 0 don't care about verify failure.				 * 1 fail if verify fails */	int verify_depth;	int (*verify_callback)(int ok,X509_STORE_CTX *ctx); /* fail if callback returns 0 */	void (*info_callback)(const SSL *ssl,int type,int val); /* optional informational callback */	int error;		/* error bytes to be written */	int error_code;		/* actual code */#ifndef OPENSSL_NO_KRB5	KSSL_CTX *kssl_ctx;     /* Kerberos 5 context */#endif	/* OPENSSL_NO_KRB5 */	SSL_CTX *ctx;	/* set this flag to 1 and a sleep(1) is put into all SSL_read()	 * and SSL_write() calls, good for nbio debuging :-) */	int debug;		/* extra application data */	long verify_result;	CRYPTO_EX_DATA ex_data;	/* for server side, keep the list of CA_dn we can use */	STACK_OF(X509_NAME) *client_CA;	int references;	unsigned long options; /* protocol behaviour */	unsigned long mode; /* API behaviour */	long max_cert_list;	int first_packet;	int client_version;	/* what was passed, used for				 * SSLv3/TLS rollback check */	};#ifdef __cplusplus}#endif#include <openssl/ssl2.h>#include <openssl/ssl3.h>#include <openssl/tls1.h> /* This is mostly sslv3 with a few tweaks */#include <openssl/ssl23.h>#ifdef  __cplusplusextern "C" {#endif/* compatibility */#define SSL_set_app_data(s,arg)		(SSL_set_ex_data(s,0,(char *)arg))#define SSL_get_app_data(s)		(SSL_get_ex_data(s,0))#define SSL_SESSION_set_app_data(s,a)	(SSL_SESSION_set_ex_data(s,0,(char *)a))#define SSL_SESSION_get_app_data(s)	(SSL_SESSION_get_ex_data(s,0))#define SSL_CTX_get_app_data(ctx)	(SSL_CTX_get_ex_data(ctx,0))#define SSL_CTX_set_app_data(ctx,arg)	(SSL_CTX_set_ex_data(ctx,0,(char *)arg))/* The following are the possible values for ssl->state are are * used to indicate where we are up to in the SSL connection establishment. * The macros that follow are about the only things you should need to use * and even then, only when using non-blocking IO. * It can also be useful to work out where you were when the connection * failed */#define SSL_ST_CONNECT			0x1000#define SSL_ST_ACCEPT			0x2000#define SSL_ST_MASK			0x0FFF#define SSL_ST_INIT			(SSL_ST_CONNECT|SSL_ST_ACCEPT)#define SSL_ST_BEFORE			0x4000#define SSL_ST_OK			0x03#define SSL_ST_RENEGOTIATE		(0x04|SSL_ST_INIT)#define SSL_CB_LOOP			0x01#define SSL_CB_EXIT			0x02#define SSL_CB_READ			0x04#define SSL_CB_WRITE			0x08#define SSL_CB_ALERT			0x4000 /* used in callback */#define SSL_CB_READ_ALERT		(SSL_CB_ALERT|SSL_CB_READ)#define SSL_CB_WRITE_ALERT		(SSL_CB_ALERT|SSL_CB_WRITE)#define SSL_CB_ACCEPT_LOOP		(SSL_ST_ACCEPT|SSL_CB_LOOP)#define SSL_CB_ACCEPT_EXIT		(SSL_ST_ACCEPT|SSL_CB_EXIT)#define SSL_CB_CONNECT_LOOP		(SSL_ST_CONNECT|SSL_CB_LOOP)#define SSL_CB_CONNECT_EXIT		(SSL_ST_CONNECT|SSL_CB_EXIT)#define SSL_CB_HANDSHAKE_START		0x10#define SSL_CB_HANDSHAKE_DONE		0x20/* Is the SSL_connection established? */#define SSL_get_state(a)		SSL_state(a)#define SSL_is_init_finished(a)		(SSL_state(a) == SSL_ST_OK)#define SSL_in_init(a)			(SSL_state(a)&SSL_ST_INIT)#define SSL_in_before(a)		(SSL_state(a)&SSL_ST_BEFORE)#define SSL_in_connect_init(a)		(SSL_state(a)&SSL_ST_CONNECT)#define SSL_in_accept_init(a)		(SSL_state(a)&SSL_ST_ACCEPT)/* The following 2 states are kept in ssl->rstate when reads fail, * you should not need these */#define SSL_ST_READ_HEADER			0xF0

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲1区2区3区4区| 一本色道**综合亚洲精品蜜桃冫| 日韩和的一区二区| 蜜臀91精品一区二区三区 | 欧美成人三级电影在线| 欧美日韩黄色一区二区| 日韩美女视频在线| 欧美激情综合五月色丁香| 中文字幕一区二区三区在线播放| 国产日产欧美一区二区三区| 日韩码欧中文字| 男女性色大片免费观看一区二区| 国内久久精品视频| 91小视频在线观看| 欧美日韩久久不卡| 精品盗摄一区二区三区| 亚洲色图一区二区三区| 日本少妇一区二区| 不卡大黄网站免费看| 欧美精品第1页| 中文字幕日本乱码精品影院| 婷婷成人激情在线网| 不卡视频一二三| 日韩视频一区在线观看| 中文字幕综合网| 激情欧美日韩一区二区| 欧美日韩中文另类| 国产精品久久久久久久岛一牛影视| 亚洲成av人片观看| 成人av电影在线| 国产午夜精品久久久久久久| 图片区小说区国产精品视频| 懂色av一区二区三区蜜臀| 欧美一区二区视频网站| 日韩一区有码在线| 成人黄色777网| 国产欧美一区二区精品久导航| 日本三级韩国三级欧美三级| 欧美日韩中字一区| 亚洲综合一区二区三区| 91免费看片在线观看| 国产精品无遮挡| hitomi一区二区三区精品| 精品电影一区二区| 欧美一区二区视频在线观看 | 国产精品大尺度| 中文字幕永久在线不卡| 麻豆91精品91久久久的内涵| 欧美男男青年gay1069videost| 亚洲欧美福利一区二区| 在线观看日韩电影| 亚洲线精品一区二区三区八戒| 日本黄色一区二区| 亚洲亚洲精品在线观看| 欧美日韩亚洲综合| 免费一区二区视频| 国产亚洲一区二区三区四区 | 国产日韩在线不卡| av在线播放成人| 亚洲va国产va欧美va观看| 精品视频色一区| 久久草av在线| 亚洲天堂久久久久久久| 精品视频一区三区九区| 免费看日韩精品| 中文字幕精品一区| 91超碰这里只有精品国产| 激情综合网av| 亚洲男人的天堂av| 欧美电影免费观看高清完整版在线| 国产99久久久精品| 日本成人在线网站| 亚洲免费观看高清在线观看| 日韩午夜电影av| 91国偷自产一区二区三区成为亚洲经典 | 99精品一区二区| 久久成人久久爱| 亚洲精品第1页| 国产精品丝袜黑色高跟| 91麻豆精品国产91久久久久久久久 | xfplay精品久久| 欧美日韩一区三区四区| 成人精品电影在线观看| 久久精品国产99久久6| 一区二区欧美在线观看| 国产欧美视频一区二区| 911国产精品| 欧美视频在线一区| 色一情一伦一子一伦一区| 国产成人精品影视| 精品一区二区三区久久| 免费亚洲电影在线| 日韩av中文字幕一区二区三区| 一区二区三区在线播放| 中文字幕一区在线观看视频| 欧美国产一区视频在线观看| 久久综合国产精品| 久久免费视频一区| 国产欧美一区二区三区沐欲| 久久久777精品电影网影网| 欧美大黄免费观看| 久久欧美中文字幕| 国产精品美女久久久久aⅴ| 中文字幕不卡的av| 一区免费观看视频| 一区二区成人在线视频| 亚洲一本大道在线| 日本美女一区二区| 色噜噜偷拍精品综合在线| 色菇凉天天综合网| 91精品国产91热久久久做人人| 欧美一区二区播放| 久久精品欧美日韩| 中文字幕永久在线不卡| 五月婷婷激情综合网| 久久精品99国产精品| 成人毛片视频在线观看| 欧美视频日韩视频| 亚洲精品一区二区三区在线观看 | www.综合网.com| 欧美吞精做爰啪啪高潮| 精品欧美乱码久久久久久 | av不卡免费电影| 91精品国产高清一区二区三区| 欧美zozozo| 亚洲靠逼com| 国产精品一区二区久久不卡| 99re亚洲国产精品| 精品国产乱码久久久久久蜜臀 | 国产精品盗摄一区二区三区| 亚洲成国产人片在线观看| 国产一区二区精品久久| 欧美视频一区二区三区四区| 久久精品视频一区| 日韩国产欧美三级| 色天天综合色天天久久| 国产欧美一区在线| 狠狠色狠狠色综合系列| 欧美日韩成人一区二区| 亚洲乱码国产乱码精品精小说 | 欧美日韩国产美女| 国产精品国产a| 国产精品影音先锋| 欧美成人三级在线| 美女脱光内衣内裤视频久久影院| 91浏览器在线视频| 亚洲欧美怡红院| 丁香五精品蜜臀久久久久99网站 | 亚洲欧美日韩中文字幕一区二区三区| 免费在线观看不卡| 欧美草草影院在线视频| 日本va欧美va欧美va精品| 欧美丝袜丝交足nylons图片| 亚洲另类中文字| 91久久精品国产91性色tv| 国产精品久久福利| www.亚洲人| 亚洲欧美日韩一区二区| av爱爱亚洲一区| 一区二区三区小说| 51精品视频一区二区三区| 午夜精品成人在线| 欧美精品一区二区久久婷婷| 极品瑜伽女神91| 国产精品青草久久| 99免费精品视频| 亚洲成av人片| 亚洲精品一区在线观看| 成人高清免费在线播放| 中文字幕在线观看一区| 欧美在线观看视频在线| 首页综合国产亚洲丝袜| 久久久不卡网国产精品一区| 99视频精品在线| 日韩综合在线视频| 国产日韩欧美电影| 欧美视频在线一区二区三区| 精品在线播放午夜| 亚洲裸体xxx| 精品久久久久久综合日本欧美| 不卡视频一二三四| 香港成人在线视频| 国产欧美日韩视频一区二区| 亚洲视频1区2区| 91麻豆精品国产91久久久久久| 久久精品国产亚洲一区二区三区| 国产精品灌醉下药二区| 欧美人妇做爰xxxⅹ性高电影| 韩国三级中文字幕hd久久精品| 一区二区激情视频| 国产精品国产三级国产普通话蜜臀| 欧美日韩美女一区二区| 91一区二区三区在线观看| 精品一区二区在线看| 亚洲小说春色综合另类电影| 国产精品久久久久aaaa| 久久久精品天堂| 久久人人爽人人爽| 精品国产伦一区二区三区免费| 欧美日韩aaaaa|