亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ssl.h

?? Openssl的常用頭文件
?? H
?? 第 1 頁 / 共 5 頁
字號:
	long verify_result; /* only for servers */	int references;	long timeout;	long time;	int compress_meth;		/* Need to lookup the method */	SSL_CIPHER *cipher;	unsigned long cipher_id;	/* when ASN.1 loaded, this					 * needs to be used to load					 * the 'cipher' structure */	STACK_OF(SSL_CIPHER) *ciphers; /* shared ciphers? */	CRYPTO_EX_DATA ex_data; /* application specific data */	/* These are used to make removal of session-ids more	 * efficient and to implement a maximum cache size. */	struct ssl_session_st *prev,*next;	} SSL_SESSION;#define SSL_OP_MICROSOFT_SESS_ID_BUG			0x00000001L#define SSL_OP_NETSCAPE_CHALLENGE_BUG			0x00000002L#define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG		0x00000008L#define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG		0x00000010L#define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER		0x00000020L#define SSL_OP_MSIE_SSLV2_RSA_PADDING			0x00000040L#define SSL_OP_SSLEAY_080_CLIENT_DH_BUG			0x00000080L#define SSL_OP_TLS_D5_BUG				0x00000100L#define SSL_OP_TLS_BLOCK_PADDING_BUG			0x00000200L#define SSL_OP_TLS_ROLLBACK_BUG				0x00000400L/* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added * in OpenSSL 0.9.6d.  Usually (depending on the application protocol) * the workaround is not needed.  Unfortunately some broken SSL/TLS * implementations cannot handle it at all, which is why we include * it in SSL_OP_ALL. */#define SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS              0x00000800L /* added in 0.9.6e *//* SSL_OP_ALL: various bug workarounds that should be rather harmless */#define SSL_OP_ALL					0x000FFFFFL/* If set, always create a new key when using tmp_dh parameters */#define SSL_OP_SINGLE_DH_USE				0x00100000L/* Set to also use the tmp_rsa key when doing RSA operations. */#define SSL_OP_EPHEMERAL_RSA				0x00200000L#define SSL_OP_NO_SSLv2					0x01000000L#define SSL_OP_NO_SSLv3					0x02000000L#define SSL_OP_NO_TLSv1					0x04000000L/* The next flag deliberately changes the ciphertest, this is a check * for the PKCS#1 attack */#define SSL_OP_PKCS1_CHECK_1				0x08000000L#define SSL_OP_PKCS1_CHECK_2				0x10000000L#define SSL_OP_NETSCAPE_CA_DN_BUG			0x20000000L/* SSL_OP_NON_EXPORT_FIRST looks utterly broken .. */#define SSL_OP_NON_EXPORT_FIRST 			0x40000000L#define SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG		0x80000000L/* Allow SSL_write(..., n) to return r with 0 < r < n (i.e. report success * when just a single record has been written): */#define SSL_MODE_ENABLE_PARTIAL_WRITE       0x00000001L/* Make it possible to retry SSL_write() with changed buffer location * (buffer contents must stay the same!); this is not the default to avoid * the misconception that non-blocking SSL_write() behaves like * non-blocking write(): */#define SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER 0x00000002L/* Never bother the application with retries if the transport * is blocking: */#define SSL_MODE_AUTO_RETRY 0x00000004L/* Note: SSL[_CTX]_set_{options,mode} use |= op on the previous value, * they cannot be used to clear bits. */#define SSL_CTX_set_options(ctx,op) \	SSL_CTX_ctrl(ctx,SSL_CTRL_OPTIONS,op,NULL)#define SSL_CTX_get_options(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_OPTIONS,0,NULL)#define SSL_set_options(ssl,op) \	SSL_ctrl(ssl,SSL_CTRL_OPTIONS,op,NULL)#define SSL_get_options(ssl) \        SSL_ctrl(ssl,SSL_CTRL_OPTIONS,0,NULL)#define SSL_CTX_set_mode(ctx,op) \	SSL_CTX_ctrl(ctx,SSL_CTRL_MODE,op,NULL)#define SSL_CTX_get_mode(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_MODE,0,NULL)#define SSL_set_mode(ssl,op) \	SSL_ctrl(ssl,SSL_CTRL_MODE,op,NULL)#define SSL_get_mode(ssl) \        SSL_ctrl(ssl,SSL_CTRL_MODE,0,NULL)#define SSL_SESSION_CACHE_MAX_SIZE_DEFAULT	(1024*20)typedef struct ssl_comp_st	{	int id;	char *name;#ifndef NO_COMP	COMP_METHOD *method;#else	char *method;#endif	} SSL_COMP;DECLARE_STACK_OF(SSL_COMP)struct ssl_ctx_st	{	SSL_METHOD *method;	unsigned long options;	unsigned long mode;	STACK_OF(SSL_CIPHER) *cipher_list;	/* same as above but sorted for lookup */	STACK_OF(SSL_CIPHER) *cipher_list_by_id;	struct x509_store_st /* X509_STORE */ *cert_store;	struct lhash_st /* LHASH */ *sessions;	/* a set of SSL_SESSIONs */	/* Most session-ids that will be cached, default is	 * SSL_SESSION_CACHE_MAX_SIZE_DEFAULT. 0 is unlimited. */	unsigned long session_cache_size;	struct ssl_session_st *session_cache_head;	struct ssl_session_st *session_cache_tail;	/* This can have one of 2 values, ored together,	 * SSL_SESS_CACHE_CLIENT,	 * SSL_SESS_CACHE_SERVER,	 * Default is SSL_SESSION_CACHE_SERVER, which means only	 * SSL_accept which cache SSL_SESSIONS. */	int session_cache_mode;	/* If timeout is not 0, it is the default timeout value set	 * when SSL_new() is called.  This has been put in to make	 * life easier to set things up */	long session_timeout;	/* If this callback is not null, it will be called each	 * time a session id is added to the cache.  If this function	 * returns 1, it means that the callback will do a	 * SSL_SESSION_free() when it has finished using it.  Otherwise,	 * on 0, it means the callback has finished with it.	 * If remove_session_cb is not null, it will be called when	 * a session-id is removed from the cache.  After the call,	 * OpenSSL will SSL_SESSION_free() it. */	int (*new_session_cb)(struct ssl_st *ssl,SSL_SESSION *sess);	void (*remove_session_cb)(struct ssl_ctx_st *ctx,SSL_SESSION *sess);	SSL_SESSION *(*get_session_cb)(struct ssl_st *ssl,		unsigned char *data,int len,int *copy);	struct		{		int sess_connect;	/* SSL new conn - started */		int sess_connect_renegotiate;/* SSL reneg - requested */		int sess_connect_good;	/* SSL new conne/reneg - finished */		int sess_accept;	/* SSL new accept - started */		int sess_accept_renegotiate;/* SSL reneg - requested */		int sess_accept_good;	/* SSL accept/reneg - finished */		int sess_miss;		/* session lookup misses  */		int sess_timeout;	/* reuse attempt on timeouted session */		int sess_cache_full;	/* session removed due to full cache */		int sess_hit;		/* session reuse actually done */		int sess_cb_hit;	/* session-id that was not					 * in the cache was					 * passed back via the callback.  This					 * indicates that the application is					 * supplying session-id's from other					 * processes - spooky :-) */		} stats;	int references;/**/	void (*info_callback)();	/* if defined, these override the X509_verify_cert() calls *//**/	int (*app_verify_callback)();/**/	char *app_verify_arg; /* never used; should be void * */	/* default values to use in SSL structures *//**/	struct cert_st /* CERT */ *cert;/**/	int read_ahead;/**/	int verify_mode;/**/	int verify_depth;/**/	unsigned int sid_ctx_length;/**/	unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH];/**/	int (*default_verify_callback)(int ok,X509_STORE_CTX *ctx);	int purpose;		/* Purpose setting */	int trust;		/* Trust setting */	/* Default password callback. *//**/	pem_password_cb *default_passwd_callback;	/* Default password callback user data. *//**/	void *default_passwd_callback_userdata;	/* get client cert callback *//**/	int (*client_cert_cb)(/* SSL *ssl, X509 **x509, EVP_PKEY **pkey */);	/* what we put in client cert requests */	STACK_OF(X509_NAME) *client_CA;/**/	int quiet_shutdown;	CRYPTO_EX_DATA ex_data;	const EVP_MD *rsa_md5;/* For SSLv2 - name is 'ssl2-md5' */	const EVP_MD *md5;	/* For SSLv3/TLSv1 'ssl3-md5' */	const EVP_MD *sha1;   /* For SSLv3/TLSv1 'ssl3->sha1' */	STACK_OF(X509) *extra_certs;        STACK_OF(SSL_COMP) *comp_methods; /* stack of SSL_COMP, SSLv3/TLSv1 */	};#define SSL_SESS_CACHE_OFF			0x0000#define SSL_SESS_CACHE_CLIENT			0x0001#define SSL_SESS_CACHE_SERVER			0x0002#define SSL_SESS_CACHE_BOTH	(SSL_SESS_CACHE_CLIENT|SSL_SESS_CACHE_SERVER)#define SSL_SESS_CACHE_NO_AUTO_CLEAR		0x0080/* enough comments already ... see SSL_CTX_set_session_cache_mode(3) */#define SSL_SESS_CACHE_NO_INTERNAL_LOOKUP	0x0100#define SSL_SESS_CACHE_NO_INTERNAL_STORE	0x0200#define SSL_SESS_CACHE_NO_INTERNAL \	(SSL_SESS_CACHE_NO_INTERNAL_LOOKUP|SSL_SESS_CACHE_NO_INTERNAL_STORE)  struct lhash_st *SSL_CTX_sessions(SSL_CTX *ctx);#define SSL_CTX_sess_number(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_NUMBER,0,NULL)#define SSL_CTX_sess_connect(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CONNECT,0,NULL)#define SSL_CTX_sess_connect_good(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CONNECT_GOOD,0,NULL)#define SSL_CTX_sess_connect_renegotiate(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CONNECT_RENEGOTIATE,0,NULL)#define SSL_CTX_sess_accept(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_ACCEPT,0,NULL)#define SSL_CTX_sess_accept_renegotiate(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_ACCEPT_RENEGOTIATE,0,NULL)#define SSL_CTX_sess_accept_good(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_ACCEPT_GOOD,0,NULL)#define SSL_CTX_sess_hits(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_HIT,0,NULL)#define SSL_CTX_sess_cb_hits(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CB_HIT,0,NULL)#define SSL_CTX_sess_misses(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_MISSES,0,NULL)#define SSL_CTX_sess_timeouts(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_TIMEOUTS,0,NULL)#define SSL_CTX_sess_cache_full(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CACHE_FULL,0,NULL)#define SSL_CTX_sess_set_new_cb(ctx,cb)	((ctx)->new_session_cb=(cb))#define SSL_CTX_sess_get_new_cb(ctx)	((ctx)->new_session_cb)#define SSL_CTX_sess_set_remove_cb(ctx,cb)	((ctx)->remove_session_cb=(cb))#define SSL_CTX_sess_get_remove_cb(ctx)	((ctx)->remove_session_cb)#define SSL_CTX_sess_set_get_cb(ctx,cb)	((ctx)->get_session_cb=(cb))#define SSL_CTX_sess_get_get_cb(ctx)	((ctx)->get_session_cb)#define SSL_CTX_set_info_callback(ctx,cb)	((ctx)->info_callback=(cb))#define SSL_CTX_get_info_callback(ctx)		((ctx)->info_callback)#define SSL_CTX_set_client_cert_cb(ctx,cb)	((ctx)->client_cert_cb=(cb))#define SSL_CTX_get_client_cert_cb(ctx)		((ctx)->client_cert_cb)#define SSL_NOTHING	1#define SSL_WRITING	2#define SSL_READING	3#define SSL_X509_LOOKUP	4/* These will only be used when doing non-blocking IO */#define SSL_want_nothing(s)	(SSL_want(s) == SSL_NOTHING)#define SSL_want_read(s)	(SSL_want(s) == SSL_READING)#define SSL_want_write(s)	(SSL_want(s) == SSL_WRITING)#define SSL_want_x509_lookup(s)	(SSL_want(s) == SSL_X509_LOOKUP)struct ssl_st	{	/* protocol version	 * (one of SSL2_VERSION, SSL3_VERSION, TLS1_VERSION)	 */	int version;	int type; /* SSL_ST_CONNECT or SSL_ST_ACCEPT */	SSL_METHOD *method; /* SSLv3 */	/* There are 2 BIO's even though they are normally both the	 * same.  This is so data can be read and written to different	 * handlers */#ifndef NO_BIO	BIO *rbio; /* used by SSL_read */	BIO *wbio; /* used by SSL_write */	BIO *bbio; /* used during session-id reuse to concatenate		    * messages */#else	char *rbio; /* used by SSL_read */	char *wbio; /* used by SSL_write */	char *bbio;#endif	/* This holds a variable that indicates what we were doing	 * when a 0 or -1 is returned.  This is needed for	 * non-blocking IO so we know what request needs re-doing when	 * in SSL_accept or SSL_connect */	int rwstate;	/* true when we are actually in SSL_accept() or SSL_connect() */	int in_handshake;	int (*handshake_func)();	/* Imagine that here's a boolean member "init" that is	 * switched as soon as SSL_set_{accept/connect}_state	 * is called for the first time, so that "state" and	 * "handshake_func" are properly initialized.  But as	 * handshake_func is == 0 until then, we use this	 * test instead of an "init" member.	 */	int server;	/* are we the server side? - mostly used by SSL_clear*/	int new_session;/* 1 if we are to use a new session.	                 * 2 if we are a server and are inside a handshake	                 *   (i.e. not just sending a HelloRequest)	                 * NB: For servers, the 'new' session may actually be a previously	                 * cached session or even the previous session */	int quiet_shutdown;/* don't send shutdown packets */	int shutdown;	/* we have shut things down, 0x01 sent, 0x02			 * for received */	int state;	/* where we are */

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久不见久久见免费视频7| 捆绑调教一区二区三区| 91免费视频大全| 亚洲国产精华液网站w| 韩国毛片一区二区三区| 日韩精品自拍偷拍| 奇米在线7777在线精品| 欧美一区二区三区视频免费播放 | 久久中文字幕电影| 麻豆精品一二三| 日韩免费电影一区| 美国av一区二区| 日韩精品一区二区三区三区免费| 丝袜美腿亚洲一区二区图片| 精品视频在线视频| 婷婷丁香激情综合| 91精品国产麻豆| 免费成人在线视频观看| 欧美大片日本大片免费观看| 国产一区二区在线免费观看| 久久久噜噜噜久噜久久综合| 国产精品影视在线| 中文字幕在线观看一区二区| 97久久久精品综合88久久| 一区二区三区四区在线| 欧美日韩精品久久久| 婷婷成人激情在线网| 欧美一级在线免费| 国产一区啦啦啦在线观看| 久久久久久久久久久久久久久99 | 丁香婷婷综合激情五月色| 国产日韩欧美a| 成人97人人超碰人人99| 亚洲狼人国产精品| 欧美日韩国产免费| 久久电影国产免费久久电影 | 欧美一级艳片视频免费观看| 国产在线日韩欧美| 国产精品欧美经典| 欧洲精品一区二区| 美女视频黄久久| 欧美激情资源网| 91福利在线观看| 日产国产欧美视频一区精品| 2020国产精品自拍| 成人97人人超碰人人99| 亚洲国产一区二区a毛片| 制服丝袜一区二区三区| 国产一本一道久久香蕉| 中文字幕视频一区| 欧美妇女性影城| 日韩视频在线一区二区| 福利一区在线观看| 亚洲一区二区三区在线| 日韩视频一区二区三区| 成人高清免费观看| 亚洲动漫第一页| 26uuu久久综合| 91麻豆成人久久精品二区三区| 午夜天堂影视香蕉久久| 久久久久久久久久久黄色| 91久久国产综合久久| 青青草成人在线观看| 欧美mv和日韩mv国产网站| 日韩一级片网址| 国产一级精品在线| 国产午夜精品理论片a级大结局| 99国产精品久久久久久久久久| 日日夜夜免费精品| 国产精品高潮呻吟| 欧美一区二区三区日韩视频| aaa亚洲精品| 日本亚洲免费观看| 日韩美女啊v在线免费观看| 日韩一区二区视频| 91免费版在线看| 国产一区二区三区| 亚洲福利一区二区| 中文字幕不卡在线| 日韩一区二区三| 在线视频国内自拍亚洲视频| 国内精品免费**视频| 夜夜爽夜夜爽精品视频| 国产亚洲精品福利| 欧美一级高清片| 在线观看精品一区| 成人小视频在线| 久久精品久久综合| 亚洲综合清纯丝袜自拍| 欧美国产激情一区二区三区蜜月| 91麻豆精品91久久久久同性| 色综合天天综合网天天狠天天| 韩国三级中文字幕hd久久精品| 五月天欧美精品| 亚洲视频你懂的| 久久九九久精品国产免费直播| 欧美二区在线观看| 91麻豆视频网站| 成人福利视频网站| 极品少妇一区二区三区精品视频| 香蕉乱码成人久久天堂爱免费| 国产精品蜜臀av| 久久久久久久网| 日韩免费看的电影| 欧美美女网站色| 在线观看日韩电影| 91在线小视频| 成人理论电影网| 国产成人在线影院| 久久99精品国产麻豆不卡| 午夜av一区二区三区| 亚洲激情欧美激情| 亚洲欧美激情在线| 国产精品国产自产拍在线| 久久久久高清精品| 日韩欧美在线一区二区三区| 91精品国产91久久久久久一区二区| 在线观看日韩一区| 在线精品视频免费观看| 99精品在线观看视频| av激情亚洲男人天堂| 国产凹凸在线观看一区二区| 国产精品一区不卡| 亚洲精品在线免费观看视频| 日韩视频一区二区在线观看| 欧美一区二区三区日韩视频| 91精品国产黑色紧身裤美女| 制服丝袜国产精品| 在线不卡a资源高清| 欧美欧美午夜aⅴ在线观看| 欧美调教femdomvk| 欧美日韩中文字幕一区二区| 欧美性大战久久| 精品视频在线免费观看| 欧美精选一区二区| 这里只有精品电影| 欧美一区二区三区四区高清| 日韩欧美国产麻豆| 欧美mv日韩mv| 国产三级欧美三级日产三级99| 日本一区二区三区久久久久久久久不 | 97久久精品人人做人人爽50路| 99久久精品久久久久久清纯| 色综合天天综合在线视频| 在线观看亚洲精品| 9191成人精品久久| 日韩欧美色综合| 国产亚洲视频系列| 国产精品久久久99| 亚洲精品高清在线| 亚洲成人精品影院| 久久精品国产秦先生| 国产精品自拍网站| 91亚洲精品一区二区乱码| 欧洲视频一区二区| 91精品一区二区三区久久久久久 | 精品在线免费视频| 国产精品一区二区91| 99久久精品免费看| 精品视频一区 二区 三区| 欧美一级日韩不卡播放免费| xvideos.蜜桃一区二区| 国产精品麻豆网站| 亚洲主播在线播放| 另类成人小视频在线| 国产成人免费高清| 99国产欧美久久久精品| 欧美日韩一卡二卡| 精品免费国产一区二区三区四区| 国产精品欧美一级免费| 亚洲va在线va天堂| 国产一区二区三区美女| 91麻豆蜜桃一区二区三区| 欧美日韩精品一区二区三区四区 | 韩国成人在线视频| 成人一区在线看| 亚洲国产精品久久一线不卡| 久久色.com| 日韩你懂的在线播放| 一区二区在线观看免费视频播放| 国产欧美中文在线| 久久久一区二区| 日韩欧美一区在线观看| 欧美综合久久久| 成人18视频日本| 精品国产乱子伦一区| 欧美精品亚洲一区二区在线播放| 91美女蜜桃在线| 色综合久久中文字幕| eeuss影院一区二区三区| 91麻豆国产精品久久| 欧美色倩网站大全免费| 日韩女优av电影| 最新国产成人在线观看| 秋霞成人午夜伦在线观看| 波多野结衣在线一区| 日韩欧美国产综合| 亚洲精品亚洲人成人网| 韩国精品久久久| 欧美美女bb生活片|