亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? readme

?? ATLS原代碼庫,實現的很不錯 ATLS原代碼庫,實現的很不錯
??
字號:
aTLS: An asynchronous TLS/SSL Implementation for SEDARelease v1.1, 12 July 2002By Dennis Chi (denchi@uclink4.berkeley.edu) and Matt Welsh (mdw@cs.berkeley.edu)This is an implementation of TLS v1.0 and SSL v3.0 for Sandstorm. Thislibrary embodies an asynchronous, nonblocking implementation of TLS/SSL,in Java, that allows scalable servers to be built using the Sandstorm SEDA-based Internet services environment. The key feature of this library is that it is nonblocking: it does not require a separate thread to be devoted to each connection. For more information on the SEDA approach tobuilding scalable servers, please see:  http://www.cs.berkeley.edu/~mdw/proj/sedaThis library is based on PureTLS (http://rtfm.com/puretls), a Java-based TLS implementation. PureTLS in turn requires Cryptix (http://www.cryptix.org)to implement a number of the cryptography functions. COMPILATION:You have the option of downloading and compiling Cryptix and PureTLSyourself, or using the precompiled .jar files included in this release.Note that the precompiled .jar files may not represent the latestversions of these packages, but, we have verified that they work withaTLS.If you want to use the precompiled .jar files, place the followingtwo files on your CLASSPATH:   	cryptix.jar	puretls-atls.jarIf you want to install and compile the packages yourself:1) First, obtain Cryptix and PureTLS from the above sites.   Place the following directories on your CLASSPATH:   	/path/to/cryptix/src	/path/topuretls/src   That is, whereever you have Cryptix and PureTLS installed.2) Patch the PureTLS code with the file puretls-atls.PATCH, found in this   directory. You should be able to cd to your PureTLS installation   directory and type:   		patch -p1 < /path/to/aTLS/puretls-atls.PATCH   replacing "/path/to/aTLS" to the location of the aTLS directory.3) Compile Cryptix and PureTLS. Because these packages don't include   Makefiles, This probably involves something like:	cd /path/to/cryptix/src	find . -name "*.java" | xargs javac 	cd /path/to/puretls/src	./build.sh   Note that you may get some compilation warnings for PureTLS,    i.e. that it is unable to find the gnu.getopt package. These can be   safely ignored since that package is only used in test programs not   used by aTLS.To compile the aTLS code, type 'make' in this directory.CONFIGURATION:aTLS requires that you have installed several files that containcertificates. These files are:  * root.pem   -- A root certificate (used by clients and servers)  * server.pem -- A server certificate (used on servers only)  * client.pem -- A client certificate (used on clients only)  * random.pem -- Data used to seed random number generator                  (used on clients only)Examples of these files are found in the 'keys' directory and weretaken from the PureTLS code tree. The certificates in the example files have a password of "password". Unfortunately PureTLS comes with very little documentation so it is unclear what is involved to generate your own certificate files. (If you have information on this, please contact mdw@cs.berkeley.edu.)The 'random.pem' file is a random seed file required only by aTLSclients. This file will be created if it does not exist, and may beoverwritten. Therefore if you are running experiments with many clients,you probably want this file to be specified on a per-client basis,rather than having multiple clients share the same random.pem file (sayon an NFS filesystem). In the examples below, random.pem is stored in /tmp.There are two ways to configure the location of these files: aTLS server code uses a Sandstorm configuration file, and the aTLS client code usesa programmatic interface.If you are running a Sandstorm server using aTLS, then you can simplyadd a stanza to the <global> section of the file defining the locationof each of these files. For example:<sandstorm>  <global>    # aTLS Server configuration    <aTLS>      rootfile /some/path/aTLS/keys/root.pem      keyfile /some/path/aTLS/keys/server.pem      password password    </aTLS>  </global></sandstorm>(If this doesn't make sense to you, please see the Sandstorm documentationat http://www.cs.berkeley.edu/~mdw/proj/seda.)When using the aTLS client code, you can specify the locations of therequire files programmatically:    /* aTLS Client configuration */    String rootfile = "/some/path/aTLS/keys/root.pem";    String keyfile = "/some/path/aTLS/keys/client.pem";    /* Will be overwritten! */    String randomfile = "/tmp/random.pem";    String password = "password";    /* Must be called before creating any aTLSClientSocket objects. */    aTLSClientSocket.initialize(rootfile, keyfile, randomfile, password);    aTLSClientSocket sock = new aTLSClientSocket(address, port, eventQ);If your client application is configured using a Sandstorm configurationfile, you may of course specify these keys in the config file asdescribed above. TESTING THE CONFIGURATION:The aTLSnew/test directory contains a very simple client-server testprogram that can help you to see if the installation is working.The server can be invoked with:   sandstorm test-tls-server.cfgin the 'test' directory. It creates a TLS server socket on port 8096that implements a simple Web server, sending back a canned HTML reply toany HTTP request. To test it you can point your Web browser to the URL:   https://localhost:8096/*NOTE!* It is very important that you specify 'https://', *not* 'http://'in the URL. Without 'https' your Web browser will attempt to connectusing standard HTTP and nothing will happen.After some time, you will get a simple Web page starting with:  aTLS Web Server Response  Hello, this is the aTLS test web server.Before this comes up you will probably see a bunch of dialog boxesexplaining that the server certificate has expired and asking you toverify the new certificate - just keep clicking "continue". There is a LONG delay the first time you access the secure web page - see "PERFORMANCE NOTES" below.You can also test the simple Web server using the client test program,which can be invoked by running  sandstorm test-tls-client.cfgfrom the 'test' directory. You will see the client creating a TLS clientsocket and sending a simple HTTP request to the server. You can tell itall worked if you see the line:  </pre><p>And, by the way, your request (and this reply) were encrypted  using TLS! Glad to be of service today.</body></html>at the end of the output from the client.USAGE:If you are familiar to programming the Sandstorm 'aSocket' library,using aTLS is very easy. All of the programming interfaces aredocumented in Javadoc in the source code. Note that since the TLS classes extend the corresponding aSocket classes, you can easily use TLS sockets in any context where regular aSockets are used. For example, to layer an HTTP server on top of a TLS server, allthat's required is to substitute an aTLSServerSocket whereveer an ATcpServerSocket was used before.To create a TLS server socket, instantiate an aTLSServerSocket object, specifying the Sandstorm ManagerIF, SinkIF where you want to receivenotifications, and the TCP port on which you wish to listen. When aclient connection arrives, an aTLSConnection object is pushed onto thecorresponding queue. To create a TLS client socket, instantiate an aTLSClientSocket object,specifying the address or hostname of the server, the TCP port, and aSinkIF on which you wish to receive notification of connectionestablishment (an aTLSConnection object).aTLSConnection corresponds to an established TLS connection (eitherincoming or outgoing). Enqueueing a BufferElement onto theaTLSConnection causes that data to be encrypted and sent to the network.When new data arrives on the connection, an ATcpInPacket will beenqueued on the sinkIF associated with the connection from a previouscall to aTLSConnection.startReader(). PERFORMANCE NOTES:Note that the first time you use the TLS code in your application therewill be an extraordinarily long delay. This is due to the JIT compilercompiling all of the aTLS, PureTLS, and Cryptix classes associated withTLS/SSL. Don't be dismayed by the performance of the initialconnections; after some usage you should find the performance to bequite acceptable.Regardless, TLS and SSL are VERY CPU-intensive and this implementationis entirely in Java with no support for native code or hardwareacceleration. Therefore the performance is going to be significantlyslower than using traditional, non-encrypted sockets. We don't believethat this performance is significantly worse than other SSL/TLSimplementations. However, our focus here has been to produce a viablenonblocking SSL/TLS implementation for use in the SEDA project, not toconcern ourselves with achieving the highest performance possible. We'd be very interested in hearing from you about benchmark results (say,comparing aTLS with other SSL implementations such as that in Apache).A nice aspect of aTLS is that it can scale to a VERY large number ofsocket connections (in the thousands), unlike servers like Apache whichare limited by the number of processes/threads that the system can support.BUGS, SUPPORT, OTHER INFORMATION:The best way to get support on this software is to join the seda- users mailing list, instructions for which are found at   http://www.cs.berkeley.edu/~mdw/proj/seda. LICENSE:This is open source software covered by the following copyright license.The PureTLS and Cryptix libraries (included in this release) are coveredby their own respective licenses.   Copyright (c) 2002 by The Regents of the University of California.   All rights reserved.   Permission to use, copy, modify, and distribute this software and its  documentation for any purpose, without fee, and without written agreement is  hereby granted, provided that the above copyright notice and the following  two paragraphs appear in all copies of this software.   IN NO EVENT SHALL THE UNIVERSITY OF CALIFORNIA BE LIABLE TO ANY PARTY FOR  DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES ARISING OUT  OF THE USE OF THIS SOFTWARE AND ITS DOCUMENTATION, EVEN IF THE UNIVERSITY OF  CALIFORNIA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.   THE UNIVERSITY OF CALIFORNIA SPECIFICALLY DISCLAIMS ANY WARRANTIES,  INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY  AND FITNESS FOR A PARTICULAR PURPOSE.  THE SOFTWARE PROVIDED HEREUNDER IS  ON AN "AS IS" BASIS, AND THE UNIVERSITY OF CALIFORNIA HAS NO OBLIGATION TO  PROVIDE MAINTENANCE, SUPPORT, UPDATES, ENHANCEMENTS, OR MODIFICATIONS.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
中文字幕第一区第二区| 亚洲精品欧美激情| 久久精品人人做| 一本久久a久久精品亚洲| 一区二区三区在线高清| 欧美色手机在线观看| 美女在线视频一区| 日韩女优视频免费观看| 色天使色偷偷av一区二区| 成人一级黄色片| 亚洲欧美在线另类| 在线一区二区三区做爰视频网站| 日韩福利视频导航| 欧美亚洲丝袜传媒另类| 日本不卡不码高清免费观看 | 99精品热视频| 午夜视频在线观看一区| 欧美日韩一级二级三级| 亚洲一区二区精品视频| 91免费版在线| 国产在线精品免费av| 91精品1区2区| 欧美一区二区三区男人的天堂| 波多野洁衣一区| 中文字幕制服丝袜一区二区三区| 麻豆国产一区二区| 大白屁股一区二区视频| 91久久精品网| 一本色道久久综合亚洲91| 欧美日韩中字一区| 日本一区二区三区电影| 亚洲精品免费一二三区| 毛片不卡一区二区| 国产91露脸合集magnet| 欧美吻胸吃奶大尺度电影| 国产欧美日韩另类视频免费观看| 亚洲一区二区三区四区在线观看 | 亚洲丝袜自拍清纯另类| 午夜精品在线视频一区| 亚洲精品成人在线| 国产黄色成人av| 欧美一区二区三区四区在线观看 | 午夜视频在线观看一区二区| 国产一区二区三区香蕉| 欧美大黄免费观看| 国产精品自拍毛片| 在线观看区一区二| 欧美日韩免费一区二区三区 | 国产揄拍国内精品对白| 色综合久久久久网| 福利一区二区在线观看| 国产精品美女久久久久aⅴ| 亚洲精品一区二区三区99| 色嗨嗨av一区二区三区| 欧美一区二区三区在线观看 | 欧美精品xxxxbbbb| 91成人在线观看喷潮| 日韩三级免费观看| 欧美军同video69gay| 日韩av一级电影| 欧美午夜免费电影| 免费高清在线一区| 蜜桃视频第一区免费观看| 亚洲不卡在线观看| 色综合中文字幕国产| 日日摸夜夜添夜夜添亚洲女人| 亚洲第一在线综合网站| 中文字幕第一页久久| 欧美日韩国产高清一区二区| 久久久九九九九| 欧美日韩精品三区| av在线综合网| 国产一区免费电影| 日韩精品一区国产麻豆| 亚洲第一狼人社区| 亚洲精品欧美综合四区| 国产精品一区三区| 紧缚奴在线一区二区三区| 国产一区二区三区久久久 | 色婷婷激情综合| 丝袜美腿亚洲一区| 国产精品77777| 自拍偷拍欧美激情| 欧美国产日韩在线观看| 久久亚洲私人国产精品va媚药| 日韩欧美中文字幕一区| 婷婷夜色潮精品综合在线| 国产欧美视频一区二区三区| 五月天丁香久久| 精品福利一二区| 91在线无精精品入口| 久久久精品蜜桃| 337p亚洲精品色噜噜噜| 欧美疯狂性受xxxxx喷水图片| 亚洲精品免费在线观看| av激情亚洲男人天堂| 亚洲精品高清视频在线观看| 成人av在线资源网站| 福利电影一区二区三区| 91在线国产观看| 91在线播放网址| 国产精品情趣视频| 亚洲欧洲国产日本综合| 中文字幕中文字幕一区二区| 色噜噜狠狠成人中文综合| 国内精品免费**视频| 婷婷激情综合网| 婷婷国产v国产偷v亚洲高清| 麻豆freexxxx性91精品| 精品99一区二区| 欧美日韩在线播放| 狠狠色丁香婷综合久久| 综合婷婷亚洲小说| 国产.欧美.日韩| 国产三级一区二区| 成人av网站在线| 国产精品网曝门| 国产成a人无v码亚洲福利| 日韩一级成人av| 国产精品视频在线看| 日韩av中文字幕一区二区三区 | 亚洲午夜视频在线| 国产suv精品一区二区6| 无码av免费一区二区三区试看| 蜜臀av在线播放一区二区三区| 国产大陆亚洲精品国产| 精品久久久久久久人人人人传媒| 亚洲欧美日韩中文字幕一区二区三区 | 日本伊人色综合网| 成人av免费在线观看| 成人一区二区三区| 欧洲色大大久久| 亚洲视频你懂的| 一本色道久久综合狠狠躁的推荐 | 一区免费观看视频| 欧美精品一卡二卡| 日韩精品中文字幕一区| 国产欧美一区二区三区鸳鸯浴| 国产日韩欧美麻豆| 亚洲同性gay激情无套| 亚洲午夜视频在线| 国内成人自拍视频| 国产一区 二区 三区一级| 国产宾馆实践打屁股91| 视频在线观看一区| 一区二区三区中文字幕精品精品| 精品日韩99亚洲| 91精品国产91综合久久蜜臀| 中文字幕免费一区| 亚洲免费大片在线观看| 久久久噜噜噜久噜久久综合| 国产精品亚洲午夜一区二区三区 | 国产精品狼人久久影院观看方式| 精东粉嫩av免费一区二区三区| 国产精品久久久久一区二区三区共| 色综合久久66| 欧美性受xxxx黑人xyx性爽| 91麻豆国产在线观看| 欧美日韩卡一卡二| wwww国产精品欧美| 亚洲日本在线天堂| 韩国v欧美v日本v亚洲v| 成年人国产精品| 日韩欧美电影一二三| 久久综合色之久久综合| 亚洲一区二区三区四区在线| 日韩黄色免费电影| 成人免费高清在线观看| 欧美酷刑日本凌虐凌虐| 国产精品视频看| 精品一区二区在线视频| 在线视频一区二区三| 成人欧美一区二区三区黑人麻豆| 亚洲高清视频在线| 色偷偷久久一区二区三区| 久久免费美女视频| 亚洲日本在线看| 国产成人免费xxxxxxxx| 国产精品888| 狠狠久久亚洲欧美| 另类中文字幕网| 国产精品一卡二卡| 免费在线观看成人| 日韩欧美一二三| 欧美大片免费久久精品三p| 国产女主播在线一区二区| 日韩福利电影在线| 欧美一三区三区四区免费在线看| 国产精品不卡视频| 欧美一区二区三区视频在线观看| 午夜精品福利在线| 色综合一个色综合亚洲| 精品福利在线导航| 亚洲三级久久久| 国产专区欧美精品| 日本高清成人免费播放| 欧美激情综合五月色丁香| 国产日韩欧美在线一区| 国产高清不卡二三区| 久久久久久久久久久久电影|