亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ocsp.h

?? Marvell ISP wireless wpa_supplicant application
?? H
?? 第 1 頁 / 共 2 頁
字號:
/* ocsp.h *//* Written by Tom Titchener <Tom_Titchener@groove.net> for the OpenSSL * project. *//* History:   This file was transfered to Richard Levitte from CertCo by Kathy   Weinhold in mid-spring 2000 to be included in OpenSSL or released   as a patch kit. *//* ==================================================================== * Copyright (c) 1998-2000 The OpenSSL Project.  All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright *    notice, this list of conditions and the following disclaimer.  * * 2. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in *    the documentation and/or other materials provided with the *    distribution. * * 3. All advertising materials mentioning features or use of this *    software must display the following acknowledgment: *    "This product includes software developed by the OpenSSL Project *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)" * * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to *    endorse or promote products derived from this software without *    prior written permission. For written permission, please contact *    openssl-core@openssl.org. * * 5. Products derived from this software may not be called "OpenSSL" *    nor may "OpenSSL" appear in their names without prior written *    permission of the OpenSSL Project. * * 6. Redistributions of any form whatsoever must retain the following *    acknowledgment: *    "This product includes software developed by the OpenSSL Project *    for use in the OpenSSL Toolkit (http://www.openssl.org/)" * * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED * OF THE POSSIBILITY OF SUCH DAMAGE. * ==================================================================== * * This product includes cryptographic software written by Eric Young * (eay@cryptsoft.com).  This product includes software written by Tim * Hudson (tjh@cryptsoft.com). * */#ifndef HEADER_OCSP_H#define HEADER_OCSP_H#include <openssl/x509.h>#include <openssl/x509v3.h>#include <openssl/safestack.h>#ifdef  __cplusplusextern "C" {#endif/* Various flags and values */#define OCSP_DEFAULT_NONCE_LENGTH	16#define OCSP_NOCERTS			0x1#define OCSP_NOINTERN			0x2#define OCSP_NOSIGS			0x4#define OCSP_NOCHAIN			0x8#define OCSP_NOVERIFY			0x10#define OCSP_NOEXPLICIT			0x20#define OCSP_NOCASIGN			0x40#define OCSP_NODELEGATED		0x80#define OCSP_NOCHECKS			0x100#define OCSP_TRUSTOTHER			0x200#define OCSP_RESPID_KEY			0x400#define OCSP_NOTIME			0x800/*   CertID ::= SEQUENCE { *       hashAlgorithm            AlgorithmIdentifier, *       issuerNameHash     OCTET STRING, -- Hash of Issuer's DN *       issuerKeyHash      OCTET STRING, -- Hash of Issuers public key (excluding the tag & length fields) *       serialNumber       CertificateSerialNumber } */typedef struct ocsp_cert_id_st	{	X509_ALGOR *hashAlgorithm;	ASN1_OCTET_STRING *issuerNameHash;	ASN1_OCTET_STRING *issuerKeyHash;	ASN1_INTEGER *serialNumber;	} OCSP_CERTID;DECLARE_STACK_OF(OCSP_CERTID)/*   Request ::=     SEQUENCE { *       reqCert                    CertID, *       singleRequestExtensions    [0] EXPLICIT Extensions OPTIONAL } */typedef struct ocsp_one_request_st	{	OCSP_CERTID *reqCert;	STACK_OF(X509_EXTENSION) *singleRequestExtensions;	} OCSP_ONEREQ;DECLARE_STACK_OF(OCSP_ONEREQ)DECLARE_ASN1_SET_OF(OCSP_ONEREQ)/*   TBSRequest      ::=     SEQUENCE { *       version             [0] EXPLICIT Version DEFAULT v1, *       requestorName       [1] EXPLICIT GeneralName OPTIONAL, *       requestList             SEQUENCE OF Request, *       requestExtensions   [2] EXPLICIT Extensions OPTIONAL } */typedef struct ocsp_req_info_st	{	ASN1_INTEGER *version;	GENERAL_NAME *requestorName;	STACK_OF(OCSP_ONEREQ) *requestList;	STACK_OF(X509_EXTENSION) *requestExtensions;	} OCSP_REQINFO;/*   Signature       ::=     SEQUENCE { *       signatureAlgorithm   AlgorithmIdentifier, *       signature            BIT STRING, *       certs                [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } */typedef struct ocsp_signature_st	{	X509_ALGOR *signatureAlgorithm;	ASN1_BIT_STRING *signature;	STACK_OF(X509) *certs;	} OCSP_SIGNATURE;/*   OCSPRequest     ::=     SEQUENCE { *       tbsRequest                  TBSRequest, *       optionalSignature   [0]     EXPLICIT Signature OPTIONAL } */typedef struct ocsp_request_st	{	OCSP_REQINFO *tbsRequest;	OCSP_SIGNATURE *optionalSignature; /* OPTIONAL */	} OCSP_REQUEST;/*   OCSPResponseStatus ::= ENUMERATED { *       successful            (0),      --Response has valid confirmations *       malformedRequest      (1),      --Illegal confirmation request *       internalError         (2),      --Internal error in issuer *       tryLater              (3),      --Try again later *                                       --(4) is not used *       sigRequired           (5),      --Must sign the request *       unauthorized          (6)       --Request unauthorized *   } */#define OCSP_RESPONSE_STATUS_SUCCESSFUL          0#define OCSP_RESPONSE_STATUS_MALFORMEDREQUEST     1#define OCSP_RESPONSE_STATUS_INTERNALERROR        2#define OCSP_RESPONSE_STATUS_TRYLATER             3#define OCSP_RESPONSE_STATUS_SIGREQUIRED          5#define OCSP_RESPONSE_STATUS_UNAUTHORIZED         6/*   ResponseBytes ::=       SEQUENCE { *       responseType   OBJECT IDENTIFIER, *       response       OCTET STRING } */typedef struct ocsp_resp_bytes_st	{	ASN1_OBJECT *responseType;	ASN1_OCTET_STRING *response;	} OCSP_RESPBYTES;/*   OCSPResponse ::= SEQUENCE { *      responseStatus         OCSPResponseStatus, *      responseBytes          [0] EXPLICIT ResponseBytes OPTIONAL } */typedef struct ocsp_response_st	{	ASN1_ENUMERATED *responseStatus;	OCSP_RESPBYTES  *responseBytes;	} OCSP_RESPONSE;/*   ResponderID ::= CHOICE { *      byName   [1] Name, *      byKey    [2] KeyHash } */#define V_OCSP_RESPID_NAME 0#define V_OCSP_RESPID_KEY  1typedef struct ocsp_responder_id_st	{	int type;	union   {		X509_NAME* byName;        	ASN1_OCTET_STRING *byKey;		} value;	} OCSP_RESPID;/*   KeyHash ::= OCTET STRING --SHA-1 hash of responder's public key *                            --(excluding the tag and length fields) *//*   RevokedInfo ::= SEQUENCE { *       revocationTime              GeneralizedTime, *       revocationReason    [0]     EXPLICIT CRLReason OPTIONAL } */typedef struct ocsp_revoked_info_st	{	ASN1_GENERALIZEDTIME *revocationTime;	ASN1_ENUMERATED *revocationReason;	} OCSP_REVOKEDINFO;/*   CertStatus ::= CHOICE { *       good                [0]     IMPLICIT NULL, *       revoked             [1]     IMPLICIT RevokedInfo, *       unknown             [2]     IMPLICIT UnknownInfo } */#define V_OCSP_CERTSTATUS_GOOD    0#define V_OCSP_CERTSTATUS_REVOKED 1#define V_OCSP_CERTSTATUS_UNKNOWN 2typedef struct ocsp_cert_status_st	{	int type;	union	{		ASN1_NULL *good;		OCSP_REVOKEDINFO *revoked;		ASN1_NULL *unknown;		} value;	} OCSP_CERTSTATUS;/*   SingleResponse ::= SEQUENCE { *      certID                       CertID, *      certStatus                   CertStatus, *      thisUpdate                   GeneralizedTime, *      nextUpdate           [0]     EXPLICIT GeneralizedTime OPTIONAL, *      singleExtensions     [1]     EXPLICIT Extensions OPTIONAL } */typedef struct ocsp_single_response_st	{	OCSP_CERTID *certId;	OCSP_CERTSTATUS *certStatus;	ASN1_GENERALIZEDTIME *thisUpdate;	ASN1_GENERALIZEDTIME *nextUpdate;	STACK_OF(X509_EXTENSION) *singleExtensions;	} OCSP_SINGLERESP;DECLARE_STACK_OF(OCSP_SINGLERESP)DECLARE_ASN1_SET_OF(OCSP_SINGLERESP)/*   ResponseData ::= SEQUENCE { *      version              [0] EXPLICIT Version DEFAULT v1, *      responderID              ResponderID, *      producedAt               GeneralizedTime, *      responses                SEQUENCE OF SingleResponse, *      responseExtensions   [1] EXPLICIT Extensions OPTIONAL } */typedef struct ocsp_response_data_st	{	ASN1_INTEGER *version;	OCSP_RESPID  *responderId;	ASN1_GENERALIZEDTIME *producedAt;	STACK_OF(OCSP_SINGLERESP) *responses;	STACK_OF(X509_EXTENSION) *responseExtensions;	} OCSP_RESPDATA;/*   BasicOCSPResponse       ::= SEQUENCE { *      tbsResponseData      ResponseData, *      signatureAlgorithm   AlgorithmIdentifier, *      signature            BIT STRING, *      certs                [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } */  /* Note 1:     The value for "signature" is specified in the OCSP rfc2560 as follows:     "The value for the signature SHALL be computed on the hash of the DER     encoding ResponseData."  This means that you must hash the DER-encoded     tbsResponseData, and then run it through a crypto-signing function, which     will (at least w/RSA) do a hash-'n'-private-encrypt operation.  This seems     a bit odd, but that's the spec.  Also note that the data structures do not     leave anywhere to independently specify the algorithm used for the initial     hash. So, we look at the signature-specification algorithm, and try to do     something intelligent.	-- Kathy Weinhold, CertCo */  /* Note 2:     It seems that the mentioned passage from RFC 2560 (section 4.2.1) is open     for interpretation.  I've done tests against another responder, and found     that it doesn't do the double hashing that the RFC seems to say one     should.  Therefore, all relevant functions take a flag saying which     variant should be used.	-- Richard Levitte, OpenSSL team and CeloCom */typedef struct ocsp_basic_response_st	{	OCSP_RESPDATA *tbsResponseData;	X509_ALGOR *signatureAlgorithm;	ASN1_BIT_STRING *signature;	STACK_OF(X509) *certs;	} OCSP_BASICRESP;/* *   CRLReason ::= ENUMERATED { *        unspecified             (0), *        keyCompromise           (1), *        cACompromise            (2),

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩中文字幕av电影| 欧美情侣在线播放| 国产精品美女久久久久久久久 | 日本欧美在线观看| 日韩视频在线一区二区| 国产在线精品免费| 亚洲日本在线天堂| 亚洲在线视频一区| 国产精品乱码一区二区三区软件| 日韩免费视频线观看| 国产乱妇无码大片在线观看| 亚洲精品久久7777| 久久久影院官网| 91精品蜜臀在线一区尤物| 91在线观看地址| 蜜臀av一级做a爰片久久| 91黄色激情网站| 韩国成人在线视频| 日韩中文字幕一区二区三区| 一个色综合网站| 国产精品视频在线看| 2021久久国产精品不只是精品| 国产欧美精品在线观看| 国产精品99久久久久久久vr | 美女国产一区二区三区| 一区二区欧美在线观看| 在线观看91精品国产入口| 久久久亚洲国产美女国产盗摄 | 日本美女视频一区二区| 欧美电影一区二区三区| 视频一区免费在线观看| 亚洲午夜久久久久| 一区二区三区欧美在线观看| 精品国产一区二区三区久久影院| 日本一区二区三区电影| 欧美国产激情一区二区三区蜜月| 亚洲精品成人悠悠色影视| 亚洲三级电影全部在线观看高清| 中文字幕亚洲在| 精品国产麻豆免费人成网站| 亚洲欧美另类图片小说| 亚洲视频免费在线| 亚洲国产美女搞黄色| 在线观看一区日韩| 91蝌蚪porny成人天涯| 国产精品自在在线| av欧美精品.com| 色综合久久88色综合天天 | 日韩精品一区二区三区四区| 老司机精品视频线观看86| 天天操天天干天天综合网| 麻豆一区二区三| 韩国欧美国产一区| 亚洲成va人在线观看| 奇米影视7777精品一区二区| 国产午夜精品福利| 国产亚洲欧洲997久久综合| 国产欧美一区在线| 综合激情网...| 亚洲成人www| 午夜电影一区二区三区| 国产又黄又大久久| 成人一区在线看| 成人avav影音| 欧美日本精品一区二区三区| 久久久精品综合| 久久久综合激的五月天| 国内精品不卡在线| 91美女精品福利| 欧美日韩一区二区在线观看视频 | 日韩欧美的一区二区| 成人h精品动漫一区二区三区| 欧美xingq一区二区| 成人av免费在线播放| 成人av电影在线观看| 欧美久久一二三四区| 中文字幕的久久| 午夜av区久久| 9191久久久久久久久久久| 国产精品久久久久四虎| 免费人成精品欧美精品| 一区二区三区.www| 成人免费视频一区二区| av中文字幕亚洲| 精品日韩一区二区| 亚洲一二三区在线观看| 国产成人免费9x9x人网站视频| 粉嫩嫩av羞羞动漫久久久| 日韩一区国产二区欧美三区| 蜜桃久久av一区| 日韩三级视频中文字幕| 亚洲午夜激情av| 在线观看av不卡| 《视频一区视频二区| 久久99久久久久久久久久久| 欧美三区在线观看| 91浏览器打开| 国产精品色噜噜| 狠狠色丁香婷综合久久| 欧美人妖巨大在线| 国产精品不卡在线| 亚洲aⅴ怡春院| www国产亚洲精品久久麻豆| 亚洲国产人成综合网站| 在线一区二区三区做爰视频网站| 久久久不卡影院| 国产美女在线观看一区| 久久一区二区三区四区| 午夜精品久久久久久久久久久| 精品美女被调教视频大全网站| 日韩国产欧美在线观看| 亚洲激情一二三区| 欧美视频一区二区在线观看| 一区av在线播放| 色老综合老女人久久久| 午夜国产精品一区| 日韩免费成人网| 狠狠狠色丁香婷婷综合激情| 国产黄色精品视频| 成人性色生活片| 亚洲精品乱码久久久久久久久| 一本一道波多野结衣一区二区 | 成人的网站免费观看| 成人欧美一区二区三区黑人麻豆| 国产精品欧美久久久久一区二区| 国产精品成人免费在线| caoporn国产一区二区| 成人sese在线| 日本伊人午夜精品| 精品久久久久香蕉网| 国产麻豆91精品| 久久先锋影音av鲁色资源网| 日韩伦理电影网| 在线成人午夜影院| 国产不卡高清在线观看视频| 欧美高清在线精品一区| 日本韩国精品在线| 精品影视av免费| 久久精品一二三| 欧美午夜电影网| 亚洲综合久久久久| 精品国产伦一区二区三区观看方式| 国产成人啪午夜精品网站男同| 自拍av一区二区三区| 欧美一区国产二区| 亚洲色图色小说| 欧美一二三区在线观看| 日韩区在线观看| 亚洲日本在线天堂| 国产精品1区2区3区在线观看| 欧美日韩日日夜夜| 亚洲欧美欧美一区二区三区| 成人美女视频在线观看18| 欧美一级一区二区| 亚洲 欧美综合在线网络| 欧美亚洲综合在线| 亚洲激情六月丁香| 91免费国产视频网站| 国产精品国产三级国产三级人妇 | 欧洲精品在线观看| 中文字幕一区二区三区精华液| 国产福利一区二区三区| 欧美r级电影在线观看| 蜜桃在线一区二区三区| 91精品国产欧美一区二区成人| 五月天丁香久久| 91麻豆精品国产91| 日本成人在线网站| 日韩欧美另类在线| 久久国产欧美日韩精品| 久久婷婷国产综合国色天香| 国产一区二区在线观看视频| 久久久精品天堂| 国产精品一区二区男女羞羞无遮挡| 精品成人免费观看| 国产精品一区二区不卡| 国产精品视频免费| 欧美在线不卡一区| 午夜亚洲福利老司机| 91精选在线观看| 韩国理伦片一区二区三区在线播放| 欧美精品一区二区三区蜜桃视频| 国产综合色视频| 中文字幕乱码久久午夜不卡| 99久久er热在这里只有精品66| 亚洲男人的天堂在线观看| 欧美亚洲一区三区| 久久精品国产在热久久| 国产日韩亚洲欧美综合| 91免费国产在线| 日本不卡一二三区黄网| 久久久久久影视| 91论坛在线播放| 日本不卡高清视频| 精品国产区一区| 91一区在线观看| 男女视频一区二区| 中文av一区二区| 欧美精品久久久久久久久老牛影院| 久久99热99|