亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? tls.h

?? hostapd源代碼
?? H
?? 第 1 頁 / 共 2 頁
字號:
/* * WPA Supplicant / SSL/TLS interface definition * Copyright (c) 2004-2006, Jouni Malinen <jkmaline@cc.hut.fi> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. * * Alternatively, this software may be distributed under the terms of BSD * license. * * See README and COPYING for more details. */#ifndef TLS_H#define TLS_Hstruct tls_connection;struct tls_keys {	const u8 *master_key; /* TLS master secret */	size_t master_key_len;	const u8 *client_random;	size_t client_random_len;	const u8 *server_random;	size_t server_random_len;	const u8 *inner_secret; /* TLS/IA inner secret */	size_t inner_secret_len;};struct tls_config {	const char *opensc_engine_path;	const char *pkcs11_engine_path;	const char *pkcs11_module_path;};/** * struct tls_connection_params - Parameters for TLS connection * @ca_cert: File or reference name for CA X.509 certificate in PEM or DER * format * @ca_cert_blob: ca_cert as inlined data or %NULL if not used * @ca_cert_blob_len: ca_cert_blob length * @ca_path: Path to CA certificates (OpenSSL specific) * @subject_match: String to match in the subject of the peer certificate or * %NULL to allow all subjects * @altsubject_match: String to match in the alternative subject of the peer * certificate or %NULL to allow all alternative subjects * @client_cert: File or reference name for client X.509 certificate in PEM or * DER format * @client_cert_blob: client_cert as inlined data or %NULL if not used * @client_cert_blob_len: client_cert_blob length * @private_key: File or reference name for client private key in PEM or DER * format (traditional format (RSA PRIVATE KEY) or PKCS#8 (PRIVATE KEY) * @private_key_blob: private_key as inlined data or %NULL if not used * @private_key_blob_len: private_key_blob length * @private_key_passwd: Passphrase for decrypted private key, %NULL if no * passphrase is used. * @dh_file: File name for DH/DSA data in PEM format, or %NULL if not used * @dh_blob: dh_file as inlined data or %NULL if not used * @dh_blob_len: dh_blob length * @engine: 1 = use engine (e.g., a smartcard) for private key operations * (this is OpenSSL specific for now) * @engine_id: engine id string (this is OpenSSL specific for now) * @ppin: pointer to the pin variable in the configuration * (this is OpenSSL specific for now) * @key_id: the private key's key id (this is OpenSSL specific for now) * @tls_ia: Whether to enable TLS/IA (for EAP-TTLSv1) * * TLS connection parameters to be configured with tls_connection_set_params() * and tls_global_set_params(). * * Certificates and private key can be configured either as a reference name * (file path or reference to certificate store) or by providing the same data * as a pointer to the data in memory. Only one option will be used for each * field. */struct tls_connection_params {	const char *ca_cert;	const u8 *ca_cert_blob;	size_t ca_cert_blob_len;	const char *ca_path;	const char *subject_match;	const char *altsubject_match;	const char *client_cert;	const u8 *client_cert_blob;	size_t client_cert_blob_len;	const char *private_key;	const u8 *private_key_blob;	size_t private_key_blob_len;	const char *private_key_passwd;	const char *dh_file;	const u8 *dh_blob;	size_t dh_blob_len;	int tls_ia;	/* OpenSSL specific variables */	int engine;	const char *engine_id;	const char *pin;	const char *key_id;};/** * tls_init - Initialize TLS library * @conf: Configuration data for TLS library * Returns: Context data to be used as tls_ctx in calls to other functions, * or %NULL on failure. * * Called once during program startup and once for each RSN pre-authentication * session. In other words, there can be two concurrent TLS contexts. If global * library initialization is needed (i.e., one that is shared between both * authentication types), the TLS library wrapper should maintain a reference * counter and do global initialization only when moving from 0 to 1 reference. */void * tls_init(const struct tls_config *conf);/** * tls_deinit - Deinitialize TLS library * @tls_ctx: TLS context data from tls_init() * * Called once during program shutdown and once for each RSN pre-authentication * session. If global library deinitialization is needed (i.e., one that is * shared between both authentication types), the TLS library wrapper should * maintain a reference counter and do global deinitialization only when moving * from 1 to 0 references. */void tls_deinit(void *tls_ctx);/** * tls_get_errors - Process pending errors * @tls_ctx: TLS context data from tls_init() * * Returns: Number of found error, 0 if no errors detected. * * Process all pending TLS errors. */int tls_get_errors(void *tls_ctx);/** * tls_connection_init - Initialize a new TLS connection * @tls_ctx: TLS context data from tls_init() * * Returns: Connection context data, conn for other function calls */struct tls_connection * tls_connection_init(void *tls_ctx);/** * tls_connection_deinit - Free TLS connection data * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * * Release all resources allocated for TLS connection. */void tls_connection_deinit(void *tls_ctx, struct tls_connection *conn);/** * tls_connection_established - Has the TLS connection been completed? * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * * Returns: 1 if TLS connection has been completed, 0 if not. */int tls_connection_established(void *tls_ctx, struct tls_connection *conn);/** * tls_connection_shutdown - Shutdown TLS connection data. * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * * Returns: 0 on success, -1 on failure * * Shutdown current TLS connection without releasing all resources. New * connection can be started by using the same conn without having to call * tls_connection_init() or setting certificates etc. again. The new * connection should try to use session resumption. */int tls_connection_shutdown(void *tls_ctx, struct tls_connection *conn);enum {	TLS_SET_PARAMS_ENGINE_PRV_VERIFY_FAILED = -3,	TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED = -2};/** * tls_connection_set_params - Set TLS connection parameters * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * @params: Connection parameters * * Returns: 0 on success, -1 on failure, * TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED (-2) on possible PIN error causing * PKCS#11 engine failure, or * TLS_SET_PARAMS_ENGINE_PRV_VERIFY_FAILED (-3) on failure to verify the * PKCS#11 engine private key. */int tls_connection_set_params(void *tls_ctx, struct tls_connection *conn,			      const struct tls_connection_params *params);/** * tls_global_set_params - Set TLS parameters for all TLS connection * @tls_ctx: TLS context data from tls_init() * @params: Global TLS parameters * Returns: 0 on success, -1 on failure, * TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED (-2) on possible PIN error causing * PKCS#11 engine failure, or * TLS_SET_PARAMS_ENGINE_PRV_VERIFY_FAILED (-3) on failure to verify the * PKCS#11 engine private key. */int tls_global_set_params(void *tls_ctx,			  const struct tls_connection_params *params);/** * tls_global_set_verify - Set global certificate verification options * @tls_ctx: TLS context data from tls_init() * @check_crl: 0 = do not verify CRLs, 1 = verify CRL for the user certificate, * 2 = verify CRL for all certificates * * Returns: 0 on success, -1 on failure */int tls_global_set_verify(void *tls_ctx, int check_crl);/** * tls_connection_set_verify - Set certificate verification options * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * @verify_peer: 1 = verify peer certificate * * Returns: 0 on success, -1 on failure */int tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn,			      int verify_peer);/** * tls_connection_set_ia - Set TLS/IA parameters * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * @tls_ia: 1 = enable TLS/IA * Returns: 0 on success, -1 on failure * * This function is used to configure TLS/IA in server mode where * tls_connection_set_params() is not used. */int tls_connection_set_ia(void *tls_ctx, struct tls_connection *conn,			  int tls_ia);/** * tls_connection_get_keys - Get master key and random data from TLS connection * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * @keys: Structure of key/random data (filled on success) * * Returns: 0 on success, -1 on failure */int tls_connection_get_keys(void *tls_ctx, struct tls_connection *conn,			    struct tls_keys *keys);/** * tls_connection_prf - Use TLS-PRF to derive keying material * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * @label: Label (e.g., description of the key) for PRF * @server_random_first: seed is 0 = client_random|server_random, * 1 = server_random|client_random

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲色图制服诱惑 | 国产日韩v精品一区二区| 国产精品久久久久久久久快鸭| 亚洲国产精品一区二区www在线| 久草热8精品视频在线观看| 91色综合久久久久婷婷| 亚洲精品在线电影| 无吗不卡中文字幕| 91蝌蚪国产九色| 国产亚洲欧美日韩日本| 日韩av电影天堂| 91福利国产精品| 成人免费在线观看入口| 国产精品一色哟哟哟| 欧美一区二区日韩| 亚洲福利电影网| 欧美丝袜自拍制服另类| 亚洲人成7777| 99re成人精品视频| 欧美国产日韩亚洲一区| 国产精品夜夜嗨| 久久久不卡网国产精品二区| 蜜乳av一区二区| 91精品国产综合久久久蜜臀粉嫩| 一区二区三区电影在线播| 9久草视频在线视频精品| 国产女同性恋一区二区| 成人午夜激情影院| 中文字幕免费观看一区| 国产成a人无v码亚洲福利| 久久久综合视频| 国产成人精品综合在线观看| 国产精品沙发午睡系列990531| 国产精品一级在线| 国产欧美一区视频| 丁香婷婷综合激情五月色| 亚洲国产岛国毛片在线| 成人免费三级在线| 亚洲精品乱码久久久久久黑人 | 欧美性做爰猛烈叫床潮| 亚洲一级电影视频| 欧美一区二区三区免费观看视频| 日韩精品一级二级| 日韩欧美一级片| 国产精品一二二区| 中文字幕亚洲区| 欧美影视一区二区三区| 天天做天天摸天天爽国产一区| 欧美伦理视频网站| 国产在线看一区| 国产农村妇女毛片精品久久麻豆| 97精品超碰一区二区三区| 亚洲中国最大av网站| 欧美精品vⅰdeose4hd| 久久成人免费电影| 国产精品久久看| 欧美三区在线观看| 韩国在线一区二区| 亚洲天堂2014| 欧美电影免费观看高清完整版| 国产黑丝在线一区二区三区| 国产精品国产三级国产| 777午夜精品免费视频| 国产在线一区观看| 亚洲激情六月丁香| 欧美不卡激情三级在线观看| 99久久综合色| 久久精品国产免费看久久精品| 国产精品日产欧美久久久久| 欧美日韩1234| k8久久久一区二区三区 | 成人影视亚洲图片在线| 亚洲图片你懂的| 欧美成人精品二区三区99精品| 成人午夜精品在线| 免费成人在线观看视频| 中文在线一区二区 | 另类小说欧美激情| 亚洲婷婷综合久久一本伊一区| 日韩视频在线一区二区| 99精品欧美一区二区三区综合在线| 日韩主播视频在线| 亚洲精品视频在线看| 国产婷婷一区二区| 5566中文字幕一区二区电影| 99久久婷婷国产综合精品| 久久精品国产秦先生| 亚洲18色成人| 亚洲激情男女视频| 亚洲欧洲日产国产综合网| 26uuu亚洲| 欧美一区二区三区日韩视频| 色婷婷av一区二区| av在线一区二区三区| 国产制服丝袜一区| 久久99精品一区二区三区| 亚洲成av人片一区二区三区 | 色噜噜偷拍精品综合在线| 极品瑜伽女神91| 另类调教123区| 日韩国产欧美三级| 亚洲第一福利一区| 亚洲综合图片区| 亚洲一区在线观看免费观看电影高清| 中文字幕精品一区二区精品绿巨人 | 色婷婷亚洲精品| av不卡免费电影| eeuss鲁片一区二区三区在线看| 国产九色sp调教91| 国产精品一二二区| 成人午夜精品在线| av资源网一区| 色国产精品一区在线观看| 91美女在线观看| 色婷婷激情一区二区三区| 日本韩国一区二区三区| 欧美在线视频你懂得| 欧美性一区二区| 91精品国产手机| 日韩色视频在线观看| 欧美变态凌虐bdsm| 国产日产欧产精品推荐色 | 97精品电影院| 91久久一区二区| 欧美日韩国产a| 91精品国产麻豆| 欧美精品一区二区久久久| 久久亚洲综合av| 中文字幕一区二区三区不卡在线 | 欧美日韩国产三级| 日韩一区二区三区四区| 精品国产污网站| 国产精品久久久久aaaa| 樱桃国产成人精品视频| 午夜精品影院在线观看| 美女久久久精品| 不卡一区在线观看| 欧美综合色免费| 日韩精品中文字幕在线一区| 国产欧美日韩精品一区| 一级中文字幕一区二区| 蜜桃视频在线观看一区| 国产精品99久| 日本高清无吗v一区| 欧美一级欧美三级| 亚洲国产精品高清| 亚洲高清视频在线| 国产一区二区三区日韩 | 亚洲国产成人av网| 国产一区二区三区国产| 色狠狠av一区二区三区| 日韩精品一区国产麻豆| 日韩伦理免费电影| 久久精品国产99国产精品| 国产91露脸合集magnet | 日本在线不卡视频| 成人av动漫网站| 日韩一区二区三区在线观看| 亚洲天堂精品在线观看| 麻豆久久久久久| 色综合天天做天天爱| 日韩精品自拍偷拍| 亚洲国产精品久久人人爱蜜臀| 福利91精品一区二区三区| 欧美猛男超大videosgay| 国产欧美日韩在线| 毛片不卡一区二区| 欧美日韩国产成人在线91| 一色屋精品亚洲香蕉网站| 蜜桃视频在线观看一区| 欧美影院精品一区| 国产精品蜜臀av| 国产一区二区三区在线观看精品| 欧美日韩视频在线观看一区二区三区| 欧美国产日本视频| 国产在线不卡一区| 欧美一区二区三区的| 亚洲一区二区三区四区五区中文| 成人美女在线观看| 久久亚洲精精品中文字幕早川悠里| 夜夜操天天操亚洲| 色一区在线观看| 亚洲男人电影天堂| 成人美女在线观看| 国产丝袜欧美中文另类| 狠狠色丁香久久婷婷综合_中| 91精品国产入口| 亚洲va国产va欧美va观看| 欧美中文字幕一区二区三区亚洲| 最新高清无码专区| 99久久精品国产麻豆演员表| 欧美国产视频在线| 成人深夜在线观看| 国产精品久久久久久久久快鸭| 成人永久免费视频| 中文文精品字幕一区二区| 国产不卡一区视频| 中文字幕国产一区二区| 成人va在线观看| 亚洲欧美激情在线|