亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? tls.h

?? hostapd源代碼
?? H
?? 第 1 頁 / 共 2 頁
字號:
 * @out: Buffer for output data from TLS-PRF * @out_len: Length of the output buffer * Returns: 0 on success, -1 on failure * * This function is optional to implement if tls_connection_get_keys() provides * access to master secret and server/client random values. If these values are * not exported from the TLS library, tls_connection_prf() is required so that * further keying material can be derived from the master secret. If not * implemented, the function will still need to be defined, but it can just * return -1. Example implementation of this function is in tls_prf() function * when it is called with seed set to client_random|server_random (or * server_random|client_random). */int tls_connection_prf(void *tls_ctx, struct tls_connection *conn,		       const char *label, int server_random_first,		       u8 *out, size_t out_len);/** * tls_connection_handshake - Process TLS handshake (client side) * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * @in_data: Input data from TLS peer * @in_len: Input data length * @out_len: Length of the output buffer. * * Returns: Pointer to output data, %NULL on failure * * Caller is responsible for freeing returned output data. * * This function is used during TLS handshake. The first call is done with * in_data == %NULL and the library is expected to return ClientHello packet. * This packet is then send to the server and a response from server is given * to TLS library by calling this function again with in_data pointing to the * TLS message from the server. * * If the TLS handshake fails, this function may return %NULL. However, if the * TLS library has a TLS alert to send out, that should be returned as the * output data. In this case, tls_connection_get_failed() must return failure * (> 0). * * tls_connection_established() should return 1 once the TLS handshake has been * completed successfully. */u8 * tls_connection_handshake(void *tls_ctx, struct tls_connection *conn,			      const u8 *in_data, size_t in_len,			      size_t *out_len);/** * tls_connection_server_handshake - Process TLS handshake (server side) * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * @in_data: Input data from TLS peer * @in_len: Input data length * @out_len: Length of the output buffer. * * Returns: pointer to output data, %NULL on failure * * Caller is responsible for freeing returned output data. */u8 * tls_connection_server_handshake(void *tls_ctx,				     struct tls_connection *conn,				     const u8 *in_data, size_t in_len,				     size_t *out_len);/** * tls_connection_encrypt - Encrypt data into TLS tunnel * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * @in_data: Pointer to plaintext data to be encrypted * @in_len: Input buffer length * @out_data: Pointer to output buffer (encrypted TLS data) * @out_len: Maximum out_data length  * * Returns: Number of bytes written to out_data, -1 on failure * * This function is used after TLS handshake has been completed successfully to * send data in the encrypted tunnel. */int tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn,			   const u8 *in_data, size_t in_len,			   u8 *out_data, size_t out_len);/** * tls_connection_decrypt - Decrypt data from TLS tunnel * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * @in_data: Pointer to input buffer (encrypted TLS data) * @in_len: Input buffer length * @out_data: Pointer to output buffer (decrypted data from TLS tunnel) * @out_len: Maximum out_data length * * Returns: Number of bytes written to out_data, -1 on failure * * This function is used after TLS handshake has been completed successfully to * receive data from the encrypted tunnel. */int tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn,			   const u8 *in_data, size_t in_len,			   u8 *out_data, size_t out_len);/** * tls_connection_resumed - Was session resumption used * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * * Returns: 1 if current session used session resumption, 0 if not */int tls_connection_resumed(void *tls_ctx, struct tls_connection *conn);/** * tls_connection_set_master_key - Configure master secret for TLS connection * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * @key: TLS pre-master-secret * @key_len: length of key in bytes * * Returns: 0 on success, -1 on failure */int tls_connection_set_master_key(void *tls_ctx, struct tls_connection *conn,				  const u8 *key, size_t key_len);/** * tls_connection_set_anon_dh - Configure TLS connection to use anonymous DH * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * * Returns: 0 on success, -1 on failure * * TODO: consider changing this to more generic routine for configuring allowed * ciphers */int tls_connection_set_anon_dh(void *tls_ctx, struct tls_connection *conn);/** * tls_get_cipher - Get current cipher name * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * @buf: Buffer for the cipher name * @buflen: buf size * * Returns: 0 on success, -1 on failure * * Get the name of the currently used cipher. */int tls_get_cipher(void *tls_ctx, struct tls_connection *conn,		   char *buf, size_t buflen);/** * tls_connection_enable_workaround - Enable TLS workaround options * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * * Returns: 0 on success, -1 on failure * * This function is used to enable connection-specific workaround options for * buffer SSL/TLS implementations. */int tls_connection_enable_workaround(void *tls_ctx,				     struct tls_connection *conn);/** * tls_connection_client_hello_ext - Set TLS extension for ClientHello * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * @ext_type: Extension type * @data: Extension payload (NULL to remove extension) * @data_len: Extension payload length * * Returns: 0 on success, -1 on failure */int tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn,				    int ext_type, const u8 *data,				    size_t data_len);/** * tls_connection_get_failed - Get connection failure status * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * * Returns >0 if connection has failed, 0 if not. */int tls_connection_get_failed(void *tls_ctx, struct tls_connection *conn);/** * tls_connection_get_read_alerts - Get connection read alert status * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * * Returns: Number of times a fatal read (remote end reported error) has * happened during this connection. */int tls_connection_get_read_alerts(void *tls_ctx, struct tls_connection *conn);/** * tls_connection_get_write_alerts - Get connection write alert status * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * * Returns: Number of times a fatal write (locally detected error) has happened * during this connection. */int tls_connection_get_write_alerts(void *tls_ctx,				    struct tls_connection *conn);/** * tls_connection_get_keyblock_size - Get TLS key_block size * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * Returns: Size of the key_block for the negotiated cipher suite or -1 on * failure */int tls_connection_get_keyblock_size(void *tls_ctx,				     struct tls_connection *conn);#define TLS_CAPABILITY_IA 0x0001 /* TLS Inner Application (TLS/IA) *//** * tls_capabilities - Get supported TLS capabilities * @tls_ctx: TLS context data from tls_init() * Returns: Bit field of supported TLS capabilities (TLS_CAPABILITY_*) */unsigned int tls_capabilities(void *tls_ctx);/** * tls_connection_ia_send_phase_finished - Send a TLS/IA PhaseFinished message * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * @final: 1 = FinalPhaseFinished, 0 = IntermediatePhaseFinished * @out_data: Pointer to output buffer (encrypted TLS/IA data) * @out_len: Maximum out_data length  * Returns: Number of bytes written to out_data on success, -1 on failure * * This function is used to send the TLS/IA end phase message, e.g., when the * EAP server completes EAP-TTLSv1. */int tls_connection_ia_send_phase_finished(void *tls_ctx,					  struct tls_connection *conn,					  int final,					  u8 *out_data, size_t out_len);/** * tls_connection_ia_final_phase_finished - Has final phase been completed * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * Returns: 1 if valid FinalPhaseFinished has been received, 0 if not, or -1 * on failure */int tls_connection_ia_final_phase_finished(void *tls_ctx,					   struct tls_connection *conn);/** * tls_connection_ia_permute_inner_secret - Permute TLS/IA inner secret * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * @key: Session key material (session_key vectors with 2-octet length), or * %NULL if no session key was generating in the current phase * @key_len: Length of session key material * Returns: 0 on success, -1 on failure */int tls_connection_ia_permute_inner_secret(void *tls_ctx,					   struct tls_connection *conn,					   const u8 *key, size_t key_len);#endif /* TLS_H */

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
精品国产伦一区二区三区观看体验| 国产精品午夜在线| 久久精品国产色蜜蜜麻豆| 日韩美女天天操| 国产ts人妖一区二区| 国产精品久久久久久福利一牛影视| 国产永久精品大片wwwapp| 欧美精品一区二区三区蜜桃视频 | 97精品久久久久中文字幕| 一区二区三区久久久| 日韩视频免费直播| 不卡的av电影| 午夜欧美2019年伦理| 26uuu亚洲综合色| 不卡视频免费播放| 免费观看30秒视频久久| 国产精品传媒视频| 久久人人97超碰com| 国产成人免费视频精品含羞草妖精| 一色屋精品亚洲香蕉网站| 欧美日韩不卡一区二区| 国产成人av自拍| 亚洲成a人在线观看| 精品电影一区二区三区 | 久久国产麻豆精品| 亚洲精品国产视频| 久久久久久亚洲综合| 欧美三电影在线| av不卡在线播放| 久久精品国内一区二区三区| 专区另类欧美日韩| 国产欧美日韩另类视频免费观看| 欧美欧美午夜aⅴ在线观看| 成人av免费在线| 丁香婷婷综合网| 国产真实乱对白精彩久久| 日韩在线播放一区二区| 亚洲综合激情另类小说区| 中文字幕中文字幕中文字幕亚洲无线 | 久久久精品欧美丰满| 日韩一区二区三区在线观看 | 日本久久精品电影| 95精品视频在线| www.欧美精品一二区| 国产成人免费在线观看| 国产精品综合网| 国产精品亚洲第一| 成人综合在线网站| 色综合久久天天| 欧美日韩在线播| 日韩欧美电影一区| 久久久噜噜噜久久中文字幕色伊伊 | 欧美日韩三级视频| 欧美一区二区三区四区高清| 555www色欧美视频| 久久天堂av综合合色蜜桃网| 欧美激情一区不卡| 亚洲一区视频在线| 麻豆高清免费国产一区| 成人免费不卡视频| 欧美日韩一二三区| 久久精品人人做人人综合| 亚洲精品视频免费看| 亚洲超碰精品一区二区| 国产美女视频一区| 欧美日韩一区二区在线观看视频| 欧美精品一区二区三| 亚洲免费观看高清在线观看| 精品一区在线看| 欧美三级日韩三级国产三级| 国产亚洲精品bt天堂精选| 亚洲一区免费观看| 成人一级片网址| 日韩无一区二区| 亚洲超碰精品一区二区| 成人深夜视频在线观看| 日韩无一区二区| 亚洲va在线va天堂| 国产91高潮流白浆在线麻豆 | 91麻豆精东视频| 欧美国产精品劲爆| 久久福利资源站| 日韩免费在线观看| 天堂资源在线中文精品| 色综合久久88色综合天天| 国产精品日韩成人| 成人午夜电影久久影院| wwwwww.欧美系列| 狠狠色丁香久久婷婷综| 91精品国产aⅴ一区二区| 亚洲一区二区三区影院| 在线视频国产一区| 亚洲综合另类小说| 91精品午夜视频| 美日韩一区二区| 久久久午夜精品理论片中文字幕| 韩国v欧美v日本v亚洲v| 久久亚洲捆绑美女| 国产一区二区主播在线| 中文字幕一区免费在线观看| 99视频精品全部免费在线| 亚洲码国产岛国毛片在线| 在线观看日韩av先锋影音电影院| 一区二区三区不卡在线观看| 欧美情侣在线播放| 国产成人在线看| 亚洲精品欧美激情| 日韩三级视频在线看| 欧美日韩午夜精品| 理论电影国产精品| 亚洲啪啪综合av一区二区三区| 欧美无人高清视频在线观看| 日产精品久久久久久久性色| 欧美激情一区二区三区| 欧美一区二区三区在线电影| 国产乱码一区二区三区| 亚洲精品亚洲人成人网在线播放| 日韩欧美一区中文| 色吊一区二区三区| 高清国产一区二区三区| 日韩和欧美一区二区三区| 一色桃子久久精品亚洲| 精品日韩一区二区三区| 在线免费观看日本欧美| 成人一区二区视频| 538prom精品视频线放| 中文字幕亚洲不卡| 日韩一区二区三区在线| 欧美午夜精品一区| 91美女精品福利| 成人午夜免费视频| 久久99久久99小草精品免视看| 亚洲综合男人的天堂| 国产精品传媒在线| 国产精品嫩草影院av蜜臀| 精品少妇一区二区三区| 久久综合给合久久狠狠狠97色69| 色婷婷久久99综合精品jk白丝| 成人av免费在线观看| 国产成都精品91一区二区三| 国产麻豆一精品一av一免费 | caoporm超碰国产精品| 成人精品国产免费网站| 丁香激情综合国产| 99视频热这里只有精品免费| 99久久久久久99| 在线观看免费一区| 欧美日本一区二区三区| 日韩美女视频在线| 久久久综合九色合综国产精品| 欧美精品一区二区三区四区| 国产婷婷色一区二区三区在线| 国产日韩欧美亚洲| 亚洲伦理在线精品| 青青青爽久久午夜综合久久午夜| 蜜桃av噜噜一区| 国产suv精品一区二区6| 成人99免费视频| 欧美老女人第四色| 国产欧美一区二区精品秋霞影院 | 精品视频免费在线| www久久久久| 亚洲综合色婷婷| 九九热在线视频观看这里只有精品| 国产凹凸在线观看一区二区| 欧美亚洲国产一区在线观看网站| 91精品国产综合久久国产大片| 欧美精品一区二区久久婷婷| 成人欧美一区二区三区1314| 久久国产剧场电影| 色一情一乱一乱一91av| 亚洲va欧美va人人爽午夜| 国产精品一二三四五| 日韩一级二级三级精品视频| 国产精品三级视频| 免费人成网站在线观看欧美高清| 99精品黄色片免费大全| 日韩欧美一级二级三级久久久| 亚洲愉拍自拍另类高清精品| 不卡一区二区三区四区| 久久久精品tv| 国产成人av网站| 26uuu另类欧美亚洲曰本| 日韩精品电影在线| 4438x成人网最大色成网站| 亚洲大片精品永久免费| 欧美性欧美巨大黑白大战| 亚洲女同ⅹxx女同tv| 成人一区二区三区视频在线观看 | 26uuu成人网一区二区三区| 日韩—二三区免费观看av| 色视频一区二区| 午夜欧美视频在线观看| 4438x成人网最大色成网站| 老司机免费视频一区二区| 日韩一区二区在线观看| 国产主播一区二区| 中文字幕不卡在线播放| www.成人在线| 亚洲影视在线观看|