亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? tls.h

?? 最新的Host AP 新添加了許多pcmcia 的驅動
?? H
?? 第 1 頁 / 共 2 頁
字號:
/* * WPA Supplicant / SSL/TLS interface definition * Copyright (c) 2004-2007, Jouni Malinen <j@w1.fi> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. * * Alternatively, this software may be distributed under the terms of BSD * license. * * See README and COPYING for more details. */#ifndef TLS_H#define TLS_Hstruct tls_connection;struct tls_keys {	const u8 *master_key; /* TLS master secret */	size_t master_key_len;	const u8 *client_random;	size_t client_random_len;	const u8 *server_random;	size_t server_random_len;	const u8 *inner_secret; /* TLS/IA inner secret */	size_t inner_secret_len;};struct tls_config {	const char *opensc_engine_path;	const char *pkcs11_engine_path;	const char *pkcs11_module_path;};/** * struct tls_connection_params - Parameters for TLS connection * @ca_cert: File or reference name for CA X.509 certificate in PEM or DER * format * @ca_cert_blob: ca_cert as inlined data or %NULL if not used * @ca_cert_blob_len: ca_cert_blob length * @ca_path: Path to CA certificates (OpenSSL specific) * @subject_match: String to match in the subject of the peer certificate or * %NULL to allow all subjects * @altsubject_match: String to match in the alternative subject of the peer * certificate or %NULL to allow all alternative subjects * @client_cert: File or reference name for client X.509 certificate in PEM or * DER format * @client_cert_blob: client_cert as inlined data or %NULL if not used * @client_cert_blob_len: client_cert_blob length * @private_key: File or reference name for client private key in PEM or DER * format (traditional format (RSA PRIVATE KEY) or PKCS#8 (PRIVATE KEY) * @private_key_blob: private_key as inlined data or %NULL if not used * @private_key_blob_len: private_key_blob length * @private_key_passwd: Passphrase for decrypted private key, %NULL if no * passphrase is used. * @dh_file: File name for DH/DSA data in PEM format, or %NULL if not used * @dh_blob: dh_file as inlined data or %NULL if not used * @dh_blob_len: dh_blob length * @engine: 1 = use engine (e.g., a smartcard) for private key operations * (this is OpenSSL specific for now) * @engine_id: engine id string (this is OpenSSL specific for now) * @ppin: pointer to the pin variable in the configuration * (this is OpenSSL specific for now) * @key_id: the private key's id when using engine (this is OpenSSL * specific for now) * @cert_id: the certificate's id when using engine * @ca_cert_id: the CA certificate's id when using engine * @tls_ia: Whether to enable TLS/IA (for EAP-TTLSv1) * * TLS connection parameters to be configured with tls_connection_set_params() * and tls_global_set_params(). * * Certificates and private key can be configured either as a reference name * (file path or reference to certificate store) or by providing the same data * as a pointer to the data in memory. Only one option will be used for each * field. */struct tls_connection_params {	const char *ca_cert;	const u8 *ca_cert_blob;	size_t ca_cert_blob_len;	const char *ca_path;	const char *subject_match;	const char *altsubject_match;	const char *client_cert;	const u8 *client_cert_blob;	size_t client_cert_blob_len;	const char *private_key;	const u8 *private_key_blob;	size_t private_key_blob_len;	const char *private_key_passwd;	const char *dh_file;	const u8 *dh_blob;	size_t dh_blob_len;	int tls_ia;	/* OpenSSL specific variables */	int engine;	const char *engine_id;	const char *pin;	const char *key_id;	const char *cert_id;	const char *ca_cert_id;};/** * tls_init - Initialize TLS library * @conf: Configuration data for TLS library * Returns: Context data to be used as tls_ctx in calls to other functions, * or %NULL on failure. * * Called once during program startup and once for each RSN pre-authentication * session. In other words, there can be two concurrent TLS contexts. If global * library initialization is needed (i.e., one that is shared between both * authentication types), the TLS library wrapper should maintain a reference * counter and do global initialization only when moving from 0 to 1 reference. */void * tls_init(const struct tls_config *conf);/** * tls_deinit - Deinitialize TLS library * @tls_ctx: TLS context data from tls_init() * * Called once during program shutdown and once for each RSN pre-authentication * session. If global library deinitialization is needed (i.e., one that is * shared between both authentication types), the TLS library wrapper should * maintain a reference counter and do global deinitialization only when moving * from 1 to 0 references. */void tls_deinit(void *tls_ctx);/** * tls_get_errors - Process pending errors * @tls_ctx: TLS context data from tls_init() * Returns: Number of found error, 0 if no errors detected. * * Process all pending TLS errors. */int tls_get_errors(void *tls_ctx);/** * tls_connection_init - Initialize a new TLS connection * @tls_ctx: TLS context data from tls_init() * Returns: Connection context data, conn for other function calls */struct tls_connection * tls_connection_init(void *tls_ctx);/** * tls_connection_deinit - Free TLS connection data * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * * Release all resources allocated for TLS connection. */void tls_connection_deinit(void *tls_ctx, struct tls_connection *conn);/** * tls_connection_established - Has the TLS connection been completed? * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * Returns: 1 if TLS connection has been completed, 0 if not. */int tls_connection_established(void *tls_ctx, struct tls_connection *conn);/** * tls_connection_shutdown - Shutdown TLS connection * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * Returns: 0 on success, -1 on failure * * Shutdown current TLS connection without releasing all resources. New * connection can be started by using the same conn without having to call * tls_connection_init() or setting certificates etc. again. The new * connection should try to use session resumption. */int tls_connection_shutdown(void *tls_ctx, struct tls_connection *conn);enum {	TLS_SET_PARAMS_ENGINE_PRV_VERIFY_FAILED = -3,	TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED = -2};/** * tls_connection_set_params - Set TLS connection parameters * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * @params: Connection parameters * Returns: 0 on success, -1 on failure, * TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED (-2) on possible PIN error causing * PKCS#11 engine failure, or * TLS_SET_PARAMS_ENGINE_PRV_VERIFY_FAILED (-3) on failure to verify the * PKCS#11 engine private key. */int __must_checktls_connection_set_params(void *tls_ctx, struct tls_connection *conn,			  const struct tls_connection_params *params);/** * tls_global_set_params - Set TLS parameters for all TLS connection * @tls_ctx: TLS context data from tls_init() * @params: Global TLS parameters * Returns: 0 on success, -1 on failure, * TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED (-2) on possible PIN error causing * PKCS#11 engine failure, or * TLS_SET_PARAMS_ENGINE_PRV_VERIFY_FAILED (-3) on failure to verify the * PKCS#11 engine private key. */int __must_check tls_global_set_params(	void *tls_ctx, const struct tls_connection_params *params);/** * tls_global_set_verify - Set global certificate verification options * @tls_ctx: TLS context data from tls_init() * @check_crl: 0 = do not verify CRLs, 1 = verify CRL for the user certificate, * 2 = verify CRL for all certificates * Returns: 0 on success, -1 on failure */int __must_check tls_global_set_verify(void *tls_ctx, int check_crl);/** * tls_connection_set_verify - Set certificate verification options * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * @verify_peer: 1 = verify peer certificate * Returns: 0 on success, -1 on failure */int __must_check tls_connection_set_verify(void *tls_ctx,					   struct tls_connection *conn,					   int verify_peer);/** * tls_connection_set_ia - Set TLS/IA parameters * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * @tls_ia: 1 = enable TLS/IA * Returns: 0 on success, -1 on failure * * This function is used to configure TLS/IA in server mode where * tls_connection_set_params() is not used. */int __must_check tls_connection_set_ia(void *tls_ctx,				       struct tls_connection *conn,				       int tls_ia);/** * tls_connection_get_keys - Get master key and random data from TLS connection * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * @keys: Structure of key/random data (filled on success) * Returns: 0 on success, -1 on failure */int __must_check tls_connection_get_keys(void *tls_ctx,					 struct tls_connection *conn,					 struct tls_keys *keys);/** * tls_connection_prf - Use TLS-PRF to derive keying material * @tls_ctx: TLS context data from tls_init() * @conn: Connection context data from tls_connection_init() * @label: Label (e.g., description of the key) for PRF * @server_random_first: seed is 0 = client_random|server_random, * 1 = server_random|client_random * @out: Buffer for output data from TLS-PRF * @out_len: Length of the output buffer

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日本少妇一区二区| 欧美成人免费网站| 一区二区三区四区不卡在线| 99国产精品国产精品毛片| 日韩欧美一级二级三级久久久| 亚洲高清不卡在线| 91麻豆精品国产| 日本中文字幕一区二区视频| 日韩午夜在线观看| 精品无码三级在线观看视频| 精品国产青草久久久久福利| 国产成人精品影视| 亚洲欧美日韩在线播放| 欧美日韩精品三区| 久久99国产精品久久99| 欧美tickling挠脚心丨vk| 成人综合婷婷国产精品久久| 亚洲精品视频在线看| 色婷婷综合久久久中文字幕| 美女脱光内衣内裤视频久久网站| 久久久久综合网| 99久久精品免费| 久久99国内精品| 亚洲成人av中文| 久久综合给合久久狠狠狠97色69| 不卡的av电影| 日本中文字幕一区二区有限公司| 国产精品国产a级| 日韩欧美中文字幕精品| 国产成人免费av在线| 石原莉奈在线亚洲三区| 中文字幕中文在线不卡住| 91精品一区二区三区在线观看| 韩国欧美国产一区| 日韩精品亚洲一区| 亚洲一区二区在线视频| 亚洲少妇30p| 26uuu国产电影一区二区| 精品视频一区 二区 三区| 国产麻豆精品theporn| 精品一区二区免费| 国产一区二区三区最好精华液| 中文字幕一区二区三区在线不卡| 久久久亚洲欧洲日产国码αv| 日韩精品一区二区三区视频| 91免费在线视频观看| 成人黄页在线观看| 94-欧美-setu| 久久99国产精品久久99果冻传媒| 三级久久三级久久| 婷婷中文字幕综合| 爽好久久久欧美精品| 日韩精品国产欧美| 捆绑调教一区二区三区| 成人久久18免费网站麻豆| 久久国产精品无码网站| 久久99热这里只有精品| 国产乱一区二区| 成人午夜免费av| 欧美日韩综合不卡| 日韩女优av电影| 中文无字幕一区二区三区| 亚洲乱码国产乱码精品精98午夜 | 国产成人综合自拍| 91在线你懂得| 欧美性一级生活| 欧美一级免费大片| 中文字幕一区在线观看视频| 亚洲制服欧美中文字幕中文字幕| 亚洲丰满少妇videoshd| 国产成都精品91一区二区三| 欧美日韩中文字幕一区| 欧美一区二区三区公司| 亚洲特黄一级片| 国内不卡的二区三区中文字幕 | 春色校园综合激情亚洲| 欧美一区二区人人喊爽| 国产精品欧美一级免费| 国产精品影视在线观看| 91成人在线免费观看| 日本一区二区视频在线| 一区二区三区影院| 福利一区二区在线| 欧美一三区三区四区免费在线看 | 欧美成人精品高清在线播放| 国产精品久久久久毛片软件| 美女看a上一区| 在线电影一区二区三区| 亚洲已满18点击进入久久| 国产一区999| 亚洲精品一区二区在线观看| 亚洲线精品一区二区三区八戒| 韩国精品久久久| 精品欧美一区二区在线观看| 一区二区激情视频| 在线观看欧美黄色| 亚洲视频免费观看| 一本到不卡精品视频在线观看| 国产欧美日韩在线| 国产高清成人在线| 久久久久久电影| 国产精品1024| 亚洲欧美综合色| 一本久久a久久免费精品不卡| 亚洲一区二区av电影| 欧美理论片在线| 国产精品69毛片高清亚洲| 26uuu国产一区二区三区| 国产精品一卡二| 国产午夜精品一区二区| 99久久精品一区| 亚洲国产精品久久人人爱蜜臀| 欧美二区乱c少妇| 国产伦精品一区二区三区视频青涩| 日韩欧美高清在线| www.日韩av| 激情偷乱视频一区二区三区| 亚洲六月丁香色婷婷综合久久| 日韩欧美国产电影| 91首页免费视频| 婷婷一区二区三区| 中文字幕av资源一区| 日韩欧美高清dvd碟片| 91亚洲精华国产精华精华液| 奇米影视一区二区三区小说| 国产色婷婷亚洲99精品小说| 欧美视频在线播放| 99久久er热在这里只有精品15| 蜜臀av性久久久久蜜臀aⅴ四虎 | 国产99久久久久久免费看农村| 依依成人综合视频| 日本一区二区免费在线| 91精品欧美福利在线观看| 国产黄色精品视频| 久久99九九99精品| 日韩高清国产一区在线| 亚洲激情第一区| 亚洲三级电影网站| 国产精品毛片无遮挡高清| 日韩精品一区二区三区老鸭窝| 欧美色精品天天在线观看视频| 成人综合激情网| 国产精品一品二品| 国产福利一区二区三区| 日本不卡在线视频| 性久久久久久久久久久久| 亚洲少妇中出一区| 亚洲三级电影网站| 综合久久久久久| 亚洲视频一区二区在线| 亚洲综合一二三区| 日韩高清一区在线| 久久99国内精品| 国产高清在线观看免费不卡| 丁香六月综合激情| 99在线精品一区二区三区| 99精品在线免费| 91丨九色丨尤物| 欧美日韩一区高清| 精品欧美乱码久久久久久1区2区| 欧美tickling挠脚心丨vk| 亚洲精品一线二线三线无人区| 久久久国产一区二区三区四区小说 | 亚洲综合免费观看高清完整版 | 欧美在线观看一二区| 欧美一二三区在线观看| ...xxx性欧美| 国产乱一区二区| 91精品国产综合久久精品麻豆| 久久夜色精品国产欧美乱极品| 中文字幕欧美一| 国产成人综合在线| 日韩亚洲欧美高清| 午夜激情久久久| 94-欧美-setu| 亚洲欧洲av一区二区三区久久| 韩国精品久久久| 国产欧美一区二区三区网站| 美女视频网站黄色亚洲| av亚洲产国偷v产偷v自拍| 精品国产一区二区三区不卡| 亚洲电影一级片| 91免费精品国自产拍在线不卡| 久久久亚洲精华液精华液精华液| 午夜影视日本亚洲欧洲精品| 99视频热这里只有精品免费| 国产日韩av一区二区| 激情文学综合丁香| 久久久久9999亚洲精品| 国产一区在线看| 国产精品视频观看| 色悠悠久久综合| 亚洲三级在线观看| 91成人免费在线视频| 日韩影院精彩在线| 26uuu国产日韩综合| 国产成人亚洲综合a∨猫咪| 久久精品一二三| 不卡欧美aaaaa| 亚洲精品精品亚洲|