亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ssl.h

?? openssl 的一套sdk 特別好用
?? H
?? 第 1 頁 / 共 5 頁
字號:
	 * SSL_SESSION_free() when it has finished using it.  Otherwise,	 * on 0, it means the callback has finished with it.	 * If remove_session_cb is not null, it will be called when	 * a session-id is removed from the cache.  After the call,	 * OpenSSL will SSL_SESSION_free() it. */	int (*new_session_cb)(struct ssl_st *ssl,SSL_SESSION *sess);	void (*remove_session_cb)(struct ssl_ctx_st *ctx,SSL_SESSION *sess);	SSL_SESSION *(*get_session_cb)(struct ssl_st *ssl,		unsigned char *data,int len,int *copy);	struct		{		int sess_connect;	/* SSL new conn - started */		int sess_connect_renegotiate;/* SSL reneg - requested */		int sess_connect_good;	/* SSL new conne/reneg - finished */		int sess_accept;	/* SSL new accept - started */		int sess_accept_renegotiate;/* SSL reneg - requested */		int sess_accept_good;	/* SSL accept/reneg - finished */		int sess_miss;		/* session lookup misses  */		int sess_timeout;	/* reuse attempt on timeouted session */		int sess_cache_full;	/* session removed due to full cache */		int sess_hit;		/* session reuse actually done */		int sess_cb_hit;	/* session-id that was not					 * in the cache was					 * passed back via the callback.  This					 * indicates that the application is					 * supplying session-id's from other					 * processes - spooky :-) */		} stats;	int references;	/* if defined, these override the X509_verify_cert() calls */	int (*app_verify_callback)(X509_STORE_CTX *, void *);	void *app_verify_arg;	/* before OpenSSL 0.9.7, 'app_verify_arg' was ignored	 * ('app_verify_callback' was called with just one argument) */	/* Default password callback. */	pem_password_cb *default_passwd_callback;	/* Default password callback user data. */	void *default_passwd_callback_userdata;	/* get client cert callback */	int (*client_cert_cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey);    /* cookie generate callback */    int (*app_gen_cookie_cb)(SSL *ssl, unsigned char *cookie,         unsigned int *cookie_len);    /* verify cookie callback */    int (*app_verify_cookie_cb)(SSL *ssl, unsigned char *cookie,         unsigned int cookie_len);	CRYPTO_EX_DATA ex_data;	const EVP_MD *rsa_md5;/* For SSLv2 - name is 'ssl2-md5' */	const EVP_MD *md5;	/* For SSLv3/TLSv1 'ssl3-md5' */	const EVP_MD *sha1;   /* For SSLv3/TLSv1 'ssl3->sha1' */	STACK_OF(X509) *extra_certs;	STACK_OF(SSL_COMP) *comp_methods; /* stack of SSL_COMP, SSLv3/TLSv1 */	/* Default values used when no per-SSL value is defined follow */	void (*info_callback)(const SSL *ssl,int type,int val); /* used if SSL's info_callback is NULL */	/* what we put in client cert requests */	STACK_OF(X509_NAME) *client_CA;	/* Default values to use in SSL structures follow (these are copied by SSL_new) */	unsigned long options;	unsigned long mode;	long max_cert_list;	struct cert_st /* CERT */ *cert;	int read_ahead;	/* callback that allows applications to peek at protocol messages */	void (*msg_callback)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg);	void *msg_callback_arg;	int verify_mode;	unsigned int sid_ctx_length;	unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH];	int (*default_verify_callback)(int ok,X509_STORE_CTX *ctx); /* called 'verify_callback' in the SSL */	/* Default generate session ID callback. */	GEN_SESSION_CB generate_session_id;	X509_VERIFY_PARAM *param;#if 0	int purpose;		/* Purpose setting */	int trust;		/* Trust setting */#endif	int quiet_shutdown;	};#define SSL_SESS_CACHE_OFF			0x0000#define SSL_SESS_CACHE_CLIENT			0x0001#define SSL_SESS_CACHE_SERVER			0x0002#define SSL_SESS_CACHE_BOTH	(SSL_SESS_CACHE_CLIENT|SSL_SESS_CACHE_SERVER)#define SSL_SESS_CACHE_NO_AUTO_CLEAR		0x0080/* enough comments already ... see SSL_CTX_set_session_cache_mode(3) */#define SSL_SESS_CACHE_NO_INTERNAL_LOOKUP	0x0100#define SSL_SESS_CACHE_NO_INTERNAL_STORE	0x0200#define SSL_SESS_CACHE_NO_INTERNAL \	(SSL_SESS_CACHE_NO_INTERNAL_LOOKUP|SSL_SESS_CACHE_NO_INTERNAL_STORE)  struct lhash_st *SSL_CTX_sessions(SSL_CTX *ctx);#define SSL_CTX_sess_number(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_NUMBER,0,NULL)#define SSL_CTX_sess_connect(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CONNECT,0,NULL)#define SSL_CTX_sess_connect_good(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CONNECT_GOOD,0,NULL)#define SSL_CTX_sess_connect_renegotiate(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CONNECT_RENEGOTIATE,0,NULL)#define SSL_CTX_sess_accept(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_ACCEPT,0,NULL)#define SSL_CTX_sess_accept_renegotiate(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_ACCEPT_RENEGOTIATE,0,NULL)#define SSL_CTX_sess_accept_good(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_ACCEPT_GOOD,0,NULL)#define SSL_CTX_sess_hits(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_HIT,0,NULL)#define SSL_CTX_sess_cb_hits(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CB_HIT,0,NULL)#define SSL_CTX_sess_misses(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_MISSES,0,NULL)#define SSL_CTX_sess_timeouts(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_TIMEOUTS,0,NULL)#define SSL_CTX_sess_cache_full(ctx) \	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CACHE_FULL,0,NULL)void SSL_CTX_sess_set_new_cb(SSL_CTX *ctx, int (*new_session_cb)(struct ssl_st *ssl,SSL_SESSION *sess));int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(struct ssl_st *ssl, SSL_SESSION *sess);void SSL_CTX_sess_set_remove_cb(SSL_CTX *ctx, void (*remove_session_cb)(struct ssl_ctx_st *ctx,SSL_SESSION *sess));void (*SSL_CTX_sess_get_remove_cb(SSL_CTX *ctx))(struct ssl_ctx_st *ctx, SSL_SESSION *sess);void SSL_CTX_sess_set_get_cb(SSL_CTX *ctx, SSL_SESSION *(*get_session_cb)(struct ssl_st *ssl, unsigned char *data,int len,int *copy));SSL_SESSION *(*SSL_CTX_sess_get_get_cb(SSL_CTX *ctx))(struct ssl_st *ssl, unsigned char *Data, int len, int *copy);void SSL_CTX_set_info_callback(SSL_CTX *ctx, void (*cb)(const SSL *ssl,int type,int val));void (*SSL_CTX_get_info_callback(SSL_CTX *ctx))(const SSL *ssl,int type,int val);void SSL_CTX_set_client_cert_cb(SSL_CTX *ctx, int (*client_cert_cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey));int (*SSL_CTX_get_client_cert_cb(SSL_CTX *ctx))(SSL *ssl, X509 **x509, EVP_PKEY **pkey);void SSL_CTX_set_cookie_generate_cb(SSL_CTX *ctx, int (*app_gen_cookie_cb)(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len));void SSL_CTX_set_cookie_verify_cb(SSL_CTX *ctx, int (*app_verify_cookie_cb)(SSL *ssl, unsigned char *cookie, unsigned int cookie_len));#define SSL_NOTHING	1#define SSL_WRITING	2#define SSL_READING	3#define SSL_X509_LOOKUP	4/* These will only be used when doing non-blocking IO */#define SSL_want_nothing(s)	(SSL_want(s) == SSL_NOTHING)#define SSL_want_read(s)	(SSL_want(s) == SSL_READING)#define SSL_want_write(s)	(SSL_want(s) == SSL_WRITING)#define SSL_want_x509_lookup(s)	(SSL_want(s) == SSL_X509_LOOKUP)struct ssl_st	{	/* protocol version	 * (one of SSL2_VERSION, SSL3_VERSION, TLS1_VERSION, DTLS1_VERSION)	 */	int version;	int type; /* SSL_ST_CONNECT or SSL_ST_ACCEPT */	SSL_METHOD *method; /* SSLv3 */	/* There are 2 BIO's even though they are normally both the	 * same.  This is so data can be read and written to different	 * handlers */#ifndef OPENSSL_NO_BIO	BIO *rbio; /* used by SSL_read */	BIO *wbio; /* used by SSL_write */	BIO *bbio; /* used during session-id reuse to concatenate		    * messages */#else	char *rbio; /* used by SSL_read */	char *wbio; /* used by SSL_write */	char *bbio;#endif	/* This holds a variable that indicates what we were doing	 * when a 0 or -1 is returned.  This is needed for	 * non-blocking IO so we know what request needs re-doing when	 * in SSL_accept or SSL_connect */	int rwstate;	/* true when we are actually in SSL_accept() or SSL_connect() */	int in_handshake;	int (*handshake_func)(SSL *);	/* Imagine that here's a boolean member "init" that is	 * switched as soon as SSL_set_{accept/connect}_state	 * is called for the first time, so that "state" and	 * "handshake_func" are properly initialized.  But as	 * handshake_func is == 0 until then, we use this	 * test instead of an "init" member.	 */	int server;	/* are we the server side? - mostly used by SSL_clear*/	int new_session;/* 1 if we are to use a new session.	                 * 2 if we are a server and are inside a handshake	                 *   (i.e. not just sending a HelloRequest)	                 * NB: For servers, the 'new' session may actually be a previously	                 * cached session or even the previous session unless	                 * SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION is set */	int quiet_shutdown;/* don't send shutdown packets */	int shutdown;	/* we have shut things down, 0x01 sent, 0x02			 * for received */	int state;	/* where we are */	int rstate;	/* where we are when reading */	BUF_MEM *init_buf;	/* buffer used during init */	void *init_msg;   	/* pointer to handshake message body, set by ssl3_get_message() */	int init_num;		/* amount read/written */	int init_off;		/* amount read/written */	/* used internally to point at a raw packet */	unsigned char *packet;	unsigned int packet_length;	struct ssl2_state_st *s2; /* SSLv2 variables */	struct ssl3_state_st *s3; /* SSLv3 variables */	struct dtls1_state_st *d1; /* DTLSv1 variables */	int read_ahead;		/* Read as many input bytes as possible	               	 	 * (for non-blocking reads) */	/* callback that allows applications to peek at protocol messages */	void (*msg_callback)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg);	void *msg_callback_arg;	int hit;		/* reusing a previous session */	X509_VERIFY_PARAM *param;#if 0	int purpose;		/* Purpose setting */	int trust;		/* Trust setting */#endif	/* crypto */	STACK_OF(SSL_CIPHER) *cipher_list;	STACK_OF(SSL_CIPHER) *cipher_list_by_id;	/* These are the ones being used, the ones in SSL_SESSION are	 * the ones to be 'copied' into these ones */	EVP_CIPHER_CTX *enc_read_ctx;		/* cryptographic state */	const EVP_MD *read_hash;		/* used for mac generation */#ifndef OPENSSL_NO_COMP	COMP_CTX *expand;			/* uncompress */#else	char *expand;#endif	EVP_CIPHER_CTX *enc_write_ctx;		/* cryptographic state */	const EVP_MD *write_hash;		/* used for mac generation */#ifndef OPENSSL_NO_COMP	COMP_CTX *compress;			/* compression */#else	char *compress;	#endif	/* session info */	/* client cert? */	/* This is used to hold the server certificate used */	struct cert_st /* CERT */ *cert;	/* the session_id_context is used to ensure sessions are only reused	 * in the appropriate context */	unsigned int sid_ctx_length;	unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH];	/* This can also be in the session once a session is established */	SSL_SESSION *session;	/* Default generate session ID callback. */	GEN_SESSION_CB generate_session_id;	/* Used in SSL2 and SSL3 */	int verify_mode;	/* 0 don't care about verify failure.				 * 1 fail if verify fails */	int (*verify_callback)(int ok,X509_STORE_CTX *ctx); /* fail if callback returns 0 */	void (*info_callback)(const SSL *ssl,int type,int val); /* optional informational callback */	int error;		/* error bytes to be written */	int error_code;		/* actual code */#ifndef OPENSSL_NO_KRB5	KSSL_CTX *kssl_ctx;     /* Kerberos 5 context */#endif	/* OPENSSL_NO_KRB5 */	SSL_CTX *ctx;	/* set this flag to 1 and a sleep(1) is put into all SSL_read()	 * and SSL_write() calls, good for nbio debuging :-) */	int debug;		/* extra application data */	long verify_result;	CRYPTO_EX_DATA ex_data;	/* for server side, keep the list of CA_dn we can use */	STACK_OF(X509_NAME) *client_CA;	int references;	unsigned long options; /* protocol behaviour */	unsigned long mode; /* API behaviour */	long max_cert_list;	int first_packet;	int client_version;	/* what was passed, used for				 * SSLv3/TLS rollback check */	};#ifdef __cplusplus

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久嫩草精品久久久精品| 欧美久久久影院| 国产一区二区在线观看免费| 婷婷成人综合网| 日韩国产成人精品| 天天综合天天综合色| 丝瓜av网站精品一区二区| 亚洲国产你懂的| 日韩成人一区二区三区在线观看| 亚洲成av人片一区二区三区| 偷拍与自拍一区| 日本欧美在线观看| 韩国av一区二区三区| 国产在线一区观看| 成人av电影观看| 欧美在线|欧美| 91精选在线观看| 久久综合99re88久久爱| 国产日韩欧美麻豆| 亚洲乱码国产乱码精品精小说 | 日韩一级二级三级精品视频| 欧美v日韩v国产v| 亚洲国产精品t66y| 亚洲一区二区影院| 狠狠久久亚洲欧美| 成人av在线播放网站| 色综合婷婷久久| 日韩无一区二区| 中文一区二区在线观看| 亚洲一区视频在线| 国产精品一级二级三级| 一本大道av一区二区在线播放| 欧美精品色一区二区三区| 久久女同精品一区二区| 亚洲欧美日韩国产综合在线| 日本欧美加勒比视频| caoporn国产精品| 欧美成人vr18sexvr| 亚洲欧洲国产专区| 激情另类小说区图片区视频区| 91首页免费视频| 欧美成人一区二区| 亚洲自拍偷拍欧美| 国产高清在线观看免费不卡| 在线免费精品视频| 国产精品私人自拍| 久久精品国产成人一区二区三区| 色综合久久中文字幕| 久久青草欧美一区二区三区| 午夜免费久久看| k8久久久一区二区三区 | 99麻豆久久久国产精品免费| 3atv在线一区二区三区| 中文字幕一区二| 国产一区二区三区精品视频| 制服丝袜亚洲色图| 亚洲综合成人在线视频| 成人av先锋影音| 国产日韩欧美不卡| 免费成人在线播放| 欧美日韩在线不卡| 亚洲免费观看在线视频| av不卡在线播放| 久久精品视频在线看| 激情都市一区二区| 日韩免费一区二区三区在线播放| 亚洲成a人片在线不卡一二三区| 97国产精品videossex| 国产精品剧情在线亚洲| 高清成人在线观看| 中文字幕第一区二区| 国产99久久久国产精品潘金| 久久久综合精品| 久久精品99国产精品日本| 欧美一区二区黄色| 美脚の诱脚舐め脚责91| 欧美大白屁股肥臀xxxxxx| 乱一区二区av| 精品国产91久久久久久久妲己| 日本视频免费一区| 精品久久久三级丝袜| 黄网站免费久久| 国产亚洲精品超碰| 国产成人精品影视| 中文字幕一区二| 91成人网在线| 性做久久久久久免费观看| 这里只有精品视频在线观看| 免费精品99久久国产综合精品| 欧美疯狂性受xxxxx喷水图片| 蜜桃精品在线观看| 精品国产乱码久久久久久夜甘婷婷 | 一区二区欧美视频| 在线区一区二视频| 秋霞午夜av一区二区三区| 精品国产免费久久| 国产福利一区二区三区视频 | 久久精品国产亚洲一区二区三区| 精品国产91九色蝌蚪| 97精品超碰一区二区三区| 午夜影院久久久| 久久九九国产精品| 91精彩视频在线| 青青草成人在线观看| 中文字幕在线一区免费| 91电影在线观看| 蜜桃视频一区二区三区 | 色av成人天堂桃色av| 青娱乐精品视频| 国产欧美一区二区三区网站| 91福利国产精品| 国产精品亚洲午夜一区二区三区 | 日本成人在线电影网| 欧美国产欧美综合| 欧美一区二区三级| 91在线精品一区二区三区| 日韩av一级电影| 《视频一区视频二区| 欧美一二区视频| 91福利资源站| 成人手机电影网| 蜜桃久久av一区| 亚洲成av人片一区二区三区| 国产精品人妖ts系列视频| 91精品啪在线观看国产60岁| 99久久伊人精品| 国产福利电影一区二区三区| 秋霞电影网一区二区| 亚洲综合激情网| 国产精品国产三级国产有无不卡| 精品国产乱码久久久久久免费| 欧美伊人久久久久久午夜久久久久| 激情六月婷婷综合| 免费在线看成人av| 亚洲va中文字幕| 亚洲一区中文日韩| 亚洲视频一区二区免费在线观看| 精品成人a区在线观看| 欧美一区二区免费视频| 欧美高清hd18日本| 欧美二区乱c少妇| 欧美精品日日鲁夜夜添| 91福利区一区二区三区| 色婷婷av一区二区| 在线视频国内自拍亚洲视频| 国产精品99久| 精品一区二区三区免费播放| 奇米一区二区三区av| 亚洲观看高清完整版在线观看| 亚洲一区二区黄色| 亚洲第一会所有码转帖| 亚洲成a人片在线不卡一二三区| 亚洲国产欧美日韩另类综合 | 青青草国产精品亚洲专区无| 一区二区三区四区中文字幕| ...av二区三区久久精品| 中文字幕欧美一区| √…a在线天堂一区| 伊人一区二区三区| 亚洲国产你懂的| 久久精品国产成人一区二区三区| 美国av一区二区| 国产盗摄女厕一区二区三区| 国产精品一二三四| eeuss影院一区二区三区 | 韩日欧美一区二区三区| 狠狠色狠狠色综合系列| 国产高清不卡一区二区| 91在线你懂得| 欧美一区二区三区白人| 欧美韩日一区二区三区四区| 亚洲乱码国产乱码精品精98午夜| 一区二区三区日韩| 免费av网站大全久久| 国产大片一区二区| 色欲综合视频天天天| 日韩视频123| 国产精品久久毛片a| 亚洲成人动漫在线免费观看| 麻豆成人综合网| 成人97人人超碰人人99| 欧美猛男gaygay网站| 久久久久久久久久美女| ●精品国产综合乱码久久久久| 五月激情综合婷婷| 成人中文字幕在线| 欧美日韩一区国产| 国产欧美精品一区| 亚洲成人av电影在线| 国产资源精品在线观看| 日本道免费精品一区二区三区| 久久亚洲捆绑美女| 亚洲一区影音先锋| 国产v日产∨综合v精品视频| 日本韩国精品一区二区在线观看| 日韩欧美久久一区| 一区二区三区欧美| 豆国产96在线|亚洲| 3atv一区二区三区| 一区二区在线观看视频在线观看|