亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? state.h

?? ipsec vpn
?? H
字號:
/* state and event objects * Copyright (C) 1997 Angelos D. Keromytis. * Copyright (C) 1998-2001  D. Hugh Redelmeier. * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; either version 2 of the License, or (at your * option) any later version.  See <http://www.fsf.org/copyleft/gpl.txt>. * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License * for more details. * * RCSID $Id: state.h,v 1.98.2.2 2005/07/26 02:11:23 ken Exp $ */#include <sys/types.h>#include <sys/socket.h>#include <netinet/in.h>#include <time.h>#include <gmp.h>    /* GNU MP library */#include "quirks.h"/* Message ID mechanism. * * A Message ID is contained in each IKE message header. * For Phase 1 exchanges (Main and Aggressive), it will be zero. * For other exchanges, which must be under the protection of an * ISAKMP SA, the Message ID must be unique within that ISAKMP SA. * Effectively, this labels the message as belonging to a particular * exchange. * * RFC2408 "ISAKMP" 3.1 "ISAKMP Header Format" (near end) states that * the Message ID must be unique.  We interpret this to be "unique within * one ISAKMP SA". * * BTW, we feel this uniqueness allows rekeying to be somewhat simpler * than specified by draft-jenkins-ipsec-rekeying-06.txt. */typedef u_int32_t msgid_t;	/* Network order! */#define MAINMODE_MSGID    ((msgid_t) 0)struct state;	/* forward declaration of tag */extern bool reserve_msgid(struct state *isakmp_sa, msgid_t msgid);extern msgid_t generate_msgid(struct state *isakmp_sa);/* Oakley (Phase 1 / Main Mode) transform and attributes * This is a flattened/decoded version of what is represented * in the Transaction Payload. * Names are chosen to match corresponding names in state. */struct oakley_trans_attrs {    u_int16_t encrypt;		/* Encryption algorithm */    u_int16_t enckeylen;	/* encryption key len (bits) */    const struct encrypt_desc *encrypter;	/* package of encryption routines */    oakley_hash_t hash;		/* Hash algorithm */    const struct hash_desc *hasher;	/* package of hashing routines */    oakley_auth_t auth;		/* Authentication method */#ifdef XAUTH    u_int16_t xauth;            /* did we negotiate Extended Authentication? */#endif    const struct oakley_group_desc *group;	/* Oakley group */    time_t life_seconds;	/* When this SA expires (seconds) */    u_int32_t life_kilobytes;	/* When this SA is exhausted (kilobytes) */#if 0 /* not yet */    u_int16_t prf;		/* Pseudo Random Function */#endif};/* IPsec (Phase 2 / Quick Mode) transform and attributes * This is a flattened/decoded version of what is represented * by a Transaction Payload.  There may be one for AH, one * for ESP, and a funny one for IPCOMP. */struct ipsec_trans_attrs {    u_int8_t transid;	/* transform id */    ipsec_spi_t spi;	/* his SPI */    time_t life_seconds;		/* When this SA expires */    u_int32_t life_kilobytes;	/* When this SA expires */    u_int16_t encapsulation;    ipsec_auth_t auth;                u_int16_t key_len;    u_int16_t key_rounds;#if 0 /* not implemented yet */    u_int16_t cmprs_dict_sz;    u_int32_t cmprs_alg;#endif};/* IPsec per protocol state information */struct ipsec_proto_info {    bool present;	/* was this transform specified? */    struct ipsec_trans_attrs attrs;    ipsec_spi_t our_spi;    u_int16_t keymat_len;	/* same for both */    u_char *our_keymat;    u_char *peer_keymat;};/* state object: record the state of a (possibly nascent) SA * * Invariants (violated only during short transitions): * - each state object will be in statetable exactly once. * - each state object will always have a pending event. *   This prevents leaks. */struct state{    so_serial_t        st_serialno;          /*serial number (for seniority) */    so_serial_t        st_clonedfrom;        /* serial number of parent */    int                st_usage;    struct connection *st_connection;          /* connection for this SA */    int                st_whack_sock;          /* fd for our Whack TCP socket.                                                * Single copy: close when						* freeing struct.                                                */    struct msg_digest *st_suspended_md;        /* suspended state-transition */    struct oakley_trans_attrs st_oakley;    struct ipsec_proto_info st_ah;    struct ipsec_proto_info st_esp;    struct ipsec_proto_info st_ipcomp;#ifdef KLIPS    ipsec_spi_t        st_tunnel_in_spi;          /* KLUDGE */    ipsec_spi_t        st_tunnel_out_spi;         /* KLUDGE */#endif    const struct oakley_group_desc *st_pfs_group; /*group for Phase 2 PFS */    u_int32_t          st_doi;                 /* Domain of Interpretation */    u_int32_t          st_situation;    lset_t             st_policy;              /* policy for IPsec SA */    ip_address         st_remoteaddr;          /* where to send packets to */    u_int16_t          st_remoteport;          /* host byte order */        const struct iface_port *st_interface;     /* where to send from */    ip_address         st_localaddr;           /* where to send them from */    u_int16_t          st_localport;               msgid_t            st_msgid;               /* MSG-ID from header.  Network Order! */    msgid_t            st_msgid_phase15;       /* msgid for phase 1.5 */    msgid_t            st_msgid_phase15b;      /* msgid for phase 1.5 */    /* only for a state representing an ISAKMP SA */    struct msgid_list  *st_used_msgids;        /* used-up msgids *//* symmetric stuff */  /* initiator stuff */    chunk_t            st_gi;                  /* Initiator public value */    u_int8_t           st_icookie[COOKIE_SIZE];/* Initiator Cookie */    chunk_t            st_ni;                  /* Ni nonce */  /* responder stuff */    chunk_t            st_gr;                  /* Responder public value */    u_int8_t           st_rcookie[COOKIE_SIZE];/* Responder Cookie */    chunk_t            st_nr;                  /* Nr nonce */  /* my stuff */    chunk_t            st_tpacket;             /* Transmitted packet */    /* Phase 2 ID payload info about my user */    u_int8_t           st_myuserprotoid;       /* IDcx.protoid */    u_int16_t          st_myuserport;  /* his stuff */    chunk_t            st_rpacket;             /* Received packet */    /* Phase 2 ID payload info about peer's user */    u_int8_t           st_peeruserprotoid;     /* IDcx.protoid */    u_int16_t          st_peeruserport;/* end of symmetric stuff */    u_int8_t           st_sec_in_use;      /* bool: does st_sec hold a value */    MP_INT             st_sec;             /* Our local secret value */    chunk_t            st_sec_chunk;       /* copy of above */    chunk_t            st_shared;              /* Derived shared secret                                                * Note: during Quick Mode,                                                * presence indicates PFS                                                * selected.                                                */    enum crypto_importance st_import;          /* relative priority of crypto						* operations						*/    /* In a Phase 1 state, preserve peer's public key after authentication */    struct pubkey     *st_peer_pubkey;    enum state_kind    st_state;               /* State of exchange */    u_int8_t           st_retransmit;          /* Number of retransmits */    unsigned long      st_try;                 /* number of times rekeying attempted */                                               /* 0 means the only time */    time_t             st_margin;              /* life after EVENT_SA_REPLACE */    unsigned long      st_outbound_count;      /* traffic through eroute */    time_t             st_outbound_time;       /* time of last change to st_outbound_count */    bool               st_calculating;         /* set to TRUE, if we are performing cryptographic						* operations on this state at this time						*/    chunk_t            st_p1isa;               /* Phase 1 initiator SA (Payload) for HASH */    chunk_t            st_skeyid;              /* Key material */    chunk_t            st_skeyid_d;            /* KM for non-ISAKMP key derivation */    chunk_t            st_skeyid_a;            /* KM for ISAKMP authentication */    chunk_t            st_skeyid_e;            /* KM for ISAKMP encryption */    u_char             st_iv[MAX_DIGEST_LEN];  /* IV for encryption */    u_char             st_old_iv[MAX_DIGEST_LEN];  /* IV for encryption */    u_char             st_new_iv[MAX_DIGEST_LEN];    u_char             st_ph1_iv[MAX_DIGEST_LEN]; /* IV at end if phase 1 */    unsigned int       st_iv_len;    unsigned int       st_old_iv_len;    unsigned int       st_new_iv_len;    unsigned int       st_ph1_iv_len;    chunk_t            st_enc_key;             /* Oakley Encryption key */    struct event      *st_event;               /* backpointer for certain events */    struct state      *st_hashchain_next;      /* Next in list */    struct state      *st_hashchain_prev;      /* Previous in list */    struct {        unsigned int   st_malformed_received;        unsigned int   st_malformed_sent;	bool           st_xauth_client_done;	int            st_xauth_client_attempt;        bool           st_modecfg_server_done;        bool           st_modecfg_vars_set;	bool           st_got_certrequest;        bool           st_modecfg_started;	bool           st_skeyid_calculated;	bool           st_dpd;                 /* Peer supports DPD */	bool           st_dpd_local;	       /* If we want DPD on this conn */	bool           st_logged_p1algos;      /* if we have logged algos */	u_int32_t      st_nat_traversal;       /* bit field of permitted						* methods. If non-zero, then						* NAT-T has been detected, and						* should be used. */	ip_address     st_nat_oa;	ip_address     st_natd;    } hidden_variables;                        /* internal state that						* should get copied by god						* Eistein would be proud						*/    unsigned char *st_xauth_username;    /* RFC 3706 Dead Peer Detection */    time_t              st_last_dpd;            /* Time of last DPD transmit */    u_int32_t           st_dpd_seqno;           /* Next R_U_THERE to send */    u_int32_t           st_dpd_expectseqno;     /* Next R_U_THERE_ACK to receive */    u_int32_t           st_dpd_peerseqno;       /* global variables */    struct event        *st_dpd_event;          /* backpointer for DPD events */    u_int32_t	      st_seen_vendorid;	  /* Bit field about recognized Vendor ID */    struct isakmp_quirks quirks;          /* work arounds for faults in other 					   * products */    };/* global variables */extern u_int16_t pluto_port;	/* Pluto's port */extern bool states_use_connection(struct connection *c);/* state functions */extern struct state *new_state(void);extern void init_states(void);extern void insert_state(struct state *st);extern void unhash_state(struct state *st);extern void release_whack(struct state *st);extern void state_eroute_usage(ip_subnet *ours, ip_subnet *his    , unsigned long count, time_t nw);extern void delete_state(struct state *st);struct connection;	/* forward declaration of tag */extern void delete_states_by_connection(struct connection *c, bool relations);extern struct state    *duplicate_state(struct state *st),    *find_state(const u_char *icookie	, const u_char *rcookie	, const ip_address *peer	, msgid_t msgid),    *state_with_serialno(so_serial_t sn),    *find_phase2_state_to_delete(const struct state *p1st, u_int8_t protoid	, ipsec_spi_t spi, bool *bogus),    *find_phase1_state(const struct connection *c, lset_t ok_states),    *find_sender(size_t packet_len, u_char *packet);extern struct state *find_info_state(const u_char *icookie				     , const u_char *rcookie				     , const ip_address *peer				     , msgid_t msgid);extern void show_states_status(void);#if 1void for_each_state(void *(f)(struct state *, void *data), void *data);#endif#if 1void for_each_state(void *(f)(struct state *, void *data), void *data);#endifextern void find_my_cpi_gap(cpi_t *latest_cpi, cpi_t *first_busy_cpi);extern ipsec_spi_t uniquify_his_cpi(ipsec_spi_t cpi, struct state *st);extern void fmt_state(struct state *st, time_t n		     , char *state_buf, size_t state_buf_len		     , char *state_buf2, size_t state_buf_len2);extern void delete_states_by_peer(ip_address *peer);extern void replace_states_by_peer(ip_address *peer);extern void set_state_ike_endpoints(struct state *st				    , struct connection *c);extern void delete_cryptographic_continuation(struct state *st);/* * Local Variables: * c-basic-offset:4 * c-style: pluto * End: */

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美tk丨vk视频| 91一区在线观看| 国产美女娇喘av呻吟久久| 国产麻豆日韩欧美久久| 日本高清不卡在线观看| 欧美不卡视频一区| 一区精品在线播放| 青青草国产精品97视觉盛宴| 国产成人午夜精品影院观看视频 | 亚洲国产精品激情在线观看| 伊人性伊人情综合网| 国产伦精品一区二区三区在线观看| 福利电影一区二区| 国产电影一区在线| 欧美一区二区私人影院日本| 国产精品久久国产精麻豆99网站| 久久精品国产亚洲一区二区三区| 不卡的av中国片| 精品久久久久久最新网址| 亚洲 欧美综合在线网络| 大白屁股一区二区视频| 久久青草国产手机看片福利盒子| 亚洲无人区一区| www.av精品| 国产精品精品国产色婷婷| 麻豆一区二区99久久久久| 欧美亚洲国产一卡| 国产精品成人免费精品自在线观看| 亚洲国产另类av| 欧美在线影院一区二区| 亚洲视频一区二区在线观看| 日韩综合在线视频| 色综合夜色一区| 国产精品乱码久久久久久| 国产福利不卡视频| 精品999在线播放| 亚洲成av人片| 欧美日韩精品一区二区三区四区| 亚洲图片另类小说| 欧美亚洲丝袜传媒另类| 亚洲人吸女人奶水| 国产成人精品一区二| 久久久久久久久伊人| 麻豆精品久久精品色综合| 久久亚洲精精品中文字幕早川悠里 | a美女胸又www黄视频久久| 国产精品人妖ts系列视频| 国产成人日日夜夜| 国产视频一区不卡| 色狠狠综合天天综合综合| 亚洲美女在线一区| 欧美日韩综合不卡| 亚洲最新视频在线观看| 成人午夜视频在线| 亚洲人成网站精品片在线观看| 成人avav影音| 亚洲成人在线免费| 91精品国产综合久久精品性色| 亚洲国产aⅴ天堂久久| 精品乱人伦一区二区三区| 狠狠色综合日日| 国产精品久久久久9999吃药| 91免费在线视频观看| 亚洲一区二区三区视频在线播放| 欧美一区二区视频在线观看| 精品一区二区三区香蕉蜜桃 | 久久国内精品自在自线400部| 国产ts人妖一区二区| 国产精品黄色在线观看| 欧美在线一区二区三区| 亚洲成人三级小说| 欧美一区二区福利视频| 成人动漫av在线| 亚洲黄色性网站| 精品国产乱码久久久久久久久 | 欧美激情一区二区| 欧美午夜精品一区二区三区| 蜜桃一区二区三区在线| 欧美激情一区二区三区不卡| 欧美性猛片aaaaaaa做受| 免费久久99精品国产| 中文字幕高清不卡| 欧美日免费三级在线| 国产一区二区三区免费看| 亚洲成人在线观看视频| www久久久久| 97se亚洲国产综合自在线不卡| 午夜精彩视频在线观看不卡| 欧美精品一区二区三区在线| 欧美日韩另类一区| 国产麻豆午夜三级精品| 日本色综合中文字幕| 国产精品美女www爽爽爽| 欧美日韩亚洲综合一区二区三区| 99免费精品在线观看| 蜜臀久久99精品久久久画质超高清| 一区二区三区视频在线看| 精品国产91亚洲一区二区三区婷婷| 97久久超碰精品国产| 国产999精品久久久久久绿帽| 午夜伊人狠狠久久| 亚洲综合视频在线| 欧美激情资源网| 日韩美女天天操| 日韩一区二区三区视频| 91国偷自产一区二区开放时间 | 天天操天天综合网| 亚洲国产精品久久久久婷婷884 | 成人午夜视频网站| 狠狠狠色丁香婷婷综合激情 | 日韩一区二区在线观看视频播放| 91视频在线看| 97久久超碰国产精品电影| 日韩av中文在线观看| 亚洲综合在线观看视频| 国产精品国产自产拍高清av王其 | 欧美精品一区二区精品网| 日韩视频一区二区三区| 欧美日韩国产小视频在线观看| 欧美日韩在线不卡| 一本一本久久a久久精品综合麻豆| 国产精品一区在线观看你懂的| 日韩黄色免费网站| 麻豆国产欧美一区二区三区| 视频一区二区三区在线| 日本一区中文字幕| 日韩国产欧美在线播放| 蜜臀av性久久久久蜜臀aⅴ流畅 | 成人免费视频一区| 91免费看`日韩一区二区| 成人国产视频在线观看| 国产精品亚洲一区二区三区妖精| 国产精品自拍av| 国产精品中文字幕日韩精品| 高清beeg欧美| 不卡电影免费在线播放一区| 国产做a爰片久久毛片| 国产成人av电影| 成人免费视频视频| 欧美色成人综合| 欧美一区二区日韩一区二区| 精品欧美黑人一区二区三区| 日韩欧美国产一二三区| 日韩片之四级片| 国产日韩精品一区二区三区 | 亚洲欧美在线高清| 久久看人人爽人人| 国产精品传媒视频| 亚洲国产视频直播| 国产传媒欧美日韩成人| 成人免费视频网站在线观看| 欧美精品色一区二区三区| 欧美性猛交xxxxxx富婆| 不卡的av在线| 日韩欧美一区二区不卡| 久久亚洲综合av| 偷窥少妇高潮呻吟av久久免费| 免费成人在线视频观看| 99在线热播精品免费| 欧美猛男超大videosgay| 日韩欧美123| 亚洲自拍偷拍综合| 国产老女人精品毛片久久| 欧美伦理视频网站| 中文成人综合网| 麻豆精品一区二区三区| 99国产欧美另类久久久精品| 欧美一级二级三级蜜桃| 日韩一区日韩二区| 亚洲精品伦理在线| 粉嫩av一区二区三区在线播放| 欧美中文字幕一二三区视频| 久久久国产午夜精品| 亚洲风情在线资源站| 成人av片在线观看| 91精品国产高清一区二区三区| 中文字幕精品一区| 精品午夜一区二区三区在线观看| 99re热这里只有精品视频| 国产无人区一区二区三区| 香蕉av福利精品导航| 国内精品写真在线观看| 欧美最新大片在线看| 欧美极品美女视频| 国产在线精品国自产拍免费| 欧美四级电影网| 亚洲国产成人tv| 91黄色激情网站| 亚洲免费成人av| 成人午夜电影小说| 国产偷v国产偷v亚洲高清| 七七婷婷婷婷精品国产| 欧美精品在线一区二区三区| 国产精品久久久久久久久久免费看| 夜夜嗨av一区二区三区四季av| 成人av电影在线网| 国产日韩欧美亚洲| 岛国av在线一区| 26uuu精品一区二区在线观看| 日本强好片久久久久久aaa|