亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? ssl.c

?? 一個開源的VPN原碼
?? C
?? 第 1 頁 / 共 5 頁
字號:
/* * A tls_multi object fully encapsulates OpenVPN's TLS state. * See ssl.h for more comments. */struct tls_multi *tls_multi_init (struct tls_options *tls_options,		struct udp_socket *udp_socket){  struct tls_multi *ret;  ret = (struct tls_multi *) malloc (sizeof (struct tls_multi));  ASSERT (ret);  CLEAR (*ret);  /* get command line derived options */  ret->opt = *tls_options;  /* set up pointer to HMAC object for TLS packet authentication */  ret->opt.tls_auth.key_ctx_bi = &ret->opt.tls_auth_key;  /* set up list of keys to be scanned by data channel encrypt and decrypt routines */  ASSERT (SIZE (ret->key_scan) == 3);  ret->key_scan[0] = &ret->session[TM_ACTIVE].key[KS_PRIMARY];  ret->key_scan[1] = &ret->session[TM_ACTIVE].key[KS_LAME_DUCK];  ret->key_scan[2] = &ret->session[TM_LAME_DUCK].key[KS_LAME_DUCK];  return ret;}/* * Finalize our computation of frame sizes. */voidtls_multi_init_finalize(struct tls_multi* multi, const struct frame* frame){  tls_init_control_channel_frame_parameters(frame, &multi->opt.frame);    /* initialize the active and untrusted sessions */  tls_session_init (multi, &multi->session[TM_ACTIVE]);  tls_session_init (multi, &multi->session[TM_UNTRUSTED]);}voidtls_multi_free (struct tls_multi *multi, bool clear){  int i;  ASSERT (multi);  for (i = 0; i < TM_SIZE; ++i)    tls_session_free (&multi->session[i], false);  if (clear)    CLEAR (*multi);  free(multi);}/* * Move a packet authentication HMAC + related fields to or from the front * of the buffer so it can be processed by encrypt/decrypt. *//* * Dependent on hmac size, opcode size, and session_id size. * Will assert if too small. */#define SWAP_BUF_SIZE 256static boolswap_hmac (struct buffer *buf, const struct crypto_options *co, bool incoming){  struct key_ctx *ctx;  ASSERT (co);  ctx = (incoming ? &co->key_ctx_bi->decrypt : &co->key_ctx_bi->encrypt);  ASSERT (ctx->hmac);  {    /* hmac + packet_id (8 bytes) */    const int hmac_size = HMAC_size (ctx->hmac) + packet_id_size (true);    /* opcode + session_id */    const int osid_size = 1 + SID_SIZE;    int e1, e2;    uint8_t *b = BPTR (buf);    uint8_t buf1[SWAP_BUF_SIZE];    uint8_t buf2[SWAP_BUF_SIZE];    if (incoming)      {	e1 = osid_size;	e2 = hmac_size;      }    else      {	e1 = hmac_size;	e2 = osid_size;      }    ASSERT (e1 <= SWAP_BUF_SIZE && e2 <= SWAP_BUF_SIZE);    if (buf->len >= e1 + e2)      {	memcpy (buf1, b, e1);	memcpy (buf2, b + e1, e2);	memcpy (b, buf2, e2);	memcpy (b + e2, buf1, e1);	return true;      }    else      return false;  }}#undef SWAP_BUF_SIZE/* * A simple traffic shaper for the control channel, to prevent * it from hogging the bandwidth during key exchanges. * * Return true if okay to send. * If not, return false and set *wakeup. * * Never limit the rate unless we have an active lame duck key * which will not be expiring any time soon. */static bool transmit_rate_limiter(struct tls_session* session, time_t* wakeup, time_t current){  const struct key_state *lame = &session->key[KS_LAME_DUCK];  const struct key_state *pri = &session->key[KS_PRIMARY];  /* transmit one packet every freq seconds */  const int freq = 2;  /* rough estimate of how many bytes still to transmit */  const int estimated_bytes = 20000;  /* worst-case estimated finish at this rate */  time_t finish = current + ((freq * estimated_bytes) / MTU_SIZE (&session->opt->frame));  if (check_debug_level (D_TLS_DEBUG))    {      if (lame->must_die)	msg (D_TLS_DEBUG, "TLS XMIT FINISH ESTIMATE = lame->must_die      %d seconds",	     lame->must_die - finish);      if (pri->must_negotiate)	msg (D_TLS_DEBUG, "TLS XMIT FINISH ESTIMATE = pri->must_negotiate %d seconds",	     pri->must_negotiate - finish);    }  if (freq && lame->state == S_ACTIVE && finish < lame->must_die && finish < pri->must_negotiate)    {      if (current >= session->limit_next)	{	  session->limit_next = current + freq;	  return true;	}      else	{	  compute_earliest_wakeup (wakeup, session->limit_next - current);	  return false;	}    }  return true;}/* * Write a control channel authentication record. */static voidwrite_control_auth (struct tls_session *session,		    struct key_state *ks,		    struct buffer *buf,		    struct sockaddr_in *to_udp_addr,		    int opcode,		    int max_ack,		    bool prepend_ack,		    time_t current){  uint8_t *header;  struct buffer null = clear_buf ();  ASSERT (addr_defined (&ks->remote_addr));  ASSERT (reliable_ack_write	  (&ks->rec_ack, buf, &ks->session_id_remote, max_ack, prepend_ack));  ASSERT (session_id_write_prepend (&session->session_id, buf));  ASSERT (header = buf_prepend (buf, 1));  *header = ks->key_id | (opcode << P_OPCODE_SHIFT);  if (session->tls_auth.key_ctx_bi->encrypt.hmac)    {      /* no encryption, only write hmac */      openvpn_encrypt (buf, null, &session->tls_auth, NULL, current);      ASSERT (swap_hmac (buf, &session->tls_auth, false));    }  *to_udp_addr = ks->remote_addr;}/* * Read a control channel authentication record. */static boolread_control_auth (struct buffer *buf,		   struct crypto_options *co,		   struct sockaddr_in *from,		   time_t current){  if (co->key_ctx_bi->decrypt.hmac)    {      struct buffer null = clear_buf ();      /* move the hmac record to the front of the packet */      if (!swap_hmac (buf, co, true))	{	  msg (D_TLS_ERRORS,	       "TLS Error: cannot locate HMAC in incoming packet from %s",	       print_sockaddr (from));	  return false;	}      /* authenticate only (no decrypt) and remove the hmac record         from the head of the buffer */      openvpn_decrypt (buf, null, co, NULL, current);      if (!buf->len)	{	  msg (D_TLS_ERRORS,	       "TLS Error: incoming packet authentication failed from %s",	       print_sockaddr (from));	  return false;	}    }  /* advance buffer pointer past opcode & session_id since our caller     already read it */  buf_advance (buf, SID_SIZE + 1);  return true;}/* * Macros for key_state_soft_reset & tls_process */#define ks      (&session->key[KS_PRIMARY])	/* primary key */#define ks_lame (&session->key[KS_LAME_DUCK])	/* retiring key *//* true if no in/out acknowledgements pending */#define FULL_SYNC \  (reliable_empty(&ks->send_reliable) && reliable_ack_empty(&ks->rec_ack))/* * Move the active key to the lame duck key and reinitialize the * active key. */static voidkey_state_soft_reset (struct tls_session *session, time_t current){  ks->must_die = current + session->opt->transition_window; /* remaining lifetime of old key */  key_state_free (ks_lame, false);  *ks_lame = *ks;  key_state_init (session, ks, current);  ks->session_id_remote = ks_lame->session_id_remote;  ks->remote_addr = ks_lame->remote_addr;}/* * This is the primary routine for processing TLS stuff inside the * the main event loop (see openvpn.c).  When this routine exits * with non-error status, it will set *wakeup to the number of seconds * when it wants to be called again, or 0 if it doesn't care. * * Return value is true if we have placed a packet in *to_udp which we * want to send to our peer. */static booltls_process (struct tls_multi *multi,	     struct tls_session *session,	     struct buffer *to_udp,	     struct sockaddr_in *to_udp_addr,	     struct udp_socket *to_udp_socket,	     time_t * wakeup,	     time_t current){  struct buffer *buf;  bool state_change = false;  bool generated_output = false;  /* Make sure we were initialized and that we're not in an error state */  ASSERT (ks->state != S_UNDEF);  ASSERT (ks->state != S_ERROR);  ASSERT (session_id_defined (&session->session_id));  /* Should we trigger a soft reset? -- new key, keeps old key for a while */  if (ks->state == S_ACTIVE &&      ((session->opt->renegotiate_seconds	&& current >= ks->established + session->opt->renegotiate_seconds)       || (session->opt->renegotiate_bytes	   && ks->n_bytes >= session->opt->renegotiate_bytes)       || (session->opt->renegotiate_packets	   && ks->n_packets >= session->opt->renegotiate_packets)       || (packet_id_close_to_wrapping (&ks->packet_id.send))))    {      msg (D_TLS_DEBUG_LOW, "tls_process: soft reset sec=%d bytes=%d/%d pkts=%d/%d",	   (int) ks->established + session->opt->renegotiate_seconds - current,	   ks->n_bytes, session->opt->renegotiate_bytes,	   ks->n_packets, session->opt->renegotiate_packets);      key_state_soft_reset (session, current);    }  /* Kill lame duck key transition_window seconds after primary key negotiation */  if (lame_duck_must_die (session, wakeup, current)) {	key_state_free (ks_lame, true);	msg (D_TLS_DEBUG_LOW, "tls_process: killed expiring key");  }  mutex_cycle (L_TLS);  do    {      current = time (NULL);      msg (D_TLS_DEBUG, "tls_process: chg=%d ks=%s lame=%s",	   state_change, state_name (ks->state), state_name (ks_lame->state));      state_change = false;      /*       * TLS activity is finished once we get to S_ACTIVE,       * though we will still process acknowledgements.       */      if (ks->state < S_ACTIVE)	{	  /* Initial handshake */	  if (ks->state == S_INITIAL)	    {	      buf = reliable_get_buf (&ks->send_reliable);	      if (buf)		{		  ks->must_negotiate = current + session->opt->handshake_window;	      		  /* null buffer */		  reliable_mark_active_outgoing (&ks->send_reliable, buf, ks->initial_opcode);	      		  ks->state = S_PRE_START;		  state_change = true;		  msg (D_TLS_DEBUG, "Initial Handshake, sid=%s",		       session_id_print (&session->session_id));		}	    }	  /* Are we timed out on receive? */	  if (current >= ks->must_negotiate)	    {	      msg (D_TLS_ERRORS,		   "TLS Error: TLS key negotiation failed to occur within %d seconds",		   session->opt->handshake_window);	      goto error;	    }	  /* Wait for Initial Handshake ACK */	  if (ks->state == S_PRE_START && FULL_SYNC)	    {	      ks->state = S_START;	      state_change = true;	      msg (D_TLS_DEBUG, "Transitioned to S_START");	    }	  /* Wait for ACK */	  if (((ks->state == S_GOT_KEY && !session->opt->server) ||	       (ks->state == S_SENT_KEY && session->opt->server)))	    {	      if (FULL_SYNC)		{		  ks->established = current;		  msg (D_TLS_DEBUG, "Transition to S_ACTIVE");		  if (check_debug_level (D_HANDSHAKE))		    print_details (ks->ssl, "Control Channel:");		  state_change = true;		  ks->state = S_ACTIVE;		  /* Set outgoing address for data channel packets */		  udp_socket_set_outgoing_addr (NULL, to_udp_socket, &ks->remote_addr);		}	    }	  /* Reliable buffer to outgoing UDP (send up to CONTROL_SEND_ACK_MAX ACKs	     for previously received packets) */	  if (!to_udp->len && reliable_can_send (&ks->send_reliable, current))	    {	      if (transmit_rate_limiter(session, wakeup, current))		{		  int opcode;		  struct buffer b;		  buf = reliable_send (&ks->send_reliable, &opcode, current);		  ASSERT (buf);		  b = *buf;		  write_control_auth (session, ks, &b, to_udp_addr, opcode,				      CONTROL_SEND_ACK_MAX, true, current);		  *to_udp = b;		  generated_output = true;		  state_change = true;		  msg (D_TLS_DEBUG, "Reliable -> UDP");		  break;		}	    }	  /* Send 1 or more ACKs (each received control packet gets one ACK) */	  if (!to_udp->len && !reliable_ack_empty (&ks->rec_ack))	    {	      buf = &ks->ack_write_buf;	      ASSERT (buf_init (buf, EXTRA_FRAME (&multi->opt.frame)));	      write_control_auth (session, ks, buf, to_udp_addr, P_ACK_V1,				  RELIABLE_ACK_SIZE, false, current);	      *to_udp = *buf;	      generated_output = true;	      state_change = true;	      msg (D_TLS_DEBUG, "Dedicated ACK -> UDP");	      break;	    }	  /* Write incoming ciphertext to TLS object */	  buf = reliable_get_buf_sequenced (&ks->rec_reliable);	  if (buf)	    {	      int status = 0;	      if (buf->len)		{		  status = key_state_write_ciphertext (ks, buf);		  if (status == -1)		    {		      msg (D_TLS_ERRORS,			   "TLS Error: Incoming Ciphertext -> TLS object write error");		      goto error;		    }		}	      else		{		  status = 1;		}	      if (status == 1)		{		  reliable_mark_deleted (&ks->rec_reliable, buf, true);		  state_change = true;		  msg (D_TLS_DEBUG, "Incoming Ciphertext -> TLS");		}	    }	  /* Read incoming plaintext from TLS object */	  buf = &ks->plaintext_read_buf;	  if (!buf->len)	    {	      int status;	      ASSERT (buf_init (buf, EXTRA_FRAME (&multi->opt.frame)));	      status = key_state_read_plaintext (ks, buf, MTU_SIZE (&multi->opt.frame));	      current = time (NULL);	      if (status == -1)		{		  msg (D_TLS_ERRORS, "TLS Error: TLS object -> incoming plaintext read error");		  goto error;		}	      if (status == 1)		{		  state_change = true;		  msg (D_TLS_DEBUG, "TLS -> Incoming Plaintext");		}	    }	  /* Send Key */	  buf = &ks->plaintext_write_buf;	  if (!buf->len && ((ks->state == S_START && !session->opt->server) ||			    (ks->state == S_GOT_KEY && session->opt->server)))	    {	      struct key key;	      ASSERT (buf_init (buf, EXTRA_FRAME (&multi->opt.frame)));	      generate_key_random (&key, &session->opt->key_type);	      if (!check_key (&key, &session->opt->key_type))		{		  msg (D_TLS_ERRORS, "TLS Error: Bad encrypting key generated");		  goto error;		}	      write_key (&key, &session->opt->key_type, buf);	      init_key_ctx (&ks->key.encrypt, &key, &session->opt->key_type,			    DO_ENCRYPT, "Data Channel Encrypt");	      CLEAR (key);	      ASSERT (buf_write		      (buf, session->opt->options,		       strlen (session->opt->options) + 1));	      state_change = true;	      msg (D_TLS_DEBUG, "Send Key");	      ks->state = S_SENT_KEY;	    }

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美日韩mp4| 日韩成人精品在线观看| 国产夫妻精品视频| 日韩欧美国产wwwww| 性久久久久久久| 在线视频一区二区免费| 亚洲国产高清不卡| 成人高清视频在线观看| 国产精品人成在线观看免费| 国产九色精品成人porny| 精品国精品自拍自在线| 精品一区二区在线观看| 欧美成人vr18sexvr| 精彩视频一区二区| 久久免费国产精品| 大白屁股一区二区视频| 国产精品视频线看| 色94色欧美sute亚洲13| 亚洲va欧美va天堂v国产综合| 欧美高清hd18日本| 久久国产精品第一页| 国产精品欧美经典| 欧洲国产伦久久久久久久| 亚洲一区免费视频| 久久综合精品国产一区二区三区 | 久久99精品国产麻豆婷婷| 日韩精品一区二区三区swag| 国产成人综合视频| 亚洲国产日韩综合久久精品| 日韩欧美国产一二三区| www.久久久久久久久| 美腿丝袜亚洲一区| 国产精品综合一区二区| 欧美亚洲综合一区| 成人免费看的视频| 日韩av网站免费在线| 久久免费美女视频| 欧美日韩一卡二卡三卡| gogogo免费视频观看亚洲一| 一区二区三区加勒比av| 国产女主播在线一区二区| 欧美精品免费视频| 91九色最新地址| 欧美日韩午夜精品| 激情综合色综合久久综合| 天涯成人国产亚洲精品一区av| 国产精品乱人伦一区二区| 欧美xingq一区二区| 91精品国产麻豆| 制服丝袜国产精品| 欧美一区二区三区系列电影| 欧美午夜在线观看| 欧美日韩免费观看一区三区| 欧美在线观看视频在线| 91极品美女在线| 一本色道久久综合精品竹菊| 91免费观看国产| 成人av影视在线观看| 成人亚洲精品久久久久软件| 国产91露脸合集magnet| 99久久精品情趣| 一本一本久久a久久精品综合麻豆| 99r国产精品| 欧洲一区在线观看| 日韩一区二区电影| 久久亚洲一级片| 亚洲国产精品二十页| 亚洲视频中文字幕| 亚洲成av人片一区二区三区| 免费欧美高清视频| 不卡的av电影| 91精品国产入口| 欧美国产日韩一二三区| 亚洲精品视频在线| 久久丁香综合五月国产三级网站| 懂色中文一区二区在线播放| 色综合久久中文字幕综合网| 日韩一区二区三区精品视频| 国产片一区二区| 日韩av一区二区三区| 成人自拍视频在线观看| 欧美无砖专区一中文字| 国产婷婷精品av在线| 一区二区三区四区激情| 国产精品2024| 日韩精品自拍偷拍| 亚洲综合无码一区二区| 国产999精品久久久久久| 欧美高清精品3d| 一区二区三区四区激情| 久久99国产精品麻豆| 色婷婷一区二区| 亚洲天堂免费看| 成人av免费网站| 中文字幕乱码久久午夜不卡| 九九**精品视频免费播放| 欧美日本一区二区| 亚洲乱码国产乱码精品精可以看| 欧美岛国在线观看| 亚洲精品欧美在线| 一本到三区不卡视频| 最新成人av在线| 9l国产精品久久久久麻豆| 亚洲国产激情av| 成人久久18免费网站麻豆 | 中文字幕精品—区二区四季| 久久99精品久久久久久久久久久久 | 精品国产凹凸成av人导航| 免费观看一级特黄欧美大片| 欧美日韩国产中文| 日产国产高清一区二区三区 | 精品久久人人做人人爽| 精品亚洲国产成人av制服丝袜| 欧美电影免费观看高清完整版在线| 婷婷夜色潮精品综合在线| 宅男在线国产精品| 国产一区福利在线| 亚洲欧美另类图片小说| 555www色欧美视频| 国产一区二区三区观看| 亚洲素人一区二区| 欧美乱妇23p| 国产成人在线视频网址| 亚洲三级免费观看| 精品日韩在线观看| 91视频观看视频| 久久精品免费观看| 亚洲激情av在线| 欧美激情中文字幕| 日韩午夜在线观看视频| 99精品国产视频| 国产美女娇喘av呻吟久久 | 久久久久99精品一区| 欧美精品久久天天躁| 波多野洁衣一区| 国产乱一区二区| 日韩电影免费在线观看网站| 亚洲色图制服诱惑 | 亚洲最新在线观看| 国产精品国产三级国产aⅴ原创| 欧美一卡二卡三卡| 欧美日韩综合色| 色婷婷国产精品| 91免费版pro下载短视频| 成人手机在线视频| 国产一区在线观看视频| 国产一区二区在线影院| 另类人妖一区二区av| 日一区二区三区| 日韩精品亚洲一区二区三区免费| 亚洲激情图片一区| 亚洲成人动漫在线观看| 亚洲精品视频在线| 亚洲国产一二三| 亚洲成人久久影院| 韩国女主播一区| 国产成人精品影院| 99国产精品久久久久久久久久 | 国产午夜精品理论片a级大结局| 91在线视频网址| 99久久综合狠狠综合久久| 国产xxx精品视频大全| 99久久精品国产观看| 在线视频一区二区三区| 欧美日韩国产在线观看| 精品国产乱码久久久久久夜甘婷婷| 91精品国产91综合久久蜜臀| 精品国产乱码久久久久久久久| 久久免费视频色| 亚洲精品免费看| 免费人成精品欧美精品| 成人午夜av电影| 欧美三级午夜理伦三级中视频| 日韩一区二区三区在线| 国产精品久久777777| 日韩二区三区在线观看| 成人性生交大片免费看视频在线 | 精品一区二区影视| 欧洲一区在线观看| 欧美经典三级视频一区二区三区| 亚洲欧美一区二区三区极速播放| 亚洲18色成人| 91福利社在线观看| 国产精品欧美久久久久无广告| 日韩成人一级大片| 色妞www精品视频| 欧美激情一区二区三区在线| 日本欧美韩国一区三区| 欧美日韩激情一区| 亚洲欧美另类在线| 99久久夜色精品国产网站| 精品国产乱码久久久久久久久| 亚洲综合无码一区二区| 色婷婷久久综合| 亚洲精品免费电影| 色视频一区二区| 怡红院av一区二区三区| 日本精品一级二级| 亚洲精品国产a| 欧美调教femdomvk|