亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? secure.c

?? rdesktop是一個(gè)開放源碼的Window NT中斷服務(wù)器的客戶端
?? C
?? 第 1 頁 / 共 2 頁
字號(hào):
/* -*- c-basic-offset: 8 -*-   rdesktop: A Remote Desktop Protocol client.   Protocol services - RDP encryption and licensing   Copyright (C) Matthew Chapman 1999-2005   This program is free software; you can redistribute it and/or modify   it under the terms of the GNU General Public License as published by   the Free Software Foundation; either version 2 of the License, or   (at your option) any later version.   This program is distributed in the hope that it will be useful,   but WITHOUT ANY WARRANTY; without even the implied warranty of   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the   GNU General Public License for more details.   You should have received a copy of the GNU General Public License   along with this program; if not, write to the Free Software   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.*/#include "rdesktop.h"#include <openssl/rc4.h>#include <openssl/md5.h>#include <openssl/sha.h>#include <openssl/bn.h>#include <openssl/x509v3.h>extern char g_hostname[16];extern int g_width;extern int g_height;extern int g_keylayout;extern BOOL g_encryption;extern BOOL g_licence_issued;extern BOOL g_use_rdp5;extern BOOL g_console_session;extern int g_server_bpp;extern uint16 mcs_userid;extern VCHANNEL g_channels[];extern unsigned int g_num_channels;static int rc4_key_len;static RC4_KEY rc4_decrypt_key;static RC4_KEY rc4_encrypt_key;static RSA *server_public_key;static uint8 sec_sign_key[16];static uint8 sec_decrypt_key[16];static uint8 sec_encrypt_key[16];static uint8 sec_decrypt_update_key[16];static uint8 sec_encrypt_update_key[16];static uint8 sec_crypted_random[SEC_MODULUS_SIZE];uint16 g_server_rdp_version = 0;/* * I believe this is based on SSLv3 with the following differences: *  MAC algorithm (5.2.3.1) uses only 32-bit length in place of seq_num/type/length fields *  MAC algorithm uses SHA1 and MD5 for the two hash functions instead of one or other *  key_block algorithm (6.2.2) uses 'X', 'YY', 'ZZZ' instead of 'A', 'BB', 'CCC' *  key_block partitioning is different (16 bytes each: MAC secret, decrypt key, encrypt key) *  encryption/decryption keys updated every 4096 packets * See http://wp.netscape.com/eng/ssl3/draft302.txt *//* * 48-byte transformation used to generate master secret (6.1) and key material (6.2.2). * Both SHA1 and MD5 algorithms are used. */voidsec_hash_48(uint8 * out, uint8 * in, uint8 * salt1, uint8 * salt2, uint8 salt){	uint8 shasig[20];	uint8 pad[4];	SHA_CTX sha;	MD5_CTX md5;	int i;	for (i = 0; i < 3; i++)	{		memset(pad, salt + i, i + 1);		SHA1_Init(&sha);		SHA1_Update(&sha, pad, i + 1);		SHA1_Update(&sha, in, 48);		SHA1_Update(&sha, salt1, 32);		SHA1_Update(&sha, salt2, 32);		SHA1_Final(shasig, &sha);		MD5_Init(&md5);		MD5_Update(&md5, in, 48);		MD5_Update(&md5, shasig, 20);		MD5_Final(&out[i * 16], &md5);	}}/* * 16-byte transformation used to generate export keys (6.2.2). */voidsec_hash_16(uint8 * out, uint8 * in, uint8 * salt1, uint8 * salt2){	MD5_CTX md5;	MD5_Init(&md5);	MD5_Update(&md5, in, 16);	MD5_Update(&md5, salt1, 32);	MD5_Update(&md5, salt2, 32);	MD5_Final(out, &md5);}/* Reduce key entropy from 64 to 40 bits */static voidsec_make_40bit(uint8 * key){	key[0] = 0xd1;	key[1] = 0x26;	key[2] = 0x9e;}/* Generate encryption keys given client and server randoms */static voidsec_generate_keys(uint8 * client_random, uint8 * server_random, int rc4_key_size){	uint8 pre_master_secret[48];	uint8 master_secret[48];	uint8 key_block[48];	/* Construct pre-master secret */	memcpy(pre_master_secret, client_random, 24);	memcpy(pre_master_secret + 24, server_random, 24);	/* Generate master secret and then key material */	sec_hash_48(master_secret, pre_master_secret, client_random, server_random, 'A');	sec_hash_48(key_block, master_secret, client_random, server_random, 'X');	/* First 16 bytes of key material is MAC secret */	memcpy(sec_sign_key, key_block, 16);	/* Generate export keys from next two blocks of 16 bytes */	sec_hash_16(sec_decrypt_key, &key_block[16], client_random, server_random);	sec_hash_16(sec_encrypt_key, &key_block[32], client_random, server_random);	if (rc4_key_size == 1)	{		DEBUG(("40-bit encryption enabled\n"));		sec_make_40bit(sec_sign_key);		sec_make_40bit(sec_decrypt_key);		sec_make_40bit(sec_encrypt_key);		rc4_key_len = 8;	}	else	{		DEBUG(("rc_4_key_size == %d, 128-bit encryption enabled\n", rc4_key_size));		rc4_key_len = 16;	}	/* Save initial RC4 keys as update keys */	memcpy(sec_decrypt_update_key, sec_decrypt_key, 16);	memcpy(sec_encrypt_update_key, sec_encrypt_key, 16);	/* Initialise RC4 state arrays */	RC4_set_key(&rc4_decrypt_key, rc4_key_len, sec_decrypt_key);	RC4_set_key(&rc4_encrypt_key, rc4_key_len, sec_encrypt_key);}static uint8 pad_54[40] = {	54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54,	54, 54, 54,	54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54, 54,	54, 54, 54};static uint8 pad_92[48] = {	92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92,	92, 92, 92, 92, 92, 92, 92,	92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92, 92,	92, 92, 92, 92, 92, 92, 92};/* Output a uint32 into a buffer (little-endian) */voidbuf_out_uint32(uint8 * buffer, uint32 value){	buffer[0] = (value) & 0xff;	buffer[1] = (value >> 8) & 0xff;	buffer[2] = (value >> 16) & 0xff;	buffer[3] = (value >> 24) & 0xff;}/* Generate a MAC hash (5.2.3.1), using a combination of SHA1 and MD5 */voidsec_sign(uint8 * signature, int siglen, uint8 * session_key, int keylen, uint8 * data, int datalen){	uint8 shasig[20];	uint8 md5sig[16];	uint8 lenhdr[4];	SHA_CTX sha;	MD5_CTX md5;	buf_out_uint32(lenhdr, datalen);	SHA1_Init(&sha);	SHA1_Update(&sha, session_key, keylen);	SHA1_Update(&sha, pad_54, 40);	SHA1_Update(&sha, lenhdr, 4);	SHA1_Update(&sha, data, datalen);	SHA1_Final(shasig, &sha);	MD5_Init(&md5);	MD5_Update(&md5, session_key, keylen);	MD5_Update(&md5, pad_92, 48);	MD5_Update(&md5, shasig, 20);	MD5_Final(md5sig, &md5);	memcpy(signature, md5sig, siglen);}/* Update an encryption key */static voidsec_update(uint8 * key, uint8 * update_key){	uint8 shasig[20];	SHA_CTX sha;	MD5_CTX md5;	RC4_KEY update;	SHA1_Init(&sha);	SHA1_Update(&sha, update_key, rc4_key_len);	SHA1_Update(&sha, pad_54, 40);	SHA1_Update(&sha, key, rc4_key_len);	SHA1_Final(shasig, &sha);	MD5_Init(&md5);	MD5_Update(&md5, update_key, rc4_key_len);	MD5_Update(&md5, pad_92, 48);	MD5_Update(&md5, shasig, 20);	MD5_Final(key, &md5);	RC4_set_key(&update, rc4_key_len, key);	RC4(&update, rc4_key_len, key, key);	if (rc4_key_len == 8)		sec_make_40bit(key);}/* Encrypt data using RC4 */static voidsec_encrypt(uint8 * data, int length){	static int use_count;	if (use_count == 4096)	{		sec_update(sec_encrypt_key, sec_encrypt_update_key);		RC4_set_key(&rc4_encrypt_key, rc4_key_len, sec_encrypt_key);		use_count = 0;	}	RC4(&rc4_encrypt_key, length, data, data);	use_count++;}/* Decrypt data using RC4 */voidsec_decrypt(uint8 * data, int length){	static int use_count;	if (use_count == 4096)	{		sec_update(sec_decrypt_key, sec_decrypt_update_key);		RC4_set_key(&rc4_decrypt_key, rc4_key_len, sec_decrypt_key);		use_count = 0;	}	RC4(&rc4_decrypt_key, length, data, data);	use_count++;}static voidreverse(uint8 * p, int len){	int i, j;	uint8 temp;	for (i = 0, j = len - 1; i < j; i++, j--)	{		temp = p[i];		p[i] = p[j];		p[j] = temp;	}}/* Perform an RSA public key encryption operation */static voidsec_rsa_encrypt(uint8 * out, uint8 * in, int len, uint8 * modulus, uint8 * exponent){	BN_CTX *ctx;	BIGNUM mod, exp, x, y;	uint8 inr[SEC_MODULUS_SIZE];	int outlen;	reverse(modulus, SEC_MODULUS_SIZE);	reverse(exponent, SEC_EXPONENT_SIZE);	memcpy(inr, in, len);	reverse(inr, len);	ctx = BN_CTX_new();	BN_init(&mod);	BN_init(&exp);	BN_init(&x);	BN_init(&y);	BN_bin2bn(modulus, SEC_MODULUS_SIZE, &mod);	BN_bin2bn(exponent, SEC_EXPONENT_SIZE, &exp);	BN_bin2bn(inr, len, &x);	BN_mod_exp(&y, &x, &exp, &mod, ctx);	outlen = BN_bn2bin(&y, out);	reverse(out, outlen);	if (outlen < SEC_MODULUS_SIZE)		memset(out + outlen, 0, SEC_MODULUS_SIZE - outlen);	BN_free(&y);	BN_clear_free(&x);	BN_free(&exp);	BN_free(&mod);	BN_CTX_free(ctx);}/* Initialise secure transport packet */STREAMsec_init(uint32 flags, int maxlen){	int hdrlen;	STREAM s;	if (!g_licence_issued)		hdrlen = (flags & SEC_ENCRYPT) ? 12 : 4;	else		hdrlen = (flags & SEC_ENCRYPT) ? 12 : 0;	s = mcs_init(maxlen + hdrlen);	s_push_layer(s, sec_hdr, hdrlen);	return s;}/* Transmit secure transport packet over specified channel */voidsec_send_to_channel(STREAM s, uint32 flags, uint16 channel){	int datalen;	s_pop_layer(s, sec_hdr);	if (!g_licence_issued || (flags & SEC_ENCRYPT))		out_uint32_le(s, flags);	if (flags & SEC_ENCRYPT)	{		flags &= ~SEC_ENCRYPT;		datalen = s->end - s->p - 8;#if WITH_DEBUG		DEBUG(("Sending encrypted packet:\n"));		hexdump(s->p + 8, datalen);#endif		sec_sign(s->p, 8, sec_sign_key, rc4_key_len, s->p + 8, datalen);		sec_encrypt(s->p + 8, datalen);	}	mcs_send_to_channel(s, channel);}/* Transmit secure transport packet */voidsec_send(STREAM s, uint32 flags){	sec_send_to_channel(s, flags, MCS_GLOBAL_CHANNEL);}/* Transfer the client random to the server */static voidsec_establish_key(void){	uint32 length = SEC_MODULUS_SIZE + SEC_PADDING_SIZE;	uint32 flags = SEC_CLIENT_RANDOM;	STREAM s;	s = sec_init(flags, 76);	out_uint32_le(s, length);	out_uint8p(s, sec_crypted_random, SEC_MODULUS_SIZE);	out_uint8s(s, SEC_PADDING_SIZE);	s_mark_end(s);	sec_send(s, flags);}/* Output connect initial data blob */static voidsec_out_mcs_data(STREAM s){	int hostlen = 2 * strlen(g_hostname);	int length = 158 + 76 + 12 + 4;	unsigned int i;	if (g_num_channels > 0)		length += g_num_channels * 12 + 8;	if (hostlen > 30)		hostlen = 30;	/* Generic Conference Control (T.124) ConferenceCreateRequest */	out_uint16_be(s, 5);	out_uint16_be(s, 0x14);	out_uint8(s, 0x7c);	out_uint16_be(s, 1);	out_uint16_be(s, (length | 0x8000));	/* remaining length */	out_uint16_be(s, 8);	/* length? */	out_uint16_be(s, 16);	out_uint8(s, 0);	out_uint16_le(s, 0xc001);	out_uint8(s, 0);	out_uint32_le(s, 0x61637544);	/* OEM ID: "Duca", as in Ducati. */	out_uint16_be(s, ((length - 14) | 0x8000));	/* remaining length */	/* Client information */	out_uint16_le(s, SEC_TAG_CLI_INFO);	out_uint16_le(s, 212);	/* length */	out_uint16_le(s, g_use_rdp5 ? 4 : 1);	/* RDP version. 1 == RDP4, 4 == RDP5. */	out_uint16_le(s, 8);	out_uint16_le(s, g_width);	out_uint16_le(s, g_height);	out_uint16_le(s, 0xca01);	out_uint16_le(s, 0xaa03);	out_uint32_le(s, g_keylayout);	out_uint32_le(s, 2600);	/* Client build. We are now 2600 compatible :-) */	/* Unicode name of client, padded to 32 bytes */	rdp_out_unistr(s, g_hostname, hostlen);	out_uint8s(s, 30 - hostlen);

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91年精品国产| 久久九九久久九九| 粉嫩aⅴ一区二区三区四区五区 | 欧美在线一二三四区| 秋霞影院一区二区| 亚洲欧美另类在线| 久久久久久免费毛片精品| 色婷婷久久一区二区三区麻豆| 免费成人av资源网| 亚洲一卡二卡三卡四卡五卡| 欧美一级精品大片| 一本色道久久综合亚洲精品按摩| 久久国产精品99久久人人澡| 国产精品久久免费看| 欧美一区二区在线看| 成人福利电影精品一区二区在线观看| 久久99久久99精品免视看婷婷| 亚洲靠逼com| 国产精品美女一区二区| 日韩视频一区二区三区 | 欧美精品丝袜中出| 91麻豆福利精品推荐| 国产一区二区精品久久91| 亚洲成国产人片在线观看| 国产精品成人一区二区艾草 | 一个色在线综合| 最新国产成人在线观看| 精品日韩av一区二区| 欧美日韩一二三| 91福利在线看| 欧美伊人久久久久久久久影院| 国产成人免费高清| 国产成人在线观看免费网站| 国产成人高清视频| 国产成人免费视频网站| 精品伊人久久久久7777人| 亚洲a一区二区| 五月婷婷激情综合网| 一区二区三区欧美日| 亚洲猫色日本管| 亚洲女厕所小便bbb| 中文字幕在线播放不卡一区| 精品欧美一区二区在线观看| 欧美日韩在线电影| 欧美精品日韩一区| 欧美剧情片在线观看| 色视频成人在线观看免| 99精品视频免费在线观看| 成人性生交大片免费看中文网站| 国产麻豆精品视频| 不卡一区在线观看| 91视频观看免费| 欧美体内she精高潮| 欧美性xxxxx极品少妇| 欧美在线制服丝袜| 91精品国产乱码| 亚洲精品在线网站| 欧美国产精品一区| 亚洲精品高清在线观看| 亚洲制服丝袜在线| 日本免费在线视频不卡一不卡二| 日韩在线卡一卡二| 国产一区不卡在线| 成人动漫一区二区| 欧美日韩一级大片网址| 欧美美女bb生活片| 久久婷婷综合激情| 亚洲天堂成人在线观看| 亚洲视频一区二区在线| 亚洲国产一区二区视频| 热久久免费视频| 国产suv精品一区二区6| 91视频在线观看| 91精品国产乱码| 中文在线一区二区| 亚洲第一福利视频在线| 日本不卡视频一二三区| 国产高清久久久| 欧美无砖砖区免费| 国产性天天综合网| 亚洲国产日韩一区二区| 大尺度一区二区| 欧美精品乱码久久久久久按摩| 日韩欧美在线123| 1000部国产精品成人观看| 亚洲制服欧美中文字幕中文字幕| 日韩国产精品久久| 成人少妇影院yyyy| 91精品国产91综合久久蜜臀| 精品国产伦一区二区三区观看方式 | 色婷婷综合久久久中文字幕| 欧美最猛性xxxxx直播| 日韩欧美激情在线| 一区二区三区四区av| 老司机午夜精品| 欧美性大战久久久| 国产精品美女一区二区三区| 一区二区三区蜜桃| 高清在线不卡av| 欧美一级爆毛片| 一区二区三区精品视频在线| 亚洲高清视频中文字幕| 国模冰冰炮一区二区| 欧美性xxxxxx少妇| 亚洲人成7777| 国产精品69毛片高清亚洲| 欧美日精品一区视频| 日本一区二区动态图| 日韩精品成人一区二区三区| 国产精品一二三四五| 欧美欧美欧美欧美首页| 中文字幕一区二区三区不卡| 丝袜亚洲另类欧美| 91成人网在线| 日韩一区中文字幕| 成人一区二区三区视频| 2欧美一区二区三区在线观看视频 337p粉嫩大胆噜噜噜噜噜91av | 成人一级片网址| 亚洲精品一区二区在线观看| 亚洲蜜臀av乱码久久精品蜜桃| 国产精品亚洲专一区二区三区| 欧美一区二区三区系列电影| 国产精品午夜在线观看| 国产一二三精品| 日韩精品一区二区三区中文精品 | 欧美高清在线一区二区| 久久成人综合网| 日韩欧美精品在线视频| 视频一区二区国产| 欧美猛男男办公室激情| 亚洲卡通动漫在线| 91国产免费观看| 伊人性伊人情综合网| 成人精品在线视频观看| 久久久精品2019中文字幕之3| 另类人妖一区二区av| 欧美日韩免费观看一区二区三区| 国产精品久久久久久久久免费樱桃| 国产酒店精品激情| 久久久久9999亚洲精品| 国产在线国偷精品免费看| 精品女同一区二区| 欧美在线你懂的| 亚洲成人久久影院| 欧美情侣在线播放| 久久av资源网| 国产网站一区二区| 不卡欧美aaaaa| 亚洲精品大片www| 欧美老肥妇做.爰bbww| 亚洲成人1区2区| 日韩你懂的在线播放| 麻豆国产精品官网| 国产三级三级三级精品8ⅰ区| 国模无码大尺度一区二区三区 | 国产精品久久久久aaaa樱花 | 亚洲欧美日韩电影| 欧美三级电影精品| 久久成人久久鬼色| 久久久www成人免费毛片麻豆 | 久久99精品国产麻豆不卡| 精品久久久久久久人人人人传媒 | 7777精品伊人久久久大香线蕉 | 欧美日本在线观看| 老司机精品视频导航| 久久久久99精品一区| 不卡视频免费播放| 偷拍与自拍一区| 久久久国产精华| 欧美系列日韩一区| 激情久久五月天| 亚洲视频一区在线观看| 欧美日韩国产成人在线91| 久久精品国产精品亚洲综合| 精品人在线二区三区| aa级大片欧美| 日韩精品一卡二卡三卡四卡无卡| 精品日韩成人av| 色综合色狠狠综合色| 午夜久久久久久久久| 久久色.com| 欧美午夜精品电影| 国产suv精品一区二区三区| 中文字幕中文字幕在线一区 | 欧美一级免费观看| 成人精品gif动图一区| 一区二区三国产精华液| 日韩视频一区二区| 99国产精品久久久| 麻豆精品国产91久久久久久| 国产亚洲精品bt天堂精选| 在线观看亚洲精品| 国产成人综合在线播放| 亚洲成国产人片在线观看| 久久先锋资源网| 91视频xxxx| 国产精品亚洲专一区二区三区| 一区二区三区四区五区视频在线观看 | 日本va欧美va欧美va精品| 国产精品毛片无遮挡高清|