亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? tls_openssl.c

?? IEEE 802.11a/b/g 服務器端AP
?? C
?? 第 1 頁 / 共 5 頁
字號:
	ssl_ctx->cert_store = X509_STORE_new();	if (ssl_ctx->cert_store == NULL) {		wpa_printf(MSG_DEBUG, "OpenSSL: %s - failed to allocate new "			   "certificate store", __func__);		X509_free(cert);		return -1;	}	if (!X509_STORE_add_cert(ssl_ctx->cert_store, cert)) {		unsigned long err = ERR_peek_error();		tls_show_errors(MSG_WARNING, __func__,				"Failed to add CA certificate from engine "				"to certificate store");		if (ERR_GET_LIB(err) == ERR_LIB_X509 &&		    ERR_GET_REASON(err) == X509_R_CERT_ALREADY_IN_HASH_TABLE) {			wpa_printf(MSG_DEBUG, "OpenSSL: %s - ignoring cert"				   " already in hash table error",				   __func__);		} else {			X509_free(cert);			return -1;		}	}	X509_free(cert);	wpa_printf(MSG_DEBUG, "OpenSSL: %s - added CA certificate from engine "		   "to certificate store", __func__);	SSL_set_verify(conn->ssl, SSL_VERIFY_PEER, tls_verify_cb);	return 0;#else /* OPENSSL_NO_ENGINE */	return -1;#endif /* OPENSSL_NO_ENGINE */}static int tls_connection_engine_private_key(struct tls_connection *conn){#ifndef OPENSSL_NO_ENGINE	if (SSL_use_PrivateKey(conn->ssl, conn->private_key) != 1) {		tls_show_errors(MSG_ERROR, __func__,				"ENGINE: cannot use private key for TLS");		return -1;	}	if (!SSL_check_private_key(conn->ssl)) {		tls_show_errors(MSG_INFO, __func__,				"Private key failed verification");		return -1;	}	return 0;#else /* OPENSSL_NO_ENGINE */	wpa_printf(MSG_ERROR, "SSL: Configuration uses engine, but "		   "engine support was not compiled in");	return -1;#endif /* OPENSSL_NO_ENGINE */}static int tls_connection_private_key(void *_ssl_ctx,				      struct tls_connection *conn,				      const char *private_key,				      const char *private_key_passwd,				      const u8 *private_key_blob,				      size_t private_key_blob_len){	SSL_CTX *ssl_ctx = _ssl_ctx;	char *passwd;	int ok;	if (private_key == NULL && private_key_blob == NULL)		return 0;	if (private_key_passwd) {		passwd = os_strdup(private_key_passwd);		if (passwd == NULL)			return -1;	} else		passwd = NULL;	SSL_CTX_set_default_passwd_cb(ssl_ctx, tls_passwd_cb);	SSL_CTX_set_default_passwd_cb_userdata(ssl_ctx, passwd);	ok = 0;	while (private_key_blob) {		if (SSL_use_PrivateKey_ASN1(EVP_PKEY_RSA, conn->ssl,					    (u8 *) private_key_blob,					    private_key_blob_len) == 1) {			wpa_printf(MSG_DEBUG, "OpenSSL: SSL_use_PrivateKey_"				   "ASN1(EVP_PKEY_RSA) --> OK");			ok = 1;			break;		} else {			tls_show_errors(MSG_DEBUG, __func__,					"SSL_use_PrivateKey_ASN1(EVP_PKEY_RSA)"					" failed");		}		if (SSL_use_PrivateKey_ASN1(EVP_PKEY_DSA, conn->ssl,					    (u8 *) private_key_blob,					    private_key_blob_len) == 1) {			wpa_printf(MSG_DEBUG, "OpenSSL: SSL_use_PrivateKey_"				   "ASN1(EVP_PKEY_DSA) --> OK");			ok = 1;			break;		} else {			tls_show_errors(MSG_DEBUG, __func__,					"SSL_use_PrivateKey_ASN1(EVP_PKEY_DSA)"					" failed");		}		if (SSL_use_RSAPrivateKey_ASN1(conn->ssl,					       (u8 *) private_key_blob,					       private_key_blob_len) == 1) {			wpa_printf(MSG_DEBUG, "OpenSSL: "				   "SSL_use_RSAPrivateKey_ASN1 --> OK");			ok = 1;			break;		} else {			tls_show_errors(MSG_DEBUG, __func__,					"SSL_use_RSAPrivateKey_ASN1 failed");		}		if (tls_read_pkcs12_blob(ssl_ctx, conn->ssl, private_key_blob,					 private_key_blob_len, passwd) == 0) {			wpa_printf(MSG_DEBUG, "OpenSSL: PKCS#12 as blob --> "				   "OK");			ok = 1;			break;		}		break;	}	while (!ok && private_key) {#ifndef OPENSSL_NO_STDIO		if (SSL_use_PrivateKey_file(conn->ssl, private_key,					    SSL_FILETYPE_ASN1) == 1) {			wpa_printf(MSG_DEBUG, "OpenSSL: "				   "SSL_use_PrivateKey_File (DER) --> OK");			ok = 1;			break;		} else {			tls_show_errors(MSG_DEBUG, __func__,					"SSL_use_PrivateKey_File (DER) "					"failed");		}		if (SSL_use_PrivateKey_file(conn->ssl, private_key,					    SSL_FILETYPE_PEM) == 1) {			wpa_printf(MSG_DEBUG, "OpenSSL: "				   "SSL_use_PrivateKey_File (PEM) --> OK");			ok = 1;			break;		} else {			tls_show_errors(MSG_DEBUG, __func__,					"SSL_use_PrivateKey_File (PEM) "					"failed");		}#else /* OPENSSL_NO_STDIO */		wpa_printf(MSG_DEBUG, "OpenSSL: %s - OPENSSL_NO_STDIO",			   __func__);#endif /* OPENSSL_NO_STDIO */		if (tls_read_pkcs12(ssl_ctx, conn->ssl, private_key, passwd)		    == 0) {			wpa_printf(MSG_DEBUG, "OpenSSL: Reading PKCS#12 file "				   "--> OK");			ok = 1;			break;		}		if (tls_cryptoapi_cert(conn->ssl, private_key) == 0) {			wpa_printf(MSG_DEBUG, "OpenSSL: Using CryptoAPI to "				   "access certificate store --> OK");			ok = 1;			break;		}		break;	}	if (!ok) {		wpa_printf(MSG_INFO, "OpenSSL: Failed to load private key");		os_free(passwd);		ERR_clear_error();		return -1;	}	ERR_clear_error();	SSL_CTX_set_default_passwd_cb(ssl_ctx, NULL);	os_free(passwd);		if (!SSL_check_private_key(conn->ssl)) {		tls_show_errors(MSG_INFO, __func__, "Private key failed "				"verification");		return -1;	}	wpa_printf(MSG_DEBUG, "SSL: Private key loaded successfully");	return 0;}static int tls_global_private_key(SSL_CTX *ssl_ctx, const char *private_key,				  const char *private_key_passwd){	char *passwd;	if (private_key == NULL)		return 0;	if (private_key_passwd) {		passwd = os_strdup(private_key_passwd);		if (passwd == NULL)			return -1;	} else		passwd = NULL;	SSL_CTX_set_default_passwd_cb(ssl_ctx, tls_passwd_cb);	SSL_CTX_set_default_passwd_cb_userdata(ssl_ctx, passwd);	if (#ifndef OPENSSL_NO_STDIO	    SSL_CTX_use_PrivateKey_file(ssl_ctx, private_key,					SSL_FILETYPE_ASN1) != 1 &&	    SSL_CTX_use_PrivateKey_file(ssl_ctx, private_key,					SSL_FILETYPE_PEM) != 1 &&#endif /* OPENSSL_NO_STDIO */	    tls_read_pkcs12(ssl_ctx, NULL, private_key, passwd)) {		tls_show_errors(MSG_INFO, __func__,				"Failed to load private key");		os_free(passwd);		ERR_clear_error();		return -1;	}	os_free(passwd);	ERR_clear_error();	SSL_CTX_set_default_passwd_cb(ssl_ctx, NULL);		if (!SSL_CTX_check_private_key(ssl_ctx)) {		tls_show_errors(MSG_INFO, __func__,				"Private key failed verification");		return -1;	}	return 0;}static int tls_connection_dh(struct tls_connection *conn, const char *dh_file){#ifdef OPENSSL_NO_DH	if (dh_file == NULL)		return 0;	wpa_printf(MSG_ERROR, "TLS: openssl does not include DH support, but "		   "dh_file specified");	return -1;#else /* OPENSSL_NO_DH */	DH *dh;	BIO *bio;	/* TODO: add support for dh_blob */	if (dh_file == NULL)		return 0;	if (conn == NULL)		return -1;	bio = BIO_new_file(dh_file, "r");	if (bio == NULL) {		wpa_printf(MSG_INFO, "TLS: Failed to open DH file '%s': %s",			   dh_file, ERR_error_string(ERR_get_error(), NULL));		return -1;	}	dh = PEM_read_bio_DHparams(bio, NULL, NULL, NULL);	BIO_free(bio);#ifndef OPENSSL_NO_DSA	while (dh == NULL) {		DSA *dsa;		wpa_printf(MSG_DEBUG, "TLS: Failed to parse DH file '%s': %s -"			   " trying to parse as DSA params", dh_file,			   ERR_error_string(ERR_get_error(), NULL));		bio = BIO_new_file(dh_file, "r");		if (bio == NULL)			break;		dsa = PEM_read_bio_DSAparams(bio, NULL, NULL, NULL);		BIO_free(bio);		if (!dsa) {			wpa_printf(MSG_DEBUG, "TLS: Failed to parse DSA file "				   "'%s': %s", dh_file,				   ERR_error_string(ERR_get_error(), NULL));			break;		}		wpa_printf(MSG_DEBUG, "TLS: DH file in DSA param format");		dh = DSA_dup_DH(dsa);		DSA_free(dsa);		if (dh == NULL) {			wpa_printf(MSG_INFO, "TLS: Failed to convert DSA "				   "params into DH params");			break;		}		break;	}#endif /* !OPENSSL_NO_DSA */	if (dh == NULL) {		wpa_printf(MSG_INFO, "TLS: Failed to read/parse DH/DSA file "			   "'%s'", dh_file);		return -1;	}	if (SSL_set_tmp_dh(conn->ssl, dh) != 1) {		wpa_printf(MSG_INFO, "TLS: Failed to set DH params from '%s': "			   "%s", dh_file,			   ERR_error_string(ERR_get_error(), NULL));		DH_free(dh);		return -1;	}	DH_free(dh);	return 0;#endif /* OPENSSL_NO_DH */}static int tls_global_dh(SSL_CTX *ssl_ctx, const char *dh_file){#ifdef OPENSSL_NO_DH	if (dh_file == NULL)		return 0;	wpa_printf(MSG_ERROR, "TLS: openssl does not include DH support, but "		   "dh_file specified");	return -1;#else /* OPENSSL_NO_DH */	DH *dh;	BIO *bio;	/* TODO: add support for dh_blob */	if (dh_file == NULL)		return 0;	if (ssl_ctx == NULL)		return -1;	bio = BIO_new_file(dh_file, "r");	if (bio == NULL) {		wpa_printf(MSG_INFO, "TLS: Failed to open DH file '%s': %s",			   dh_file, ERR_error_string(ERR_get_error(), NULL));		return -1;	}	dh = PEM_read_bio_DHparams(bio, NULL, NULL, NULL);	BIO_free(bio);#ifndef OPENSSL_NO_DSA	while (dh == NULL) {		DSA *dsa;		wpa_printf(MSG_DEBUG, "TLS: Failed to parse DH file '%s': %s -"			   " trying to parse as DSA params", dh_file,			   ERR_error_string(ERR_get_error(), NULL));		bio = BIO_new_file(dh_file, "r");		if (bio == NULL)			break;		dsa = PEM_read_bio_DSAparams(bio, NULL, NULL, NULL);		BIO_free(bio);		if (!dsa) {			wpa_printf(MSG_DEBUG, "TLS: Failed to parse DSA file "				   "'%s': %s", dh_file,				   ERR_error_string(ERR_get_error(), NULL));			break;		}		wpa_printf(MSG_DEBUG, "TLS: DH file in DSA param format");		dh = DSA_dup_DH(dsa);		DSA_free(dsa);		if (dh == NULL) {			wpa_printf(MSG_INFO, "TLS: Failed to convert DSA "				   "params into DH params");			break;		}		break;	}#endif /* !OPENSSL_NO_DSA */	if (dh == NULL) {		wpa_printf(MSG_INFO, "TLS: Failed to read/parse DH/DSA file "			   "'%s'", dh_file);		return -1;	}	if (SSL_CTX_set_tmp_dh(ssl_ctx, dh) != 1) {		wpa_printf(MSG_INFO, "TLS: Failed to set DH params from '%s': "			   "%s", dh_file,			   ERR_error_string(ERR_get_error(), NULL));		DH_free(dh);		return -1;	}	DH_free(dh);	return 0;#endif /* OPENSSL_NO_DH */}int tls_connection_get_keys(void *ssl_ctx, struct tls_connection *conn,			    struct tls_keys *keys){	SSL *ssl;	if (conn == NULL || keys == NULL)		return -1;	ssl = conn->ssl;	if (ssl == NULL || ssl->s3 == NULL || ssl->session == NULL)		return -1;	os_memset(keys, 0, sizeof(*keys));	keys->master_key = ssl->session->master_key;	keys->master_key_len = ssl->session->master_key_length;	keys->client_random = ssl->s3->client_random;	keys->client_random_len = SSL3_RANDOM_SIZE;	keys->server_random = ssl->s3->server_random;	keys->server_random_len = SSL3_RANDOM_SIZE;	return 0;}int tls_connection_prf(void *tls_ctx, struct tls_connection *conn,		       const char *label, int server_random_first,		       u8 *out, size_t out_len){	return -1;}u8 * tls_connection_handshake(void *ssl_ctx, struct tls_connection *conn,			      const u8 *in_data, size_t in_len,			      size_t *out_len, u8 **appl_data,			      size_t *appl_data_len){	int res;	u8 *out_data;	if (appl_data)		*appl_data = NULL;	/*	 * Give TLS handshake data from the server (if available) to OpenSSL	 * for processing.	 */	if (in_data &&	    BIO_write(conn->ssl_in, in_data, in_len) < 0) {		tls_show_errors(MSG_INFO, __func__,				"Handshake failed - BIO_write");		return NULL;	}	/* Initiate TLS handshake or continue the existing handshake */	res = SSL_connect(conn->ssl);	if (res != 1) {		int err = SSL_get_error(conn->ssl, res);		if (err == SSL_ERROR_WANT_READ)			wpa_printf(MSG_DEBUG, "SSL: SSL_connect - want "				   "more data");		else if (err == SSL_ERROR_WANT_WRITE)			wpa_printf(MSG_DEBUG, "SSL: SSL_connect - want to "				   "write");		else {			tls_show_errors(MSG_INFO, __func__, "SSL_connect");			conn->failed++;		}	}	/* Get the TLS handshake data to be sent to the server */	res = BIO_ctrl_pending(conn->ssl_out);	wpa_printf(MSG_DEBUG, "SSL: %d bytes pending from ssl_out", res);	out_data = os_malloc(res == 0 ? 1 : res);	if (out_data == NULL) {		wpa_printf(MSG_DEBUG, "SSL: Failed to allocate memory for "			   "handshake output (%d bytes)", res);		if (BIO_reset(conn->ssl_out) < 0) {			tls_show_errors(MSG_INFO, __func__,					"BIO_reset failed");		}		*out_len = 0;		return NULL;	}	res = res == 0 ? 0 : BIO_read(conn->ssl_out, out_data, res);	if (res < 0) {		tls_show_errors(MSG_INFO, __func__,				"Handshake failed - BIO_read");		if (BIO_reset(conn->ssl_out) < 0) {			tls_show_errors(MSG_INFO, __func__,					"BIO_reset failed");		}		*out_len = 0;		return NULL;	}	*out_len = res;	if (SSL_is_init_finished(conn->ssl) && appl_data) {		*appl_data = os_malloc(in_len);		if (*appl_data) {			res = SSL_read(conn->ssl, *appl_data, in_len);			if (res < 0) {				tls_show_errors(MSG_INFO, __func__,						"Failed to read possible "						"Application Data");				os_free(*appl_data);				*appl_data = NULL;			} else {				*appl_data_len = res;				wpa_hexdump_key(MSG_MSGDUMP, "SSL: Application"						" Data in Finish message",						*appl_data, *appl_data_len);			}		}	}	return out_data;}u8 * tls_connection_server_handshake(void *ssl_ctx,				     struct tls_connection *conn,				     const u8 *in_data, size_t in_len,				     size_t *out_len){	int res;	u8 *out_data;	/*	 * Give TLS handshake data from the client (if available) to OpenSSL	 * for processing.	 */	if (in_data &&	    BIO_write(conn->ssl_in, in_data, in_len) < 0) {		tls_show_errors(MSG_INFO, __func__,				"Handshake failed - BIO_write");		return NULL;	}	/* Initiate TLS handshake or continue the existing handshake */	res = SSL_accept(conn->ssl);

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
成人精品国产一区二区4080| 欧美伦理视频网站| 久久久久久久久久久久久久久99| 美女国产一区二区| 亚洲精品一区二区精华| 国产激情精品久久久第一区二区| 国产性色一区二区| 色诱亚洲精品久久久久久| 一区二区三区日韩精品视频| 欧美午夜一区二区| 91一区一区三区| 久久久久久久综合日本| 本田岬高潮一区二区三区| 日韩毛片精品高清免费| 欧美日韩国产精选| 国产精品一区不卡| 亚洲狠狠丁香婷婷综合久久久| 欧美日韩一区 二区 三区 久久精品| 视频一区在线播放| 精品国产乱码久久久久久夜甘婷婷| 国产黄色精品视频| 亚洲v日本v欧美v久久精品| 欧美大白屁股肥臀xxxxxx| 国产a级毛片一区| 亚洲午夜一区二区三区| 久久综合狠狠综合久久综合88| 99精品久久只有精品| 日韩高清不卡一区二区三区| 国产精品色呦呦| 正在播放一区二区| 99视频精品全部免费在线| 亚洲高清免费视频| 国产丝袜欧美中文另类| 欧美日韩中文精品| 成人免费的视频| 日本成人在线网站| 国产精品国产三级国产普通话99| 欧美日高清视频| 99精品久久只有精品| 狠狠色狠狠色综合系列| 一区二区三区在线观看视频| 久久久久高清精品| 欧美一区二区视频在线观看2022 | 欧美一激情一区二区三区| 国产精品白丝jk黑袜喷水| 亚洲色图欧美激情| 精品免费日韩av| 欧美性大战xxxxx久久久| 精品无人码麻豆乱码1区2区 | 美女视频网站久久| jlzzjlzz欧美大全| 麻豆成人久久精品二区三区小说| 亚洲精品国产精华液| 久久久av毛片精品| 6080日韩午夜伦伦午夜伦| 97se狠狠狠综合亚洲狠狠| 紧缚捆绑精品一区二区| 亚洲五月六月丁香激情| 亚洲免费在线播放| 国产精品第13页| 久久综合色8888| 久久伊99综合婷婷久久伊| 911精品产国品一二三产区| 在线免费亚洲电影| 色综合天天综合狠狠| 91色视频在线| 99久久777色| 91色九色蝌蚪| 色88888久久久久久影院野外| 成人av高清在线| 成人综合在线观看| 99视频有精品| 色狠狠av一区二区三区| 91麻豆精品秘密| 欧美影视一区二区三区| 99精品桃花视频在线观看| 国产美女久久久久| 国产美女在线精品| 高清在线观看日韩| 成人自拍视频在线观看| av在线不卡电影| 91亚洲精品久久久蜜桃| 91色porny在线视频| 一本久久a久久免费精品不卡| av综合在线播放| 一本色道综合亚洲| 欧洲精品在线观看| 欧美三级欧美一级| 欧美三级蜜桃2在线观看| 成人福利视频网站| 成人晚上爱看视频| 一本色道a无线码一区v| 色菇凉天天综合网| 欧美一区二区三区喷汁尤物| 在线播放91灌醉迷j高跟美女| 日韩网站在线看片你懂的| 欧美一区二区女人| 久久久久久久精| 欧美韩国日本不卡| 欧美日免费三级在线| 99久久精品国产网站| 色吧成人激情小说| 欧美精品v国产精品v日韩精品| 777午夜精品视频在线播放| 欧美一区二区三区啪啪| 精品久久免费看| 国产精品污网站| 亚洲人123区| 中文字幕一区二区三区蜜月| 亚洲三级免费观看| 亚洲chinese男男1069| 麻豆精品精品国产自在97香蕉| 成人免费av资源| 欧美性猛交xxxx黑人交| 337p粉嫩大胆噜噜噜噜噜91av| 国产亚洲va综合人人澡精品| 亚洲精品中文在线影院| 日韩福利电影在线| 99久久精品国产导航| 欧美亚洲国产一卡| 欧美va亚洲va| 一区二区三区毛片| 国产麻豆日韩欧美久久| 欧美久久一二区| 国产女人水真多18毛片18精品视频| 一区二区三区资源| 麻豆精品在线看| 欧美在线观看一区| 337p粉嫩大胆色噜噜噜噜亚洲| 亚洲愉拍自拍另类高清精品| 极品少妇一区二区三区精品视频| 在线观看www91| 91超碰这里只有精品国产| 亚洲精品久久嫩草网站秘色| 国产乱码精品1区2区3区| 欧美日高清视频| 亚洲美女免费在线| 国产综合久久久久久鬼色| 5566中文字幕一区二区电影| 亚洲国产精品99久久久久久久久| 久久99久久久欧美国产| 成人性生交大合| 久久综合久久综合亚洲| 亚洲综合一区二区精品导航| 国产a精品视频| 久久久欧美精品sm网站| 午夜欧美电影在线观看| 91成人看片片| 欧美日韩三级在线| 国产成人福利片| 在线观看亚洲a| 亚洲男人天堂av网| 国产不卡免费视频| 国产午夜精品一区二区三区嫩草| 亚洲综合免费观看高清完整版| 韩国精品久久久| 日韩欧美国产精品| 视频一区国产视频| 91精品国产91久久久久久最新毛片| 综合久久综合久久| 色一区在线观看| 国产精品毛片a∨一区二区三区| 成人av综合在线| 欧美日韩视频在线一区二区 | 在线一区二区视频| 亚洲色图在线看| 成年人网站91| 国产精品久久久久三级| 波多野结衣亚洲一区| 欧美激情一区三区| 成人97人人超碰人人99| 国产亚洲精品bt天堂精选| 成人av在线影院| 欧美va亚洲va香蕉在线| 国产盗摄一区二区三区| 久久精品亚洲精品国产欧美kt∨ | 亚洲欧美日韩国产综合在线| 国产黄色精品视频| ㊣最新国产の精品bt伙计久久| 成人污视频在线观看| 国产精品福利av| 一本大道久久a久久综合| 亚洲欧美色图小说| 欧洲国内综合视频| 日韩精品福利网| 久久久精品一品道一区| 国产成人综合在线播放| 亚洲精品va在线观看| 欧美主播一区二区三区美女| 日韩av二区在线播放| 欧美猛男超大videosgay| 日韩电影免费在线| 国产丝袜在线精品| 色综合天天综合网天天看片| 日本中文字幕一区二区视频 | 国产精品一区不卡| 一区二区三区毛片| 一本一道久久a久久精品综合蜜臀| 一区二区久久久| 26uuu精品一区二区在线观看|