亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? tls_openssl.c

?? IEEE 802.11a/b/g 服務器端AP
?? C
?? 第 1 頁 / 共 5 頁
字號:
	if (res != 1) {		int err = SSL_get_error(conn->ssl, res);		if (err == SSL_ERROR_WANT_READ)			wpa_printf(MSG_DEBUG, "SSL: SSL_accept - want "				   "more data");		else if (err == SSL_ERROR_WANT_WRITE)			wpa_printf(MSG_DEBUG, "SSL: SSL_accept - want to "				   "write");		else {			tls_show_errors(MSG_INFO, __func__, "SSL_accept");			return NULL;		}	}	/* Get the TLS handshake data to be sent to the client */	res = BIO_ctrl_pending(conn->ssl_out);	wpa_printf(MSG_DEBUG, "SSL: %d bytes pending from ssl_out", res);	out_data = os_malloc(res == 0 ? 1 : res);	if (out_data == NULL) {		wpa_printf(MSG_DEBUG, "SSL: Failed to allocate memory for "			   "handshake output (%d bytes)", res);		if (BIO_reset(conn->ssl_out) < 0) {			tls_show_errors(MSG_INFO, __func__,					"BIO_reset failed");		}		*out_len = 0;		return NULL;	}	res = res == 0 ? 0 : BIO_read(conn->ssl_out, out_data, res);	if (res < 0) {		tls_show_errors(MSG_INFO, __func__,				"Handshake failed - BIO_read");		if (BIO_reset(conn->ssl_out) < 0) {			tls_show_errors(MSG_INFO, __func__,					"BIO_reset failed");		}		*out_len = 0;		return NULL;	}	*out_len = res;	return out_data;}int tls_connection_encrypt(void *ssl_ctx, struct tls_connection *conn,			   const u8 *in_data, size_t in_len,			   u8 *out_data, size_t out_len){	int res;	if (conn == NULL)		return -1;	/* Give plaintext data for OpenSSL to encrypt into the TLS tunnel. */	if ((res = BIO_reset(conn->ssl_in)) < 0 ||	    (res = BIO_reset(conn->ssl_out)) < 0) {		tls_show_errors(MSG_INFO, __func__, "BIO_reset failed");		return res;	}	res = SSL_write(conn->ssl, in_data, in_len);	if (res < 0) {		tls_show_errors(MSG_INFO, __func__,				"Encryption failed - SSL_write");		return res;	}	/* Read encrypted data to be sent to the server */	res = BIO_read(conn->ssl_out, out_data, out_len);	if (res < 0) {		tls_show_errors(MSG_INFO, __func__,				"Encryption failed - BIO_read");		return res;	}	return res;}int tls_connection_decrypt(void *ssl_ctx, struct tls_connection *conn,			   const u8 *in_data, size_t in_len,			   u8 *out_data, size_t out_len){	int res;	/* Give encrypted data from TLS tunnel for OpenSSL to decrypt. */	res = BIO_write(conn->ssl_in, in_data, in_len);	if (res < 0) {		tls_show_errors(MSG_INFO, __func__,				"Decryption failed - BIO_write");		return res;	}	if (BIO_reset(conn->ssl_out) < 0) {		tls_show_errors(MSG_INFO, __func__, "BIO_reset failed");		return res;	}	/* Read decrypted data for further processing */	res = SSL_read(conn->ssl, out_data, out_len);	if (res < 0) {		tls_show_errors(MSG_INFO, __func__,				"Decryption failed - SSL_read");		return res;	}	return res;}int tls_connection_resumed(void *ssl_ctx, struct tls_connection *conn){	return conn ? conn->ssl->hit : 0;}int tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn,				   u8 *ciphers){	char buf[100], *pos, *end;	u8 *c;	int ret;	if (conn == NULL || conn->ssl == NULL || ciphers == NULL)		return -1;	buf[0] = '\0';	pos = buf;	end = pos + sizeof(buf);	c = ciphers;	while (*c != TLS_CIPHER_NONE) {		const char *suite;		switch (*c) {		case TLS_CIPHER_RC4_SHA:			suite = "RC4-SHA";			break;		case TLS_CIPHER_AES128_SHA:			suite = "AES128-SHA";			break;		case TLS_CIPHER_RSA_DHE_AES128_SHA:			suite = "DHE-RSA-AES128-SHA";			break;		case TLS_CIPHER_ANON_DH_AES128_SHA:			suite = "ADH-AES128-SHA";			break;		default:			wpa_printf(MSG_DEBUG, "TLS: Unsupported "				   "cipher selection: %d", *c);			return -1;		}		ret = os_snprintf(pos, end - pos, ":%s", suite);		if (ret < 0 || ret >= end - pos)			break;		pos += ret;		c++;	}	wpa_printf(MSG_DEBUG, "OpenSSL: cipher suites: %s", buf + 1);	if (SSL_set_cipher_list(conn->ssl, buf + 1) != 1) {		tls_show_errors(MSG_INFO, __func__,				"Cipher suite configuration failed");		return -1;	}	return 0;}int tls_get_cipher(void *ssl_ctx, struct tls_connection *conn,		   char *buf, size_t buflen){	const char *name;	if (conn == NULL || conn->ssl == NULL)		return -1;	name = SSL_get_cipher(conn->ssl);	if (name == NULL)		return -1;	os_strlcpy(buf, name, buflen);	return 0;}int tls_connection_enable_workaround(void *ssl_ctx,				     struct tls_connection *conn){	SSL_set_options(conn->ssl, SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS);	return 0;}#if defined(EAP_FAST) || defined(EAP_FAST_DYNAMIC)/* ClientHello TLS extensions require a patch to openssl, so this function is * commented out unless explicitly needed for EAP-FAST in order to be able to * build this file with unmodified openssl. */int tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn,				    int ext_type, const u8 *data,				    size_t data_len){	if (conn == NULL || conn->ssl == NULL)		return -1;	if (SSL_set_hello_extension(conn->ssl, ext_type, (void *) data,				    data_len) != 1)		return -1;	return 0;}#endif /* EAP_FAST || EAP_FAST_DYNAMIC */int tls_connection_get_failed(void *ssl_ctx, struct tls_connection *conn){	if (conn == NULL)		return -1;	return conn->failed;}int tls_connection_get_read_alerts(void *ssl_ctx, struct tls_connection *conn){	if (conn == NULL)		return -1;	return conn->read_alerts;}int tls_connection_get_write_alerts(void *ssl_ctx, struct tls_connection *conn){	if (conn == NULL)		return -1;	return conn->write_alerts;}int tls_connection_set_params(void *tls_ctx, struct tls_connection *conn,			      const struct tls_connection_params *params){	int ret;	unsigned long err;	if (conn == NULL)		return -1;	while ((err = ERR_get_error())) {		wpa_printf(MSG_INFO, "%s: Clearing pending SSL error: %s",			   __func__, ERR_error_string(err, NULL));	}	if (params->engine) {		wpa_printf(MSG_DEBUG, "SSL: Initializing TLS engine");		ret = tls_engine_init(conn, params->engine_id, params->pin,				      params->key_id, params->cert_id,				      params->ca_cert_id);		if (ret)			return ret;	}	if (tls_connection_set_subject_match(conn,					     params->subject_match,					     params->altsubject_match))		return -1;	if (params->engine && params->ca_cert_id) {		if (tls_connection_engine_ca_cert(tls_ctx, conn,						  params->ca_cert_id))			return TLS_SET_PARAMS_ENGINE_PRV_VERIFY_FAILED;	} else if (tls_connection_ca_cert(tls_ctx, conn, params->ca_cert,					  params->ca_cert_blob,					  params->ca_cert_blob_len,					  params->ca_path))		return -1;	if (params->engine && params->cert_id) {		if (tls_connection_engine_client_cert(conn, params->cert_id))			return TLS_SET_PARAMS_ENGINE_PRV_VERIFY_FAILED;	} else if (tls_connection_client_cert(conn, params->client_cert,					      params->client_cert_blob,					      params->client_cert_blob_len))		return -1;	if (params->engine && params->key_id) {		wpa_printf(MSG_DEBUG, "TLS: Using private key from engine");		if (tls_connection_engine_private_key(conn))			return TLS_SET_PARAMS_ENGINE_PRV_VERIFY_FAILED;	} else if (tls_connection_private_key(tls_ctx, conn,					      params->private_key,					      params->private_key_passwd,					      params->private_key_blob,					      params->private_key_blob_len)) {		wpa_printf(MSG_INFO, "TLS: Failed to load private key '%s'",			   params->private_key);		return -1;	}	if (tls_connection_dh(conn, params->dh_file)) {		wpa_printf(MSG_INFO, "TLS: Failed to load DH file '%s'",			   params->dh_file);		return -1;	}	tls_get_errors(tls_ctx);	return 0;}int tls_global_set_params(void *tls_ctx,			  const struct tls_connection_params *params){	SSL_CTX *ssl_ctx = tls_ctx;	unsigned long err;	while ((err = ERR_get_error())) {		wpa_printf(MSG_INFO, "%s: Clearing pending SSL error: %s",			   __func__, ERR_error_string(err, NULL));	}	if (tls_global_ca_cert(ssl_ctx, params->ca_cert))		return -1;	if (tls_global_client_cert(ssl_ctx, params->client_cert))		return -1;	if (tls_global_private_key(ssl_ctx, params->private_key,				   params->private_key_passwd))		return -1;	if (tls_global_dh(ssl_ctx, params->dh_file)) {		wpa_printf(MSG_INFO, "TLS: Failed to load DH file '%s'",			   params->dh_file);		return -1;	}	return 0;}int tls_connection_get_keyblock_size(void *tls_ctx,				     struct tls_connection *conn){	const EVP_CIPHER *c;	const EVP_MD *h;	if (conn == NULL || conn->ssl == NULL ||	    conn->ssl->enc_read_ctx == NULL ||	    conn->ssl->enc_read_ctx->cipher == NULL ||	    conn->ssl->read_hash == NULL)		return -1;	c = conn->ssl->enc_read_ctx->cipher;#if OPENSSL_VERSION_NUMBER >= 0x00909000L	h = EVP_MD_CTX_md(conn->ssl->read_hash);#else	h = conn->ssl->read_hash;#endif	return 2 * (EVP_CIPHER_key_length(c) +		    EVP_MD_size(h) +		    EVP_CIPHER_iv_length(c));}unsigned int tls_capabilities(void *tls_ctx){	return 0;}int tls_connection_set_ia(void *tls_ctx, struct tls_connection *conn,			  int tls_ia){	return -1;}int tls_connection_ia_send_phase_finished(void *tls_ctx,					  struct tls_connection *conn,					  int final,					  u8 *out_data, size_t out_len){	return -1;}int tls_connection_ia_final_phase_finished(void *tls_ctx,					   struct tls_connection *conn){	return -1;}int tls_connection_ia_permute_inner_secret(void *tls_ctx,					   struct tls_connection *conn,					   const u8 *key, size_t key_len){	return -1;}#if defined(EAP_FAST) || defined(EAP_FAST_DYNAMIC)/* Pre-shared secred requires a patch to openssl, so this function is * commented out unless explicitly needed for EAP-FAST in order to be able to * build this file with unmodified openssl. */static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len,			   STACK_OF(SSL_CIPHER) *peer_ciphers,			   SSL_CIPHER **cipher, void *arg){	struct tls_connection *conn = arg;	int ret;	if (conn == NULL || conn->session_ticket_cb == NULL)		return 0;	ret = conn->session_ticket_cb(conn->session_ticket_cb_ctx,				      conn->session_ticket,				      conn->session_ticket_len,				      s->s3->client_random,				      s->s3->server_random, secret);	os_free(conn->session_ticket);	conn->session_ticket = NULL;	if (ret <= 0)		return 0;	*secret_len = SSL_MAX_MASTER_KEY_LENGTH;	return 1;}#ifdef SSL_OP_NO_TICKETstatic void tls_hello_ext_cb(SSL *s, int client_server, int type,			     unsigned char *data, int len, void *arg){	struct tls_connection *conn = arg;	if (conn == NULL || conn->session_ticket_cb == NULL)		return;	wpa_printf(MSG_DEBUG, "OpenSSL: %s: type=%d length=%d", __func__,		   type, len);	if (type == TLSEXT_TYPE_session_ticket && !client_server) {		os_free(conn->session_ticket);		conn->session_ticket = NULL;		wpa_hexdump(MSG_DEBUG, "OpenSSL: ClientHello SessionTicket "			    "extension", data, len);		conn->session_ticket = os_malloc(len);		if (conn->session_ticket == NULL)			return;		os_memcpy(conn->session_ticket, data, len);		conn->session_ticket_len = len;	}}#else /* SSL_OP_NO_TICKET */static int tls_hello_ext_cb(SSL *s, TLS_EXTENSION *ext, void *arg){	struct tls_connection *conn = arg;	if (conn == NULL || conn->session_ticket_cb == NULL)		return 0;	wpa_printf(MSG_DEBUG, "OpenSSL: %s: type=%d length=%d", __func__,		   ext->type, ext->length);	os_free(conn->session_ticket);	conn->session_ticket = NULL;	if (ext->type == 35) {		wpa_hexdump(MSG_DEBUG, "OpenSSL: ClientHello SessionTicket "			    "extension", ext->data, ext->length);		conn->session_ticket = os_malloc(ext->length);		if (conn->session_ticket == NULL)			return SSL_AD_INTERNAL_ERROR;		os_memcpy(conn->session_ticket, ext->data, ext->length);		conn->session_ticket_len = ext->length;	}	return 0;}#endif /* SSL_OP_NO_TICKET */#endif /* EAP_FAST || EAP_FAST_DYNAMIC */int tls_connection_set_session_ticket_cb(void *tls_ctx,					 struct tls_connection *conn,					 tls_session_ticket_cb cb,					 void *ctx){#if defined(EAP_FAST) || defined(EAP_FAST_DYNAMIC)	conn->session_ticket_cb = cb;	conn->session_ticket_cb_ctx = ctx;	if (cb) {		if (SSL_set_session_secret_cb(conn->ssl, tls_sess_sec_cb,					      conn) != 1)			return -1;#ifdef SSL_OP_NO_TICKET		SSL_set_tlsext_debug_callback(conn->ssl, tls_hello_ext_cb);		SSL_set_tlsext_debug_arg(conn->ssl, conn);#else /* SSL_OP_NO_TICKET */		if (SSL_set_hello_extension_cb(conn->ssl, tls_hello_ext_cb,					       conn) != 1)			return -1;#endif /* SSL_OP_NO_TICKET */	} else {		if (SSL_set_session_secret_cb(conn->ssl, NULL, NULL) != 1)			return -1;#ifdef SSL_OP_NO_TICKET		SSL_set_tlsext_debug_callback(conn->ssl, NULL);		SSL_set_tlsext_debug_arg(conn->ssl, conn);#else /* SSL_OP_NO_TICKET */		if (SSL_set_hello_extension_cb(conn->ssl, NULL, NULL) != 1)			return -1;#endif /* SSL_OP_NO_TICKET */	}	return 0;#else /* EAP_FAST || EAP_FAST_DYNAMIC */	return -1;#endif /* EAP_FAST || EAP_FAST_DYNAMIC */}

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
丁香天五香天堂综合| 国产日产欧美一区二区视频| 欧美视频一区二区三区| 91免费在线播放| 91婷婷韩国欧美一区二区| av亚洲精华国产精华精| 不卡视频在线看| 91免费国产在线观看| 91丝袜美腿高跟国产极品老师 | 日本不卡中文字幕| 日韩在线观看一区二区| 日韩精品一卡二卡三卡四卡无卡| 亚洲成a人在线观看| 日韩国产一二三区| 麻豆视频一区二区| 国产精品1024| 一本久道久久综合中文字幕| 91电影在线观看| 91精选在线观看| 2020国产精品自拍| 国产精品女主播在线观看| 国产精品女主播av| 香蕉久久一区二区不卡无毒影院| 天涯成人国产亚洲精品一区av| 蜜桃av一区二区| 国产成人综合视频| 色狠狠综合天天综合综合| 欧美日韩亚洲综合一区二区三区| 日韩一区二区精品| 欧美激情一区三区| 亚洲高清免费视频| 黄页网站大全一区二区| 成人精品电影在线观看| 在线观看亚洲精品视频| 日韩区在线观看| 国产精品视频一区二区三区不卡| 一区二区三区日韩| 久久国内精品自在自线400部| 91成人看片片| 欧美一区二区啪啪| 国产婷婷一区二区| 亚洲成av人影院| 国产激情精品久久久第一区二区| 色综合色综合色综合| 日韩欧美久久久| 亚洲色图在线视频| 六月丁香婷婷久久| 色综合中文字幕国产| 91麻豆精品国产91久久久久久| 国产欧美日韩三区| 午夜精彩视频在线观看不卡| 国产一区二区三区在线观看免费视频| 色94色欧美sute亚洲线路二| 日韩三区在线观看| 亚洲久草在线视频| 国产美女娇喘av呻吟久久| 欧美日韩在线播| 亚洲国产精品av| 免费成人av在线播放| 色综合视频在线观看| 久久免费视频一区| 日韩成人免费看| 色综合网站在线| 国产网站一区二区| 久久电影网站中文字幕| 在线观看成人小视频| 国产欧美一区二区在线| 免费高清成人在线| 国产suv精品一区二区三区| 精品一区二区三区免费观看| 捆绑变态av一区二区三区| 91尤物视频在线观看| 国产成人精品一区二| 欧美一二区视频| 亚洲人成伊人成综合网小说| 久久电影网站中文字幕 | 欧美一区二区在线看| 亚洲欧美激情小说另类| 高清av一区二区| 精品国产伦一区二区三区观看方式 | 99在线视频精品| 久久色视频免费观看| 日本在线不卡视频| 欧美三区在线视频| 一区二区三区成人| 91丨国产丨九色丨pron| 欧美激情艳妇裸体舞| 国产一区二区三区美女| 日韩一区二区在线观看视频| 亚洲va国产va欧美va观看| 91老师片黄在线观看| 国产精品理伦片| 丁香婷婷综合五月| 国产日韩精品一区二区三区在线| 精彩视频一区二区| 26uuu国产一区二区三区| 欧美aaaaaa午夜精品| 日韩一区二区三区免费看| 亚洲电影视频在线| 欧美精品日日鲁夜夜添| 亚洲无人区一区| 欧美精品精品一区| 丝袜美腿亚洲色图| 欧美一区二区视频网站| 日本欧美一区二区在线观看| 欧美高清性hdvideosex| 午夜精品福利视频网站| 欧美男男青年gay1069videost| 婷婷成人激情在线网| 日韩视频中午一区| 另类人妖一区二区av| 欧美大片免费久久精品三p| 久久av中文字幕片| 国产亚洲一区二区在线观看| 国产91精品免费| **网站欧美大片在线观看| 色综合久久中文综合久久97| 亚洲一级二级三级| 91精品国产一区二区三区蜜臀 | 91国偷自产一区二区三区成为亚洲经典| 自拍偷自拍亚洲精品播放| 99re这里只有精品视频首页| 亚洲精品乱码久久久久久久久| 日本久久电影网| 亚洲成av人片一区二区三区| 欧美一级国产精品| 国产成人精品三级麻豆| 国产精品国产三级国产普通话三级 | 一区二区三区在线观看欧美| 色狠狠av一区二区三区| 午夜久久久久久久久 | 麻豆极品一区二区三区| 久久综合久久综合九色| 99久久99久久精品免费观看| 亚洲国产综合色| 精品三级av在线| aaa亚洲精品| 视频一区欧美日韩| 久久精品一区八戒影视| 91免费观看国产| 日韩黄色小视频| 中国av一区二区三区| 欧美色图第一页| 国产精品一级二级三级| 亚洲精品国产精品乱码不99 | 天天色图综合网| 国产香蕉久久精品综合网| 色域天天综合网| 激情国产一区二区| 伊人一区二区三区| 精品国产乱码久久久久久牛牛| 成人黄色网址在线观看| 日韩av一区二区三区| 国产精品久久久久久久久免费樱桃 | 亚洲444eee在线观看| 久久久久久久国产精品影院| 色伊人久久综合中文字幕| 久久精品72免费观看| 亚洲精选一二三| 精品电影一区二区三区 | 国产亚洲精品久| 欧美日韩精品一区视频| 国产精品一二三在| 日韩电影在线一区二区| 国产精品国产a| 欧美岛国在线观看| 欧美三级日韩三级| av午夜一区麻豆| 久久精品av麻豆的观看方式| 国产精品日日摸夜夜摸av| 91麻豆精品国产综合久久久久久 | 日韩欧美黄色影院| 色婷婷久久久亚洲一区二区三区| 国产真实乱偷精品视频免| 亚洲一区二区欧美激情| 久久久久久久久蜜桃| 欧美肥妇bbw| 在线观看亚洲精品视频| 成人黄色综合网站| 国产精品888| 日本亚洲免费观看| 亚洲一区在线视频| 日本一区二区成人在线| 久久亚洲一级片| 日韩欧美中文字幕精品| 欧美色男人天堂| 91成人免费电影| 色综合婷婷久久| 91丨国产丨九色丨pron| 成人黄色大片在线观看| 国产麻豆日韩欧美久久| 美女高潮久久久| 日本不卡高清视频| 肉丝袜脚交视频一区二区| 亚洲一区在线看| 亚洲午夜激情网站| 亚洲成人av在线电影| 亚洲综合偷拍欧美一区色| 亚洲美女少妇撒尿| 亚洲欧美日韩中文播放 |