亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? easy-tls.c

?? mediastreamer2是開源的網絡傳輸媒體流的庫
?? C
?? 第 1 頁 / 共 3 頁
字號:
	int w = n >= 2;	/* loop over all (i, w) in {0,1}x{0,1} */	int fd;		if (i == 0 && w == 0)	    fd = read_select_1;	else if (i == 1 && w == 0)	    fd = read_select_2;	else if (i == 0 && w == 1)	    fd = write_select_1;	else {	    assert(i == 1 && w == 1);	    fd = write_select_2;	}		if (fd >= 0) {	    if (w == 0)		FD_SET(fd, &reads);	    else /* w == 1 */		FD_SET(fd, &writes);	}    }    if (seconds >= 0) {	timeout.tv_sec = seconds;	timeout.tv_usec = 0;	timeout_p = &timeout;    } else 	timeout_p = NULL;    DEBUG_MSG2("select no.", ++tls_select_count);    select(maxfd + 1, &reads, &writes, (fd_set *) NULL, timeout_p);    DEBUG_MSG("cont.");}/*****************************************************************************/#define TUNNELBUFSIZE (16*1024)struct tunnelbuf {    char buf[TUNNELBUFSIZE];    size_t len;    size_t offset;};static int tls_connect_attempt(SSL *, int *write_select, int *read_select, int *closed, int *progress, const char **err_pref);static int tls_accept_attempt(SSL *, int *write_select, int *read_select, int *closed, int *progress, const char **err_pref);static int tls_write_attempt(SSL *, struct tunnelbuf *, int *write_select, int *read_select, int *closed, int *progress, const char **err_pref);static int tls_read_attempt(SSL *, struct tunnelbuf *, int *write_select, int *read_select, int *closed, int *progress, const char **err_pref);static int write_attempt(int fd, struct tunnelbuf *, int *select, int *closed, int *progress);static int read_attempt(int fd, struct tunnelbuf *, int *select, int *closed, int *progress);static void write_info(SSL *ssl, int *info_fd){    if (*info_fd != -1) {	long v;	int v_ok;	struct tls_x509_name_string peer;	char infobuf[TLS_INFO_SIZE];	int r;	DEBUG_MSG("write_info");	v = SSL_get_verify_result(ssl);	v_ok = (v == X509_V_OK) ? 'A' : 'E'; /* Auth./Error */	{	    X509 *peercert;	    peercert = SSL_get_peer_certificate(ssl);	    tls_get_x509_subject_name_oneline(peercert, &peer);	    if (peercert != NULL)		X509_free(peercert);	}	if (peer.str[0] == '\0')	    v_ok = '0'; /* no cert at all */	else	    if (strchr(peer.str, '\n')) {		/* should not happen, but make sure */		*strchr(peer.str, '\n') = '\0';	    }	r = snprintf(infobuf, sizeof infobuf, "%c:%s\n%s\n", v_ok, X509_verify_cert_error_string(v), peer.str);	DEBUG_MSG2("snprintf", r);	if (r == -1 || r >= sizeof infobuf)	    r = sizeof infobuf - 1;	write(*info_fd, infobuf, r);	close (*info_fd);	*info_fd = -1;    }}/* tls_proxy expects that all fds are closed after return */static voidtls_proxy(int clear_fd, int tls_fd, int info_fd, SSL_CTX *ctx, int client_p){    struct tunnelbuf clear_to_tls, tls_to_clear;    SSL *ssl;    BIO *rbio, *wbio;    int closed, in_handshake;    const char *err_pref_1 = "", *err_pref_2 = "";    const char *err_def = NULL;    assert(clear_fd != -1);    assert(tls_fd != -1);    assert(clear_fd < FD_SETSIZE);    assert(tls_fd < FD_SETSIZE);    /* info_fd may be -1 */    assert(ctx != NULL);    tls_rand_seed_uniquely();    tls_socket_nonblocking(clear_fd);    DEBUG_MSG2("clear_fd", clear_fd);    tls_socket_nonblocking(tls_fd);    DEBUG_MSG2("tls_fd", tls_fd);    ssl = SSL_new(ctx);    if (ssl == NULL)	goto err;    DEBUG_MSG("SSL_new");    if (!SSL_set_fd(ssl, tls_fd))	goto err;    rbio = SSL_get_rbio(ssl);    wbio = SSL_get_wbio(ssl); /* should be the same, but who cares */    assert(rbio != NULL);    assert(wbio != NULL);    if (client_p)	SSL_set_connect_state(ssl);    else	SSL_set_accept_state(ssl);        closed = 0;    in_handshake = 1;    tls_to_clear.len = 0;    tls_to_clear.offset = 0;    clear_to_tls.len = 0;    clear_to_tls.offset = 0;    err_def = "I/O error";        /* loop finishes as soon as we detect that one side closed;     * when all (program and OS) buffers have enough space,     * the data from the last succesful read in each direction is transferred     * before close */    do {	int clear_read_select = 0, clear_write_select = 0,	    tls_read_select = 0, tls_write_select = 0,	    progress = 0;	int r;	unsigned long num_read = BIO_number_read(rbio),	    num_written = BIO_number_written(wbio);	DEBUG_MSG2("loop iteration", ++tls_loop_count);	if (in_handshake) {	    DEBUG_MSG("in_handshake");	    if (client_p)		r = tls_connect_attempt(ssl, &tls_write_select, &tls_read_select, &closed, &progress, &err_pref_1);	    else		r = tls_accept_attempt(ssl, &tls_write_select, &tls_read_select, &closed, &progress, &err_pref_1);	    if (r != 0) {		write_info(ssl, &info_fd);		goto err;	    }	    if (closed)		goto err_return;	    if (!SSL_in_init(ssl)) {		in_handshake = 0;		write_info(ssl, &info_fd);	    }	}		if (clear_to_tls.len != 0 && !in_handshake) {	    assert(!closed);	    	    r = tls_write_attempt(ssl, &clear_to_tls, &tls_write_select, &tls_read_select, &closed, &progress, &err_pref_1);	    if (r != 0)		goto err;	    if (closed) {		assert(progress);		tls_to_clear.offset = 0;		tls_to_clear.len = 0;	    }	}		if (tls_to_clear.len != 0) {	    assert(!closed);	    r = write_attempt(clear_fd, &tls_to_clear, &clear_write_select, &closed, &progress);	    if (r != 0)		goto err_return;	    if (closed) {		assert(progress);		clear_to_tls.offset = 0;		clear_to_tls.len = 0;	    }	}		if (!closed) {	    if (clear_to_tls.offset + clear_to_tls.len < sizeof clear_to_tls.buf) {		r = read_attempt(clear_fd, &clear_to_tls, &clear_read_select, &closed, &progress);		if (r != 0)		    goto err_return;		if (closed) {		    r = SSL_shutdown(ssl);		    DEBUG_MSG2("SSL_shutdown", r);		}	    }	}		if (!closed && !in_handshake) {	    if (tls_to_clear.offset + tls_to_clear.len < sizeof tls_to_clear.buf) {		r = tls_read_attempt(ssl, &tls_to_clear, &tls_write_select, &tls_read_select, &closed, &progress, &err_pref_1);		if (r != 0)		    goto err;		if (closed) {		    r = SSL_shutdown(ssl);		    DEBUG_MSG2("SSL_shutdown", r);		}	    }	}	if (!progress) {	    DEBUG_MSG("!progress?");	    if (num_read != BIO_number_read(rbio) || num_written != BIO_number_written(wbio))		progress = 1;	    if (!progress) {		DEBUG_MSG("!progress");		assert(clear_read_select || tls_read_select || clear_write_select || tls_write_select);		tls_sockets_select(clear_read_select ? clear_fd : -1, tls_read_select ? tls_fd : -1, clear_write_select ? clear_fd : -1, tls_write_select ? tls_fd : -1, -1);	    }	}    } while (!closed);    return; err:    tls_openssl_errors(err_pref_1, err_pref_2, err_def, tls_child_apparg); err_return:    return;}static inttls_get_error(SSL *ssl, int r, int *write_select, int *read_select, int *closed, int *progress){    int err = SSL_get_error(ssl, r);    if (err == SSL_ERROR_NONE) {	assert(r > 0);	*progress = 1;	return 0;    }    assert(r <= 0);    switch (err) {    case SSL_ERROR_ZERO_RETURN:	assert(r == 0);	*closed = 1;	*progress = 1;	return 0;    case SSL_ERROR_WANT_WRITE:	*write_select = 1;	return 0;	    case SSL_ERROR_WANT_READ:	*read_select = 1;	return 0;    }    return -1;}static inttls_connect_attempt(SSL *ssl, int *write_select, int *read_select, int *closed, int *progress, const char **err_pref){    int n, r;    DEBUG_MSG("tls_connect_attempt");    n = SSL_connect(ssl);    DEBUG_MSG2("SSL_connect",n);    r = tls_get_error(ssl, n, write_select, read_select, closed, progress);    if (r == -1)	*err_pref = " during SSL_connect";    return r;}static inttls_accept_attempt(SSL *ssl, int *write_select, int *read_select, int *closed, int *progress, const char **err_pref){    int n, r;    DEBUG_MSG("tls_accept_attempt");    n = SSL_accept(ssl);    DEBUG_MSG2("SSL_accept",n);    r = tls_get_error(ssl, n, write_select, read_select, closed, progress);    if (r == -1)	*err_pref = " during SSL_accept";    return r;}static inttls_write_attempt(SSL *ssl, struct tunnelbuf *buf, int *write_select, int *read_select, int *closed, int *progress, const char **err_pref){    int n, r;    DEBUG_MSG("tls_write_attempt");    n = SSL_write(ssl, buf->buf + buf->offset, buf->len);    DEBUG_MSG2("SSL_write",n);    r = tls_get_error(ssl, n, write_select, read_select, closed, progress);    if (n > 0) {	buf->len -= n;	assert(buf->len >= 0);	if (buf->len == 0)	    buf->offset = 0;	else	    buf->offset += n;    }    if (r == -1)	*err_pref = " during SSL_write";    return r;}static inttls_read_attempt(SSL *ssl, struct tunnelbuf *buf, int *write_select, int *read_select, int *closed, int *progress, const char **err_pref){    int n, r;    size_t total;    DEBUG_MSG("tls_read_attempt");    total = buf->offset + buf->len;    assert(total < sizeof buf->buf);    n = SSL_read(ssl, buf->buf + total, (sizeof buf->buf) - total);    DEBUG_MSG2("SSL_read",n);    r = tls_get_error(ssl, n, write_select, read_select, closed, progress);    if (n > 0) {	buf->len += n;	assert(buf->offset + buf->len <= sizeof buf->buf);    }    if (r == -1)	*err_pref = " during SSL_read";    return r;}static intget_error(int r, int *select, int *closed, int *progress){    if (r >= 0) {	*progress = 1;	if (r == 0)	    *closed = 1;	return 0;    } else {	assert(r == -1);	if (errno == EAGAIN || errno == EWOULDBLOCK) {	    *select = 1;	    return 0;	} else if (errno == EPIPE) {	    *progress = 1;	    *closed = 1;	    return 0;	} else	    return -1;    }}static int write_attempt(int fd, struct tunnelbuf *buf, int *select, int *closed, int *progress){    int n, r;    DEBUG_MSG("write_attempt");    n = write(fd, buf->buf + buf->offset, buf->len);    DEBUG_MSG2("write",n);    r = get_error(n, select, closed, progress);    if (n > 0) {	buf->len -= n;	assert(buf->len >= 0);	if (buf->len == 0)	    buf->offset = 0;	else	    buf->offset += n;    }    if (r == -1)	tls_errprintf(1, tls_child_apparg, "write error: %s\n", strerror(errno));    return r;}    static intread_attempt(int fd, struct tunnelbuf *buf, int *select, int *closed, int *progress){    int n, r;    size_t total;    DEBUG_MSG("read_attempt");    total = buf->offset + buf->len;    assert(total < sizeof buf->buf);    n = read(fd, buf->buf + total, (sizeof buf->buf) - total);    DEBUG_MSG2("read",n);    r = get_error(n, select, closed, progress);    if (n > 0) {	buf->len += n;	assert(buf->offset + buf->len <= sizeof buf->buf);    }    if (r == -1)	tls_errprintf(1, tls_child_apparg, "read error: %s\n", strerror(errno));    return r;}

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久草在线在线精品观看| 国产一区二区中文字幕| 久久久亚洲高清| 精品少妇一区二区三区视频免付费 | 久久久无码精品亚洲日韩按摩| 欧美一区二区三区日韩| 日韩欧美色综合网站| 欧美一级黄色大片| 欧美成人精品1314www| 精品日韩av一区二区| 精品国产乱码91久久久久久网站| 欧美变态口味重另类| 久久精品在线观看| 中文字幕的久久| 亚洲欧美偷拍三级| 亚洲成人免费视频| 激情成人午夜视频| 大白屁股一区二区视频| 不卡电影一区二区三区| 欧美日韩亚洲另类| 欧美不卡一区二区| 中文字幕亚洲在| 亚洲大型综合色站| 寂寞少妇一区二区三区| av一区二区不卡| 欧美日韩国产精选| 久久久蜜桃精品| 亚洲精品国产第一综合99久久 | 欧美一级片在线| 国产亚洲综合在线| 亚洲与欧洲av电影| 九九久久精品视频| 99国产精品一区| 欧美一级欧美三级| 亚洲欧美日韩在线不卡| 理论电影国产精品| 色综合一个色综合亚洲| 欧美videos中文字幕| 亚洲欧美一区二区在线观看| 琪琪久久久久日韩精品| av一区二区三区在线| 日韩欧美亚洲国产精品字幕久久久| 国产精品久久久久影院| 日产国产欧美视频一区精品| av综合在线播放| 久久综合色婷婷| 亚洲成a人v欧美综合天堂| 粉嫩av一区二区三区| 日韩片之四级片| 亚洲第四色夜色| 91麻豆蜜桃一区二区三区| 精品成人一区二区三区四区| 午夜成人在线视频| 日本高清无吗v一区| 国产欧美久久久精品影院| 日韩高清在线电影| 欧美在线制服丝袜| 亚洲视频一区在线| 丁香天五香天堂综合| 欧美电影免费观看完整版| 亚洲大片在线观看| 91成人网在线| 亚洲自拍与偷拍| 色婷婷亚洲婷婷| 成人欧美一区二区三区1314| 国产一区二区三区av电影 | 欧美日韩中文字幕一区二区| 国产精品久久久99| 成人精品电影在线观看| 国产日韩精品一区二区三区| 国产一区二区三区精品欧美日韩一区二区三区 | 欧美午夜片在线观看| 亚洲欧美在线视频观看| 91在线免费视频观看| 国产精品美女www爽爽爽| 风间由美性色一区二区三区| 欧美高清在线视频| av成人免费在线观看| 综合激情成人伊人| 91欧美一区二区| 亚洲一级在线观看| 欧美日韩视频不卡| 日本视频一区二区| 欧美大片一区二区三区| 国产综合色精品一区二区三区| 欧美不卡一二三| 国产精品888| 国产精品国产三级国产普通话99 | 一二三四区精品视频| 一本大道av伊人久久综合| 亚洲综合在线观看视频| 欧美喷水一区二区| 麻豆国产欧美一区二区三区| 久久看人人爽人人| eeuss鲁片一区二区三区| 亚洲精品视频在线观看免费| 欧美区一区二区三区| 激情欧美一区二区| 国产精品久久久久久妇女6080| 91美女片黄在线观看| 婷婷国产v国产偷v亚洲高清| 欧美mv日韩mv| 91福利视频在线| 国产麻豆日韩欧美久久| 亚洲欧美日韩系列| 日韩午夜在线影院| 99久久久国产精品免费蜜臀| 香蕉成人伊视频在线观看| 久久噜噜亚洲综合| 欧美日韩国产高清一区二区三区| 国产一区二区三区在线观看免费| 亚洲激情图片qvod| 日韩美女在线视频| 91女厕偷拍女厕偷拍高清| 久久精品国产99国产| 玉足女爽爽91| 国产亚洲污的网站| 欧美日韩精品福利| 成人av午夜电影| 九九久久精品视频| 亚洲福利一二三区| 国产精品美女视频| 日韩一级欧美一级| 欧美在线不卡视频| 波多野结衣中文字幕一区 | ㊣最新国产の精品bt伙计久久| 欧美老人xxxx18| 99精品国产热久久91蜜凸| 看电视剧不卡顿的网站| 一区av在线播放| 综合久久给合久久狠狠狠97色| 精品国产欧美一区二区| 欧美精品久久99久久在免费线| 成人美女视频在线看| 狠狠色狠狠色综合系列| 午夜视频在线观看一区二区三区| 国产精品久久午夜| 久久精品欧美一区二区三区麻豆| 欧美一区二区视频观看视频| 日本韩国精品在线| 色综合天天狠狠| 99久久99久久免费精品蜜臀| 国产精品1024| 国产成人精品亚洲777人妖 | 不卡的av在线| 国产伦精品一区二区三区免费| 奇米精品一区二区三区在线观看| 亚洲线精品一区二区三区八戒| 玉足女爽爽91| 亚洲成人精品影院| 亚洲成人综合网站| 五月综合激情网| 日韩国产欧美在线视频| 亚洲午夜电影在线观看| 亚洲一二三级电影| 午夜精品免费在线| 亚洲444eee在线观看| 亚洲一区二区三区在线看| 亚洲精品日韩专区silk| 一区二区三区在线影院| 亚洲国产视频在线| 亚洲成人福利片| 久久精品二区亚洲w码| 国产乱国产乱300精品| 高清免费成人av| 91麻豆福利精品推荐| 欧美四级电影在线观看| 欧美日韩成人综合在线一区二区| 91精品在线一区二区| 欧美电影免费提供在线观看| 国产欧美1区2区3区| 亚洲免费av在线| 日韩影院在线观看| 国产在线国偷精品产拍免费yy| 国产成人久久精品77777最新版本| 成人av小说网| 91精品综合久久久久久| 久久色成人在线| 亚洲欧美国产77777| 日韩电影免费在线观看网站| 九九**精品视频免费播放| 成人av综合一区| 9191国产精品| 国产精品私房写真福利视频| 亚洲午夜三级在线| 激情久久久久久久久久久久久久久久| 成人听书哪个软件好| 欧美精品乱码久久久久久按摩| 久久综合久久99| 一区二区激情视频| 国产麻豆精品视频| 欧美日韩国产另类一区| 日本一区二区三区电影| 午夜久久久久久久久| av影院午夜一区| 欧美精品一区二区在线播放| 亚洲一区av在线| 波多野结衣中文字幕一区二区三区| 欧美久久一区二区| 最新不卡av在线|