亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? op_decode.c

?? 知名的開源IDS的日志工具
?? C
?? 第 1 頁 / 共 2 頁
字號:
/* $Id: op_decode.c,v 1.9 2004/04/03 19:57:32 andrewbaker Exp $ *//*** Copyright (C) 1998-2001 Martin Roesch <roesch@sourcefire.com>** Portions Copyright (C) 2002 Andrew R. Baker <andrewb@snort.org>**** This program is distributed under the terms of version 1.0 of the ** Q Public License.  See LICENSE.QPL for further details.**** This program is distributed in the hope that it will be useful,** but WITHOUT ANY WARRANTY; without even the implied warranty of** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.***/#include "config.h"#include <string.h>#ifdef SOLARIS#include <strings.h>#endif#include "util.h"#include "op_decode.h"#include "barnyard.h"#include "input-plugins/dp_log.h"int DecodePacket(Packet *p, SnortPktHeader *pkthdr, uint8_t *pkt){    switch(linktype)    {        case 0: /* Null linktype */            DecodeIP(pkt, pkthdr->caplen, p);            return 0;        case 1: /* Ethernet */            DecodeEthPkt(p, pkthdr, pkt);            return  0;    }    return -1;}/* * Function: DecodeEthPkt(Packet *, SnortPktHeader *, u_int8_t*) * * Purpose: Decode those fun loving ethernet packets, one at a time! * * Arguments: p => pointer to the decoded packet struct *            pkthdr => ptr to the packet header *            pkt => pointer to the real live packet data * * Returns: void function */void DecodeEthPkt(Packet *p, SnortPktHeader *pkthdr, u_int8_t *pkt){    u_int32_t pkt_len;      /* suprisingly, the length of the packet */    u_int32_t cap_len;      /* caplen value */    bzero((char *) p, sizeof(Packet));    p->pkth = pkthdr;    /* set the lengths we need */    pkt_len = pkthdr->pktlen;   /* total packet length */    cap_len = pkthdr->caplen;   /* captured packet length */    /* do a little validation */    if(pkthdr->caplen < ETHERNET_HEADER_LEN)    {        if(pv.verbose >= 3)            LogMessage("Captured data length < Ethernet header "                    "length! (%d bytes)\n", cap_len);        return;    }        /* lay the ethernet structure over the packet data */    p->eh = (EtherHdr *) pkt;    /* grab out the network type */    switch(ntohs(p->eh->ether_type))    {        case ETHERNET_TYPE_PPPoE_DISC:        case ETHERNET_TYPE_PPPoE_SESS:            DecodePPPoEPkt(p, pkthdr, pkt);            return;        case ETHERNET_TYPE_IP:            DecodeIP(pkt + ETHERNET_HEADER_LEN,                     cap_len - ETHERNET_HEADER_LEN, p);            return;        case ETHERNET_TYPE_ARP:        case ETHERNET_TYPE_REVARP:            DecodeARP(pkt + ETHERNET_HEADER_LEN,                     cap_len - ETHERNET_HEADER_LEN, p);            return;        case ETHERNET_TYPE_IPV6:            DecodeIPV6(pkt + ETHERNET_HEADER_LEN,                     (cap_len - ETHERNET_HEADER_LEN));            return;        case ETHERNET_TYPE_IPX:            DecodeIPX(pkt + ETHERNET_HEADER_LEN,                     (cap_len - ETHERNET_HEADER_LEN));            return;        case ETHERNET_TYPE_8021Q:            DecodeVlan(pkt + ETHERNET_HEADER_LEN,                     cap_len - ETHERNET_HEADER_LEN, p);            return;         default:            if(pv.verbose >= 3)                LogMessage("Unknown Network header (0x%X)...\n",                         p->eh->ether_type);            return;    }    return;}void DecodeVlan(u_int8_t * pkt, const u_int32_t len, Packet * p){    u_int16_t pri;    p->vh = (VlanTagHdr *) pkt;    pri = (0xe000 & ntohs(p->vh->vth_vlan))>>13;     /* check to see if we've got an encapsulated LLC layer */    if(pri != 0)    {        p->ehllc = (EthLlc *) (pkt + sizeof(VlanTagHdr));        if(p->ehllc->dsap == ETH_DSAP_IP &&                p->ehllc->ssap == ETH_SSAP_IP)        {                  p->ehllcother = (EthLlcOther *) (pkt + sizeof(VlanTagHdr) +                                              sizeof(EthLlc));            switch(ntohs(p->ehllcother->proto_id))            {                case ETHERNET_TYPE_IP:                    DecodeIP(pkt + sizeof(VlanTagHdr) + sizeof(EthLlc) +                            sizeof(EthLlcOther), len - sizeof(VlanTagHdr), p);                    return;                case ETHERNET_TYPE_ARP:                case ETHERNET_TYPE_REVARP:                    DecodeARP(pkt + sizeof(VlanTagHdr)+ sizeof(EthLlc) +                            sizeof(EthLlcOther), len - sizeof(VlanTagHdr), p);                    return;                default:                    return;            }        }    }    else    {        switch(ntohs(p->vh->vth_proto))        {            case ETHERNET_TYPE_IP:                DecodeIP(pkt + sizeof(VlanTagHdr),                         len - sizeof(VlanTagHdr), p);                return;            case ETHERNET_TYPE_ARP:            case ETHERNET_TYPE_REVARP:                DecodeARP(pkt + sizeof(VlanTagHdr),                         len - sizeof(VlanTagHdr), p);                return;            default:                return;        }    }}/* * Function: DecodePppPkt(Packet *, char *, struct pcap_pkthdr*, u_int8_t*) * * Purpose: Decoded PPP traffic * * Arguments: p => pointer to decoded packet struct  *            user => Utility pointer, unused *            pkthdr => ptr to the packet header *            pkt => pointer to the real live packet data * * Returns: void function */void DecodePppPkt(Packet * p, SnortPktHeader * pkthdr, u_int8_t * pkt){    static int had_vj = 0;    u_int32_t len;    u_int32_t cap_len;    struct ppp_header *ppphdr;    bzero((char *) p, sizeof(Packet));    p->pkth = pkthdr;    ppphdr = (struct ppp_header *)pkt;     len = pkthdr->pktlen;    cap_len = pkthdr->caplen;    /* do a little validation */    if(cap_len < PPP_HDRLEN)    {        if(pv.verbose >= 3)            LogMessage("PPP header length < captured len! (%d bytes)\n",                    cap_len);        return;    }    /*      * We only handle uncompressed packets. Handling VJ compression would mean     * to implement a PPP state machine.     */    switch (ntohs(ppphdr->protocol))     {        case PPP_VJ_COMP:            if (!had_vj)                LogMessage("PPP link seems to use VJ compression, "                        "cannot handle compressed packets!\n");            had_vj = 1;            break;        case PPP_VJ_UCOMP:            /* VJ compression modifies the protocol field. It must be set             * to tcp (only TCP packets can be VJ compressed) */            if(cap_len < PPP_HDRLEN + IP_HEADER_LEN)            {                if(pv.verbose >= 3)                    LogMessage("PPP VJ min packet length > captured len! "                            "(%d bytes)\n", cap_len);                return;            }            ((IPHdr *)(pkt + PPP_HDRLEN))->ip_proto = IPPROTO_TCP;            /* fall through */        case PPP_IP:            DecodeIP(pkt + PPP_HDRLEN, cap_len - PPP_HDRLEN, p);            break;        case PPP_IPX:            DecodeIPX(pkt + PPP_HDRLEN, cap_len - PPP_HDRLEN);            break;    }}/* * Function: DecodePPPoEPkt(Packet *, char *, struct pcap_pkthdr*, u_int8_t*) * * Purpose: Decode those fun loving ethernet packets, one at a time! * * Arguments: p => pointer to the decoded packet struct *            user => Utility pointer (unused) *            pkthdr => ptr to the packet header *            pkt => pointer to the real live packet data * * Returns: void function * * see http://www.faqs.org/rfcs/rfc2516.html * */void DecodePPPoEPkt(Packet *p, SnortPktHeader *pkthdr, u_int8_t *pkt){    u_int32_t pkt_len;      /* suprisingly, the length of the packet */    u_int32_t cap_len;      /* caplen value */    PPPoEHdr *ppppoep=0;    PPPoE_Tag *ppppoe_tag=0;    PPPoE_Tag tag; /* needed to avoid alignment problems */    bzero((char *) p, sizeof(Packet));    /* set the lengths we need */    pkt_len = pkthdr->pktlen;  /* total packet length */    cap_len = pkthdr->caplen;   /* captured packet length */    /* do a little validation */    if(pkthdr->caplen < ETHERNET_HEADER_LEN)    {        if(pv.verbose >= 3)            LogMessage("Captured data length < Ethernet header length! "                    "(%d bytes)\n", cap_len);        return;    }    /* lay the ethernet structure over the packet data */    p->eh = (EtherHdr *) pkt;    ppppoep = (PPPoEHdr *)pkt;    /* grab out the network type */    switch(ntohs(p->eh->ether_type))    {        case ETHERNET_TYPE_PPPoE_DISC:        case ETHERNET_TYPE_PPPoE_SESS:            break;        default:            return;    }    if (ntohs(p->eh->ether_type) != ETHERNET_TYPE_PPPoE_DISC)    {        DecodePppPkt(p, pkthdr, pkt+18);        return;    }    ppppoe_tag = (PPPoE_Tag *)(pkt + sizeof(PPPoEHdr));    while (ppppoe_tag < (PPPoE_Tag *)(pkt + pkthdr->caplen))    {        /* no guarantee in PPPoE spec that ppppoe_tag is aligned at all... */        memcpy(&tag, ppppoe_tag, sizeof(tag));        if (ntohs(tag.length) > 0)        {        }        ppppoe_tag = (PPPoE_Tag *)((char *)(ppppoe_tag+1)+ntohs(tag.length));    }    return;}/* * Function: DecodeIP(u_int8_t *, const u_int32_t, Packet *) * * Purpose: Decode the IP network layer * * Arguments: pkt => ptr to the packet data *            len => length from here to the end of the packet *            p   => pointer to the packet decode struct * * Returns: void function */void DecodeIP(u_int8_t * pkt, const u_int32_t len, Packet * p){    u_int32_t ip_len; /* length from the start of the ip hdr to the                       * pkt end */    u_int32_t hlen;   /* ip header length */    /* lay the IP struct over the raw data */    p->iph = (IPHdr *) pkt;    /* do a little validation */    if(len < IP_HEADER_LEN)    {        if(pv.verbose >= 3)            LogMessage("IP header truncated! (%d bytes)\n", len);        p->iph = NULL;        return;    }    /*     * with datalink DLT_RAW it's impossible to differ ARP datagrams from IP.     * So we are just ignoring non IP datagrams     */    if(IP_VER(p->iph) != 4)    {        if(pv.verbose >= 3)            LogMessage("[!] WARNING: Not IPv4 datagram! "                    "([ver: 0x%x][len: 0x%x])\n",                     IP_VER(p->iph), p->iph->ip_len);        p->iph = NULL;        return;    }    /* set the IP datagram length */    ip_len = ntohs(p->iph->ip_len);    /* set the IP header length */    hlen = IP_HLEN(p->iph) << 2;    if (ip_len != len)    {        if (ip_len > len)         {            ip_len = len;        }    }    if(ip_len < hlen)    {        if(pv.verbose >= 3)            LogMessage("[!] WARNING: IP dgm len (%d bytes) < IP hdr len "                    "(%d bytes), packet discarded\n", ip_len, hlen);        return;    }             /* test for IP options */    p->ip_options_len = hlen - IP_HEADER_LEN;    if(p->ip_options_len > 0)    {        p->ip_options_data = pkt + IP_HEADER_LEN;        DecodeIPOptions((pkt + IP_HEADER_LEN), p->ip_options_len, p);    }    else    {        p->ip_option_count = 0;    }    /* set the remaining packet length */    ip_len -= hlen;    /* check for fragmented packets */    p->frag_offset = ntohs(p->iph->ip_off);    /*      * get the values of the reserved, more      * fragments and don't fragment flags      */    if(((p->frag_offset & 0x8000) >> 15))        p->pkt_flags |= PKT_RB_FLAG;    if(((p->frag_offset & 0x4000) >> 14))        p->pkt_flags |= PKT_DF_FLAG;    if(((p->frag_offset & 0x2000) >> 13))        p->pkt_flags |= PKT_MF_FLAG;    /* mask off the high bits in the fragment offset field */    p->frag_offset &= 0x1FFF;    if(p->frag_offset || (p->pkt_flags & PKT_MF_FLAG))    {        /* set the packet fragment flag */        p->pkt_flags |= PKT_FRAG_FLAG;    }    /* if this packet isn't a fragment */    if((p->pkt_flags & PKT_FRAG_FLAG) == 0)    {        switch(p->iph->ip_proto)        {            case IPPROTO_TCP:                DecodeTCP(pkt + hlen, ip_len, p);                return;            case IPPROTO_UDP:                DecodeUDP(pkt + hlen, ip_len, p);                return;            case IPPROTO_ICMP:                DecodeICMP(pkt + hlen, ip_len, p);                return;            default:                p->data = pkt + hlen;                p->dsize = ip_len;                return;        }    }    else    {        /* set the payload pointer and payload size */        p->data = pkt + hlen;        p->dsize = ip_len;    }}/* * Function: DecodeIPOnly(u_int8_t *, const u_int32_t, Packet *) * * Purpose: Decode the IP network layer but not recurse * * Arguments: pkt => ptr to the packet data *            len => length from here to the end of the packet *            p   => pointer to dummy packet decode struct * * Returns: void function */int DecodeIPOnly(u_int8_t * pkt, const u_int32_t len, Packet * p){    u_int32_t ip_len;  /*                         * length from the start of the ip hdr to the                        * pkt end                         */    u_int32_t hlen;    /* ip header length */    /* lay the IP struct over the raw data */    p->iph = (IPHdr *) pkt;    /* do a little validation */    if(len < IP_HEADER_LEN)    {        if(pv.verbose >= 3)            LogMessage("ICMP Unreachable IP short header (%d bytes)\n", len);        p->iph = NULL;        return(0);    }    /*     * with datalink DLT_RAW it's impossible to differ ARP datagrams from IP.     * So we are just ignoring non IP datagrams     */    if(IP_VER(p->iph) != 4)    {        if(pv.verbose >= 3)            LogMessage("[!] WARNING: ICMP Unreachable not IPv4 datagram "                    "([ver: 0x%x][len: 0x%x])\n",                     IP_VER(p->iph), p->iph->ip_len);        p->iph = NULL;        return(0);    }    /* set the IP datagram length */    ip_len = ntohs(p->iph->ip_len);

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩视频一区二区| 色综合中文字幕国产 | 亚洲综合清纯丝袜自拍| 色天天综合色天天久久| 亚洲精品视频一区| 欧美日本在线一区| 亚洲电影一级黄| 日韩一区二区三区电影在线观看| 久久99国产精品免费网站| 国产日韩三级在线| 91网站最新地址| 亚洲超碰97人人做人人爱| 日韩一区二区精品在线观看| 国产精品1024久久| 一级日本不卡的影视| 欧美一级免费观看| 国产ts人妖一区二区| 亚洲激情图片qvod| 日韩精品一区在线| eeuss影院一区二区三区| 亚洲欧美激情插| 欧美一区二区三区男人的天堂 | 国产福利一区在线| 亚洲欧美日韩电影| 日韩免费一区二区| 波多野结衣视频一区| 日韩av中文字幕一区二区三区| 久久久99精品久久| 欧美三级日本三级少妇99| 久久se这里有精品| 一区二区三区在线视频播放| 日韩视频永久免费| 色94色欧美sute亚洲线路一久 | 亚洲一区视频在线| 欧美精品一区视频| 欧洲色大大久久| 国产精品538一区二区在线| 亚洲国产日韩a在线播放性色| 精品乱人伦小说| 欧美亚洲高清一区| 国产激情视频一区二区三区欧美| 亚洲午夜久久久| 国产精品久久福利| 欧美成人一区二区三区片免费 | 666欧美在线视频| 成人黄色av网站在线| 免费在线观看一区| 一区二区欧美精品| 中文字幕精品三区| 精品国产91亚洲一区二区三区婷婷| 在线观看视频91| 成人激情动漫在线观看| 久久国产精品一区二区| 亚洲亚洲精品在线观看| 日韩毛片高清在线播放| 久久久久久**毛片大全| 日韩免费观看2025年上映的电影| 在线观看视频一区二区| 色综合欧美在线| 成人av动漫在线| 高清久久久久久| 国产精品88888| 国产乱淫av一区二区三区 | 久久成人免费网站| 日韩va亚洲va欧美va久久| 亚洲一区二区三区中文字幕| 亚洲欧美日韩国产手机在线 | 久久久久国色av免费看影院| 日韩三级视频中文字幕| 欧美一卡2卡3卡4卡| 欧美群妇大交群的观看方式| 欧美图区在线视频| 欧美在线影院一区二区| 色婷婷久久久亚洲一区二区三区 | 亚洲福利一区二区| 亚洲成人精品影院| 亚洲成人精品一区二区| 五月天精品一区二区三区| 五月婷婷色综合| 日韩黄色免费网站| 美国毛片一区二区| 久久99精品久久久| 国产一区不卡精品| 国产精品白丝jk白祙喷水网站 | 色综合色狠狠综合色| 91香蕉视频在线| 欧美性高清videossexo| 欧美情侣在线播放| 欧美一区二区三区人| 精品99一区二区| 国产香蕉久久精品综合网| 国产精品色哟哟| 亚洲久本草在线中文字幕| 亚洲国产美国国产综合一区二区| 亚洲电影一级片| 久久精品国内一区二区三区| 国产成人在线免费观看| 91小宝寻花一区二区三区| 欧美日韩一级二级三级| 精品国产凹凸成av人导航| 国产精品美女一区二区| 亚洲午夜免费视频| 久久99久久精品| 波多野结衣中文字幕一区| 日本精品裸体写真集在线观看 | 一区二区三区在线播放| 无码av中文一区二区三区桃花岛| 另类调教123区| av在线免费不卡| 欧美久久久久久久久| 久久影院电视剧免费观看| 视频一区二区不卡| 风流少妇一区二区| 欧美日韩精品免费| 精品欧美乱码久久久久久1区2区| 国产精品九色蝌蚪自拍| 日韩激情在线观看| 不卡视频一二三四| 777久久久精品| 国产精品电影院| 日本三级亚洲精品| 99精品欧美一区二区三区小说| 91精品国产色综合久久ai换脸| 国产欧美精品区一区二区三区| 亚洲一区二区三区中文字幕在线 | 懂色av一区二区三区蜜臀| 欧美日韩中文精品| 国产女人aaa级久久久级| 舔着乳尖日韩一区| 91色porny蝌蚪| 久久女同性恋中文字幕| 午夜日韩在线电影| 成人精品电影在线观看| 日韩免费看网站| 五月婷婷久久丁香| 色综合天天综合网天天看片| 欧美精品一区二区三区在线| 亚洲成人手机在线| 97精品国产露脸对白| 国产日韩欧美一区二区三区综合| 日韩av不卡一区二区| 欧美性三三影院| 成人欧美一区二区三区白人| 狠狠色综合播放一区二区| 欧美精选一区二区| 亚洲综合在线第一页| www.成人在线| 欧美激情艳妇裸体舞| 蜜臀久久99精品久久久久宅男| 欧美视频中文字幕| 亚洲激情自拍视频| 91视频www| 亚洲视频一二区| a级高清视频欧美日韩| 国产日韩欧美精品综合| 国产乱对白刺激视频不卡| 欧美一区二区不卡视频| 亚洲电影激情视频网站| 欧美日韩在线综合| 亚洲国产sm捆绑调教视频| 欧美在线视频全部完| 亚洲精品成人少妇| 在线影院国内精品| 亚洲一区在线看| 欧美亚洲愉拍一区二区| 亚洲精选在线视频| 在线视频国内一区二区| 亚洲一区在线观看网站| 欧美性欧美巨大黑白大战| 亚洲一区二区三区四区中文字幕| 91福利视频久久久久| 亚洲国产精品嫩草影院| 欧美日韩国产一区二区三区地区| 亚洲资源中文字幕| 欧美另类高清zo欧美| 日本美女一区二区三区视频| 日韩小视频在线观看专区| 激情丁香综合五月| 国产性做久久久久久| 91在线云播放| 亚洲电影视频在线| 日韩一区二区三免费高清| 国产一二三精品| 国产精品麻豆视频| 91久久精品一区二区二区| 亚洲国产aⅴ成人精品无吗| 欧美一区二区视频观看视频| 国产尤物一区二区| 国产精品久久久久影院色老大| 色婷婷国产精品久久包臀| 五月天视频一区| 久久久.com| 欧洲国内综合视频| 久久99国产精品麻豆| 欧美国产乱子伦 | 欧美本精品男人aⅴ天堂| 国产在线不卡视频| 亚洲欧洲精品一区二区三区 | 91九色02白丝porn| 日本在线观看不卡视频|