亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? op_decode.c

?? 知名的開源IDS的日志工具
?? C
?? 第 1 頁 / 共 2 頁
字號:
/* $Id: op_decode.c,v 1.9 2004/04/03 19:57:32 andrewbaker Exp $ *//*** Copyright (C) 1998-2001 Martin Roesch <roesch@sourcefire.com>** Portions Copyright (C) 2002 Andrew R. Baker <andrewb@snort.org>**** This program is distributed under the terms of version 1.0 of the ** Q Public License.  See LICENSE.QPL for further details.**** This program is distributed in the hope that it will be useful,** but WITHOUT ANY WARRANTY; without even the implied warranty of** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.***/#include "config.h"#include <string.h>#ifdef SOLARIS#include <strings.h>#endif#include "util.h"#include "op_decode.h"#include "barnyard.h"#include "input-plugins/dp_log.h"int DecodePacket(Packet *p, SnortPktHeader *pkthdr, uint8_t *pkt){    switch(linktype)    {        case 0: /* Null linktype */            DecodeIP(pkt, pkthdr->caplen, p);            return 0;        case 1: /* Ethernet */            DecodeEthPkt(p, pkthdr, pkt);            return  0;    }    return -1;}/* * Function: DecodeEthPkt(Packet *, SnortPktHeader *, u_int8_t*) * * Purpose: Decode those fun loving ethernet packets, one at a time! * * Arguments: p => pointer to the decoded packet struct *            pkthdr => ptr to the packet header *            pkt => pointer to the real live packet data * * Returns: void function */void DecodeEthPkt(Packet *p, SnortPktHeader *pkthdr, u_int8_t *pkt){    u_int32_t pkt_len;      /* suprisingly, the length of the packet */    u_int32_t cap_len;      /* caplen value */    bzero((char *) p, sizeof(Packet));    p->pkth = pkthdr;    /* set the lengths we need */    pkt_len = pkthdr->pktlen;   /* total packet length */    cap_len = pkthdr->caplen;   /* captured packet length */    /* do a little validation */    if(pkthdr->caplen < ETHERNET_HEADER_LEN)    {        if(pv.verbose >= 3)            LogMessage("Captured data length < Ethernet header "                    "length! (%d bytes)\n", cap_len);        return;    }        /* lay the ethernet structure over the packet data */    p->eh = (EtherHdr *) pkt;    /* grab out the network type */    switch(ntohs(p->eh->ether_type))    {        case ETHERNET_TYPE_PPPoE_DISC:        case ETHERNET_TYPE_PPPoE_SESS:            DecodePPPoEPkt(p, pkthdr, pkt);            return;        case ETHERNET_TYPE_IP:            DecodeIP(pkt + ETHERNET_HEADER_LEN,                     cap_len - ETHERNET_HEADER_LEN, p);            return;        case ETHERNET_TYPE_ARP:        case ETHERNET_TYPE_REVARP:            DecodeARP(pkt + ETHERNET_HEADER_LEN,                     cap_len - ETHERNET_HEADER_LEN, p);            return;        case ETHERNET_TYPE_IPV6:            DecodeIPV6(pkt + ETHERNET_HEADER_LEN,                     (cap_len - ETHERNET_HEADER_LEN));            return;        case ETHERNET_TYPE_IPX:            DecodeIPX(pkt + ETHERNET_HEADER_LEN,                     (cap_len - ETHERNET_HEADER_LEN));            return;        case ETHERNET_TYPE_8021Q:            DecodeVlan(pkt + ETHERNET_HEADER_LEN,                     cap_len - ETHERNET_HEADER_LEN, p);            return;         default:            if(pv.verbose >= 3)                LogMessage("Unknown Network header (0x%X)...\n",                         p->eh->ether_type);            return;    }    return;}void DecodeVlan(u_int8_t * pkt, const u_int32_t len, Packet * p){    u_int16_t pri;    p->vh = (VlanTagHdr *) pkt;    pri = (0xe000 & ntohs(p->vh->vth_vlan))>>13;     /* check to see if we've got an encapsulated LLC layer */    if(pri != 0)    {        p->ehllc = (EthLlc *) (pkt + sizeof(VlanTagHdr));        if(p->ehllc->dsap == ETH_DSAP_IP &&                p->ehllc->ssap == ETH_SSAP_IP)        {                  p->ehllcother = (EthLlcOther *) (pkt + sizeof(VlanTagHdr) +                                              sizeof(EthLlc));            switch(ntohs(p->ehllcother->proto_id))            {                case ETHERNET_TYPE_IP:                    DecodeIP(pkt + sizeof(VlanTagHdr) + sizeof(EthLlc) +                            sizeof(EthLlcOther), len - sizeof(VlanTagHdr), p);                    return;                case ETHERNET_TYPE_ARP:                case ETHERNET_TYPE_REVARP:                    DecodeARP(pkt + sizeof(VlanTagHdr)+ sizeof(EthLlc) +                            sizeof(EthLlcOther), len - sizeof(VlanTagHdr), p);                    return;                default:                    return;            }        }    }    else    {        switch(ntohs(p->vh->vth_proto))        {            case ETHERNET_TYPE_IP:                DecodeIP(pkt + sizeof(VlanTagHdr),                         len - sizeof(VlanTagHdr), p);                return;            case ETHERNET_TYPE_ARP:            case ETHERNET_TYPE_REVARP:                DecodeARP(pkt + sizeof(VlanTagHdr),                         len - sizeof(VlanTagHdr), p);                return;            default:                return;        }    }}/* * Function: DecodePppPkt(Packet *, char *, struct pcap_pkthdr*, u_int8_t*) * * Purpose: Decoded PPP traffic * * Arguments: p => pointer to decoded packet struct  *            user => Utility pointer, unused *            pkthdr => ptr to the packet header *            pkt => pointer to the real live packet data * * Returns: void function */void DecodePppPkt(Packet * p, SnortPktHeader * pkthdr, u_int8_t * pkt){    static int had_vj = 0;    u_int32_t len;    u_int32_t cap_len;    struct ppp_header *ppphdr;    bzero((char *) p, sizeof(Packet));    p->pkth = pkthdr;    ppphdr = (struct ppp_header *)pkt;     len = pkthdr->pktlen;    cap_len = pkthdr->caplen;    /* do a little validation */    if(cap_len < PPP_HDRLEN)    {        if(pv.verbose >= 3)            LogMessage("PPP header length < captured len! (%d bytes)\n",                    cap_len);        return;    }    /*      * We only handle uncompressed packets. Handling VJ compression would mean     * to implement a PPP state machine.     */    switch (ntohs(ppphdr->protocol))     {        case PPP_VJ_COMP:            if (!had_vj)                LogMessage("PPP link seems to use VJ compression, "                        "cannot handle compressed packets!\n");            had_vj = 1;            break;        case PPP_VJ_UCOMP:            /* VJ compression modifies the protocol field. It must be set             * to tcp (only TCP packets can be VJ compressed) */            if(cap_len < PPP_HDRLEN + IP_HEADER_LEN)            {                if(pv.verbose >= 3)                    LogMessage("PPP VJ min packet length > captured len! "                            "(%d bytes)\n", cap_len);                return;            }            ((IPHdr *)(pkt + PPP_HDRLEN))->ip_proto = IPPROTO_TCP;            /* fall through */        case PPP_IP:            DecodeIP(pkt + PPP_HDRLEN, cap_len - PPP_HDRLEN, p);            break;        case PPP_IPX:            DecodeIPX(pkt + PPP_HDRLEN, cap_len - PPP_HDRLEN);            break;    }}/* * Function: DecodePPPoEPkt(Packet *, char *, struct pcap_pkthdr*, u_int8_t*) * * Purpose: Decode those fun loving ethernet packets, one at a time! * * Arguments: p => pointer to the decoded packet struct *            user => Utility pointer (unused) *            pkthdr => ptr to the packet header *            pkt => pointer to the real live packet data * * Returns: void function * * see http://www.faqs.org/rfcs/rfc2516.html * */void DecodePPPoEPkt(Packet *p, SnortPktHeader *pkthdr, u_int8_t *pkt){    u_int32_t pkt_len;      /* suprisingly, the length of the packet */    u_int32_t cap_len;      /* caplen value */    PPPoEHdr *ppppoep=0;    PPPoE_Tag *ppppoe_tag=0;    PPPoE_Tag tag; /* needed to avoid alignment problems */    bzero((char *) p, sizeof(Packet));    /* set the lengths we need */    pkt_len = pkthdr->pktlen;  /* total packet length */    cap_len = pkthdr->caplen;   /* captured packet length */    /* do a little validation */    if(pkthdr->caplen < ETHERNET_HEADER_LEN)    {        if(pv.verbose >= 3)            LogMessage("Captured data length < Ethernet header length! "                    "(%d bytes)\n", cap_len);        return;    }    /* lay the ethernet structure over the packet data */    p->eh = (EtherHdr *) pkt;    ppppoep = (PPPoEHdr *)pkt;    /* grab out the network type */    switch(ntohs(p->eh->ether_type))    {        case ETHERNET_TYPE_PPPoE_DISC:        case ETHERNET_TYPE_PPPoE_SESS:            break;        default:            return;    }    if (ntohs(p->eh->ether_type) != ETHERNET_TYPE_PPPoE_DISC)    {        DecodePppPkt(p, pkthdr, pkt+18);        return;    }    ppppoe_tag = (PPPoE_Tag *)(pkt + sizeof(PPPoEHdr));    while (ppppoe_tag < (PPPoE_Tag *)(pkt + pkthdr->caplen))    {        /* no guarantee in PPPoE spec that ppppoe_tag is aligned at all... */        memcpy(&tag, ppppoe_tag, sizeof(tag));        if (ntohs(tag.length) > 0)        {        }        ppppoe_tag = (PPPoE_Tag *)((char *)(ppppoe_tag+1)+ntohs(tag.length));    }    return;}/* * Function: DecodeIP(u_int8_t *, const u_int32_t, Packet *) * * Purpose: Decode the IP network layer * * Arguments: pkt => ptr to the packet data *            len => length from here to the end of the packet *            p   => pointer to the packet decode struct * * Returns: void function */void DecodeIP(u_int8_t * pkt, const u_int32_t len, Packet * p){    u_int32_t ip_len; /* length from the start of the ip hdr to the                       * pkt end */    u_int32_t hlen;   /* ip header length */    /* lay the IP struct over the raw data */    p->iph = (IPHdr *) pkt;    /* do a little validation */    if(len < IP_HEADER_LEN)    {        if(pv.verbose >= 3)            LogMessage("IP header truncated! (%d bytes)\n", len);        p->iph = NULL;        return;    }    /*     * with datalink DLT_RAW it's impossible to differ ARP datagrams from IP.     * So we are just ignoring non IP datagrams     */    if(IP_VER(p->iph) != 4)    {        if(pv.verbose >= 3)            LogMessage("[!] WARNING: Not IPv4 datagram! "                    "([ver: 0x%x][len: 0x%x])\n",                     IP_VER(p->iph), p->iph->ip_len);        p->iph = NULL;        return;    }    /* set the IP datagram length */    ip_len = ntohs(p->iph->ip_len);    /* set the IP header length */    hlen = IP_HLEN(p->iph) << 2;    if (ip_len != len)    {        if (ip_len > len)         {            ip_len = len;        }    }    if(ip_len < hlen)    {        if(pv.verbose >= 3)            LogMessage("[!] WARNING: IP dgm len (%d bytes) < IP hdr len "                    "(%d bytes), packet discarded\n", ip_len, hlen);        return;    }             /* test for IP options */    p->ip_options_len = hlen - IP_HEADER_LEN;    if(p->ip_options_len > 0)    {        p->ip_options_data = pkt + IP_HEADER_LEN;        DecodeIPOptions((pkt + IP_HEADER_LEN), p->ip_options_len, p);    }    else    {        p->ip_option_count = 0;    }    /* set the remaining packet length */    ip_len -= hlen;    /* check for fragmented packets */    p->frag_offset = ntohs(p->iph->ip_off);    /*      * get the values of the reserved, more      * fragments and don't fragment flags      */    if(((p->frag_offset & 0x8000) >> 15))        p->pkt_flags |= PKT_RB_FLAG;    if(((p->frag_offset & 0x4000) >> 14))        p->pkt_flags |= PKT_DF_FLAG;    if(((p->frag_offset & 0x2000) >> 13))        p->pkt_flags |= PKT_MF_FLAG;    /* mask off the high bits in the fragment offset field */    p->frag_offset &= 0x1FFF;    if(p->frag_offset || (p->pkt_flags & PKT_MF_FLAG))    {        /* set the packet fragment flag */        p->pkt_flags |= PKT_FRAG_FLAG;    }    /* if this packet isn't a fragment */    if((p->pkt_flags & PKT_FRAG_FLAG) == 0)    {        switch(p->iph->ip_proto)        {            case IPPROTO_TCP:                DecodeTCP(pkt + hlen, ip_len, p);                return;            case IPPROTO_UDP:                DecodeUDP(pkt + hlen, ip_len, p);                return;            case IPPROTO_ICMP:                DecodeICMP(pkt + hlen, ip_len, p);                return;            default:                p->data = pkt + hlen;                p->dsize = ip_len;                return;        }    }    else    {        /* set the payload pointer and payload size */        p->data = pkt + hlen;        p->dsize = ip_len;    }}/* * Function: DecodeIPOnly(u_int8_t *, const u_int32_t, Packet *) * * Purpose: Decode the IP network layer but not recurse * * Arguments: pkt => ptr to the packet data *            len => length from here to the end of the packet *            p   => pointer to dummy packet decode struct * * Returns: void function */int DecodeIPOnly(u_int8_t * pkt, const u_int32_t len, Packet * p){    u_int32_t ip_len;  /*                         * length from the start of the ip hdr to the                        * pkt end                         */    u_int32_t hlen;    /* ip header length */    /* lay the IP struct over the raw data */    p->iph = (IPHdr *) pkt;    /* do a little validation */    if(len < IP_HEADER_LEN)    {        if(pv.verbose >= 3)            LogMessage("ICMP Unreachable IP short header (%d bytes)\n", len);        p->iph = NULL;        return(0);    }    /*     * with datalink DLT_RAW it's impossible to differ ARP datagrams from IP.     * So we are just ignoring non IP datagrams     */    if(IP_VER(p->iph) != 4)    {        if(pv.verbose >= 3)            LogMessage("[!] WARNING: ICMP Unreachable not IPv4 datagram "                    "([ver: 0x%x][len: 0x%x])\n",                     IP_VER(p->iph), p->iph->ip_len);        p->iph = NULL;        return(0);    }    /* set the IP datagram length */    ip_len = ntohs(p->iph->ip_len);

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美日韩一级片在线观看| 欧美高清在线一区二区| 国产麻豆日韩欧美久久| 一区二区欧美在线观看| 久久婷婷国产综合精品青草| 欧美亚洲丝袜传媒另类| 99国内精品久久| 国产成人精品三级| 国产真实精品久久二三区| 狠狠色伊人亚洲综合成人| 菠萝蜜视频在线观看一区| 99精品视频在线免费观看| 777a∨成人精品桃花网| 色哟哟精品一区| 色久综合一二码| 欧美精品高清视频| 精品三级在线观看| 日韩免费视频一区二区| 精品剧情在线观看| 亚洲国产精品视频| 日韩电影在线观看一区| 午夜国产不卡在线观看视频| 日韩国产在线观看一区| 日本不卡中文字幕| 在线视频国产一区| 精品久久久久一区二区国产| 亚洲午夜av在线| 色综合久久久久综合99| 国产精品国产三级国产普通话99 | 国产午夜一区二区三区| 亚洲精品一线二线三线| 亚洲欧美国产77777| 亚洲免费在线观看| 成人手机电影网| 欧美理论在线播放| 一区二区在线观看不卡| 国模无码大尺度一区二区三区| 欧美精品日韩一区| 丝袜亚洲另类丝袜在线| 欧美另类videos死尸| 亚洲国产成人porn| 欧美精品丝袜中出| 日本美女一区二区三区| 日韩欧美国产成人一区二区| 日本亚洲电影天堂| 精品久久久久久久人人人人传媒| 精品一区中文字幕| 99国产精品视频免费观看| 中文字幕 久热精品 视频在线 | 福利一区在线观看| 欧美日韩一区二区在线观看| 一区二区三区欧美久久| 欧美日韩高清不卡| 中文在线资源观看网站视频免费不卡| 国产99精品国产| 亚洲精品中文字幕乱码三区| 在线影视一区二区三区| 午夜精品久久久久久久久久久 | 色欧美片视频在线观看在线视频| 亚洲精品中文字幕在线观看| 欧美日韩高清一区| 国产一本一道久久香蕉| 国产精品久久看| 综合久久综合久久| 国产在线精品一区二区夜色| 国产亚洲一区二区三区| 99精品欧美一区二区蜜桃免费| 亚洲精品一二三四区| 欧美精品第1页| 国产精品亚洲视频| 日韩一区二区免费在线电影| 亚洲激情图片一区| 欧美美女直播网站| 日韩一区二区免费视频| 国产成人在线看| 一级精品视频在线观看宜春院| 欧美精品免费视频| 国产乱子轮精品视频| 亚洲乱码国产乱码精品精98午夜| 日韩一区二区三区高清免费看看| 成人美女视频在线观看18| 亚洲男帅同性gay1069| 欧美人xxxx| 91在线云播放| 久久国产剧场电影| 91精品欧美综合在线观看最新| 国产一区二区精品久久99| 亚洲欧美电影一区二区| 欧美精品一区二区久久婷婷| 99久久精品国产麻豆演员表| 日韩精品一二三四| 1区2区3区国产精品| 高清在线不卡av| 午夜不卡av在线| 一色屋精品亚洲香蕉网站| 欧美一区二区福利视频| 免费成人你懂的| 日韩一区二区视频| 91小视频在线免费看| 成人免费小视频| 久久夜色精品国产噜噜av| 精品视频资源站| 99久久精品国产导航| 另类欧美日韩国产在线| 夜夜嗨av一区二区三区| 精品日韩成人av| 欧美精品丝袜久久久中文字幕| 色综合久久久久| 波多野结衣中文字幕一区二区三区| 奇米精品一区二区三区在线观看| 一级精品视频在线观看宜春院| 国产精品网站一区| 色哟哟在线观看一区二区三区| 国产成人午夜片在线观看高清观看| 奇米在线7777在线精品| 丝袜国产日韩另类美女| **性色生活片久久毛片| 精品国产一区二区三区四区四| 欧美日韩你懂的| 成人深夜在线观看| 精品亚洲成av人在线观看| 亚洲国产精品影院| 国产精品久久国产精麻豆99网站| 精品捆绑美女sm三区| 911精品国产一区二区在线| 9人人澡人人爽人人精品| 亚洲乱码国产乱码精品精小说| 久久久久久久久久电影| 本田岬高潮一区二区三区| 日本欧美一区二区在线观看| 亚洲国产欧美在线人成| 亚洲国产你懂的| 午夜免费欧美电影| 日本色综合中文字幕| 日韩av高清在线观看| 九九九久久久精品| 国产在线不卡视频| 国产在线精品一区二区夜色| 国产精品18久久久久久vr| 懂色av中文字幕一区二区三区| 国产成人高清视频| 国产女人aaa级久久久级| 亚洲 欧美综合在线网络| 国产日韩v精品一区二区| 国产女人18水真多18精品一级做| 中文字幕精品综合| 亚洲黄色在线视频| 午夜激情一区二区| 久久99热国产| 成人丝袜高跟foot| 欧美唯美清纯偷拍| 精品欧美久久久| 中文字幕人成不卡一区| 亚洲图片自拍偷拍| 久久不见久久见免费视频1| 粉嫩av一区二区三区在线播放| 色狠狠桃花综合| 欧美va亚洲va香蕉在线| 日本一区二区高清| 亚洲午夜av在线| 国产一区 二区 三区一级| 色成年激情久久综合| 91精品免费在线观看| 欧美国产国产综合| 亚洲妇女屁股眼交7| 韩国av一区二区三区四区 | 国产精品性做久久久久久| 国产一区二区三区国产| 色诱视频网站一区| 欧美一二三四在线| 亚洲欧美日韩国产成人精品影院| 免费看日韩精品| 一本大道久久a久久精二百 | 亚洲国产精品成人久久综合一区 | 国产精品影视在线| 国产一区二区在线影院| voyeur盗摄精品| 欧美日韩不卡一区二区| 欧美一区二区视频观看视频| 欧美成人精品3d动漫h| 国产精品免费网站在线观看| 亚洲欧美日韩国产一区二区三区| 一区二区三区波多野结衣在线观看| 日韩精彩视频在线观看| 大桥未久av一区二区三区中文| 制服丝袜日韩国产| 日韩美女视频一区| 精品中文字幕一区二区 | 欧美日韩精品三区| 国产精品美女久久久久aⅴ| 青青草精品视频| 日本韩国欧美在线| 国产欧美日韩视频一区二区| 日韩高清不卡在线| 在线精品视频一区二区三四| 国产欧美日本一区视频| 麻豆91在线播放| 国产成人午夜精品5599| 91麻豆精品国产自产在线观看一区 | 亚洲国产综合91精品麻豆|