亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? pcap.h

?? Windows XP下的抓包程序?qū)崿F(xiàn)
?? H
?? 第 1 頁(yè) / 共 5 頁(yè)
字號(hào):
  supplied.) NULL is returned if an error occured, or if no packets were read from a live 
  capture (if, for example, they were discarded because they didn't pass the packet filter, 
  or if, on platforms that support a read timeout that starts before any packets arrive, the 
  timeout expires before any packets arrive, or if the file descriptor for the capture device 
  is in non-blocking mode and no packets were available to be read), or if no more packets are 
  available in a ``savefile.'' Unfortunately, there is no way to determine whether an error 
  occured or not.
\sa pcap_dispatch(), pcap_loop()
*/

u_char *pcap_next(pcap_t *p, struct pcap_pkthdr *h);

/*! \brief Read a packet from an interface or from an offline capture.

This function is used to retrieve the next available packet, bypassing the callback method traditionally 
provided by libpcap.

pcap_next_ex fills the pkt_header and pkt_data parameters (see pcap_handler()) with the pointers to the 
header and to the data of the next captured packet.

The return value can be:
- 1 if the packet has been read without problems
- 0 if the timeout set with pcap_open_live() has elapsed. In this case pkt_header and pkt_data don't point to a valid packet
- -1 if an error occurred
- -2 if EOF was reached reading from an offline capture

\sa pcap_open_live(), pcap_loop(), pcap_dispatch(), pcap_handler()
*/
int pcap_next_ex(pcap_t *p, struct pcap_pkthdr **pkt_header, const u_char **pkt_data);

/*! \brief set a flag that will force pcap_dispatch() or pcap_loop() to return rather than looping.

  They will return the number of packets that have been processed so far, or -2 if no packets have been processed so far.
  This routine is safe to use inside a signal handler on UNIX or a console control handler on Windows, as it merely sets 
  a flag that is checked within the loop.
  The flag is checked in loops reading packets from the OS - a signal by itself will not necessarily terminate those 
  loops - as well as in loops processing a set of packets returned by the OS. Note that if you are catching signals on 
  UNIX systems that support restarting system calls after a signal, and calling pcap_breakloop() in the signal handler, 
  you must specify, when catching those signals, that system calls should NOT be restarted by that signal. Otherwise, 
  if the signal interrupted a call reading packets in a live capture, when your signal handler returns after calling 
  pcap_breakloop(), the call will be restarted, and the loop will not terminate until more packets arrive and the call 
  completes.  
  \note pcap_next() will, on some platforms, loop reading packets from the OS; that loop will not necessarily be 
  terminated by a signal, so pcap_breakloop() should be used to terminate packet processing even if pcap_next() is 
  being used.
  pcap_breakloop() does not guarantee that no further packets will be processed by pcap_dispatch() or pcap_loop() after 
  it is called; at most one more packet might be processed.
  If -2 is returned from pcap_dispatch() or pcap_loop(), the flag is cleared, so a subsequent call will resume reading 
  packets. If a positive number is returned, the flag is not cleared, so a subsequent call will return -2 and clear 
  the flag.
*/
void pcap_breakloop(pcap_t *);

/*! \brief Send a raw packet.

This function allows to send a raw packet to the network. p is the interface that 
will be used to send the packet, buf contains the data of the packet to send (including the various 
protocol headers), size is the dimension of the buffer pointed by buf, i.e. the size of the packet to send. 
The MAC CRC doesn't need to be included, because it is transparently calculated and added by the network 
interface driver.
The return value is 0 if the packet is succesfully sent, -1 otherwise.

\sa pcap_open_live()
*/
int pcap_sendpacket(pcap_t *p, u_char *buf, int size);	

/*! \brief Save a packet to disk.

       pcap_dump() outputs a packet to  the  "savefile"  opened
       with  pcap_dump_open().   Note  that its calling arguments
       are suitable for use with pcap_dispatch() or  pcap_loop().
       If   called  directly,  the  user  parameter  is  of  type
       pcap_dumper_t as returned by pcap_dump_open().

\sa pcap_dump_open(), pcap_dump_close(), pcap_dispatch(), pcap_loop()
*/
void pcap_dump(u_char *user, const struct pcap_pkthdr *h, const u_char *sp);

/*! \brief Return the file position for a "savefile".

	pcap_dump_ftell() returns the current file position for the "savefile", representing the number of bytes written by
	pcap_dump_open() and pcap_dump() .
	-1 is returned on error.

\sa pcap_dump_open(), pcap_dump()
*/
long pcap_dump_ftell(pcap_dumper_t *);

/*! \brief Compile a packet filter, converting an high level filtering expression 
(see \ref language) in a program that can be interpreted by the kernel-level
filtering engine.

  pcap_compile() is used to compile the string str into a filter program. program 
  is a pointer to a bpf_program struct and is filled in by pcap_compile(). optimize 
  controls whether optimization on the resulting code is performed. netmask 
  specifies the IPv4 netmask of the network on which packets are being captured; 
  it is used only when checking for IPv4 broadcast addresses in the filter program. 
  If the netmask of the network on which packets are being captured isn't known to 
  the program, or if packets are being captured on the Linux "any" pseudo-interface 
  that can capture on more than one network, a value of 0 can be supplied; tests for 
  IPv4 broadcast addreses won't be done correctly, but all other tests in the filter 
  program will be OK. A return of -1 indicates an error in which case pcap_geterr() 
  may be used to display the error text.

\sa pcap_open_live(), pcap_setfilter(), pcap_freecode(), pcap_snapshot()
*/
int pcap_compile(pcap_t *p, struct bpf_program *fp, char *str, int optimize, bpf_u_int32 netmask);

/*!\brief Compile a packet filter without the need of opening an adapter. This function converts an high level filtering expression 
(see \ref language) in a program that can be interpreted by the kernel-level filtering engine.

       pcap_compile_nopcap() is similar to pcap_compile() except 
       that  instead  of passing a pcap structure, one passes the
       snaplen and linktype explicitly.  It  is  intended  to  be
       used  for  compiling filters for direct BPF usage, without
       necessarily having called pcap_open().   A  return  of  -1
       indicates   an  error;  the  error  text  is  unavailable.
       (pcap_compile_nopcap()     is     a     wrapper     around
       pcap_open_dead(),  pcap_compile(),  and  pcap_close(); the
       latter three routines can be used directly in order to get
       the error text for a compilation error.)

       Look at the \ref language section for details on the 
       str parameter.

\sa pcap_open_live(), pcap_setfilter(), pcap_freecode(), pcap_snapshot()
*/
int pcap_compile_nopcap(int snaplen_arg, int linktype_arg, struct bpf_program *program, char *buf, int optimize, bpf_u_int32 mask);


/*! \brief Associate a filter to a capture.

       pcap_setfilter()  is used to specify a filter program.  fp
       is a pointer to a bpf_program struct, usually  the  result
       of  a  call to pcap_compile().  -1 is returned on failure,
       in which case pcap_geterr() may be  used  to  display  the
       error text; 0 is returned on success.

\sa pcap_compile(), pcap_compile_nopcap()
*/
int pcap_setfilter(pcap_t *p, struct bpf_program *fp);


/*! \brief Free a filter.

       pcap_freecode()  is  used  to  free  up  allocated  memory
       pointed to by a bpf_program struct generated by  pcap_compile()  
	   when  that  BPF  program  is no longer needed, for
       example after it has been made the filter  program  for  a
       pcap structure by a call to pcap_setfilter().

\sa pcap_compile(), pcap_compile_nopcap()
*/
void pcap_freecode(struct bpf_program *fp);

/*! \brief Return the link layer of an adapter.

returns the link layer type; link layer types it can return include:

    - DLT_NULL BSD loopback encapsulation; the link layer header is a 4-byte field, in host byte order, containing a PF_ value from socket.h for the network-layer protocol of the packet. 
        Note that ``host byte order'' is the byte order of the machine on which the packets are captured, and the PF_ values are for the OS of the machine on which the packets are captured; if a live capture is being done, ``host byte order'' is the byte order of the machine capturing the packets, and the PF_ values are those of the OS of the machine capturing the packets, but if a ``savefile'' is being read, the byte order and PF_ values are not necessarily those of the machine reading the capture file. 
    - DLT_EN10MB Ethernet (10Mb, 100Mb, 1000Mb, and up) 
    - DLT_IEEE802: IEEE 802.5 Token Ring 
    - DLT_ARCNET: ARCNET 
    - DLT_SLIP: SLIP; the link layer header contains, in order:
            -# a 1-byte flag, which is 0 for packets received by the machine and 1 for packets sent by the machine;
            -# a 1-byte field, the upper 4 bits of which indicate the type of packet, as per RFC 1144:
                - 0x40: an unmodified IP datagram (TYPE_IP); 
                - 0x70: an uncompressed-TCP IP datagram (UNCOMPRESSED_TCP), with that byte being the first byte of the raw IP header on the wire, containing the connection number in the protocol field; 
                - 0x80: a compressed-TCP IP datagram (COMPRESSED_TCP), with that byte being the first byte of the compressed TCP/IP datagram header; 
            -# for UNCOMPRESSED_TCP, the rest of the modified IP header, and for COMPRESSED_TCP, the compressed TCP/IP datagram header; 
            -# for a total of 16 bytes; the uncompressed IP datagram follows the header. 

    - DLT_PPP: PPP; if the first 2 bytes are 0xff and 0x03, it's PPP in HDLC-like framing, with the PPP header following those two bytes, otherwise it's PPP without framing, and the packet begins with the PPP header. 
    - DLT_FDDI: FDDI 
    - DLT_ATM_RFC1483: RFC 1483 LLC/SNAP-encapsulated ATM; the packet begins with an IEEE 802.2 LLC header. 
    - DLT_RAW: raw IP; the packet begins with an IP header. 
    - DLT_PPP_SERIAL: PPP in HDLC-like framing, as per RFC 1662, or Cisco PPP with HDLC framing, as per section 4.3.1 of RFC 1547; the first byte will be 0xFF for PPP in HDLC-like framing, and will be 0x0F or 0x8F for Cisco PPP with HDLC framing. 
    - DLT_PPP_ETHER: PPPoE; the packet begins with a PPPoE header, as per RFC 2516. 
    - DLT_C_HDLC: Cisco PPP with HDLC framing, as per section 4.3.1 of RFC 1547. 
    - DLT_IEEE802_11: IEEE 802.11 wireless LAN 
    - DLT_FRELAY: Frame Relay 
    - DLT_LOOP: OpenBSD loopback encapsulation; the link layer header is a 4-byte field, in network byte order, containing a PF_ value from OpenBSD's socket.h for the network-layer protocol of the packet. 
        Note that, if a ``savefile'' is being read, those PF_ values are not necessarily those of the machine reading the capture file. 
    - DLT_LINUX_SLL: Linux "cooked" capture encapsulation; the link layer header contains, in order:
		- a 2-byte "packet type", in network byte order, which is one of:
			-# packet was sent to us by somebody else 
			-# packet was broadcast by somebody else 
			-# packet was multicast, but not broadcast, by somebody else 
			-# packet was sent by somebody else to somebody else 
			-# packet was sent by us 
		- a 2-byte field, in network byte order, containing a Linux ARPHRD_ value for the link layer device type;
		- a 2-byte field, in network byte order, containing the length of the link layer address of the sender of the packet (which could be 0);
		- an 8-byte field containing that number of bytes of the link layer header (if there are more than 8 bytes, only the first 8 are present);
		- 2-byte field containing an Ethernet protocol type, in network byte order, or containing 1 for Novell 802.3 frames without an 802.2 LLC header or 4 for frames beginning with an 802.2 LLC header. 
    - DLT_LTALK: Apple LocalTalk; the packet begins with an AppleTalk LLAP header. 
    - DLT_PFLOG: OpenBSD pflog; the link layer header contains, in order:
		- a 4-byte PF_ value, in network byte order;
		- a 16-character interface name;
		- a 2-byte rule number, in network byte order;
		- a 2-byte reason code, in network byte order, which is one of:
			-# match 
			-# bad offset 
			-# fragment 
			-# short 
			-# normalize 
			-# memory
		-a 2-byte action code, in network byte order, which is one of:
			-# passed 
			-# dropped 
			-# scrubbed 
		- a 2-byte direction, in network byte order, which is one of:
			-# incoming or outgoing 
			-# incoming 
			-# outgoing 
    - DLT_PRISM_HEADER: Prism monitor mode information followed by an 802.11 header. 
    - DLT_IP_OVER_FC: RFC 2625 IP-over-Fibre Channel, with the link-layer header being the Network_Header as described in that RFC. 
    - DLT_SUNATM: SunATM devices; the link layer header contains, in order:
		- a 1-byte flag field, containing a direction flag in the uppermost bit, which is set for packets transmitted by the machine and clear for packets received by the machine, and a 4-byte traffic type in the low-order 4 bits, which is one of:
			-# raw traffic 
			-# LANE traffic 
			-# LLC-encapsulated traffic 
			-# MARS traffic 
			-# IFMP traffic 
			-# ILMI traffic 
			-# Q.2931 traffic 
		- a 1-byte VPI value;
		- a 2-byte VCI field, in network byte order. 
    - DLT_IEEE802_11_RADIO: link-layer information followed by an 802.11 header - see http://www.shaftnet.org/~pizza/software/capturefrm.txt for a description of the link-layer information. 
    - DLT_ARCNET_LINUX: ARCNET, with no exception frames, reassembled packets rather than raw frames, and an extra 16-bit offset field between the destination host and type bytes. 
    - DLT_LINUX_IRDA: Linux-IrDA packets, with a DLT_LINUX_SLL header followed by the IrLAP header. 

\sa pcap_list_datalinks(), pcap_set_datalink(), pcap_datalink_name_to_val()
*/
int pcap_datalink(pcap_t *p);

/*! \brief list datalinks 

  pcap_list_datalinks() is used to get a list of the supported data link types of the 
  interface associated with the pcap descriptor. pcap_list_datalinks() allocates an array 
  to hold the list and sets *dlt_buf. The caller is responsible for freeing the array. -1 
  is returned on failure; otherwise, the number of data link types in the array is returned.

\sa pcap_datalink(), pcap_set_datalink(), pcap_datalink_name_to_val()
*/
int pcap_list_datalinks(pcap_t *p, int **dlt_buf);

/*! \brief Set the current data link type of the pcap 
  descriptor to the type specified by dlt. -1 is returned on failure. */
int pcap_set_datalink(pcap_t *p, int dlt);

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
精品在线视频一区| 午夜久久久影院| 日本欧美一区二区在线观看| 欧洲激情一区二区| 18成人在线视频| 岛国av在线一区| 国产日韩精品一区二区三区在线| 久久不见久久见中文字幕免费| 91精品国模一区二区三区| 午夜视频在线观看一区二区| 欧美二区三区的天堂| 午夜精品影院在线观看| 欧美剧在线免费观看网站| 奇米在线7777在线精品| 精品毛片乱码1区2区3区| 久久精品国产一区二区三| 精品日本一线二线三线不卡| 国产精品 欧美精品| 国产亚洲成av人在线观看导航| 成人免费观看视频| 亚洲人成在线播放网站岛国| 91香蕉视频黄| 香蕉久久夜色精品国产使用方法| 一本大道综合伊人精品热热| 亚洲国产精品一区二区久久恐怖片 | 欧美美女一区二区三区| 日日夜夜免费精品| 精品国产免费人成在线观看| 成人午夜视频网站| 一区二区三区在线视频播放 | 国产成人福利片| 国产精品乱子久久久久| 国产成人免费av在线| 久久久久久久综合色一本| 国产iv一区二区三区| 国产精品污www在线观看| 99久久精品免费| 天堂av在线一区| 国产欧美日韩在线看| 欧美在线综合视频| 美女视频黄 久久| 国产精品国产三级国产有无不卡 | 经典三级视频一区| 《视频一区视频二区| 91精品国产综合久久小美女| 成人午夜视频网站| 日韩高清电影一区| 国产精品久久久久婷婷二区次| 欧美高清精品3d| 成人性生交大片免费| 午夜精品在线视频一区| 综合婷婷亚洲小说| 日韩美女视频在线| 成人av影院在线| 日韩精品一级二级| 一区在线播放视频| 欧美电影精品一区二区| 色综合天天综合| 国内国产精品久久| 日本视频中文字幕一区二区三区| 国产精品久久久久一区二区三区共| 欧美精品乱人伦久久久久久| 成人av资源网站| 精品一区二区三区久久| 亚洲sss视频在线视频| 亚洲三级视频在线观看| 精品成人一区二区| 6080yy午夜一二三区久久| 99久久久久免费精品国产| 国产伦精品一区二区三区免费| 亚洲午夜电影在线观看| 最新久久zyz资源站| 久久久久97国产精华液好用吗| 制服.丝袜.亚洲.另类.中文| 一本久久a久久精品亚洲| 国产丶欧美丶日本不卡视频| 精品一区二区三区影院在线午夜| 午夜在线成人av| 一区二区三区电影在线播| 欧美激情综合网| 国产日韩欧美亚洲| 久久久久久麻豆| 久久亚洲一级片| 精品福利一二区| 亚洲精品一区二区三区精华液 | 波多野结衣中文一区| 精品国产一区二区在线观看| 国产精品资源网站| 精品影院一区二区久久久| 日韩影院精彩在线| 午夜精品久久久久久久久久| 夜夜精品视频一区二区| 综合欧美亚洲日本| 国产日产亚洲精品系列| 欧美一二三四在线| 欧美va亚洲va| 久久久精品国产免费观看同学| 国产亚洲一本大道中文在线| 欧美国产日韩a欧美在线观看| 欧美日韩二区三区| 欧美日韩国产小视频在线观看| 91毛片在线观看| 成人av电影观看| 91在线小视频| 欧美视频一区二| 色av综合在线| 99久久综合精品| 色88888久久久久久影院按摩| 国产aⅴ精品一区二区三区色成熟| 国产精一区二区三区| 七七婷婷婷婷精品国产| 奇米影视一区二区三区| 亚洲成人资源在线| 久久精品免费观看| 另类小说一区二区三区| 精品一区中文字幕| 极品销魂美女一区二区三区| 国产尤物一区二区在线| 国产成人99久久亚洲综合精品| 国产一区二区三区香蕉| 不卡一区在线观看| 欧美系列在线观看| 日韩欧美www| 国产精品久久久久久久久免费相片| 国产欧美日韩卡一| 亚洲黄网站在线观看| 蜜桃av一区二区三区| 日韩视频免费直播| 精品久久久久香蕉网| 国产精品色婷婷| 亚洲第一福利视频在线| 九九九精品视频| 成人性视频免费网站| 色94色欧美sute亚洲线路一ni | 99久久婷婷国产综合精品| 欧美色综合网站| 久久久不卡网国产精品二区| 亚洲精品高清在线| 国产一区二区不卡在线| 日本精品免费观看高清观看| 精品少妇一区二区三区| 亚洲精品高清在线观看| 国内精品嫩模私拍在线| 日本道精品一区二区三区| 亚洲精品在线观| 亚洲一区二区三区四区在线| 国产精品一区二区三区四区 | 亚洲欧洲中文日韩久久av乱码| 日产国产高清一区二区三区| 国产一区二区在线免费观看| 成人一区二区三区中文字幕| 欧美日韩精品欧美日韩精品一综合| 欧美性一区二区| 欧美sm极限捆绑bd| 最新国产成人在线观看| 国内外精品视频| 欧美日韩一区二区三区在线看 | 久久久.com| 毛片av一区二区| 欧美日韩在线一区二区| 国产精品乱码妇女bbbb| 日韩国产精品久久| 在线免费亚洲电影| 欧美韩日一区二区三区四区| 日韩精品福利网| 欧洲av一区二区嗯嗯嗯啊| 国产欧美一区二区在线观看| 久久99热国产| 欧美一区二区三区系列电影| 亚洲伊人伊色伊影伊综合网| 97精品国产97久久久久久久久久久久| 欧美精品一区二区三区视频| 日本麻豆一区二区三区视频| 欧美三区免费完整视频在线观看| 日韩理论在线观看| jizzjizzjizz欧美| 一区免费观看视频| 北岛玲一区二区三区四区| 国产农村妇女毛片精品久久麻豆| 国产一区二区精品久久| 精品粉嫩超白一线天av| 狠狠色丁香久久婷婷综合丁香| 日韩欧美久久一区| 久久精品国产色蜜蜜麻豆| 日韩视频免费观看高清在线视频| 婷婷中文字幕一区三区| 91精品国产91久久久久久一区二区| 久久精品一区二区三区av| 亚洲激情一二三区| 在线观看一区二区视频| 久久久久高清精品| 国产白丝网站精品污在线入口| 26uuu色噜噜精品一区| 国产乱子轮精品视频| 欧美本精品男人aⅴ天堂| 国产资源精品在线观看| 国产色综合久久| 色综合激情五月| 亚洲成在线观看| 日韩美女一区二区三区四区|