亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? pcap.h

?? Windows XP下的抓包程序?qū)崿F(xiàn)
?? H
?? 第 1 頁(yè) / 共 5 頁(yè)
字號(hào):

	\param type: pointer to an integer, which is used to return the code corrisponding to the 
	selected source. The code will be one defined in the \link remote_source_ID Source identification
	Codes \endlink.<br>
	In case the source string does not exists (i.e. 'source == NULL') or it is empty
	('*source == NULL'), it returns PCAP_SRC_IF_LOCAL (i.e. you are ready to 
	call pcap_open_live() ). This behavior is kept only for compatibility with older 
	applications (e.g. tcpdump); therefore we suggest to move to the new syntax for sources.<br>
	This parameter can be NULL in case the user is not interested in that.

	\param host: user-allocated buffer (of size PCAP_BUF_SIZE) that is used to return 
	the host name on which the capture has to be started.
	This value is meaningful only in case of remote capture; otherwise, the returned 
	string will be empty ("").
	This parameter can be NULL in case the user is not interested in that.

	\param port: user-allocated buffer (of size PCAP_BUF_SIZE) that is used to return 
	the port that has to be used by the RPCAP protocol to contact the other host.
	This value is meaningful only in case of remote capture and if the user wants to use
	a non-standard port; otherwise, the returned string will be empty ("").
	In case of remote capture, an emply string means "use the standard RPCAP port".
	This parameter can be NULL in case the user is not interested in that.

	\param name: user-allocated buffer (of size PCAP_BUF_SIZE) that is used to return 
	the source name, without the source prefix.
	If the name does not exist (for example because source contains 'rpcap://' that means 
	'default local adapter'), it returns NULL.
	This parameter can be NULL in case the user is not interested in that.

	\param errbuf: pointer to a user-allocated buffer (of size PCAP_ERRBUF_SIZE)
	that will contain the error message (in case there is one).
	This parameter can be NULL in case the user is not interested in that.

	\return '0' if everything is fine, '-1' if some errors occurred. The requested values
	(host name, network port, type of the source) are returned into the proper variables
	passed by reference.
*/
int pcap_parsesrcstr(const char *source, int *type, char *host, char *port, char *name, char *errbuf);

/*!	\brief Open a generic source in order to capture / send (WinPcap only) traffic.
	
	The pcap_open() replaces all the pcap_open_xxx() functions with a single call.

	This function hides the differences between the different pcap_open_xxx() functions
	so that the programmer does not have to manage different opening function.
	In this way, the 'true' open function is decided according to the source type,
	which is included into the source string (in the form of source prefix).

	This function can rely on the pcap_createsrcstr() to create the string that keeps
	the capture device according to	the new syntax, and the pcap_parsesrcstr() for the
	other way round.

	\param source: zero-terminated string containing the source name to open.
	The source name has to include the format prefix according to the new
	\link remote_source_string Source Specification Syntax\endlink and it cannot be NULL.<br>
	On on Linux systems with 2.2 or later kernels, a device argument of "any"
	(i.e. rpcap://any) can be used to capture packets from all interfaces.
	<br>
	In order to makes the source syntax easier, please remember that:
	- the adapters returned by the pcap_findalldevs_ex() can be used immediately by the pcap_open()
	- in case the user wants to pass its own source string to the pcap_open(), the 
	pcap_createsrcstr() helps in creating the correct source identifier.
	
	\param snaplen: length of the packet that has to be retained.	
	For each packet received by the filter, only the first 'snaplen' bytes are stored 
	in the buffer and passed to the user application. For instance, snaplen equal to 
	100 means that only the first 100 bytes of each packet are stored.

  	\param flags: keeps several flags that can be needed for capturing packets.
	The allowed flags are defined in the \link remote_open_flags pcap_open() flags \endlink.

	\param read_timeout: read timeout in milliseconds.
	The read timeout is used to arrange that the read not necessarily return
	immediately when a packet is seen, but that it waits for some amount of 
	time to allow more packets to arrive and to read multiple packets from 
	the OS kernel in one operation. Not all platforms support a read timeout;
	on platforms that don't, the read timeout is ignored.

	\param auth: a pointer to a 'struct pcap_rmtauth' that keeps the information required to
	authenticate the user on a remote machine. In case this is not a remote capture, this
	pointer can be set to NULL.

	\param errbuf: a pointer to a user-allocated buffer which will contain the error
	in case this function fails. The pcap_open() and findalldevs() are the only two
	functions which have this parameter, since they do not have (yet) a pointer to a
	pcap_t structure, which reserves space for the error string. Since these functions
	do not have (yet) a pcap_t pointer (the pcap_t pointer is NULL in case of errors),
	they need an explicit 'errbuf' variable.
	'errbuf' may also be set to warning text when pcap_open_live() succeds; 
	to detect this case the caller should store a  zero-length string in  
	'errbuf' before calling pcap_open_live() and display the warning to the user 
	if 'errbuf' is no longer a zero-length string.

	\return A pointer to a 'pcap_t' which can be used as a parameter to the following
	calls (pcap_compile() and so on) and that specifies an opened WinPcap session. In case of 
	problems, it returns NULL and the 'errbuf' variable keeps the error message.

	\warning The source cannot be larger than PCAP_BUF_SIZE.

	\warning The following formats are not allowed as 'source' strings:
	- rpcap:// [to open the first local adapter]
	- rpcap://hostname/ [to open the first remote adapter]

*/
pcap_t *pcap_open(const char *source, int snaplen, int flags, int read_timeout, struct pcap_rmtauth *auth, char *errbuf);

/*!	\brief Define a sampling method for packet capture.

	This function allows applying a sampling method to the packet capture process.
	The currently sampling methods (and the way to set them) are described into the
	struct pcap_samp. In other words, the user must set the appropriate parameters
	into it; these will be applied as soon as the capture starts.

	\warning Sampling parameters <strong>cannot</strong> be changed when a capture is 
	active. These parameters must be applied <strong>before</strong> starting the capture.
	If they are applied when the capture is in progress, the new settings are ignored.

	\warning Sampling works only when capturing data on Win32 or reading from a file.
	It has not been implemented on other platforms. Sampling works on remote machines
	provided that the probe (i.e. the capturing device) is a Win32 workstation.
*/
struct pcap_samp *pcap_setsampling(pcap_t *p);

/*!	\brief Block until a network connection is accepted (active mode only).

	This function has been defined to allow the client dealing with the 'active mode'.
	In other words, in the 'active mode' the server opens the connection toward the
	client, so that the client has to open a socket in order to wait for connections.
	When a new connection is accepted, the RPCAP protocol starts as usual; the only 
	difference is that the connection is initiated by the server.

	This function accepts only ONE connection, then it closes the waiting socket. This means
	that if some error occurs, the application has to call it again in order to accept another
	connection.

	This function returns when a new connection (coming from a valid host 'connectinghost')
	is accepted; it returns error otherwise.

	\param address: a string that keeps the network address we have to bind to; 
	usually it is NULL (it means 'bind on all local addresses').

	\param port: a string that keeps the network port on which we have to bind to; usually
	it is NULL (it means 'bind on the predefined port', i.e. RPCAP_DEFAULT_NETPORT_ACTIVE).

	\param hostlist: a string that keeps the host name of the host from whom we are
	expecting a connection; it can be NULL (it means 'accept connection from everyone').
	Host names are separated by a whatever character in the RPCAP_HOSTLIST_SEP list.

	\param connectinghost: a user-allocated buffer that will contain the name of the host
	is trying to connect to us.
	This variable must be at least RPCAP_HOSTLIST_SIZE bytes..

	\param auth: a pointer to a pcap_rmtauth structure. This pointer keeps the information
	required to authenticate the RPCAP connection to the remote host.

	\param errbuf: a pointer to a user-allocated buffer (of size PCAP_ERRBUF_SIZE)
	that will contain the error message (in case there is one).

	\return The SOCKET identifier of the new control connection if everything is fine,
	a negative number if some errors occurred. The error message is returned into the errbuf variable.
	In case it returns '-1', this means 'everything is fine', but the host cannot be admitted.
	In case it returns '-2', in means 'unrecoverable error' (for example it is not able to bind the 
	socket, or something like that).
	In case it returns '-3', it means 'authentication failed'. The authentication check is performed
	only if the connecting host is among the ones that are allowed to connect to this host.

	The host that is connecting to us is returned into the hostlist variable, which ust be allocated
	by the user. This variable contains the host name both in case the host is allowed, 
	and in case the connection is refused.

	\warning Although this function returns the socket established by the new control connection,
	this value should not be used. This value will be stored into some libpcap internal
	variables and it will be managed automatically by the library. In other words, all the
	following calls to findalldevs() and pcap_open() will check if the host is among one that
	already has a control connection in place; if so, that one will be used.

	\warning This function has several problems if used inside a thread, which is stopped
	when this call is blocked into the accept(). In this case, the socket on which we accept
	connections is not freed (thread termination is a very dirty job), so that we are no
	longer able to accept other connections until the program (i.e. the process) stops.
	In order to solve the problem, call the pcap_remoteact_cleanup().
*/
SOCKET pcap_remoteact_accept(const char *address, const char *port, const char *hostlist, char *connectinghost, struct pcap_rmtauth *auth, char *errbuf);

/*!	\brief Drop an active connection (active mode only).

	This function has been defined to allow the client dealing with the 'active mode'.
	This function closes an active connection that is still in place and it purges
	the host name from the 'activeHost' list.
	From this point on, the client will not have any connection with that host in place.

	\param host: a string that keeps the host name of the host for which we want to
	close the active connection.

	\param errbuf: a pointer to a user-allocated buffer (of size PCAP_ERRBUF_SIZE)
	that will contain the error message (in case there is one).

	\return '0' if everything is fine, '-1' if some errors occurred. The error message is 
	returned into the errbuf variable.
*/
int pcap_remoteact_close(const char *host, char *errbuf);

/*!	\brief Clean the socket that is currently used in waiting active connections.

	This function does a very dirty job. The fact is that is the waiting socket is not
	freed if the pcap_remoteaccept() is killed inside a new thread. This function is
	able to clean the socket in order to allow the next calls to pcap_remoteact_accept() to work.
	
	This function is useful *only* if you launch pcap_remoteact_accept() inside a new thread,
	and you stops (not very gracefully) the thread (for example because the user changed idea,
	and it does no longer want to wait for an active connection).
	So, basically, the flow should be the following:
	- launch a new thread
	- call the pcap_remoteact_accept
	- if this new thread is killed, call pcap_remoteact_cleanup().
	
	This function has no effects in other cases.

	\return None.
*/
void pcap_remoteact_cleanup();

/*!	\brief Return the hostname of the host that have an active connection with us (active mode only).

	This function has been defined to allow the client dealing with the 'active mode'.
	This function returns the list of hosts that are currently having an active connection
	with us. This function is useful in order to delete an active connection that is still
	in place.

	\param hostlist: a user-allocated string that will keep the list of host that are 
	currently connected with us.

	\param sep: the character that has to be sued as a separator between the hosts (','  for example).

	\param size: size of the hostlist buffer.

	\param errbuf: a pointer to a user-allocated buffer (of size PCAP_ERRBUF_SIZE)
	that will contain the error message (in case there is one).

	\return '0' if everything is fine, '-1' if some errors occurred. The error message is 
	returned into the errbuf variable.
*/
int pcap_remoteact_list(char *hostlist, char sep, int size, char *errbuf);

//\}
// End of Windows-specific extensions



/*@}*/

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美国产国产综合| 亚洲曰韩产成在线| 色拍拍在线精品视频8848| 日韩成人精品视频| 中文字幕亚洲在| 日韩精品最新网址| 欧洲视频一区二区| 成人av在线网站| 久久超碰97中文字幕| 亚洲自拍偷拍麻豆| 欧美高清在线精品一区| 在线不卡中文字幕| 91一区二区在线| 国产福利一区在线观看| 日韩电影免费一区| 一区2区3区在线看| 亚洲色大成网站www久久九九| www国产成人| 7777女厕盗摄久久久| 日本高清不卡一区| 成人av电影在线观看| 久久99国内精品| 免费在线观看一区| 婷婷丁香久久五月婷婷| 一区二区三区精品视频| 亚洲人成网站在线| 国产精品污www在线观看| 久久亚洲精品国产精品紫薇| 日韩三级电影网址| 欧美日韩精品欧美日韩精品一综合| 99在线视频精品| 国产黄色成人av| 韩国女主播成人在线| 麻豆精品新av中文字幕| 日本va欧美va瓶| 日韩电影免费在线看| 天堂在线亚洲视频| 亚洲成av人片观看| 亚洲一卡二卡三卡四卡无卡久久 | 日韩一区在线播放| 国产女人18毛片水真多成人如厕| 337p粉嫩大胆色噜噜噜噜亚洲| 欧美电视剧免费全集观看| 欧美一区二区三区视频在线观看 | 福利一区福利二区| 国产福利一区在线观看| 国产福利一区在线| www.综合网.com| 色老汉一区二区三区| 欧美午夜不卡在线观看免费| 欧美日韩在线观看一区二区 | 日韩国产一二三区| 日韩在线一二三区| 麻豆91免费观看| 国产在线乱码一区二区三区| 国产一区二区三区免费观看| 丁香啪啪综合成人亚洲小说| 成人午夜免费av| 91浏览器在线视频| 欧美一区二区性放荡片| 欧美大白屁股肥臀xxxxxx| 精品国产伦理网| 国产精品三级电影| 亚洲精品大片www| 五月天激情综合网| 激情综合色综合久久| 成人免费高清在线| 91麻豆国产福利精品| 制服丝袜成人动漫| 欧美国产国产综合| 亚洲制服丝袜一区| 卡一卡二国产精品 | 丁香六月久久综合狠狠色| 色中色一区二区| 欧美一级理论性理论a| 国产亚洲一区二区三区在线观看| 亚洲视频在线观看三级| 日韩国产欧美在线视频| 懂色一区二区三区免费观看| 欧美少妇bbb| 国产婷婷色一区二区三区在线| 一区二区三区精品视频| 国模套图日韩精品一区二区| 色综合网色综合| 日韩精品一区二区三区四区视频| 亚洲欧洲性图库| 蜜桃av一区二区| aaa国产一区| 精品999在线播放| 亚洲综合免费观看高清完整版在线| 精品一区二区三区在线视频| 91丝袜美腿高跟国产极品老师| 精品国产伦一区二区三区观看方式 | 精品日韩成人av| 亚洲综合999| 国产精品1024| 欧美日韩国产影片| 国产精品蜜臀在线观看| 久久精品国产一区二区| 色婷婷精品久久二区二区蜜臀av| 精品国内片67194| 亚洲一区电影777| 99久久精品费精品国产一区二区| 日韩欧美综合一区| 亚洲自拍与偷拍| 97久久超碰国产精品电影| 日韩精品最新网址| 亚洲国产人成综合网站| 不卡av在线免费观看| 久久无码av三级| 日韩精品电影在线| 91九色最新地址| 中文字幕制服丝袜一区二区三区| 精品亚洲国内自在自线福利| 欧美日韩一级二级| 一区二区三区自拍| 99久久综合99久久综合网站| 久久久综合网站| 久久99精品久久久久久国产越南 | 成人小视频在线| 久久综合色8888| 免费不卡在线观看| 欧美一区二区在线免费观看| 午夜精品国产更新| 欧美性色综合网| 亚洲一区免费观看| 日本道免费精品一区二区三区| 国产精品天天摸av网| 国产99久久久精品| 国产日本欧美一区二区| 国产一区二区三区四区五区美女| 日韩精品中文字幕在线一区| 日韩成人一区二区三区在线观看| 欧美日韩高清一区二区| 亚洲资源在线观看| 欧美日韩一本到| 无吗不卡中文字幕| 91精品国产色综合久久 | 成人黄色免费短视频| 中文字幕一区二区5566日韩| 成人国产在线观看| 亚洲欧美欧美一区二区三区| 日本精品裸体写真集在线观看| 亚洲一区av在线| 欧美男女性生活在线直播观看| 日韩精品电影在线| 精品国产髙清在线看国产毛片| 国内精品伊人久久久久av一坑 | 日韩电影在线一区| 日韩一级成人av| 狠狠色丁香婷婷综合久久片| 久久久www成人免费毛片麻豆| 国产美女在线观看一区| 中文欧美字幕免费| 色婷婷狠狠综合| 秋霞午夜鲁丝一区二区老狼| 日韩欧美视频在线| 国产精品18久久久久| 国产精品久久久久一区二区三区| 色婷婷精品久久二区二区蜜臀av | 国产精品系列在线观看| 中文字幕日本不卡| 欧美中文字幕一区二区三区亚洲| 香蕉乱码成人久久天堂爱免费| 欧美xingq一区二区| 国产伦精品一区二区三区免费迷 | 欧美mv和日韩mv的网站| 风间由美一区二区三区在线观看| 国产精品国产三级国产| 欧美亚洲国产怡红院影院| 老司机精品视频线观看86| 国产精品天美传媒沈樵| 欧美图区在线视频| 国产成人亚洲综合a∨婷婷| 亚洲精品第1页| 欧美α欧美αv大片| 91麻豆swag| 狠狠久久亚洲欧美| 伊人色综合久久天天| 精品欧美乱码久久久久久| k8久久久一区二区三区| 日韩成人伦理电影在线观看| 中文在线一区二区| 欧美夫妻性生活| 91亚洲男人天堂| 久久精品国产精品亚洲精品| 亚洲人成影院在线观看| 精品久久一区二区| 在线观看日韩国产| 国产传媒欧美日韩成人| 天天影视网天天综合色在线播放 | 亚洲色图视频免费播放| 精品国产91乱码一区二区三区| 色综合视频在线观看| 精东粉嫩av免费一区二区三区| 亚洲国产综合色| 中文字幕一区二区日韩精品绯色| 欧美va亚洲va香蕉在线| 欧美视频一区二| 成人免费av在线|