亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? tcpip.h

?? Ubuntu packages of security software。 相當不錯的源碼
?? H
?? 第 1 頁 / 共 3 頁
字號:
   finished with the packet.  The packet length is returned in   packetlen, which must be a valid int pointer. */u8 *build_tcp_raw(const struct in_addr *source, const struct in_addr *victim,		  int ttl, u16 ipid, u8 tos, bool df,		  u8* ipopt, int ipoptlen,		  u16 sport, u16 dport,		  u32 seq, u32 ack, u8 reserved, u8 flags, u16 window, u16 urp,		  u8 *options, int optlen,		  char *data, u16 datalen,		  u32 *packetlen);/* Builds a UDP packet (including an IP header) by packing the fields   with the given information.  It allocates a new buffer to store the   packet contents, and then returns that buffer.  The packet is not   actually sent by this function.  Caller must delete the buffer when   finished with the packet.  The packet length is returned in   packetlen, which must be a valid int pointer. */u8 *build_udp_raw(struct in_addr *source, const struct in_addr *victim, 		  int ttl, u16 ipid, u8 tos, bool df,		  u8* ipopt, int ipoptlen, 		  u16 sport, u16 dport,  		  char *data, u16 datalen, 		  u32 *packetlen);/* Builds an ICMP packet (including an IP header) by packing the   fields with the given information.  It allocates a new buffer to   store the packet contents, and then returns that buffer.  The   packet is not actually sent by this function.  Caller must delete   the buffer when finished with the packet.  The packet length is   returned in packetlen, which must be a valid int pointer. The   id/seq will be converted to network byte order (if it differs from   HBO) */u8 *build_icmp_raw(const struct in_addr *source, const struct in_addr *victim, 		   int ttl, u16 ipid, u8 tos, bool df,		   u8* ipopt, int ipoptlen,		   u16 seq, unsigned short id, u8 ptype, u8 pcode,		   char *data, u16 datalen, u32 *packetlen);/* Builds an IGMP packet (including an IP header) by packing the fields   with the given information.  It allocates a new buffer to store the   packet contents, and then returns that buffer.  The packet is not   actually sent by this function.  Caller must delete the buffer when   finished with the packet.  The packet length is returned in packetlen,   which must be a valid int pointer. */u8 *build_igmp_raw(const struct in_addr *source, const struct in_addr *victim, 		   int ttl, u16 ipid, u8 tos, bool df,		   u8* ipopt, int ipoptlen,		   u8 ptype, u8 pcode,		   char *data, u16 datalen, u32 *packetlen);/* Builds an IP packet (including an IP header) by packing the fields   with the given information.  It allocates a new buffer to store the   packet contents, and then returns that buffer.  The packet is not   actually sent by this function.  Caller must delete the buffer when   finished with the packet.  The packet length is returned in   packetlen, which must be a valid int pointer. */u8 *build_ip_raw(const struct in_addr *source, const struct in_addr *victim, 		 u8 proto,		 int ttl, u16 ipid, u8 tos, bool df,		 u8* ipopt, int ipoptlen,		 char *data, u16 datalen, 		 u32 *packetlen);/* Send a pre-built IPv4 packet */int send_ip_packet(int sd, struct eth_nfo *eth, u8 *packet, 		   unsigned int packetlen);/* Decoy versions of the raw packet sending functions ... */int send_tcp_raw_decoys( int sd, struct eth_nfo *eth, 			 const struct in_addr *victim,			 int ttl, bool df, 			 u8* ipopt, int ipoptlen,			 u16 sport, u16 dport,			 u32 seq, u32 ack, u8 reserved, u8 flags, u16 window, u16 urp,			 u8 *options, int optlen,			 char *data, u16 datalen);int send_udp_raw_decoys( int sd, struct eth_nfo *eth, 			 const struct in_addr *victim,			 int ttl, u16 ipid,			 u8* ipops, int ip,			 u16 sport, u16 dport,			 char *data, u16 datalen);/* Calls pcap_open_live and spits out an error (and quits) if the call fails.   So a valid pcap_t will always be returned. */pcap_t *my_pcap_open_live(const char *device, int snaplen, int promisc, 			  int to_ms);// Returns whether the system supports pcap_get_selectable_fd() properlybool pcap_selectable_fd_valid();/* Call this instead of pcap_get_selectable_fd directly (or your code   won't compile on Windows).  On systems which don't seem to support   the pcap_get_selectable_fd() function properly, returns -1,   otherwise simply calls pcap_selectable_fd and returns the   results.  If you just want to test whether the function is supported,   use pcap_selectable_fd_valid() instead. */int my_pcap_get_selectable_fd(pcap_t *p);// Returns whether the packet receive time value obtaned from libpcap// (and thus by readip_pcap()) should be considered valid.  When// invalid (Windows and Amiga), readip_pcap returns the time you called it.bool pcap_recv_timeval_valid();/* Prints stats from a pcap descriptor (number of received and dropped   packets). */void pcap_print_stats(int logt, pcap_t *pd);/* A simple function that caches the eth_t from dnet for one device,   to avoid opening, closing, and re-opening it thousands of tims.  If   you give a different device, this function will close the first   one.  Thus this should never be used by programs that need to deal   with multiple devices at once.  In addition, you MUST NEVER   eth_close() A DEVICE OBTAINED FROM THIS FUNCTION.  Instead, you can   call eth_close_cached() to close whichever device (if any) is   cached.  Returns NULL if it fails to open the device. */eth_t *eth_open_cached(const char *device);/* See the description for eth_open_cached */void eth_close_cached();/* A simple function I wrote to help in debugging, shows the important fields   of a TCP packet*/int readtcppacket(const u8 *packet, int readdata);int readudppacket(const u8 *packet, int readdata);/* Convert an IP address to the device (IE ppp0 eth0) using that address.  Dev passed in must be at least     32 bytes long */int ipaddr2devname( char *dev, const struct in_addr *addr );/* And vice versa */int devname2ipaddr(char *dev, struct in_addr *addr);/* Looks for an interface assigned to the given IP (ss), and returns   the interface_info for the first one found.  If non found, returns NULL */struct interface_info *getInterfaceByIP(struct sockaddr_storage *ss);/* Looks for an interface with the given name (iname), and returns the   corresponding interface_info if found.  Will accept a match of   devname or devfullname.  Returns NULL if none found */struct interface_info *getInterfaceByName(char *iname);/* Where the above 4 functions get their info */struct interface_info *getinterfaces(int *howmany);pcap_if_t *getpcapinterfaces();/* Parse the system routing table, converting each route into a   sys_route entry.  Returns an array of sys_routes.  numroutes is set   to the number of routes in the array.  The routing table is only   read the first time this is called -- later results are cached.   The returned route array is sorted by netmask with the most   specific matches first. */struct sys_route *getsysroutes(int *howmany);void sethdrinclude(int sd);void set_ttl(int sd, int ttl);/* Fill buf (up to buflen -- truncate if necessary but always   terminate) with a short representation of the packet stats.   Returns buf.  Aborts if there is a problem. */char *getFinalPacketStats(char *buf, int buflen);/* This function tries to determine the target's ethernet MAC address   from a received packet as follows:   1) If linkhdr is an ethernet header, grab the src mac (otherwise give up)   2) If overwrite is 0 and a MAC is already set for this target, give up.   3) If the packet source address is not the target, give up.   4) Use the routing table to try to determine rather target is      directly connected to the src host running Nmap.  If it is, set the MAC.   This function returns 0 if it ends up setting the MAC, nonzero otherwise   This function assumes that ip has already been verified as   containing a complete IP header (or at least the first 20 bytes).*/  int setTargetMACIfAvailable(Target *target, struct link_header *linkhdr,			    struct ip *ip, int overwrite);/* This function ensures that the next hop MAC address for a target is   filled in.  This address is the target's own MAC if it is directly   connected, and the next hop mac otherwise.  Returns true if the   address is set when the function ends, false if not.  This function   firt checks if it is already set, if not it tries the arp cache,   and if that fails it sends an ARP request itself.  This should be called   after an ARP scan if many directly connected machines are involved. */bool setTargetNextHopMAC(Target *target);int islocalhost(const struct in_addr * const addr);int isipprivate(const struct in_addr * const addr);int unblock_socket(int sd);// Takes a protocol number like IPPROTO_TCP, IPPROTO_UDP, or// IPPROTO_IP and returns a ascii representation (or "unknown" if it// doesn't recognize the number).  If uppercase is true, the returned// value will be in all uppercase letters.  You can skip this// parameter to use lowercase.const char *proto2ascii(u8 proto, bool uppercase=false);/* Hex dump */int get_link_offset(char *device);/* If rcvdtime is non-null and a packet is returned, rcvd will be   filled with the time that packet was captured from the wire by   pcap.  If linknfo is not NULL, lnknfo->headerlen and   lnkinfo->header will be filled with the appropriate values. */char *readip_pcap(pcap_t *pd, unsigned int *len, long to_usec, 		  struct timeval *rcvdtime, struct link_header *linknfo);/* Attempts to read one IPv4/Ethernet ARP reply packet from the pcap   descriptor pd.  If it receives one, fills in sendermac (must pass   in 6 bytes), senderIP, and rcvdtime (can be NULL if you don't care)   and returns 1.  If it times out and reads no arp requests, returns   0.  to_usec is the timeout period in microseconds.  Use 0 to avoid   blocking to the extent possible, and -1 to block forever.  Returns   -1 or exits if ther is an error. */int read_arp_reply_pcap(pcap_t *pd, u8 *sendermac, struct in_addr *senderIP,		       long to_usec, struct timeval *rcvdtime);/* Examines the given tcp packet and obtains the TCP timestamp option   information if available.  Note that the CALLER must ensure that   "tcp" contains a valid header (in particular the th_off must be the   true packet length and tcp must contain it).  If a valid timestamp   option is found in the header, nonzero is returned and the   'timestamp' and 'echots' parameters are filled in with the   appropriate value (if non-null).  Otherwise 0 is returned and the   parameters (if non-null) are filled with 0.  Remember that the   correct way to check for errors is to look at the return value   since a zero ts or echots could possibly be valid. */int gettcpopt_ts(struct tcp_hdr *tcp, u32 *timestamp, u32 *echots);/* Maximize the receive buffer of a socket descriptor (up to 500K) */void max_rcvbuf(int sd);/* Maximize the open file descriptor limit for this process go up to the   max allowed  */int max_sd();/* Convert a socket to blocking mode */int block_socket(int sd);/* Give broadcast permission to a socket */void broadcast_socket(int sd);/* Do a receive (recv()) on a socket and stick the results (upt to   len) into buf .  Give up after 'seconds'.  Returns the number of   bytes read (or -1 in the case of an error.  It only does one recv   (it will not keep going until len bytes are read).  If timedout is   not NULL, it will be set to zero (no timeout occured) or 1 (it   did). */int recvtime(int sd, char *buf, int len, int seconds, int *timedout);/* Sets a pcap filter function -- makes SOCK_RAW reads easier */#ifndef WINIP_Hvoid set_pcap_filter(const char *device, pcap_t *pd, char *bpf, ...);#endif#endif /*TCPIP_H*/

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
石原莉奈一区二区三区在线观看| 国产在线精品视频| 美女脱光内衣内裤视频久久网站 | 欧美三级中文字| 精品国产91久久久久久久妲己 | 99久久综合国产精品| 欧美色倩网站大全免费| 国产日韩精品一区二区三区在线| 亚洲第一福利视频在线| 成人午夜av电影| 日韩欧美国产高清| 亚洲欧美日韩中文播放| 极品瑜伽女神91| 欧美日韩国产首页在线观看| 久久精品在线免费观看| 日本不卡中文字幕| 欧美怡红院视频| 亚洲免费在线视频| 成人av影院在线| 国产日韩欧美一区二区三区乱码| 日本免费在线视频不卡一不卡二| 91天堂素人约啪| 国产精品丝袜久久久久久app| 精品无码三级在线观看视频| 日韩丝袜情趣美女图片| 午夜成人免费电影| 欧美日韩视频在线第一区| 亚洲欧美激情视频在线观看一区二区三区| 国产一区在线看| 久久婷婷国产综合精品青草| 麻豆精品一区二区三区| 555www色欧美视频| 午夜视频久久久久久| 欧美色综合网站| 亚洲资源在线观看| 一本一道久久a久久精品| 亚洲色图视频免费播放| 91美女蜜桃在线| 亚洲一区二区高清| 欧美精品久久一区二区三区| 视频在线观看国产精品| 3atv在线一区二区三区| 久久精品国产一区二区三| 欧美r级在线观看| 国产91综合网| 一区二区三区四区不卡视频| 欧美色图12p| 日本欧美一区二区在线观看| 久久综合狠狠综合久久综合88| 国产一区二区三区观看| 国产精品久久久久久亚洲伦| 日本高清无吗v一区| 日韩成人免费电影| 国产日韩欧美高清| 在线亚洲一区观看| 麻豆91免费观看| 久久久精品欧美丰满| 91在线porny国产在线看| 亚洲18影院在线观看| 欧美videossexotv100| aaa亚洲精品| 亚洲福利视频一区二区| 久久久久久免费| 91行情网站电视在线观看高清版| 日本免费在线视频不卡一不卡二| 久久夜色精品国产噜噜av| 99精品黄色片免费大全| 视频一区中文字幕| 国产精品网友自拍| 在线电影国产精品| 欧美日本一区二区三区四区| 国产欧美一区二区精品秋霞影院| 亚洲视频精选在线| 欧美做爰猛烈大尺度电影无法无天| 亚洲国产精品尤物yw在线观看| wwwwxxxxx欧美| 欧美在线高清视频| 国产精品一二三四区| 亚洲二区视频在线| 中文字幕在线不卡一区二区三区| 3d成人h动漫网站入口| 91一区二区三区在线观看| 日韩av一级片| 一区二区三区在线观看国产 | 91在线视频免费91| 免费久久精品视频| 在线不卡中文字幕播放| 丁香亚洲综合激情啪啪综合| 视频一区中文字幕| 一区二区在线观看免费| 久久久久国产精品人| 欧美二区三区91| 欧美性大战久久久| 国产高清成人在线| 狠狠色2019综合网| 日韩高清不卡在线| 亚洲综合无码一区二区| 国产精品久久久久久久第一福利 | 日本高清不卡一区| 高潮精品一区videoshd| 激情五月激情综合网| 免费在线观看一区| 蜜臂av日日欢夜夜爽一区| 亚洲成av人片在www色猫咪| 国产精品视频一区二区三区不卡| 久久久久国产精品人| 精品免费一区二区三区| 日韩免费福利电影在线观看| 91精品国产品国语在线不卡| 欧美网站大全在线观看| 91小视频在线观看| 91视频一区二区| 色综合中文字幕国产 | 久久成人羞羞网站| 午夜精品久久久久| 亚洲图片欧美色图| 夜夜操天天操亚洲| 亚洲国产精品视频| 午夜精品福利在线| 三级一区在线视频先锋 | 欧美一区二区三区四区在线观看| 在线欧美小视频| 欧美日韩一本到| 欧美一级免费观看| 精品区一区二区| 国产欧美日韩一区二区三区在线观看 | 亚洲柠檬福利资源导航| 亚洲精品免费看| 一区二区三区欧美| 日韩高清电影一区| 黑人精品欧美一区二区蜜桃| 国产一区二区三区免费看| 国产69精品久久99不卡| 99免费精品在线观看| 91论坛在线播放| 欧美日韩夫妻久久| 精品久久久久久久一区二区蜜臀| 国产婷婷精品av在线| 中文字幕不卡在线| 亚洲免费电影在线| 秋霞影院一区二区| 国产乱码精品一区二区三区av| 成人久久久精品乱码一区二区三区| 99视频精品免费视频| 欧美精品三级日韩久久| 久久蜜臀精品av| 亚洲精品免费看| 裸体一区二区三区| 成人av小说网| 日韩美女天天操| 国产欧美一区二区三区在线看蜜臀 | 91在线观看下载| 日韩免费观看2025年上映的电影 | 国产欧美日韩在线| 亚洲永久精品国产| 国产一区二区伦理| 在线观看视频91| 日本一区二区三区四区| 午夜一区二区三区在线观看| 国产成a人亚洲| 欧美精选一区二区| 国产精品大尺度| 久久99精品一区二区三区| 色先锋aa成人| 国产三级精品在线| 看电影不卡的网站| 欧美在线免费观看亚洲| 日本一区二区三区免费乱视频| 日韩电影一区二区三区| 日本道免费精品一区二区三区| 久久综合色鬼综合色| 香港成人在线视频| 91国偷自产一区二区开放时间 | 日本亚洲免费观看| av一区二区三区四区| 日韩欧美一区在线观看| 亚洲国产日韩一级| 91原创在线视频| 中文字幕一区二区日韩精品绯色| 激情偷乱视频一区二区三区| 欧美剧情电影在线观看完整版免费励志电影| 久久久久久日产精品| 男人的天堂亚洲一区| 欧美日韩一区二区三区四区| 亚洲美女区一区| 国产a精品视频| 久久久久久9999| 寂寞少妇一区二区三区| 精品久久久影院| 黑人巨大精品欧美一区| 7777精品伊人久久久大香线蕉 | 91网上在线视频| 中文字幕一区在线观看视频| av成人老司机| 成人欧美一区二区三区视频网页| 国产精品羞羞答答xxdd| 久久综合色之久久综合| 精品一区二区在线看| 精品成a人在线观看| 国产又粗又猛又爽又黄91精品|