亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? tcpip.h

?? Ubuntu packages of security software。 相當不錯的源碼
?? H
?? 第 1 頁 / 共 3 頁
字號:
		  u8* ipopt, int ipoptlen,		  u16 sport, u16 dport,		  char *data, u16 datalen);int send_ip_raw( int sd, struct eth_nfo *eth,		 struct in_addr *source, const struct in_addr *victim,		 u8 proto, int ttl,		 u8* ipopt, int ipoptlen,		 char *data, u16 datalen);/* Builds a TCP packet (including an IP header) by packing the fields   with the given information.  It allocates a new buffer to store the   packet contents, and then returns that buffer.  The packet is not   actually sent by this function.  Caller must delete the buffer when   finished with the packet.  The packet length is returned in   packetlen, which must be a valid int pointer. */u8 *build_tcp_raw(const struct in_addr *source, const struct in_addr *victim,		  int ttl, u16 ipid, u8 tos, bool df,		  u8* ipopt, int ipoptlen,		  u16 sport, u16 dport,		  u32 seq, u32 ack, u8 reserved, u8 flags, u16 window, u16 urp,		  u8 *options, int optlen,		  char *data, u16 datalen,		  u32 *packetlen);/* Builds a UDP packet (including an IP header) by packing the fields   with the given information.  It allocates a new buffer to store the   packet contents, and then returns that buffer.  The packet is not   actually sent by this function.  Caller must delete the buffer when   finished with the packet.  The packet length is returned in   packetlen, which must be a valid int pointer. */u8 *build_udp_raw(struct in_addr *source, const struct in_addr *victim, 		  int ttl, u16 ipid, u8 tos, bool df,		  u8* ipopt, int ipoptlen, 		  u16 sport, u16 dport,  		  char *data, u16 datalen, 		  u32 *packetlen);/* Builds an ICMP packet (including an IP header) by packing the   fields with the given information.  It allocates a new buffer to   store the packet contents, and then returns that buffer.  The   packet is not actually sent by this function.  Caller must delete   the buffer when finished with the packet.  The packet length is   returned in packetlen, which must be a valid int pointer. The   id/seq will be converted to network byte order (if it differs from   HBO) */u8 *build_icmp_raw(const struct in_addr *source, const struct in_addr *victim, 		   int ttl, u16 ipid, u8 tos, bool df,		   u8* ipopt, int ipoptlen,		   u16 seq, unsigned short id, u8 ptype, u8 pcode,		   char *data, u16 datalen, u32 *packetlen);/* Builds an IP packet (including an IP header) by packing the fields   with the given information.  It allocates a new buffer to store the   packet contents, and then returns that buffer.  The packet is not   actually sent by this function.  Caller must delete the buffer when   finished with the packet.  The packet length is returned in   packetlen, which must be a valid int pointer. */u8 *build_ip_raw(const struct in_addr *source, const struct in_addr *victim, 		 u8 proto,		 int ttl, u16 ipid, u8 tos, bool df,		 u8* ipopt, int ipoptlen,		 char *data, u16 datalen, 		 u32 *packetlen);/* Send a pre-built IPv4 packet */int send_ip_packet(int sd, struct eth_nfo *eth, u8 *packet, 		   unsigned int packetlen);/* Decoy versions of the raw packet sending functions ... */int send_tcp_raw_decoys( int sd, struct eth_nfo *eth, 			 const struct in_addr *victim,			 int ttl, bool df, 			 u8* ipopt, int ipoptlen,			 u16 sport, u16 dport,			 u32 seq, u32 ack, u8 reserved, u8 flags, u16 window, u16 urp,			 u8 *options, int optlen,			 char *data, u16 datalen);int send_udp_raw_decoys( int sd, struct eth_nfo *eth, 			 const struct in_addr *victim,			 int ttl, u16 ipid,			 u8* ipops, int ip,			 u16 sport, u16 dport,			 char *data, u16 datalen);/* Calls pcap_open_live and spits out an error (and quits) if the call fails.   So a valid pcap_t will always be returned. */pcap_t *my_pcap_open_live(const char *device, int snaplen, int promisc, 			  int to_ms);// Returns whether the system supports pcap_get_selectable_fd() properlybool pcap_selectable_fd_valid();/* Call this instead of pcap_get_selectable_fd directly (or your code   won't compile on Windows).  On systems which don't seem to support   the pcap_get_selectable_fd() function properly, returns -1,   otherwise simply calls pcap_selectable_fd and returns the   results.  If you just want to test whether the function is supported,   use pcap_selectable_fd_valid() instead. */int my_pcap_get_selectable_fd(pcap_t *p);// Returns whether the packet receive time value obtaned from libpcap// (and thus by readip_pcap()) should be considered valid.  When// invalid (Windows and Amiga), readip_pcap returns the time you called it.bool pcap_recv_timeval_valid();/* A simple function that caches the eth_t from dnet for one device,   to avoid opening, closing, and re-opening it thousands of tims.  If   you give a different device, this function will close the first   one.  Thus this should never be used by programs that need to deal   with multiple devices at once.  In addition, you MUST NEVER   eth_close() A DEVICE OBTAINED FROM THIS FUNCTION.  Instead, you can   call eth_close_cached() to close whichever device (if any) is   cached.  Returns NULL if it fails to open the device. */eth_t *eth_open_cached(const char *device);/* See the description for eth_open_cached */void eth_close_cached();/* A simple function I wrote to help in debugging, shows the important fields   of a TCP packet*/int readtcppacket(const u8 *packet, int readdata);int readudppacket(const u8 *packet, int readdata);/* Convert an IP address to the device (IE ppp0 eth0) using that address.  Dev passed in must be at least     32 bytes long */int ipaddr2devname( char *dev, const struct in_addr *addr );/* And vice versa */int devname2ipaddr(char *dev, struct in_addr *addr);/* Looks for an interface assigned to the given IP (ss), and returns   the interface_info for the first one found.  If non found, returns NULL */struct interface_info *getInterfaceByIP(struct sockaddr_storage *ss);/* Looks for an interface with the given name (iname), and returns the   corresponding interface_info if found.  Will accept a match of   devname or devfullname.  Returns NULL if none found */struct interface_info *getInterfaceByName(char *iname);/* Where the above 4 functions get their info */struct interface_info *getinterfaces(int *howmany);/* Parse the system routing table, converting each route into a   sys_route entry.  Returns an array of sys_routes.  numroutes is set   to the number of routes in the array.  The routing table is only   read the first time this is called -- later results are cached.   The returned route array is sorted by netmask with the most   specific matches first. */struct sys_route *getsysroutes(int *howmany);void sethdrinclude(int sd);/* Fill buf (up to buflen -- truncate if necessary but always   terminate) with a short representation of the packet stats.   Returns buf.  Aborts if there is a problem. */char *getFinalPacketStats(char *buf, int buflen);/* This function tries to determine the target's ethernet MAC address   from a received packet as follows:   1) If linkhdr is an ethernet header, grab the src mac (otherwise give up)   2) If overwrite is 0 and a MAC is already set for this target, give up.   3) If the packet source address is not the target, give up.   4) Use the routing table to try to determine rather target is      directly connected to the src host running Nmap.  If it is, set the MAC.   This function returns 0 if it ends up setting the MAC, nonzero otherwise   This function assumes that ip has already been verified as   containing a complete IP header (or at least the first 20 bytes).*/  int setTargetMACIfAvailable(Target *target, struct link_header *linkhdr,			    struct ip *ip, int overwrite);/* This function ensures that the next hop MAC address for a target is   filled in.  This address is the target's own MAC if it is directly   connected, and the next hop mac otherwise.  Returns true if the   address is set when the function ends, false if not.  This function   firt checks if it is already set, if not it tries the arp cache,   and if that fails it sends an ARP request itself.  This should be called   after an ARP scan if many directly connected machines are involved. */bool setTargetNextHopMAC(Target *target);int islocalhost(const struct in_addr * const addr);int isipprivate(const struct in_addr * const addr);int unblock_socket(int sd);// Takes a protocol number like IPPROTO_TCP, IPPROTO_UDP, or// IPPROTO_TCP and returns a ascii representation (or "unknown" if it// doesn't recognize the number).  If uppercase is true, the returned// value will be in all uppercase letters.  You can skip this// parameter to use lowercase.const char *proto2ascii(u8 proto, bool uppercase=false);/* Hex dump */int get_link_offset(char *device);/* If rcvdtime is non-null and a packet is returned, rcvd will be   filled with the time that packet was captured from the wire by   pcap.  If linknfo is not NULL, lnknfo->headerlen and   lnkinfo->header will be filled with the appropriate values. */char *readip_pcap(pcap_t *pd, unsigned int *len, long to_usec, 		  struct timeval *rcvdtime, struct link_header *linknfo);/* Attempts to read one IPv4/Ethernet ARP reply packet from the pcap   descriptor pd.  If it receives one, fills in sendermac (must pass   in 6 bytes), senderIP, and rcvdtime (can be NULL if you don't care)   and returns 1.  If it times out and reads no arp requests, returns   0.  to_usec is the timeout period in microseconds.  Use 0 to avoid   blocking to the extent possible, and -1 to block forever.  Returns   -1 or exits if ther is an error. */int read_arp_reply_pcap(pcap_t *pd, u8 *sendermac, struct in_addr *senderIP,		       long to_usec, struct timeval *rcvdtime);/* Examines the given tcp packet and obtains the TCP timestamp option   information if available.  Note that the CALLER must ensure that   "tcp" contains a valid header (in particular the th_off must be the   true packet length and tcp must contain it).  If a valid timestamp   option is found in the header, nonzero is returned and the   'timestamp' and 'echots' parameters are filled in with the   appropriate value (if non-null).  Otherwise 0 is returned and the   parameters (if non-null) are filled with 0.  Remember that the   correct way to check for errors is to look at the return value   since a zero ts or echots could possibly be valid. */int gettcpopt_ts(struct tcphdr *tcp, u32 *timestamp, u32 *echots);/* Maximize the receive buffer of a socket descriptor (up to 500K) */void max_rcvbuf(int sd);/* Maximize the open file descriptor limit for this process go up to the   max allowed  */int max_sd();/* Convert a socket to blocking mode */int block_socket(int sd);/* Give broadcast permission to a socket */void broadcast_socket(int sd);/* Do a receive (recv()) on a socket and stick the results (upt to   len) into buf .  Give up after 'seconds'.  Returns the number of   bytes read (or -1 in the case of an error.  It only does one recv   (it will not keep going until len bytes are read).  If timedout is   not NULL, it will be set to zero (no timeout occured) or 1 (it   did). */int recvtime(int sd, char *buf, int len, int seconds, int *timedout);/* Sets a pcap filter function -- makes SOCK_RAW reads easier */#ifndef WINIP_Htypedef int (*PFILTERFN)(const char *packet, unsigned int len); /* 1 to keep */void set_pcap_filter(const char *device, pcap_t *pd, char *bpf, ...);#endif/* Just accept everything ... TODO: Need a better approach than this flt_    stuff */int flt_all(const char *packet, unsigned int len);int flt_icmptcp(const char *packet, unsigned int len);int flt_icmptcp_2port(const char *packet, unsigned int len);int flt_icmptcp_5port(const char *packet, unsigned int len);#endif /*TCPIP_H*/

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
中文字幕精品—区二区四季| 丁香婷婷综合网| 久久精品夜夜夜夜久久| 国产综合色产在线精品| 久久久www成人免费毛片麻豆| 免费欧美在线视频| 日韩欧美一级在线播放| 黄一区二区三区| 欧美高清在线精品一区| 不卡的av电影| 亚洲一区二区欧美激情| 欧美日本一区二区在线观看| 日韩不卡免费视频| 精品成人在线观看| 成人激情动漫在线观看| 亚洲乱码精品一二三四区日韩在线| 欧美亚洲国产一卡| 理论电影国产精品| 国产精品天美传媒沈樵| 欧美中文字幕不卡| 久久不见久久见中文字幕免费| 国产精品乱码久久久久久| 在线观看免费成人| 国产一区二区成人久久免费影院| 日本一区二区免费在线观看视频| 91丨九色丨蝌蚪富婆spa| 免费三级欧美电影| 国产精品家庭影院| 日韩一卡二卡三卡四卡| 色噜噜夜夜夜综合网| 久久91精品久久久久久秒播| 亚洲精品久久久蜜桃| 久久日韩粉嫩一区二区三区| 在线视频综合导航| 国产精品456| 久久精品国产精品青草| 最新中文字幕一区二区三区 | 日韩欧美一区二区久久婷婷| 色妞www精品视频| 波波电影院一区二区三区| 国内精品嫩模私拍在线| 日韩在线播放一区二区| 亚洲国产精品人人做人人爽| 亚洲男人的天堂在线观看| 久久久电影一区二区三区| 精品对白一区国产伦| 精品国内二区三区| 一区二区三区在线播放| 亚洲精品成人悠悠色影视| 成人免费在线播放视频| 国产精品不卡视频| 亚洲蜜臀av乱码久久精品| 综合激情成人伊人| 亚洲日穴在线视频| 亚洲综合视频在线观看| 日韩电影一区二区三区四区| 日产国产高清一区二区三区| 激情文学综合插| 成人福利视频在线| 欧美视频完全免费看| 欧美大尺度电影在线| 欧美高清在线一区| 午夜亚洲福利老司机| 蜜臀av一区二区在线观看 | 亚洲免费观看视频| 欧美aaaaaa午夜精品| 成人在线一区二区三区| 色视频一区二区| 欧美成人a在线| 国产精品伦一区二区三级视频| 亚洲国产一区二区视频| 蜜桃av噜噜一区| 91在线观看地址| 亚洲精品一区二区三区四区高清| 亚洲黄色av一区| 久久99精品网久久| 91麻豆国产福利在线观看| 日韩视频在线观看一区二区| 亚洲精品免费在线观看| 激情综合色丁香一区二区| 99精品一区二区三区| 欧美xingq一区二区| 亚洲高清免费观看| 在线国产电影不卡| 亚洲视频 欧洲视频| 成人激情av网| 国产精品家庭影院| 暴力调教一区二区三区| 久久伊人蜜桃av一区二区| 亚洲午夜久久久久久久久电影院| 波多野结衣在线一区| 久久久久久久久久久久久女国产乱| 亚洲成av人片在线| 欧美精品在线观看播放| 亚洲成人tv网| 日韩一区二区免费视频| 久久av资源网| 26uuu国产电影一区二区| 看片网站欧美日韩| 欧美xxxxx牲另类人与| 美女免费视频一区| 国产日本亚洲高清| 国产高清精品在线| 中文字幕欧美三区| 在线看国产一区| 另类人妖一区二区av| 日韩精品一区二区三区老鸭窝| 免费成人结看片| 国产午夜久久久久| 日本韩国一区二区| 老司机午夜精品99久久| 欧美激情艳妇裸体舞| 91亚洲精品一区二区乱码| 亚洲制服丝袜av| 久久久久国产精品厨房| 91国模大尺度私拍在线视频| 日本午夜精品视频在线观看| 中文字幕精品三区| 欧美午夜精品免费| 国产在线视视频有精品| 亚洲精品免费在线观看| 欧美精品一区二区三区一线天视频| av毛片久久久久**hd| 爽爽淫人综合网网站| 国产日韩欧美精品综合| 欧美日韩激情一区二区三区| 成人免费毛片片v| 一区二区三区蜜桃| 欧美精品一区二区在线播放| 欧美无砖砖区免费| av电影一区二区| 精品一区二区三区免费播放| 一区二区三区四区在线免费观看| 日韩免费高清电影| 欧美色男人天堂| 色网站国产精品| 91日韩在线专区| 91蜜桃视频在线| 99热精品一区二区| www.亚洲色图| 成人激情免费电影网址| 国产精品一区二区三区乱码| 肉肉av福利一精品导航| 一区二区三区免费网站| 国产精品电影一区二区| 国产精品伦理一区二区| 国产精品毛片大码女人| 99久久综合国产精品| 日韩免费成人网| 91精品久久久久久久91蜜桃| 日韩三级中文字幕| 日韩女优av电影在线观看| 日韩一区二区电影网| 久久久久久久久久电影| 国产女人18毛片水真多成人如厕| 国产婷婷色一区二区三区在线| xnxx国产精品| 亚洲色图欧洲色图| 日韩在线一二三区| 国产精品影音先锋| 在线免费观看日本一区| 91精品国产一区二区三区蜜臀 | 一区二区三区美女| 偷拍亚洲欧洲综合| 国产精品888| 欧美在线一二三| 精品国产1区2区3区| 自拍偷拍国产精品| 久久精品国产精品亚洲精品| 国产剧情一区二区三区| eeuss国产一区二区三区| 51精品秘密在线观看| 美女爽到高潮91| 欧美色偷偷大香| 亚洲婷婷综合色高清在线| 蜜臀av一区二区在线免费观看 | 国产一区二区三区高清播放| 色哟哟一区二区| 久久久久国产一区二区三区四区| 亚洲电影一级黄| 色婷婷精品大在线视频| 99综合电影在线视频| eeuss鲁一区二区三区| 91.com视频| 国产福利一区在线观看| 国产精品国产自产拍高清av| 91啪九色porn原创视频在线观看| 日韩美女视频一区| 91精品国产91久久综合桃花| 国产一区二区免费在线| 亚洲日本在线天堂| 日韩免费看的电影| 国产精品伊人色| 国产精品久久午夜| 色天天综合色天天久久| 亚洲国产成人porn| 欧美二区三区91| 激情国产一区二区 | 国产女人aaa级久久久级| 成人深夜在线观看|