亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? tcpip.cc

?? Ubuntu packages of security software。 相當(dāng)不錯(cuò)的源碼
?? CC
?? 第 1 頁 / 共 5 頁
字號(hào):
/*************************************************************************** * tcpip.cc -- Various functions relating to low level TCP/IP handling,    * * including sending raw packets, routing, printing packets, reading from  * * libpcap, etc.                                                           * *                                                                         * ***********************IMPORTANT NMAP LICENSE TERMS************************ *                                                                         * * The Nmap Security Scanner is (C) 1996-2008 Insecure.Com LLC. Nmap is    * * also a registered trademark of Insecure.Com LLC.  This program is free  * * software; you may redistribute and/or modify it under the terms of the  * * GNU General Public License as published by the Free Software            * * Foundation; Version 2 with the clarifications and exceptions described  * * below.  This guarantees your right to use, modify, and redistribute     * * this software under certain conditions.  If you wish to embed Nmap      * * technology into proprietary software, we sell alternative licenses      * * (contact sales@insecure.com).  Dozens of software vendors already       * * license Nmap technology such as host discovery, port scanning, OS       * * detection, and version detection.                                       * *                                                                         * * Note that the GPL places important restrictions on "derived works", yet * * it does not provide a detailed definition of that term.  To avoid       * * misunderstandings, we consider an application to constitute a           * * "derivative work" for the purpose of this license if it does any of the * * following:                                                              * * o Integrates source code from Nmap                                      * * o Reads or includes Nmap copyrighted data files, such as                * *   nmap-os-fingerprints or nmap-service-probes.                          * * o Executes Nmap and parses the results (as opposed to typical shell or  * *   execution-menu apps, which simply display raw Nmap output and so are  * *   not derivative works.)                                                *  * o Integrates/includes/aggregates Nmap into a proprietary executable     * *   installer, such as those produced by InstallShield.                   * * o Links to a library or executes a program that does any of the above   * *                                                                         * * The term "Nmap" should be taken to also include any portions or derived * * works of Nmap.  This list is not exclusive, but is just meant to        * * clarify our interpretation of derived works with some common examples.  * * These restrictions only apply when you actually redistribute Nmap.  For * * example, nothing stops you from writing and selling a proprietary       * * front-end to Nmap.  Just distribute it by itself, and point people to   * * http://insecure.org/nmap/ to download Nmap.                             * *                                                                         * * We don't consider these to be added restrictions on top of the GPL, but * * just a clarification of how we interpret "derived works" as it applies  * * to our GPL-licensed Nmap product.  This is similar to the way Linus     * * Torvalds has announced his interpretation of how "derived works"        * * applies to Linux kernel modules.  Our interpretation refers only to     * * Nmap - we don't speak for any other GPL products.                       * *                                                                         * * If you have any questions about the GPL licensing restrictions on using * * Nmap in non-GPL works, we would be happy to help.  As mentioned above,  * * we also offer alternative license to integrate Nmap into proprietary    * * applications and appliances.  These contracts have been sold to dozens  * * of software vendors, and generally include a perpetual license as well  * * as providing for priority support and updates as well as helping to     * * fund the continued development of Nmap technology.  Please email        * * sales@insecure.com for further information.                             * *                                                                         * * As a special exception to the GPL terms, Insecure.Com LLC grants        * * permission to link the code of this program with any version of the     * * OpenSSL library which is distributed under a license identical to that  * * listed in the included Copying.OpenSSL file, and distribute linked      * * combinations including the two. You must obey the GNU GPL in all        * * respects for all of the code used other than OpenSSL.  If you modify    * * this file, you may extend this exception to your version of the file,   * * but you are not obligated to do so.                                     * *                                                                         * * If you received these files with a written license agreement or         * * contract stating terms other than the terms above, then that            * * alternative license agreement takes precedence over these comments.     * *                                                                         * * Source is provided to this software because we believe users have a     * * right to know exactly what a program is going to do before they run it. * * This also allows you to audit the software for security holes (none     * * have been found so far).                                                * *                                                                         * * Source code also allows you to port Nmap to new platforms, fix bugs,    * * and add new features.  You are highly encouraged to send your changes   * * to fyodor@insecure.org for possible incorporation into the main         * * distribution.  By sending these changes to Fyodor or one the            * * Insecure.Org development mailing lists, it is assumed that you are      * * offering Fyodor and Insecure.Com LLC the unlimited, non-exclusive right * * to reuse, modify, and relicense the code.  Nmap will always be          * * available Open Source, but this is important because the inability to   * * relicense code has caused devastating problems for other Free Software  * * projects (such as KDE and NASM).  We also occasionally relicense the    * * code to third parties as discussed above.  If you wish to specify       * * special license conditions of your contributions, just say so when you  * * send them.                                                              * *                                                                         * * This program is distributed in the hope that it will be useful, but     * * WITHOUT ANY WARRANTY; without even the implied warranty of              * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU       * * General Public License for more details at                              * * http://www.gnu.org/copyleft/gpl.html , or in the COPYING file included  * * with Nmap.                                                              * *                                                                         * ***************************************************************************//* $Id: tcpip.cc 6633 2007-12-22 06:32:03Z fyodor $ */#ifdef WIN32#include "nmap_winconfig.h"#endif#include "portreasons.h"#include <dnet.h>#include "tcpip.h"#include "NmapOps.h"#include "Target.h"#include "utils.h"#if HAVE_SYS_TIME_H#include <sys/time.h>#endif#if HAVE_SYS_RESOURCE_H#include <sys/resource.h>#endif#if HAVE_UNISTD_H/* #include <sys/unistd.h> */#include <unistd.h>#endif#if HAVE_NET_IF_H#ifndef NET_IF_H  /* why doesn't OpenBSD do this? */#include <net/if.h>#define NET_IF_H#endif#endif#if HAVE_NETINET_IF_ETHER_H#ifndef NETINET_IF_ETHER_H#include <netinet/if_ether.h>#define NETINET_IF_ETHER_H#endif /* NETINET_IF_ETHER_H */#endif /* HAVE_NETINET_IF_ETHER_H */extern NmapOps o;#ifdef WIN32#include "pcap-int.h"void nmapwin_init();void nmapwin_cleanup();void nmapwin_list_interfaces();int if2nameindex(int ifi);#endifstatic PacketCounter PktCt;/* These two are for eth_open_cached() and eth_close_cached() */static char etht_cache_device_name[64];static eth_t *etht_cache_device = NULL;void sethdrinclude(int sd) {#ifdef IP_HDRINCLint one = 1;setsockopt(sd, IPPROTO_IP, IP_HDRINCL, (const char *) &one, sizeof(one));#endif}void set_ttl(int sd, int ttl){#ifdef IP_TTL	if (sd == -1)		return;	setsockopt(sd, IPPROTO_IP, IP_TTL, (const char *) &ttl, sizeof ttl);#endif}// Takes a protocol number like IPPROTO_TCP, IPPROTO_UDP, or// IPPROTO_IP and returns a ascii representation (or "unknown" if it// doesn't recognize the number).  If uppercase is true, the returned// value will be in all uppercase letters.  You can skip this// parameter to use lowercase.const char *proto2ascii(u8 proto, bool uppercase) {  switch(proto) {  case IPPROTO_TCP:    return uppercase? "TCP" : "tcp"; break;  case IPPROTO_UDP:    return uppercase? "UDP" : "udp"; break;  case IPPROTO_IP:    return uppercase? "IP" : "ip"; break;  default:    return uppercase? "UNKNOWN" : "unknown";  }  return NULL; // Unreached}static char *ll2shortascii(unsigned long long bytes, char *buf, int buflen) {  if (buflen < 2 || !buf) fatal("Bogus parameter passed to %s", __func__);  if (bytes > 1000000) {    Snprintf(buf, buflen, "%.3fMB", bytes / 1000000.0);  } else if (bytes > 10000) {    Snprintf(buf, buflen, "%.3fKB", bytes / 1000.0);  } else Snprintf(buf, buflen, "%uB", (unsigned int) bytes);      return buf;}/* Fill buf (up to buflen -- truncate if necessary but always   terminate) with a short representation of the packet stats.   Returns buf.  Aborts if there is a problem. */char *getFinalPacketStats(char *buf, int buflen) {  char sendbytesasc[16], recvbytesasc[16];  if (buflen <= 10 || !buf)    fatal("%s called with woefully inadequate parameters", __func__);  Snprintf(buf, buflen, #if WIN32	  "Raw packets sent: %I64u (%s) | Rcvd: %I64u (%s)",#else	  "Raw packets sent: %llu (%s) | Rcvd: %llu (%s)",#endif	   PktCt.sendPackets,	   ll2shortascii(PktCt.sendBytes, sendbytesasc, sizeof(sendbytesasc)),	   PktCt.recvPackets,	   ll2shortascii(PktCt.recvBytes, recvbytesasc, sizeof(recvbytesasc)));  return buf;}  /* Takes an ARP PACKET (including ethernet header) and prints it if     packet tracing is enabled.  'frame' must point to the 14-byte     ethernet header (e.g. starting with destination addr). The     direction must be PacketTrace::SENT or PacketTrace::RCVD .     Optional 'now' argument makes this function slightly more     efficient by avoiding a gettimeofday() call. */void PacketTrace::traceArp(pdirection pdir, const u8 *frame, u32 len,			struct timeval *now) {  struct timeval tv;  char arpdesc[128];  char who_has[INET_ADDRSTRLEN], tell[INET_ADDRSTRLEN];      if (pdir == SENT) {    PktCt.sendPackets++;    PktCt.sendBytes += len;  } else {    PktCt.recvPackets++;    PktCt.recvBytes += len;  }  if (!o.packetTrace()) return;  if (now)    tv = *now;  else gettimeofday(&tv, NULL);  if (len < 42) {    error("Packet tracer: Arp packets must be at least 42 bytes long.  Should be exactly that length excl. ethernet padding.");    return;  }  if (frame[21] == 1) /* arp REQUEST */ {    inet_ntop(AF_INET, frame+38, who_has, sizeof(who_has));    inet_ntop(AF_INET, frame+28, tell, sizeof(tell));    Snprintf(arpdesc, sizeof(arpdesc), "who-has %s tell %s", who_has, tell);  } else { /* ARP REPLY */    inet_ntop(AF_INET, frame+28, who_has, sizeof(who_has));    Snprintf(arpdesc, sizeof(arpdesc), 	     "reply %s is-at %02X:%02X:%02X:%02X:%02X:%02X", who_has, 	     frame[22], frame[23], frame[24], frame[25], frame[26], frame[27]);  }  log_write(LOG_STDOUT|LOG_NORMAL, "%s (%.4fs) ARP %s\n", (pdir == SENT)? "SENT" : "RCVD",  o.TimeSinceStartMS(&tv) / 1000.0, arpdesc);  return;}/* Get an ASCII information about a tcp option which is pointed by   optp, with a length of len. The result is stored in the result   buffer. The result may look like "<mss 1452,sackOK,timestamp   45848914 0,nop,wscale 7>" */static void tcppacketoptinfo(u8 *optp, int len, char *result, int bufsize) {  assert(optp);  assert(result);  char *p, ch;  u8 *q;  int opcode;  u16 tmpshort;  u32 tmpword1, tmpword2;  p = result; *p = '\0';  q = optp;  ch = '<';    while(len > 0 && bufsize > 2) {	Snprintf(p, bufsize, "%c", ch);	bufsize--;	p++;    opcode=*q++;	    if (!opcode) { /* End of List */	  	  Snprintf(p, bufsize, "eol");	  bufsize -= strlen(p);	  p += strlen(p);	        len--;	      } else if (opcode == 1) { /* No Op */	  	  Snprintf(p, bufsize, "nop");	  bufsize -= strlen(p);	  p += strlen(p);	        len--;	      } else if (opcode == 2) { /* MSS */	        if(len<4)        break; /* MSS has 4 bytes */	        q++;      memcpy(&tmpshort, q, 2);	  	  Snprintf(p, bufsize, "mss %u", ntohs(tmpshort));	  bufsize -= strlen(p);	  p += strlen(p);      q += 2;      len -= 4;	      } else if (opcode == 3) { /* Window Scale */	        if(len<3)        break; /* Window Scale option has 3 bytes */	        q++;	  Snprintf(p, bufsize, "wscale %u", *q);	  bufsize -= strlen(p);	  p += strlen(p); 	        q++;      len -= 3;	      } else if (opcode == 4) { /* SACK permitted */	        if(len<2)        break; /* SACK permitted option has 2 bytes */	  	  Snprintf(p, bufsize, "sackOK");	  bufsize -= strlen(p);	  p += strlen(p); 	        q++;      len -= 2;	      } else if (opcode == 5) { /* SACK */	  	  int sackoptlen = *q;	  if(len < sackoptlen)		break;	  	  q++;	  	  if((sackoptlen-2) % 8 != 0) {		Snprintf(p, bufsize, "malformed sack");		bufsize -= strlen(p);		p += strlen(p); 	  } else {		Snprintf(p, bufsize, "sack %d ", (sackoptlen-2)/8);		bufsize -= strlen(p);		p += strlen(p);		for(int i = 0; i < sackoptlen - 2; i += 8) {		  memcpy(&tmpword1, q + i, 4);		  memcpy(&tmpword2, q + i + 4, 4);		  Snprintf(p, bufsize, "{%u:%u}", tmpword1, tmpword2);		  bufsize -= strlen(p);		  p += strlen(p);		}	  }	  q += sackoptlen-2;	  len -= sackoptlen;	  	} else if (opcode == 8) { /* Timestamp */      if(len<10)        break; /* Timestamp option has 10 bytes */      q++;      memcpy(&tmpword1, q, 4);      memcpy(&tmpword2, q+4, 4);	  Snprintf(p, bufsize, "timestamp %u %u", ntohl(tmpword1), ntohl(tmpword2));	  bufsize -= strlen(p);	  p += strlen(p);	  q += 8;	  len -= 10;	      }	ch = ',';

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲精品亚洲人成人网| 欧美日韩精品一区视频| 日韩欧美美女一区二区三区| 中文字幕欧美三区| 久久99国产精品免费网站| 91色porny蝌蚪| 国产精品久久久久久久久果冻传媒 | 成人黄色小视频在线观看| 日韩欧美一区二区三区在线| 亚洲高清免费在线| 色老汉av一区二区三区| 国产精品欧美一区二区三区| 国产一区999| 欧美va亚洲va香蕉在线| 老司机精品视频一区二区三区| 在线观看成人小视频| 亚洲视频一区二区在线| 99久久久久久99| 亚洲激情校园春色| 欧美视频一区二| 亚洲444eee在线观看| 欧美精品亚洲一区二区在线播放| 亚洲综合免费观看高清完整版在线| 91免费小视频| 五月婷婷激情综合网| 国产精品成人一区二区三区夜夜夜| 国产美女视频91| 国产精品久久久久久久岛一牛影视| 99热这里都是精品| 亚洲蜜臀av乱码久久精品| 欧美日韩中字一区| 国产又粗又猛又爽又黄91精品| 久久奇米777| 91在线视频免费91| 亚洲bt欧美bt精品| 国产视频一区二区三区在线观看| 成人免费av在线| 亚洲一级在线观看| 欧美videossexotv100| 成人18视频日本| 日本va欧美va欧美va精品| 中文字幕精品综合| 51精品视频一区二区三区| 国产河南妇女毛片精品久久久| 一区二区三区欧美激情| 久久色在线观看| 91福利在线观看| 国产成人精品1024| 日韩电影在线观看网站| 成人免费一区二区三区视频| 日韩免费性生活视频播放| 成人av资源站| 国产九色sp调教91| 首页国产丝袜综合| 亚洲人一二三区| 2欧美一区二区三区在线观看视频| 91精品福利视频| 成人午夜免费视频| 国产乱人伦偷精品视频免下载| 亚洲高清在线精品| 一区二区三区久久| 国产精品国产精品国产专区不蜜| 欧美精品一区二区久久婷婷| 欧美精品乱人伦久久久久久| 在线观看亚洲一区| 91丨九色丨黑人外教| av亚洲精华国产精华精| 国产成人av福利| 国产成a人亚洲精品| 狠狠狠色丁香婷婷综合久久五月| 亚洲午夜私人影院| 亚洲国产精品久久久男人的天堂| 亚洲桃色在线一区| 中文字幕在线不卡视频| 综合久久国产九一剧情麻豆| 日韩理论在线观看| 亚洲欧美视频在线观看| 亚洲欧美激情在线| 亚洲一区免费视频| 天堂成人免费av电影一区| 日韩中文字幕不卡| 精品在线一区二区三区| 国产精品18久久久久久vr| 国产成人精品亚洲日本在线桃色 | 久久亚洲一区二区三区明星换脸| 日韩视频中午一区| 精品动漫一区二区三区在线观看| 欧美精品一区二区三区高清aⅴ| 国产欧美日韩久久| 亚洲丝袜自拍清纯另类| 亚洲成人av资源| 蜜臀av性久久久久蜜臀aⅴ四虎 | 欧美精品一卡两卡| 精品日韩99亚洲| 亚洲欧美综合在线精品| 亚洲大片在线观看| 国产最新精品免费| 91九色02白丝porn| 久久这里只有精品视频网| 亚洲免费观看高清完整版在线观看熊| 首页欧美精品中文字幕| 成人一区在线看| 欧美美女直播网站| 中文字幕亚洲欧美在线不卡| 日本vs亚洲vs韩国一区三区二区| 国产69精品一区二区亚洲孕妇| 欧美日韩大陆一区二区| 久久精品夜色噜噜亚洲a∨| 午夜亚洲福利老司机| 成人黄色777网| 日韩精品一区二区在线| 中文字幕一区二区在线观看| 久久国产精品免费| 欧美日韩情趣电影| 亚洲精品亚洲人成人网在线播放| 国产成人午夜视频| 欧美电视剧免费观看| 亚洲成a人片在线观看中文| 成人白浆超碰人人人人| 久久久久久久久久久久久久久99 | 久久久精品黄色| 麻豆精品视频在线观看免费| 欧美日韩的一区二区| 一区二区三区不卡视频在线观看 | 亚洲高清不卡在线| 色先锋久久av资源部| 国产精品理伦片| 成人国产一区二区三区精品| 久久久综合视频| 国产精品一区二区久久不卡| 日韩精品资源二区在线| 久久国产精品99久久久久久老狼| 欧美刺激脚交jootjob| 奇米影视一区二区三区小说| 欧美一区二区三区免费| 人人精品人人爱| 久久综合久久综合久久综合| 狠狠色综合日日| 国产精品免费视频网站| voyeur盗摄精品| 亚洲国产精品一区二区久久 | 精品久久久久香蕉网| 国内精品伊人久久久久av一坑 | 三级亚洲高清视频| 日韩欧美中文字幕一区| 国产精品一区二区久久不卡 | 北条麻妃国产九九精品视频| 亚洲黄色录像片| 欧美一区二区国产| 国产69精品久久777的优势| 成人欧美一区二区三区白人| 欧美三级电影网| 国产福利一区二区三区视频在线| 国产精品久久久久毛片软件| 欧美伊人久久大香线蕉综合69 | 亚洲成人tv网| 国产亚洲欧美激情| 欧美网站大全在线观看| 国产曰批免费观看久久久| 亚洲视频免费观看| 久久综合资源网| 精品视频一区 二区 三区| 粉嫩嫩av羞羞动漫久久久| 亚洲亚洲人成综合网络| 国产午夜精品一区二区| 欧美日韩情趣电影| 国产白丝网站精品污在线入口| 亚洲成人高清在线| 亚洲欧洲日韩综合一区二区| 精品日韩在线观看| 欧美色精品在线视频| 国产91高潮流白浆在线麻豆| 秋霞午夜av一区二区三区| 亚洲欧美怡红院| 久久久99精品免费观看不卡| 欧美日本韩国一区| 日本精品一级二级| 成人黄色国产精品网站大全在线免费观看 | 国产精品久久二区二区| 欧美精品一区二区三区蜜桃视频| 欧美日本一区二区在线观看| 色域天天综合网| 色成年激情久久综合| av福利精品导航| 成人高清在线视频| 国产99久久久国产精品免费看| 国产在线播放一区| 国产一区免费电影| 国产精品99久久久久| 国产91丝袜在线播放0| 大美女一区二区三区| fc2成人免费人成在线观看播放| 国产成人亚洲综合色影视| 成人激情开心网| 91蜜桃传媒精品久久久一区二区| 99精品久久只有精品| 色婷婷激情综合| 91精品欧美一区二区三区综合在| 欧美顶级少妇做爰| 久久先锋影音av鲁色资源网|