亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? group__wpcapfunc.html

?? Winpcap是一個強大的網絡開發庫
?? HTML
?? 第 1 頁 / 共 5 頁
字號:
          <td>(</td>          <td class="paramtype">char *&nbsp;</td>          <td class="paramname"> <em>source</em>, </td>        </tr>        <tr>          <td class="paramkey"></td>          <td></td>          <td class="paramtype">int&nbsp;</td>          <td class="paramname"> <em>type</em>, </td>        </tr>        <tr>          <td class="paramkey"></td>          <td></td>          <td class="paramtype">const char *&nbsp;</td>          <td class="paramname"> <em>host</em>, </td>        </tr>        <tr>          <td class="paramkey"></td>          <td></td>          <td class="paramtype">const char *&nbsp;</td>          <td class="paramname"> <em>port</em>, </td>        </tr>        <tr>          <td class="paramkey"></td>          <td></td>          <td class="paramtype">const char *&nbsp;</td>          <td class="paramname"> <em>name</em>, </td>        </tr>        <tr>          <td class="paramkey"></td>          <td></td>          <td class="paramtype">char *&nbsp;</td>          <td class="paramname"> <em>errbuf</em></td><td>&nbsp;</td>        </tr>        <tr>          <td></td>          <td>)</td>          <td></td><td></td><td></td>        </tr>      </table></div><div class="memdoc"><p>Accept a set of strings (host name, port, ...), and it returns the complete source string according to the new format (e.g. 'rpcap://1.2.3.4/eth0'). <p>This function is provided in order to help the user creating the source string according to the new format. An unique source string is used in order to make easy for old applications to use the remote facilities. Think about tcpdump, for example, which has only one way to specify the interface on which the capture has to be started. However, GUI-based programs can find more useful to specify hostname, port and interface name separately. In that case, they can use this function to create the source string before passing it to the <a class="el" href="group__wpcapfunc.html#g2b64c7b6490090d1d37088794f1f1791" title="Open a generic source in order to capture / send (WinPcap only) traffic.">pcap_open()</a> function.<p><dl compact><dt><b>Parameters:</b></dt><dd>  <table border="0" cellspacing="2" cellpadding="0">    <tr><td valign="top"></td><td valign="top"><em>source,:</em>&nbsp;</td><td>a user-allocated buffer that will contain the complete source string wen the function returns.<br> The source will start with an identifier according to the new <a class="el" href="group__remote__source__string.html">Source Specification Syntax </a>.<br> This function assumes that the allocated buffer is at least PCAP_BUF_SIZE bytes.</td></tr>    <tr><td valign="top"></td><td valign="top"><em>type,:</em>&nbsp;</td><td>its value tells the type of the source we want to create. It can assume the values defined in the <a class="el" href="group__remote__source__ID.html">Source identification Codes </a>.<br></td></tr>    <tr><td valign="top"></td><td valign="top"><em>host,:</em>&nbsp;</td><td>an user-allocated buffer that keeps the host (e.g. "foo.bar.com") we want to connect to. It can be NULL in case we want to open an interface on a local host.</td></tr>    <tr><td valign="top"></td><td valign="top"><em>port,:</em>&nbsp;</td><td>an user-allocated buffer that keeps the network port (e.g. "2002") we want to use for the RPCAP protocol. It can be NULL in case we want to open an interface on a local host.</td></tr>    <tr><td valign="top"></td><td valign="top"><em>name,:</em>&nbsp;</td><td>an user-allocated buffer that keeps the interface name we want to use (e.g. "eth0"). It can be NULL in case the return string (i.e. 'source') has to be used with the <a class="el" href="group__wpcapfunc.html#g98f36e62c95c6ad81eaa8b2bbeb8f16e" title="Create a list of network devices that can be opened with pcap_open().">pcap_findalldevs_ex()</a>, which does not require the interface name.</td></tr>    <tr><td valign="top"></td><td valign="top"><em>errbuf,:</em>&nbsp;</td><td>a pointer to a user-allocated buffer (of size PCAP_ERRBUF_SIZE) that will contain the error message (in case there is one).</td></tr>  </table></dl><dl class="return" compact><dt><b>Returns:</b></dt><dd>'0' if everything is fine, '-1' if some errors occurred. The string containing the complete source is returned in the 'source' variable.</dd></dl><dl class="warning" compact><dt><b>Warning:</b></dt><dd>If the source is longer than PCAP_BUF_SIZE, the excess characters are truncated. </dd></dl></div></div><p><a class="anchor" name="g64c019f851f7da6892d51cca15f12ace"></a><!-- doxytag: member="funcs/pcap.h::pcap_datalink" ref="g64c019f851f7da6892d51cca15f12ace" args="(pcap_t *p)" --><div class="memitem"><div class="memproto">      <table class="memname">        <tr>          <td class="memname">int pcap_datalink           </td>          <td>(</td>          <td class="paramtype"><a class="el" href="group__wpcap__def.html#g4711d025f83503ce692efa5e45ec60a7">pcap_t</a> *&nbsp;</td>          <td class="paramname"> <em>p</em>          </td>          <td>&nbsp;)&nbsp;</td>          <td></td>        </tr>      </table></div><div class="memdoc"><p>Return the link layer of an adapter. <p>returns the link layer type; link layer types it can return include:<p><ul><li>DLT_NULL BSD loopback encapsulation; the link layer header is a 4-byte field, in host byte order, containing a PF_ value from socket.h for the network-layer protocol of the packet. Note that ``host byte order'' is the byte order of the machine on which the packets are captured, and the PF_ values are for the OS of the machine on which the packets are captured; if a live capture is being done, ``host byte order'' is the byte order of the machine capturing the packets, and the PF_ values are those of the OS of the machine capturing the packets, but if a ``savefile'' is being read, the byte order and PF_ values are not necessarily those of the machine reading the capture file.</li><li>DLT_EN10MB Ethernet (10Mb, 100Mb, 1000Mb, and up)</li><li>DLT_IEEE802: IEEE 802.5 Token Ring</li><li>DLT_ARCNET: ARCNET</li><li>DLT_SLIP: SLIP; the link layer header contains, in order:<ol type=a><li>a 1-byte flag, which is 0 for packets received by the machine and 1 for packets sent by the machine;</li><li>a 1-byte field, the upper 4 bits of which indicate the type of packet, as per RFC 1144:<ul><li>0x40: an unmodified IP datagram (TYPE_IP);</li><li>0x70: an uncompressed-TCP IP datagram (UNCOMPRESSED_TCP), with that byte being the first byte of the raw IP header on the wire, containing the connection number in the protocol field;</li><li>0x80: a compressed-TCP IP datagram (COMPRESSED_TCP), with that byte being the first byte of the compressed TCP/IP datagram header;</li></ul></li><li>for UNCOMPRESSED_TCP, the rest of the modified IP header, and for COMPRESSED_TCP, the compressed TCP/IP datagram header;</li><li>for a total of 16 bytes; the uncompressed IP datagram follows the header.</li></ol></li></ul><p><ul><li>DLT_PPP: PPP; if the first 2 bytes are 0xff and 0x03, it's PPP in HDLC-like framing, with the PPP header following those two bytes, otherwise it's PPP without framing, and the packet begins with the PPP header.</li><li>DLT_FDDI: FDDI</li><li>DLT_ATM_RFC1483: RFC 1483 LLC/SNAP-encapsulated ATM; the packet begins with an IEEE 802.2 LLC header.</li><li>DLT_RAW: raw IP; the packet begins with an IP header.</li><li>DLT_PPP_SERIAL: PPP in HDLC-like framing, as per RFC 1662, or Cisco PPP with HDLC framing, as per section 4.3.1 of RFC 1547; the first byte will be 0xFF for PPP in HDLC-like framing, and will be 0x0F or 0x8F for Cisco PPP with HDLC framing.</li><li>DLT_PPP_ETHER: PPPoE; the packet begins with a PPPoE header, as per RFC 2516.</li><li>DLT_C_HDLC: Cisco PPP with HDLC framing, as per section 4.3.1 of RFC 1547.</li><li>DLT_IEEE802_11: IEEE 802.11 wireless LAN</li><li>DLT_FRELAY: Frame Relay</li><li>DLT_LOOP: OpenBSD loopback encapsulation; the link layer header is a 4-byte field, in network byte order, containing a PF_ value from OpenBSD's socket.h for the network-layer protocol of the packet. Note that, if a ``savefile'' is being read, those PF_ values are not necessarily those of the machine reading the capture file.</li><li>DLT_LINUX_SLL: Linux "cooked" capture encapsulation; the link layer header contains, in order:<ul><li>a 2-byte "packet type", in network byte order, which is one of:<ol type=i><li>packet was sent to us by somebody else</li><li>packet was broadcast by somebody else</li><li>packet was multicast, but not broadcast, by somebody else</li><li>packet was sent by somebody else to somebody else</li><li>packet was sent by us</li></ol></li><li>a 2-byte field, in network byte order, containing a Linux ARPHRD_ value for the link layer device type;</li><li>a 2-byte field, in network byte order, containing the length of the link layer address of the sender of the packet (which could be 0);</li><li>an 8-byte field containing that number of bytes of the link layer header (if there are more than 8 bytes, only the first 8 are present);</li><li>2-byte field containing an Ethernet protocol type, in network byte order, or containing 1 for Novell 802.3 frames without an 802.2 LLC header or 4 for frames beginning with an 802.2 LLC header.</li></ul></li><li>DLT_LTALK: Apple LocalTalk; the packet begins with an AppleTalk LLAP header.</li><li>DLT_PFLOG: OpenBSD pflog; the link layer header contains, in order:<ul><li>a 4-byte PF_ value, in network byte order;</li><li>a 16-character interface name;</li><li>a 2-byte rule number, in network byte order;</li><li>a 2-byte reason code, in network byte order, which is one of:<ol type=i><li>match</li><li>bad offset</li><li>fragment</li><li>short</li><li>normalize</li><li>memory -a 2-byte action code, in network byte order, which is one of:</li><li>passed</li><li>dropped</li><li>scrubbed</li></ol></li><li>a 2-byte direction, in network byte order, which is one o

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美日韩国产色站一区二区三区| 国产午夜亚洲精品午夜鲁丝片| 日韩你懂的在线播放| 国产精品三级av在线播放| 午夜久久久久久| 91亚洲精华国产精华精华液| 精品免费日韩av| 五月天丁香久久| 日本精品一区二区三区高清| 国产女人水真多18毛片18精品视频| 亚洲综合免费观看高清完整版 | 日韩一区二区免费在线观看| 亚洲欧美激情在线| 高清不卡在线观看| 精品国产亚洲在线| 免费观看成人av| 91精品国产全国免费观看| 亚洲一区二区影院| 91福利在线免费观看| 国产精品国产三级国产普通话蜜臀 | 久久99国产乱子伦精品免费| 欧美日韩极品在线观看一区| 一区二区三区成人| 色综合天天天天做夜夜夜夜做| 国产午夜精品一区二区三区嫩草 | 高清av一区二区| 精品成人一区二区| 精品制服美女丁香| 久久夜色精品一区| 久久se精品一区精品二区| 日韩一区二区高清| 久久精品99久久久| 精品日本一线二线三线不卡| 久久精品国产一区二区| 日韩欧美一区二区在线视频| 奇米精品一区二区三区在线观看 | 午夜精品福利一区二区三区av| 一本到不卡精品视频在线观看 | 久久se精品一区精品二区| 欧美一区二区三区不卡| 经典三级视频一区| 久久精品人人爽人人爽| 国产成人免费在线观看不卡| 国产精品三级在线观看| 色一区在线观看| 亚洲18影院在线观看| 在线电影一区二区三区| 久久99精品久久久久| 久久精品在线观看| av成人老司机| 五月婷婷另类国产| 久久久久久久久99精品| 91视频国产观看| 亚洲444eee在线观看| www一区二区| 色综合久久综合| 日本人妖一区二区| 欧美激情一区二区三区不卡| 色综合久久综合网欧美综合网| 亚洲v精品v日韩v欧美v专区| 精品国产一区二区三区四区四| 成人综合婷婷国产精品久久 | 欧美国产精品一区二区三区| 色网站国产精品| 久久国产综合精品| 中文字幕一区视频| 日韩一二在线观看| 99久久99久久精品免费观看| 日本午夜一区二区| 亚洲欧洲精品一区二区三区 | 亚洲美女偷拍久久| 日韩免费在线观看| 91理论电影在线观看| 美女久久久精品| 亚洲美女区一区| 精品国产第一区二区三区观看体验| 91在线无精精品入口| 捆绑调教一区二区三区| 自拍偷拍欧美精品| 26uuu精品一区二区| 欧美日韩性生活| 99久久精品情趣| 国产精品综合久久| 天天综合色天天| 亚洲另类色综合网站| 欧美精品一区二区三区视频| 欧美日韩一区久久| 一本久久a久久精品亚洲| 国产一区二区网址| 麻豆国产精品777777在线| 亚洲综合丁香婷婷六月香| 久久久久久久久久美女| 日韩欧美一级二级三级久久久 | 粉嫩aⅴ一区二区三区四区 | 日本不卡一区二区三区| 一区二区三区**美女毛片| 日本一区二区高清| 精品国产免费一区二区三区四区 | 91国产丝袜在线播放| 国产mv日韩mv欧美| 国产精品影视在线观看| 国内精品视频一区二区三区八戒| 亚洲国产精品自拍| 一区二区在线看| 亚洲人成网站精品片在线观看| 国产偷国产偷精品高清尤物| 欧美成人伊人久久综合网| 欧美一级高清大全免费观看| 欧美男人的天堂一二区| 欧美日韩中文一区| 欧美日韩一卡二卡| 欧美人体做爰大胆视频| 精品视频全国免费看| 欧美色成人综合| 欧美日韩精品三区| 51精品视频一区二区三区| 69堂成人精品免费视频| 6080亚洲精品一区二区| 91精品在线观看入口| 欧美一级黄色大片| 久久久综合精品| 国产欧美综合在线| 国产精品不卡在线观看| 亚洲免费三区一区二区| 亚洲综合在线观看视频| 亚洲成人一区在线| 蜜桃视频在线一区| 国产成人久久精品77777最新版本| 国产成人在线影院| 不卡视频一二三四| 欧美综合色免费| 欧美一区二区三级| 国产欧美一区二区精品久导航| 中文字幕第一页久久| 亚洲精选视频免费看| 偷拍自拍另类欧美| 国产九色sp调教91| 欧洲色大大久久| 日韩免费视频线观看| 国产精品毛片久久久久久| 亚洲精品久久久蜜桃| 久久国产生活片100| av亚洲精华国产精华精| 欧美日韩日本视频| 久久久亚洲高清| 亚洲综合视频在线| 国产精品伊人色| 欧美卡1卡2卡| 国产无遮挡一区二区三区毛片日本| 亚洲丝袜精品丝袜在线| 婷婷综合在线观看| jvid福利写真一区二区三区| 欧美猛男超大videosgay| 精品福利av导航| 一区二区三区精品视频在线| 久久er99精品| 在线观看成人小视频| 国产亚洲一区二区在线观看| 亚洲国产精品视频| 成人av资源下载| 日韩精品综合一本久道在线视频| 国产精品国产三级国产aⅴ原创| 日韩黄色免费网站| 色老综合老女人久久久| 久久久久久久久久电影| 视频在线观看一区| 91一区二区在线| 久久综合精品国产一区二区三区| 一区二区高清视频在线观看| 国产精品99久久久久| 日韩一区二区麻豆国产| 亚洲成人一区二区在线观看| 99久久99久久精品免费看蜜桃| 久久综合av免费| 日韩va亚洲va欧美va久久| 91成人在线免费观看| 成人欧美一区二区三区黑人麻豆| 麻豆91精品视频| 4438x亚洲最大成人网| 亚洲韩国一区二区三区| 91视频com| ...av二区三区久久精品| 国产精品99久| 日韩欧美美女一区二区三区| 日韩国产成人精品| 欧美丰满高潮xxxx喷水动漫| 一区二区三区四区av| 99久久精品国产观看| 亚洲图片激情小说| 97aⅴ精品视频一二三区| 国产精品第四页| 成人黄色国产精品网站大全在线免费观看| 精品欧美一区二区久久| 久久99热这里只有精品| 精品日韩av一区二区| 精品午夜一区二区三区在线观看| 欧美成人精品3d动漫h| 麻豆精品国产91久久久久久| 日韩一区二区免费电影| 激情综合亚洲精品|