target.cc

来自「Ubuntu packages of security software。 相」· CC 代码 · 共 463 行 · 第 1/2 页

CC
463
字号
/*************************************************************************** * Target.cc -- The Target class encapsulates much of the information Nmap * * has about a host.  Results (such as ping, OS scan, etc) are stored in   * * this class as they are determined.                                      * *                                                                         * ***********************IMPORTANT NMAP LICENSE TERMS************************ *                                                                         * * The Nmap Security Scanner is (C) 1996-2008 Insecure.Com LLC. Nmap is    * * also a registered trademark of Insecure.Com LLC.  This program is free  * * software; you may redistribute and/or modify it under the terms of the  * * GNU General Public License as published by the Free Software            * * Foundation; Version 2 with the clarifications and exceptions described  * * below.  This guarantees your right to use, modify, and redistribute     * * this software under certain conditions.  If you wish to embed Nmap      * * technology into proprietary software, we sell alternative licenses      * * (contact sales@insecure.com).  Dozens of software vendors already       * * license Nmap technology such as host discovery, port scanning, OS       * * detection, and version detection.                                       * *                                                                         * * Note that the GPL places important restrictions on "derived works", yet * * it does not provide a detailed definition of that term.  To avoid       * * misunderstandings, we consider an application to constitute a           * * "derivative work" for the purpose of this license if it does any of the * * following:                                                              * * o Integrates source code from Nmap                                      * * o Reads or includes Nmap copyrighted data files, such as                * *   nmap-os-fingerprints or nmap-service-probes.                          * * o Executes Nmap and parses the results (as opposed to typical shell or  * *   execution-menu apps, which simply display raw Nmap output and so are  * *   not derivative works.)                                                *  * o Integrates/includes/aggregates Nmap into a proprietary executable     * *   installer, such as those produced by InstallShield.                   * * o Links to a library or executes a program that does any of the above   * *                                                                         * * The term "Nmap" should be taken to also include any portions or derived * * works of Nmap.  This list is not exclusive, but is just meant to        * * clarify our interpretation of derived works with some common examples.  * * These restrictions only apply when you actually redistribute Nmap.  For * * example, nothing stops you from writing and selling a proprietary       * * front-end to Nmap.  Just distribute it by itself, and point people to   * * http://insecure.org/nmap/ to download Nmap.                             * *                                                                         * * We don't consider these to be added restrictions on top of the GPL, but * * just a clarification of how we interpret "derived works" as it applies  * * to our GPL-licensed Nmap product.  This is similar to the way Linus     * * Torvalds has announced his interpretation of how "derived works"        * * applies to Linux kernel modules.  Our interpretation refers only to     * * Nmap - we don't speak for any other GPL products.                       * *                                                                         * * If you have any questions about the GPL licensing restrictions on using * * Nmap in non-GPL works, we would be happy to help.  As mentioned above,  * * we also offer alternative license to integrate Nmap into proprietary    * * applications and appliances.  These contracts have been sold to dozens  * * of software vendors, and generally include a perpetual license as well  * * as providing for priority support and updates as well as helping to     * * fund the continued development of Nmap technology.  Please email        * * sales@insecure.com for further information.                             * *                                                                         * * As a special exception to the GPL terms, Insecure.Com LLC grants        * * permission to link the code of this program with any version of the     * * OpenSSL library which is distributed under a license identical to that  * * listed in the included Copying.OpenSSL file, and distribute linked      * * combinations including the two. You must obey the GNU GPL in all        * * respects for all of the code used other than OpenSSL.  If you modify    * * this file, you may extend this exception to your version of the file,   * * but you are not obligated to do so.                                     * *                                                                         * * If you received these files with a written license agreement or         * * contract stating terms other than the terms above, then that            * * alternative license agreement takes precedence over these comments.     * *                                                                         * * Source is provided to this software because we believe users have a     * * right to know exactly what a program is going to do before they run it. * * This also allows you to audit the software for security holes (none     * * have been found so far).                                                * *                                                                         * * Source code also allows you to port Nmap to new platforms, fix bugs,    * * and add new features.  You are highly encouraged to send your changes   * * to fyodor@insecure.org for possible incorporation into the main         * * distribution.  By sending these changes to Fyodor or one the            * * Insecure.Org development mailing lists, it is assumed that you are      * * offering Fyodor and Insecure.Com LLC the unlimited, non-exclusive right * * to reuse, modify, and relicense the code.  Nmap will always be          * * available Open Source, but this is important because the inability to   * * relicense code has caused devastating problems for other Free Software  * * projects (such as KDE and NASM).  We also occasionally relicense the    * * code to third parties as discussed above.  If you wish to specify       * * special license conditions of your contributions, just say so when you  * * send them.                                                              * *                                                                         * * This program is distributed in the hope that it will be useful, but     * * WITHOUT ANY WARRANTY; without even the implied warranty of              * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU       * * General Public License for more details at                              * * http://www.gnu.org/copyleft/gpl.html , or in the COPYING file included  * * with Nmap.                                                              * *                                                                         * ***************************************************************************//* $Id: Target.cc 6633 2007-12-22 06:32:03Z fyodor $ */#ifdef WIN32#include "nmap_winconfig.h"#endif#include "Target.h"#include <dnet.h>#include "nbase.h"#include "NmapOps.h"#include "utils.h"#include "nmap_error.h"extern NmapOps o;Target::Target() {  Initialize();}void Target::Initialize() {  hostname = NULL;  memset(&seq, 0, sizeof(seq));  distance = -1;  FPR1 = NULL;  FPR = NULL;  osscan_flag = OS_NOTPERF;  wierd_responses = flags = 0;  memset(&to, 0, sizeof(to));  memset(&targetsock, 0, sizeof(targetsock));  memset(&sourcesock, 0, sizeof(sourcesock));  memset(&nexthopsock, 0, sizeof(nexthopsock));  targetsocklen = sourcesocklen = nexthopsocklen = 0;  directly_connected = -1;  targetipstring[0] = '\0';  nameIPBuf = NULL;  memset(&MACaddress, 0, sizeof(MACaddress));  memset(&SrcMACaddress, 0, sizeof(SrcMACaddress));  memset(&NextHopMACaddress, 0, sizeof(NextHopMACaddress));  MACaddress_set = SrcMACaddress_set = NextHopMACaddress_set = false;  htn.msecs_used = 0;  htn.toclock_running = false;  interface_type = devt_other;	devname[0] = '\0';	devfullname[0] = '\0';  state_reason_init(&reason);}const char * Target::deviceName() { 	return (devname[0] != '\0')? devname : NULL;}const char * Target::deviceFullName() { 	return (devfullname[0] != '\0')? devfullname : NULL; }void Target::Recycle() {  FreeInternal();  Initialize();}Target::~Target() {  FreeInternal();}void Target::FreeInternal() {  /* Free the DNS name if we resolved one */  if (hostname)    free(hostname);  if (nameIPBuf) {    free(nameIPBuf);    nameIPBuf = NULL;  }  if (FPR1) delete FPR1;  if (FPR) delete FPR;}/*  Creates a "presentation" formatted string out of the IPv4/IPv6 address.    Called when the IP changes */void Target::GenerateIPString() {  struct sockaddr_in *sin = (struct sockaddr_in *) &targetsock;  struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *) &targetsock;  if (inet_ntop(sin->sin_family, (sin->sin_family == AF_INET)?                 (char *) &sin->sin_addr : #if HAVE_IPV6                (char *) &sin6->sin6_addr, #else                (char *) NULL,#endif		targetipstring, sizeof(targetipstring)) == NULL) {    fatal("Failed to convert target address to presentation format!?!  Error: %s", strerror(socket_errno()));  }}/* Fills a sockaddr_storage with the AF_INET or AF_INET6 address     information of the target.  This is a preferred way to get the     address since it is portable for IPv6 hosts.  Returns 0 for     success. ss_len must be provided.  It is not examined, but is set     to the size of the sockaddr copied in. */int Target::TargetSockAddr(struct sockaddr_storage *ss, size_t *ss_len) {  assert(ss);  assert(ss_len);    if (targetsocklen <= 0)    return 1;  assert(targetsocklen <= sizeof(*ss));  memcpy(ss, &targetsock, targetsocklen);  *ss_len = targetsocklen;  return 0;}/* Note that it is OK to pass in a sockaddr_in or sockaddr_in6 casted     to sockaddr_storage */void Target::setTargetSockAddr(struct sockaddr_storage *ss, size_t ss_len) {  assert(ss_len > 0 && ss_len <= sizeof(*ss));  if (targetsocklen > 0) {    /* We had an old target sock, so we better blow away the hostname as       this one may be new. */    setHostName(NULL);  }  memcpy(&targetsock, ss, ss_len);  targetsocklen = ss_len;  GenerateIPString();  /* The ports array needs to know a name too */  ports.setIdStr(targetipstr());}// Returns IPv4 host address or {0} if unavailable.

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?