embedded IPsec source code documentation


ah_test-sample_ah_packet.h

Go to the documentation of this file.
00001 
00006 // Generated by BreakPoint Software's Hex Workshop v4.10
00007 //   http://www.hexworkshop.com
00008 //   http://www.bpsoft.com
00009 //
00010 //  Source File: ah_test-sample_ah_packet.bin
00011 //         Time: 17.11.2003 09:58
00012 // Orig. Offset: 0 / 0x00000000
00013 //       Length: 118 / 0x00000076 
00014 
00025 unsigned char ah_test_sample_ah_outer_packet[] =
00026 {
00027         // Ethernet Header
00028         // 0x00, 0xA0, 0x24, 0x15, 0x3E, 0x12, 0x00, 0xE0, 0x29, 0x25, 0x60, 0x6C, 0x08, 0x00, 
00029         
00030         // IP Header
00031         0x45, 0x00, 
00032     0x00, 0x68, 0x79, 0x9C, 0x00, 0x00, 0x40, 0x33, 0x7D, 0x4B, 0xC0, 0xA8, 0x01, 0x28, 0xC0, 0xA8, 
00033     0x01, 0x03, 
00034         // AH Header
00035         0x04, 0x04, 0x00, 0x00, 0x00, 0x00, 0x10, 0x09, 0x00, 0x00, 0x00, 0x01, 0x45, 0x2F, 
00036     0x1D, 0xE9, 0xEE, 0x8B, 0x41, 0x26, 0x44, 0x51, 0xCC, 0x8D, 
00037         // inner packet
00038         0x45, 0x00, 0x00, 0x3C, 0xE7, 0x7A, 
00039     0x40, 0x00, 0x40, 0x06, 0xCF, 0xC5, 0xC0, 0xA8, 0x01, 0x28, 0xC0, 0xA8, 0x01, 0x03, 0x80, 0x1A, 
00040     0x00, 0x50, 0x84, 0xB9, 0xC5, 0x66, 0x00, 0x00, 0x00, 0x00, 0xA0, 0x02, 0x7E, 0xB8, 0x1F, 0x75, 
00041     0x00, 0x00, 0x02, 0x04, 0x3F, 0x5C, 0x04, 0x02, 0x08, 0x0A, 0x00, 0x0F, 0x22, 0x1C, 0x00, 0x00, 
00042     0x00, 0x00, 0x01, 0x03, 0x03, 0x00, 
00043 };
00044 
00045 unsigned char ah_test_sample_ah_inner_packet[] =
00046 {
00047         // Ethernet Header
00048         // 0x00, 0xA0, 0x24, 0x15, 0x3E, 0x12, 0x00, 0xE0, 0x29, 0x25, 0x60, 0x6C, 0x08, 0x00, 
00049         
00050         // IP Header
00051 //      0x45, 0x00, 
00052 //    0x00, 0x68, 0x79, 0x9C, 0x00, 0x00, 0x40, 0x33, 0x7D, 0x4B, 0xC0, 0xA8, 0x01, 0x28, 0xC0, 0xA8, 
00053 //    0x01, 0x03, 
00054         // AH Header
00055 //      0x04, 0x04, 0x00, 0x00, 0x00, 0x00, 0x10, 0x09, 0x00, 0x00, 0x00, 0x01, 0x45, 0x2F, 
00056 //    0x1D, 0xE9, 0xEE, 0x8B, 0x41, 0x26, 0x44, 0x51, 0xCC, 0x8D, 
00057         // inner packet
00058         0x45, 0x00, 0x00, 0x3C, 0xE7, 0x7A, 
00059     0x40, 0x00, 0x40, 0x06, 0xCF, 0xC5, 0xC0, 0xA8, 0x01, 0x28, 0xC0, 0xA8, 0x01, 0x03, 0x80, 0x1A, 
00060     0x00, 0x50, 0x84, 0xB9, 0xC5, 0x66, 0x00, 0x00, 0x00, 0x00, 0xA0, 0x02, 0x7E, 0xB8, 0x1F, 0x75, 
00061     0x00, 0x00, 0x02, 0x04, 0x3F, 0x5C, 0x04, 0x02, 0x08, 0x0A, 0x00, 0x0F, 0x22, 0x1C, 0x00, 0x00, 
00062     0x00, 0x00, 0x01, 0x03, 0x03, 0x00, 
00063 };
00064 
00065 // Generated by BreakPoint Software's Hex Workshop v4.10
00066 //   http://www.hexworkshop.com
00067 //   http://www.bpsoft.com
00068 //
00069 //  Source File: ping-answer.bin
00070 //         Time: 20.11.2003 11:31
00071 // Orig. Offset: 0 / 0x00000000
00072 //       Length: 98 / 0x00000062
00078 unsigned char ah_test_sample_ping_reply_packet[] =
00079 {
00080         // Ethernet Header
00081     // 0x00, 0xA0, 0x24, 0x15, 0x3E, 0x12, 0xAA, 0xE0, 0x29, 0x25, 0x60, 0x6C, 0x08, 0x00, 
00082 
00083         // IP Header
00084         0x45, 0x00, 
00085     0x00, 0x54, 0x00, 0x00, 0x40, 0x00, 0x40, 0x01, 0xB7, 0x50, 0xC0, 0xA8, 0x01, 0x03, 0xC0, 0xA8, 
00086     0x01, 0x05, 0x00, 0x00, 0x2A, 0xCD, 0x86, 0x04, 0x00, 0x00, 0x3F, 0xBC, 0x96, 0x8E, 0x00, 0x04, 
00087     0x8D, 0xDC, 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 
00088     0x16, 0x17, 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F, 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 
00089     0x26, 0x27, 0x28, 0x29, 0x2A, 0x2B, 0x2C, 0x2D, 0x2E, 0x2F, 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 
00090     0x36, 0x37, 
00091 };
00092 
00093 
00094 

Copyright 2003 by Christian Scheurer and Niklaus Schild