Example #1
0
void RRDVisAnalyzer::analyzeFlow(const Flow* flow)
{
	if (firstFlow) {
		initDatabases((uint64_t)(((uint64_t)flow->flowStart / 1000) / 60) * 60);
		firstFlow = false;
	}
	static char output[16];
	lpm_lookup(tree, flow->srcIP, output);

	// VERMONT does not use the timestamps properly to determine which direction of the
	// flow did start the flow. It is therefore possible that the reverse flow direction
	// actually started the flow. Hence, we need to check this manually. 
	if (flow->flowStart < flow->revFlowStart) {
		updateEntry(output, flow->flowStart, flow->flowEnd, flow->proto, flow->revBytes, flow->revPackets, flow->bytes, flow->packets);
	} else {
		updateEntry(output, flow->revFlowStart, flow->revFlowEnd, flow->proto, flow->bytes, flow->packets, flow->revBytes, flow->revPackets);
	}

	lpm_lookup(tree, flow->dstIP, output);
	if (flow->flowStart < flow->revFlowStart) {
		updateEntry(output, flow->revFlowStart, flow->revFlowEnd, flow->proto, flow->bytes, flow->packets, flow->revBytes, flow->revPackets);
	} else {
		updateEntry(output, flow->flowStart, flow->flowEnd, flow->proto, flow->revBytes, flow->revPackets, flow->bytes, flow->packets);
	}
}
void ExportPrimersDialog::sl_connectionCompleted() {
    QObject *connectionDialog = sender();
    if (Q_LIKELY(NULL != connectionDialog)) {
        connectionDialog->deleteLater();
    }
    initDatabases();
    sl_updateState();
}
Example #3
0
void MainWindow::loadFinished(bool ok)
{
    disconnect(m_webView, SIGNAL(loadFinished(bool)), this, SLOT(loadFinished(bool)));
    if (ok) {
        initDatabases();
        m_webView->page()->currentFrame()->evaluateJavaScript(QString("db.MAX_TWEET_CACHE_SIZE = 2048;"));
        m_webView->page()->currentFrame()->evaluateJavaScript(QString("db.MAX_USER_CACHE_SIZE = 128;"));
        m_webView->page()->currentFrame()->evaluateJavaScript(QString("i18n.locale = \"%1\";").arg(QLocale::system().name()));
        m_webView->page()->currentFrame()->evaluateJavaScript("globals.load_flags = 1;");
    }
}
Example #4
0
void MainWindow::loadFinished(bool ok)
{
    disconnect(m_webView, SIGNAL(loadFinished(bool)), this, SLOT(loadFinished(bool)));
    if (ok) {
        initDatabases();
        m_webView->page()->currentFrame()->evaluateJavaScript(QString("i18n.locale = \"%1\";").arg(QLocale::system().name()));
        m_webView->page()->currentFrame()->evaluateJavaScript("globals.load_flags = 1;");
#ifndef MEEGO_EDITION_HARMATTAN
        if (!isStartMinimized() || !isAutoSignIn())
            show();
#else
        show();
#endif
    }
    else {
        show();
    }
}
Example #5
0
void MainWindow::loadFinished(bool ok)
{
    disconnect(m_webView, SIGNAL(loadFinished(bool)), this, SLOT(loadFinished(bool)));
    if (ok) {
        initDatabases();

        QString confString = QString(
            "hotot_qt_variables = {"
            "      'platform': 'Linux'"
            "    , 'avatar_cache_dir': '%3'"
            "    , 'extra_fonts': %4"
            "    , 'extra_exts': %5"
            "    , 'extra_themes': %6"
            "    , 'locale': '%7'"
            "};").arg(m_confDir)
                 .arg(extraFonts())
                 .arg(extraExtensions())
                 .arg(extraThemes())
                 .arg(QLocale::system().name());

        m_webView->page()->currentFrame()->evaluateJavaScript(confString);
        QTimer::singleShot(0, this, SLOT(notifyLoadFinished()));
#ifndef MEEGO_EDITION_HARMATTAN
        if (!isStartMinimized() || !isAutoSignIn()) {
            show();
            QSettings settings("hotot-qt", "hotot");
            restoreGeometry(settings.value("geometry").toByteArray());
            restoreState(settings.value("windowState").toByteArray());
        }
#else
        show();
#endif
    }
    else {
        show();
    }
}
Example #6
0
static enum a6o_mod_status moduleH1_post_init(struct a6o_module *module)
{


#ifdef _WIN32

	const char * bases_location = NULL;
	int len;

	char* modelMalwareEat = NULL;
	char* modelMalwareIat = NULL;
	char* modelNotMalwareEat = NULL;
	char* modelNotMalwareIat = NULL;
	char* databaseEat = NULL;
	char* databaseIat = NULL;
	char* databaseTFIDFInf = NULL;
	char* databaseTFIDFSain = NULL;

	/*build db directory complete path*/
	bases_location = a6o_std_path(BASES_LOCATION);

	// modelMalwareEat
	len = strlen(bases_location) + 1 + strlen("moduleH1\\windows\\Database_malsain_2.zip") + 1;
	modelMalwareEat = calloc(len + 1, sizeof(char));
	modelMalwareEat[len] = '\0';
	sprintf_s(modelMalwareEat, len, "%s%cmoduleH1\\windows\\Database_malsain_2.zip", bases_location, a6o_path_sep());

	// modelMalwareIat
	len = strlen(bases_location) + 1 + strlen("moduleH1\\windows\\Database_malsain_1.zip") + 1;
	modelMalwareIat = calloc(len + 1, sizeof(char));
	modelMalwareIat[len] = '\0';
	sprintf_s(modelMalwareIat, len, "%s%cmoduleH1\\windows\\Database_malsain_1.zip", bases_location, a6o_path_sep());	

	// modelNotMalwareEat
	len = strlen(bases_location) + 1 + strlen("moduleH1\\windows\\Database_sain_2.zip") + 1;
	modelNotMalwareEat = calloc(len + 1, sizeof(char));
	modelNotMalwareEat[len] = '\0';
	sprintf_s(modelNotMalwareEat, len, "%s%cmoduleH1\\windows\\Database_sain_2.zip", bases_location, a6o_path_sep());	

	// modelNotMalwareIat
	len = strlen(bases_location) + 1 + strlen("moduleH1\\windows\\Database_sain_1.zip") + 1;
	modelNotMalwareIat = calloc(len + 1, sizeof(char));
	modelNotMalwareIat[len] = '\0';
	sprintf_s(modelNotMalwareIat, len, "%s%cmoduleH1\\windows\\Database_sain_1.zip", bases_location, a6o_path_sep());

	// databaseEat
	len = strlen(bases_location) + 1 + strlen("moduleH1\\windows\\database_2.dat") + 1;
	databaseEat = calloc(len + 1, sizeof(char));
	databaseEat[len] = '\0';
	sprintf_s(databaseEat, len, "%s%cmoduleH1\\windows\\database_2.dat", bases_location, a6o_path_sep());

	// databaseIat
	len = strlen(bases_location) + 1 + strlen("moduleH1\\windows\\database_1.dat") + 1;
	databaseIat = calloc(len + 1, sizeof(char));
	databaseIat[len] = '\0';
	sprintf_s(databaseIat, len, "%s%cmoduleH1\\windows\\database_1.dat", bases_location, a6o_path_sep());

	// databaseTFIDFInf
	len = strlen(bases_location) + 1 + strlen("moduleH1\\windows\\DBI_inf.dat") + 1;
	databaseTFIDFInf = calloc(len + 1, sizeof(char));
	databaseTFIDFInf[len] = '\0';
	sprintf_s(databaseTFIDFInf, len, "%s%cmoduleH1\\windows\\DBI_inf.dat", bases_location, a6o_path_sep());

	// databaseTFIDFSain
	len = strlen(bases_location) + 1 + strlen("moduleH1\\windows\\DBI_sain.dat") + 1;
	databaseTFIDFSain = calloc(len + 1, sizeof(char));
	databaseTFIDFSain[len] = '\0';
	sprintf_s(databaseTFIDFSain, len, "%s%cmoduleH1\\windows\\DBI_sain.dat", bases_location, a6o_path_sep());

	//printf("[+] Debug :: module H1 database file = [%s]\n", databaseEat);

	/* initDatabase function extension :: add db location as first parameter */
	if (initDatabases(modelMalwareEat,
			modelMalwareIat,
			modelNotMalwareEat,
			modelNotMalwareIat,
			databaseEat,
			databaseIat,
			databaseTFIDFInf,
			databaseTFIDFSain) != 0)
		return ARMADITO_MOD_INIT_ERROR;

	a6o_log(ARMADITO_LOG_MODULE, ARMADITO_LOG_LEVEL_INFO, "module H1 PE databases loaded from %s\\moduleH1\\windows \n", bases_location);

	free(modelMalwareEat);
	free(modelMalwareIat);
	free(modelNotMalwareEat);
	free(modelNotMalwareIat);
	free(databaseEat);
	free(databaseIat);
	free(databaseTFIDFInf);
	free(databaseTFIDFSain);
	free(bases_location);
	

#else

	a6o_log(ARMADITO_LOG_MODULE, ARMADITO_LOG_LEVEL_INFO, "loading module H1 ELF databases from " MODULEH1_DBDIR "/linux");

	if (initDB(MODULEH1_DBDIR "/linux/database.elfdata",
			MODULEH1_DBDIR "/linux/db_malicious.zip",
			MODULEH1_DBDIR "/linux/db_safe.zip",
			MODULEH1_DBDIR "/linux/tfidf_m.dat",
			MODULEH1_DBDIR "/linux/tfidf_s.dat") != 0)
		return ARMADITO_MOD_INIT_ERROR;

	a6o_log(ARMADITO_LOG_MODULE, ARMADITO_LOG_LEVEL_INFO, "module H1 ELF databases loaded from " MODULEH1_DBDIR "/linux");

	a6o_log(ARMADITO_LOG_MODULE, ARMADITO_LOG_LEVEL_INFO, "loading module H1 PE databases from " MODULEH1_DBDIR "/windows");
	if (initDatabases(MODULEH1_DBDIR "/windows/Database_malsain_2.zip",
			MODULEH1_DBDIR "/windows/Database_malsain_1.zip",
			MODULEH1_DBDIR "/windows/Database_sain_2.zip",
			MODULEH1_DBDIR "/windows/Database_sain_1.zip",
			MODULEH1_DBDIR "/windows/database_2.dat",
			MODULEH1_DBDIR "/windows/database_1.dat",
			MODULEH1_DBDIR "/windows/DBI_inf.dat",
			MODULEH1_DBDIR "/windows/DBI_sain.dat") != 0)
		return ARMADITO_MOD_INIT_ERROR;

	a6o_log(ARMADITO_LOG_MODULE, ARMADITO_LOG_LEVEL_INFO, "module H1 PE databases loaded from %s " MODULEH1_DBDIR "/windows");
	
#endif



	return ARMADITO_MOD_OK;
}