I'm getting the feeling that pcap_inject() isn't well supported?
I'm using two laptops: 1) Dell Latitude 630 and 2) Dell Mini 9. The Dell
Mini-9 has a Intel 1000 WiFi Link PCIe card in it. I don't know what 802.11
hardware is in the 630.
Thanks,
FM
> -Original Message-
> From: tcpdum
On Feb 9, 2010, at 9:41 AM, Carter Bullard wrote:
> Just after the call to pcap_open_live(), I set this ioctl. You may not need
> the pcap_setnonblock() for
> your application.
>
> if ((pd = pcap_open_live(device->name, snaplen, !pflag, 100, errbuf)) !=
> NULL) {
That's a sub-second timeou
On Feb 8, 2010, at 2:33 PM, Frank W. Miller wrote:
> Stock FC12. Linux kernel 2.6.31.5-127.fc12.1686.PAE #1 SMP
What type of 802.11 adapter are you using?
-
This is the tcpdump-workers list.
Visit https://cod.sandelman.ca/ to unsubscribe.
On Feb 8, 2010, at 2:34 PM, Frank W. Miller wrote:
> FWIW, packetspammer does not work either.
The current top-of-tree version of packetspammer from
git://git.warmcat.com/packetspammer
uses pcap_inject(), so it's not *too* surprising that it doesn't work. It is a
nice small (and open
Hey Marco,
This may help you if you are not doing it. It seemed to help me on Snow
Leopard.
Just after the call to pcap_open_live(), I set this ioctl. You may not need
the pcap_setnonblock() for
your application.
if ((pd = pcap_open_live(device->name, snaplen, !pflag, 100, errbuf)) !=
NUL
Guy Harris alum.mit.edu> writes:
> > Good question. Do you know how could I verify the buffer
> > they stay in? Is there
> > some printout I could add before calling pcap_dispatch to see
> > what's in the kernel buffer and what in the userland buffer?
>
> Yes, but you'd have to add it to libpc