It takes the on-the-network length, followed by the captured length, as
arguments; apparently, some people (or LLMs?) think, perhaps based on
other code that takes the captured length first, that it's the other way
around, and their fuzz-testing finds that bug in their code. See
issue #1442.
Initialize the scratch memory store to 0.
Require "[wlan] dir" integer value to be within range.
Fix the != comparison for ATM and MTP field values.
Initialize the scratch memory store to 0.
Require "[wlan] dir" integer value to be within range.
Fix the != comparison for ATM and MTP field values.
+ Deprecate bpf_filter().
rpcap:
Support user names and passwords in rpcap:// and rpcaps:// URLs.
Add a -t flag to rpcapd to specify the data channel port; from
rpcap:
Support user names and passwords in rpcap:// and rpcaps:// URLs.
Add a -t flag to rpcapd to specify the data channel port; from
#define BPF_JUMP(code, k, jt, jf) { (u_short)(code), jt, jf, k }
PCAP_AVAILABLE_0_4
#define BPF_JUMP(code, k, jt, jf) { (u_short)(code), jt, jf, k }
PCAP_AVAILABLE_0_4
+PCAP_DEPRECATED("use pcap_offline_filter()")
PCAP_API u_int bpf_filter(const struct bpf_insn *, const u_char *, u_int, u_int);
PCAP_AVAILABLE_0_6
PCAP_API u_int bpf_filter(const struct bpf_insn *, const u_char *, u_int, u_int);
PCAP_AVAILABLE_0_6