aboutsummaryrefslogtreecommitdiffstats
path: root/airpcap_loader.h
AgeCommit message (Collapse)AuthorFilesLines
2009-05-13() -> (void)jmayer1-8/+8
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@28352 f5534014-38df-0310-8fa8-9805f1628bb7
2009-05-13Make it compile without warnings on OSX.stig1-6/+0
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@28343 f5534014-38df-0310-8fa8-9805f1628bb7
2009-05-13Replace all Windows types by glib types - hopefully thejmayer1-78/+78
correct ones. Use buildbot as a compile test on Windows. This makes "configure --enable-airpcap && make" succeed on Linux. It crashes the moment you click the wireless settings button because some relevant information isn't present (nullpointer deref). git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@28340 f5534014-38df-0310-8fa8-9805f1628bb7
2007-08-17Instead of converting between 802.11 frequencies and channels umpteengerald1-18/+0
different ways, add a set of common conversion routines. Add a "Frequency/Channel" column and fill it in where we can. Fix RSSI column printing in PPI. Fix up whitespace along the way. git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@22538 f5534014-38df-0310-8fa8-9805f1628bb7
2007-05-18From Dustin Johnson:gerald1-21/+72
- Update the wireless/AirPcap GUI code to support 802.11n as well as some related upcoming code changes. - Remove airpcap.h from the repository, since it exists in the AirPcap devpack (and will be superseded Real Soon Now). - Show the individual channel flag bits in radiotap. Fix the 802.11n MCS set display. This is a partial checkin, so hopefully nothing is broken. git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@21831 f5534014-38df-0310-8fa8-9805f1628bb7
2007-04-11Fix bug 1377:morriss1-0/+1
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1377 and complaints to the mailing list that a bogus (empty or non-ASCII contents) dialog box was popped up when getting the list of interfaces. The problem was that 'get_airpcap_interface_list()' wasn't setting the returned error value when it found that AirPcap was not loaded. If whatever was in that variable happened to be 1 when a non-AirPcap user requested the list of interfaces then the bogus dialog would show up. git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@21380 f5534014-38df-0310-8fa8-9805f1628bb7
2007-01-26Spelling fixes.gerald1-2/+2
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@20561 f5534014-38df-0310-8fa8-9805f1628bb7
2007-01-23Propagate the recent interface list changes (r20521) to the AirPcap code.gerald1-1/+1
Fix a mismatched declaration found by Gisle Vanem. git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@20535 f5534014-38df-0310-8fa8-9805f1628bb7
2007-01-21Have the routines to get interface lists take a pointer to a "gchar *"guy1-7/+0
as an argument, and, on an error, if they have an error message, have them set that "gchar *" to point to a g_malloc()ed string containing the error message, rather than taking a pointer to a buffer for that message as an argument. That's more like what's done in Wiretap, and doesn't impose an upper limit on the lengths of those error messages. If that pointer is null, don't allocate the message string and return it. Have that error message already have the "cant_get" processing applied to it, so nobody other than those routines need to call the "cant_get" routines to process the error messages. Have get_airpcap_interface_list() explicitly set "*err" to the appropriate error code. Clean up indentation. git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@20521 f5534014-38df-0310-8fa8-9805f1628bb7
2007-01-11Add uri_str_to_bytes(), byte_array_dup(), and byte_array_equal()gerald1-13/+0
functions to strutil. Use GByteArrays to store SSIDs for decryption, and let the user specify arbitrary byte strings using percent-encoded strings. We should probably add percent encoding for pass phrases as well, so you can escape the ":" character. Move the key struct key conversion utilities to airpdcap.c, and remove duplicate code from packet-ieee80211.c. Fix a lot of indentation. git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@20388 f5534014-38df-0310-8fa8-9805f1628bb7
2007-01-02From Gisle Vanem:gerald1-0/+2
Here are some patches needed to build using HAVE_AIRPCAP on MingW: * airpcap.h needs 'WEP_KEY_MAX_SIZE' from <epan/crypt/wep-wpadefs.h>. * airpcap_loader.h needs <epan/crypt/airpdcap_user.h> and definition of 'decryption_key_t'. * epan/crypt/airpdcap_interop.h defines 'ntohs()' before <winsock2.h> gets included. Thus creating a parse error later on. git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@20274 f5534014-38df-0310-8fa8-9805f1628bb7
2006-12-27Prepare to move the airpdcap code to epan/crypt (SVN won't let me actuallygerald1-63/+3
move the files until these changes are checked in). Add an AC_DEFINE for airpdcap (which will be removed once the changes have settled). Update the airpdcap code to compile on non-Windows systems. Fix up comments and whitespace to conform more closely to the rest of the code base. Verified to compile under Windows and OS X. git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@20227 f5534014-38df-0310-8fa8-9805f1628bb7
2006-12-05From Davide Schiera and Giorgio Tino: Add initial WPA/WPA2 decryptiongerald1-18/+66
support. WEP key preferences have been overloaded to allow WPA keys. The decryption code currently uses Windows-specific data types, but can be converted to use glib equivalents. Add a few text and whitespace fixups. git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@20049 f5534014-38df-0310-8fa8-9805f1628bb7
2006-10-30From Giorgio Tino: Add support for version 2.0 of the AirPcap driver, gerald1-3/+110
which has an updated API for WEP key handling. git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@19736 f5534014-38df-0310-8fa8-9805f1628bb7
2006-10-19Rename get_epan_and_portaudio_version_info() to get_gui_compiled_info()gerald1-8/+18
and add version info for AirPcap. Add a corresponding get_gui_runtime_info(). Fix up whitespace. git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@19620 f5534014-38df-0310-8fa8-9805f1628bb7
2006-10-19Add support for:gerald1-1/+137
- The AirPcap Multi-Channel Aggregator (which is marketspeak for an "any" device) - Merging the 802.11 dissector WEP key list with AirPcap's - Decrypting WEP in the adapter, in Wireshark, or not at all Update the release notes. git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@19599 f5534014-38df-0310-8fa8-9805f1628bb7
2006-10-10First step in integrating the AirPcap WEP preferences with thosegerald1-2/+0
from the 802.11 dissector. Use a #define for the maximum number of WEP keys. Use AirPcap's if we have it (64). Rename find_module() prefs_find_module() and make it public. git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@19467 f5534014-38df-0310-8fa8-9805f1628bb7
2006-10-02Fix WEP key bug in the AirPcap code that could cause a crash. Enablegerald1-0/+8
AirPcap by default. Add initial support for the "Any" device in AirPcap (more to come). git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@19401 f5534014-38df-0310-8fa8-9805f1628bb7
2006-09-12remove obsolete "HAVE_AIRPCAP_API" commentulfl1-2/+0
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@19197 f5534014-38df-0310-8fa8-9805f1628bb7
2006-08-21Fix up copyrights and whitespace.gerald1-31/+34
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@18981 f5534014-38df-0310-8fa8-9805f1628bb7
2006-08-16Add support for AirPcap, an upcoming wireless product from CACE. Supportgerald1-0/+296
is disabled by default, and can be enabled by setting AIRPCAP_CONFIG in config.nmake. The code is currently limited to Windows, but should be adaptable to other platforms. The official announcement won't come until next week, so you'll have to read the source for details. :) git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@18928 f5534014-38df-0310-8fa8-9805f1628bb7