Age | Commit message (Collapse) | Author | Files | Lines |
|
different ways, add a set of common conversion routines. Add a
"Frequency/Channel" column and fill it in where we can. Fix RSSI column
printing in PPI.
Fix up whitespace along the way.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@22538 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
- Update the wireless/AirPcap GUI code to support 802.11n as well as
some related upcoming code changes.
- Remove airpcap.h from the repository, since it exists in the AirPcap
devpack (and will be superseded Real Soon Now).
- Show the individual channel flag bits in radiotap.
Fix the 802.11n MCS set display.
This is a partial checkin, so hopefully nothing is broken.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@21831 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1377
and complaints to the mailing list that a bogus (empty or non-ASCII contents)
dialog box was popped up when getting the list of interfaces. The problem was
that 'get_airpcap_interface_list()' wasn't setting the returned error value
when it found that AirPcap was not loaded. If whatever was in that variable
happened to be 1 when a non-AirPcap user requested the list of interfaces
then the bogus dialog would show up.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@21380 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@20561 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
Fix a mismatched declaration found by Gisle Vanem.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@20535 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
as an argument, and, on an error, if they have an error message, have
them set that "gchar *" to point to a g_malloc()ed string containing the
error message, rather than taking a pointer to a buffer for that message
as an argument. That's more like what's done in Wiretap, and doesn't
impose an upper limit on the lengths of those error messages. If that
pointer is null, don't allocate the message string and return it.
Have that error message already have the "cant_get" processing applied
to it, so nobody other than those routines need to call the "cant_get"
routines to process the error messages.
Have get_airpcap_interface_list() explicitly set "*err" to the
appropriate error code.
Clean up indentation.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@20521 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
functions to strutil. Use GByteArrays to store SSIDs for decryption,
and let the user specify arbitrary byte strings using percent-encoded
strings. We should probably add percent encoding for pass phrases as
well, so you can escape the ":" character.
Move the key struct key conversion utilities to airpdcap.c, and remove
duplicate code from packet-ieee80211.c. Fix a lot of indentation.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@20388 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
Here are some patches needed to build using HAVE_AIRPCAP
on MingW:
* airpcap.h needs 'WEP_KEY_MAX_SIZE' from <epan/crypt/wep-wpadefs.h>.
* airpcap_loader.h needs <epan/crypt/airpdcap_user.h> and definition of
'decryption_key_t'.
* epan/crypt/airpdcap_interop.h defines 'ntohs()' before <winsock2.h>
gets included. Thus creating a parse error later on.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@20274 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
move the files until these changes are checked in). Add an AC_DEFINE
for airpdcap (which will be removed once the changes have settled).
Update the airpdcap code to compile on non-Windows systems. Fix up
comments and whitespace to conform more closely to the rest of the
code base. Verified to compile under Windows and OS X.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@20227 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
support.
WEP key preferences have been overloaded to allow WPA keys. The
decryption code currently uses Windows-specific data types, but can be
converted to use glib equivalents.
Add a few text and whitespace fixups.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@20049 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
which has an updated API for WEP key handling.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@19736 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
and add version info for AirPcap. Add a corresponding
get_gui_runtime_info(). Fix up whitespace.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@19620 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
- The AirPcap Multi-Channel Aggregator (which is marketspeak for an "any"
device)
- Merging the 802.11 dissector WEP key list with AirPcap's
- Decrypting WEP in the adapter, in Wireshark, or not at all
Update the release notes.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@19599 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
from the 802.11 dissector. Use a #define for the maximum number of
WEP keys. Use AirPcap's if we have it (64). Rename find_module()
prefs_find_module() and make it public.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@19467 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
AirPcap by default. Add initial support for the "Any" device in AirPcap
(more to come).
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@19401 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@19197 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@18981 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
is disabled by default, and can be enabled by setting AIRPCAP_CONFIG
in config.nmake. The code is currently limited to Windows, but should
be adaptable to other platforms.
The official announcement won't come until next week, so you'll have to
read the source for details. :)
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@18928 f5534014-38df-0310-8fa8-9805f1628bb7
|