As you know, I added pcap_open_offline so I could open pcap files instead of sniff traffic, which allows me to better control testing with known packets and files.
Today's problem;
Code: Select all
$ newlisp src/sniff.lsp captures/tcp-scan.pcap
device: captures/tcp-scan.pcap
--- 1--- from ether addr: 00:30:0f:33:40:00 to: 02:00:00:00:45:00
ERR: value expected in function * : TH_OFF
called from user defined function report-packet
Code: Select all
$ tcpdump -ttttnnr captures/tcp-scan.pcap
2007-09-25 15:42:04.819943 IP 10.0.23.109.3574 > 80.237.98.132.2675: Flags [S],
seq 1439989931, win 65535, options [mss 1356,nop,nop,sackOK], length 0
2007-09-25 15:42:04.819979 IP 10.0.23.109.3547 > 80.237.98.132.1319: Flags [S],
seq 1043408690, win 65535, options [mss 1356,nop,nop,sackOK], length 0
...
Also, Wireshark has no problems reading this capture.