You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It would be convenient to support BPF filters in a minimal way, where the user provides directly the BPF opcodes.
Most of the work is already done by the tcpdump compiler, which can dump raw opcodes on stdout. We just need some glue (the following bpf2binary.py code) to import it into net2pcap through a setsockopt(s, SO_ATTACH_FILTER. ...)
It would be convenient to support BPF filters in a minimal way, where the user provides directly the BPF opcodes.
Most of the work is already done by the tcpdump compiler, which can dump raw opcodes on stdout. We just need some glue (the following
bpf2binary.py
code) to import it into net2pcap through asetsockopt(s, SO_ATTACH_FILTER. ...)
And then:
The text was updated successfully, but these errors were encountered: