File: capture-wpcap.h

package info (click to toggle)
wireshark 4.6.2-3
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 351,272 kB
  • sloc: ansic: 3,102,180; cpp: 129,710; xml: 100,972; python: 56,513; perl: 24,575; sh: 5,874; lex: 4,383; pascal: 4,304; makefile: 165; ruby: 113; objc: 91; tcl: 35
file content (51 lines) | stat: -rw-r--r-- 1,075 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
/** @file
 *
 * Wireshark - Network traffic analyzer
 * By Gerald Combs <gerald@wireshark.org>
 * Copyright 2001 Gerald Combs
 *
 * SPDX-License-Identifier: GPL-2.0-or-later
 */

#ifndef CAPTURE_WPCAP_H
#define CAPTURE_WPCAP_H

#ifdef __cplusplus
extern "C" {
#endif /* __cplusplus */

#ifdef HAVE_LIBPCAP
#ifdef __MINGW32__
#include <_bsd_types.h>
#endif
#include <pcap/pcap.h>
#endif

extern bool has_npcap;

extern void load_wpcap(void);

/*
 * This returns true if we loaded WinPcap; we don't support WinPcap anymore,
 * so this doesn't mean we can capture (has_npcap is still false), but we can
 * produce a more informative error message.
 */
extern bool caplibs_have_winpcap(void);

/**
 * Check to see if npf.sys is running.
 * @return true if npf.sys is running, false if it's not or if there was
 * an error checking its status.
 */
bool npf_sys_is_running(void);

#ifdef HAVE_LIBPCAP
int
ws_pcap_findalldevs_ex(const char *a, struct pcap_rmtauth *b, pcap_if_t **c, char *errbuf);
#endif

#ifdef __cplusplus
}
#endif /* __cplusplus */

#endif /* CAPTURE_WPCAP_H */