set(CPACK_SOURCE_PACKAGE_FILE_NAME "${CPACK_PACKAGE_NAME}-${CPACK_PACKAGE_VERSION}")
set(CPACK_PACKAGE_INSTALL_DIRECTORY "/usr")
-# Win: NSIS, ZIP, SORUCE_ZIP, CYGWIN_BINARY, SOURCE_CYGWIN,
+# Win: NSIS, ZIP, SOURCE_ZIP, CYGWIN_BINARY, SOURCE_CYGWIN,
# Linux/Unix: DEB, RPM, STGZ, TBZ2, TZ, SOURCE_TZ, SOURCE_TGZ
# OSX: PACKAGEMAKER, OSXX11
# Syntax: "Type1;Type2;Type3"
uncompressed)
Microsoft Network Monitor
AIX's iptrace
-Cinco Networks NetXRray
+Cinco Networks NetXray
Network Associates Windows-based Sniffer
AG Group/WildPackets EtherPeek/TokenPeek/AiroPeek/EtherHelp
RADCOM's WAN/LAN Analyzer
HP-UX's nettl
Toshiba's ISDN routers
ISDN4BSD "i4btrace" utility
-Cisco Secure Intrustion Detection System iplogging facility
+Cisco Secure Intrusion Detection System iplogging facility
pppd logs (pppdump-format files)
VMS's TCPIPtrace utility
DBS Etherwatch for VMS
Description:
============
-DECT pcap files can be obtained by using tools coming with the linux
+DECT pcap files can be obtained by using tools included with the linux
kernel driver for the Dosch-and-Amand COM-ON-AIR cards. The driver is
called com-on-air_cs.
-Wireshark itself cannot directy record from the DECT HW, as the driver
+Wireshark cannot directly record from the DECT HW, as the driver
currently lacks a virtual network interface.
There is ongoing work to change this (see this work by Patrick McHardy):
file with content such as
[localrules=10]
- add path 'bpf*' {mode and permissons}
+ add path 'bpf*' {mode and permissions}
where "mode and permissions" can include clauses such as
Introductory/tutorial presentation
http://ait.web.psi.ch/services/linux/hpc/hpc_user_cookbook/tools/cmake/docs/Cmake_VM_2007.pdf
-Introductory arcticle in Linux Journal
+Introductory article in Linux Journal
http://www.linuxjournal.com/node/6700/print
Useful variables
An additional note, from Jost Martin, for HP-UX 10.20:
- Q: How do I get ethereral on HPUX to capture the _outgoing_ packets
+ Q: How do I get wireshark on HPUX to capture the _outgoing_ packets
of an interface
A: You need to get PHNE_20892,PHNE_20725 and PHCO_10947 (or
newer, this is as of 4.4.00) and its dependencies. Then you can
- enable the feature as descibed below:
+ enable the feature as described below:
Patch Name: PHNE_20892
Patch Description: s700 10.20 PCI 100Base-T cumulative patch
{
AIRPCAP_VT_ACCEPT_EVERYTHING = 1, ///< Accept all the frames the device captures
AIRPCAP_VT_ACCEPT_CORRECT_FRAMES = 2, ///< Accept correct frames only, i.e. frames with correct Frame Check Sequence (FCS).
- AIRPCAP_VT_ACCEPT_CORRUPT_FRAMES = 3, ///< Accept corrupt frames only, i.e. frames with worng Frame Check Sequence (FCS).
+ AIRPCAP_VT_ACCEPT_CORRUPT_FRAMES = 3, ///< Accept corrupt frames only, i.e. frames with wrong Frame Check Sequence (FCS).
AIRPCAP_VT_UNKNOWN = 4 ///< Unknown validation type. You should see it only in case of error.
}AirpcapValidationType, *PAirpcapValidationType;
/*!
\brief Packet header.
- This structure defines the BPF that preceeds every packet delivered to the application.
+ This structure defines the BPF that precedes every packet delivered to the application.
*/
typedef struct _AirpcapBpfHeader
{
The main reason to turn monitor mode off is that, when not in monitor mode, the adapter will acknowledge the
data frames sent to its address. This is useful when the adapter needs to interact with other devices on the
- 802.11 network, bacause handling the ACKs in software is too slow.
+ 802.11 network, because handling the ACKs in software is too slow.
\note When an adapter is plugged into the system, it's always configured with monitor mode ON. The monitor mode
configuration is not stored persistently, so if you want to turn monitor mode off, you will need to do it
the developer's pack can be used as a reference on how to decode 802.11 frames with radiotap headers.
- \ref AIRPCAP_LT_802_11_PLUS_PPI, to capture 802.11 frames (including control frames) with a Per Packet Information (PPI)
header that contains per-packet meta information like channel and power information. More details on the PPI header can
- be founf in the PPI online documentation (TODO).
+ be found in the PPI online documentation (TODO).
*/
gboolean AirpcapSetLinkType(PAirpcapHandle AdapterHandle, AirpcapLinkType NewLinkType);
\param PIsFcsPresent User-provided variable that will be set to true if the adapter is including the FCS.
\return TRUE if the operation is successful. FALSE otherwise.
- In the default configuration, the adatper has FCS inclusion turned on. The MAC Frame Check Sequence is 4 bytes
+ In the default configuration, the adapter has FCS inclusion turned on. The MAC Frame Check Sequence is 4 bytes
and is located at the end of the 802.11 packet, with both AIRPCAP_LT_802_11 and AIRPCAP_LT_802_11_PLUS_RADIO
link types.
When the FCS inclusion is turned on, and if the link type is AIRPCAP_LT_802_11_PLUS_RADIO, the radiotap header
\brief Checks if the specified adapter is configured to capture frames with incorrect an incorrect Frame Check Sequence (FCS).
\param AdapterHandle Handle to the adapter.
\param ValidationType Pointer to a user supplied variable that will contain the type of validation the driver will perform. See the documentation of \ref AirpcapValidationType for details.
- \return TRUE if the operation is succesful. FALSE otherwise.
+ \return TRUE if the operation is successful. FALSE otherwise.
\note By default, the driver is configured in \ref AIRPCAP_VT_ACCEPT_EVERYTHING mode.
*/
\param KeysCollection User-allocated PAirpcapKeysCollection structure that will be filled with the keys.
\param PKeysCollectionSize \b IN: pointer to a user-allocated variable that contains the length of the KeysCollection structure, in bytes.
\b OUT: amount of data moved by the driver in the buffer pointed by KeysBuffer, in bytes.
- \return TRUE if the operation is succesful. If an error occurs, the return value is FALSE and KeysCollectionSize is zero.
+ \return TRUE if the operation is successful. If an error occurs, the return value is FALSE and KeysCollectionSize is zero.
If the provided buffer is too small to contain the keys, the return value is FALSE and KeysCollectionSize contains the
needed KeysCollection length, in bytes. If the device doesn't have any decryption key configured, the return value is TRUE, and
KeysCollectionSize will be zero.
\param KeysCollection User-allocated PAirpcapKeysCollection structure that will be filled with the keys.
\param PKeysCollectionSize \b IN: pointer to a user-allocated variable that contains the length of the KeysCollection structure, in bytes.
\b OUT: amount of data moved by the driver in the buffer pointed by KeysBuffer, in bytes.
- \return TRUE if the operation is succesful. If an error occurs, the return value is FALSE and KeysCollectionSize is zero.
+ \return TRUE if the operation is successful. If an error occurs, the return value is FALSE and KeysCollectionSize is zero.
If the provided buffer is too small to contain the keys, the return value is FALSE and KeysCollectionSize contains the
needed KeysCollection length, in bytes. If the device doesn't have any decryption key configured, the return value is TRUE, and
KeysCollectionSize will be zero.
\brief Tells if this open instance is configured to perform the decryption of the incoming frames with the <b>adapter-specific</b> keys.
\param AdapterHandle Handle to the adapter.
\param PEnable Pointer to a user supplied variable that will contain the decryption configuration. See \ref PAirpcapDecryptionState for details.
- \return TRUE if the operation is succesful. FALSE otherwise.
+ \return TRUE if the operation is successful. FALSE otherwise.
The adapter-specific decryption keys can be configured with the \ref AirpcapSetDeviceKeys() function.
\note By default, the driver is configured with \ref AIRPCAP_DECRYPTION_ON.
application is busy, at the cost of higher kernel memory usage.
\note don't use this function unless you know what you are doing. Due to caching issues and bigger non-paged
- memory consumption, bigger buffer sizes can decrease the capture performace instead of improving it.
+ memory consumption, bigger buffer sizes can decrease the capture performance instead of improving it.
*/
gboolean AirpcapSetKernelBuffer(PAirpcapHandle AdapterHandle, guint BufferSize);
\return TRUE on success.
The AirPcap driver is able to perform kernel-level filtering using the standard BPF pseudo-machine format. You can read
- the WinPcap documentation at http://www.winpcap.org/devel.htm for more details on the BPF filtering mechaism.
+ the WinPcap documentation at http://www.winpcap.org/devel.htm for more details on the BPF filtering mechanism.
A filter can be automatically created by using the pcap_compile() function of the WinPcap API. This function
converts a human readable text expression with the tcpdump/libpcap syntax into a BPF program.
</avp>
- <!--Cisco-Charging-Rule-Defination-->
+ <!--Cisco-Charging-Rule-Definition-->
<avp name="Cisco-Charging-Rule-Definition" code="131072" vendor-id="Cisco" mandatory="must" may-encrypt="yes" protected="mustnot" vendor-bit="must">
<grouped>
<avp name="Billing-Plan-Install" code="131187" vendor-id="Cisco" mandatory="must" protected="mustnot" may-encrypt="yes" vendor-bit="must">
<grouped>
- <gavp name="Billing-Plan-Defination"/>
+ <gavp name="Billing-Plan-Definition"/>
</grouped>
<gavp name="CC-Time"/>
<gavp name="CC-Money"/>
<gavp name="CC-Total-Octets"/>
- <gavp name="CC-Imput-Octets"/>
+ <gavp name="CC-Input-Octets"/>
<gavp name="CC-output-Octets"/>
<gavp name="CC-Service-Specific-Units"/>
</grouped>
<gavp name="CC-Time"/>
<gavp name="CC-Money"/>
<gavp name="CC-Total-Octets"/>
- <gavp name="CC-Imput-Octets"/>
+ <gavp name="CC-Input-Octets"/>
<gavp name="CC-output-Octets"/>
<gavp name="CC-Service-Specific-Units"/>
</grouped>
<gavp name="CC-Time"/>
<gavp name="CC-Money"/>
<gavp name="CC-Total-Octets"/>
- <gavp name="CC-Imput-Octets"/>
+ <gavp name="CC-Input-Octets"/>
<gavp name="CC-output-Octets"/>
<gavp name="CC-Service-Specific-Units"/>
</grouped>
-->
<!-- *********************** Commands ***************************** -->
<!-- Diameter Base Protocol Command Codes -->
- <!-- 0-255 RADIUS compatability codes [http://www.iana.org/assignments/radius-types] -->
+ <!-- 0-255 RADIUS compatibility codes [http://www.iana.org/assignments/radius-types] -->
<!--256 Unassigned -->
<command name="Capabilities-Exchange" code="257" vendor-id="None"/>
<command name="Re-Auth" code="258" vendor-id="None"/>
<type type-name="OctetString"/>
</avp>
-<!-- AVP:s 411 - 461 Belongs to Carge Control and is defined in chargecontrol.xml
+<!-- AVP:s 411 - 461 Belongs to Charge Control and is defined in chargecontrol.xml
411 CC-Correlation-Id [RFC4006]
412 CC-Input-Octets [RFC4006]
413 CC-Money [RFC4006]
<enum name="Private identity not requested" code="1"/>
</avp>
<avp name="GBA-Push-Info" code="417" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="NAF-SA-Identifier" code="418" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="Security-Feature-Request" code="419" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="Security-Feature-Response" code="420" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<!-- Note: The AVP codes from 421 to 499 are reserved for TS 29.109
<avp name="Reserved for TS 29.109" code="421" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="Reserved for TS 29.109" code="422" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="Reserved for TS 29.109" code="423" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="Reserved for TS 29.109" code="424" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="Reserved for TS 29.109" code="425" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="Reserved for TS 29.109" code="426" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="Reserved for TS 29.109" code="427" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="Reserved for TS 29.109" code="428" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="Reserved for TS 29.109" code="429" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="Reserved for TS 29.109" code="430" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="Reserved for TS 29.109" code="431" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="Reserved for TS 29.109" code="432" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="Reserved for TS 29.109" code="433" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="Reserved for TS 29.109" code="434" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="Reserved for TS 29.109" code="435" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="Reserved for TS 29.109" code="436" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="Reserved for TS 29.109" code="437" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="Reserved for TS 29.109" code="438" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="Reserved for TS 29.109" code="439" vendor-bit="must" may-encrypt="no" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
29.109 [7]
Note: The AVP codes from 421 to 499 are reserved for TS 29.109
<enum name="Other" code="6"/>
</avp>
<avp name="TMGI" code="900" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="must" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="Required-MBMS-Bearer-Capabilities" code="901" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="must" vendor-id="TGPP">
<type type-name="UTF8String"/>
<enum name="UPDATE" code="2"/>
</avp>
<avp name="MBMS-Service-Area" code="903" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="must" vendor-id="TGPP">
- <type type-name="OctectString"/>
+ <type type-name="OctetString"/>
</avp>
<avp name="MBMS-Session-Duration" code="904" mandatory="must" may-encrypt="no" protected="mustnot" vendor-bit="must" vendor-id="TGPP">
<type type-name="Unsigned32"/>
<avp name="QoS-Information" code="1016" mandatory="must" may-encrypt="yes" protected="may" vendor-bit="must" vendor-id="TGPP">
<grouped>
<gavp name="QoS-Class-Identifier"/>
- <gavp name="Max-Requested-Bandwdith-DL"/>
- <gavp name="Max-Requested-Bandwdith-UL"/>
+ <gavp name="Max-Requested-Bandwidth-DL"/>
+ <gavp name="Max-Requested-Bandwidth-UL"/>
<gavp name="Guaranteed-Bitrate-UL"/>
<gavp name="Guaranteed-Bitrate-DL"/>
<gavp name="Bearer-Identifier"/>
<enum name="INVITE_INTO_CONF" code="2"/>
<enum name="QUIT_CONF" code="3"/>
</avp>
- <avp name="PDN-Conncetion-ID" code="2050" vendor-bit="must" vendor-id="TGPP">
+ <avp name="PDN-Connection-ID" code="2050" vendor-bit="must" vendor-id="TGPP">
<type type-name="Unsigned32"/>
</avp>
<avp name="Dynamic-Address-Flag" code="2051" vendor-bit="must" vendor-id="TGPP">
<application id="16777231" name="Diameter e2e4 Application" uri="http://pda.etsi.org">
- <!-- ETSI ES 283 026 V1.6.0 (2008-02) Specifies some eperimental resultcodes with vendor id ETSI
+ <!-- ETSI ES 283 026 V1.6.0 (2008-02) Specifies some experimental resultcodes with vendor id ETSI
6.3.2 Experimental-Result-Code AVP values defined in the present
document
This clause defines the specific values of the Experimental-Result-Code AVP (vendor-id is ETSI):
local tap = Listener.new();
function remove()
- -- this way we remove the listener than otherwise will remain running indifinitelly
+ -- this way we remove the listener than otherwise will remain running indefinitely
tap:remove();
end
<listitem><para>
Windows 95, 98 and ME are no longer supported. The "old technology"
releases of Windows lack memory protection (specifically <ulink
- url="http://msdn.microsoft.com/en-us/library/aa366898.aspx">VirutalProtect</ulink>)
+ url="http://msdn.microsoft.com/en-us/library/aa366898.aspx">VirtualProtect</ulink>)
which we use to improve program safety and security. The last known
version to work was Ethereal 0.10.14 (which includes WinPcap 3.1). You
can get it from <ulink url="http://ethereal.com/download.html" />.