Lines Matching +defs:device +defs:mode
90 ADAPTER *adapter; /* the packet32 ADAPTER for the device */
92 int rfmon_selfstart; /* a flag tells whether the monitor mode is set by itself */
106 * Define stub versions of the monitor-mode support routines if this
115 * We don't support monitor mode.
121 PacketSetMonitorMode(PCHAR AdapterName _U_, int mode _U_)
125 * will return 0, meaning "we don't support monitor mode, so
137 * mode.
162 * attempts to set promiscuous mode on regular Ethernet devices were
353 /* Set the driver working mode */
355 pcap_setmode_npf(pcap_t *p, int mode)
359 if(PacketSetMode(pw->adapter,mode)==FALSE)
361 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "driver error: working mode not recognized");
491 * Kernel dump mode isn't supported in Npcap; calls to PacketSetDumpName(),
496 * mode isn't supported in Npcap.
503 "Npcap doesn't support kernel dump mode");
510 "Npcap doesn't support kernel dump mode");
520 /* Set the packet driver in dump mode */
524 "Error setting dump mode");
612 * Did the device go away?
621 * The device on which we're capturing
639 * reported when the device *wasn't*
642 * removed, or it's a device that doesn't
643 * correspond to a physical device.
1012 PacketSetMonitorMode(p->opt.device, 0);
1039 * Monitor mode is supported on Windows Vista and later.
1041 if (PacketGetMonitorMode(p->opt.device) == 1)
1047 if ((res = PacketSetMonitorMode(p->opt.device, 1)) != 1)
1050 // Monitor mode is not supported.
1070 pw->adapter = PacketOpenAdapter(p->opt.device);
1083 * There's no such device.
1099 "The helper program for \"Admin-only Mode\" must be allowed to make changes to your device");
1110 PacketSetMonitorMode(p->opt.device, 0);
1256 GetLastError(), "Cannot set the time stamp mode to TIMESTAMPMODE_SINGLE_SYNCHRONIZATION");
1268 GetLastError(), "Cannot set the time stamp mode to TIMESTAMPMODE_QUERYSYSTEMTIME");
1280 GetLastError(), "Cannot set the time stamp mode to TIMESTAMPMODE_QUERYSYSTEMTIME_PRECISE");
1306 /* Set promiscuous mode */
1311 * whether an adapter supports promiscuous mode, that
1329 * If we knew that this meant "promiscuous mode
1331 * mode isn't supported" error code and return
1342 * support promiscuous mode, at least
1344 * attempts to set promiscuous mode
1348 * *shark) default to promiscuous mode.
1351 * mode not supported" *warning* value, so that
1371 "failed to set hardware filter to promiscuous mode");
1402 "failed to set hardware filter to non-promiscuous mode");
1476 strstr(_strlwr(p->opt.device), "dag"));
1518 * Therefore, when we open the device, we install
1607 * Check if rfmon mode is supported on the pcap_t for Windows systems.
1612 return (PacketIsMonitorModeSupported(p->opt.device) == 1);
1620 get_ts_types(const char *device, pcap_t *p, char *ebuf)
1644 device_copy = strdup(device);
1656 * If we can't open the device now, we won't be
1660 * that the device doesn't exist, or that they
1661 * don't have permission to open the device - or
1665 * to activate the device; just return an empty
1675 * fails with a "no such device" error, checks
1885 get_ts_types(const char *device _U_, pcap_t *p _U_, char *ebuf _U_)
1895 pcapint_create_interface(const char *device _U_, char *ebuf)
1906 if (get_ts_types(device, p, ebuf) == -1) {
2012 * mode.
2017 * Restore the timeout set when the device was opened.
2019 * really leaving non-blocking mode. However, although
2148 * Give up; if they try to open this device, it'll fail.
2165 * An airpcap device is a wireless device (duh!)
2445 * Is this an AirPcap device?
2502 * full list of devices after the first device.
2512 * We disable this in "new API" mode, because 1) in WinPcap/Npcap,
2579 * Convert the device names to Unicode into AdapterName.
2658 * particular device, and use its first IPv4 address, as that's too
2659 * much work to get just one device's netmask.
2662 pcap_lookupnet(const char *device, bpf_u_int32 *netp, bpf_u_int32 *maskp,
2674 if (!PacketGetNetInfoEx((void *)device, if_addrs, &if_addr_size)) {