Lines Matching full:capture

14 #include <zephyr/net/capture.h>
133 * - Start to capture data from cooked mode capture interface in init_app()
139 * net capture setup 192.0.2.2 2001:db8:200::1 2001:db8:200::2 in init_app()
140 * net capture enable 2 in init_app()
145 * The "net capture setup" creates a tunnel. The tunnel is IPv6 in init_app()
165 * Virtual name : Cooked mode capture in init_app()
181 * Virtual name : Capture tunnel in init_app()
194 * cooked capture packets are written by the capture API to sink interface 1. in init_app()
196 * The "net capture enable 2" command will cause the packets sent to interface 2 in init_app()
197 * to be written to capture interface 4, which in turn capsulates the packets and in init_app()
203 * If the cooked mode capture is enabled (CONFIG_NET_CAPTURE_COOKED_MODE=y), in init_app()
204 * then we setup the capture automatically to the correct network interface. in init_app()
209 * You can use "net-capture.py -i zeth-ip6ip -c" command to capture the cooked in init_app()
210 * packets in host side. The net-capture.py tool is found in net-tools package. in init_app()
221 LOG_ERR("Capture cannot be setup (%d)", ret); in init_app()
226 /* If we are running in cooked mode, start to capture the packets in init_app()
241 LOG_ERR("Cannot enable capture to interface %d (%d)", in init_app()
246 /* Setup the cooked interface to capture these types of packets */ in init_app()
265 /* Now the capture device and the tunnel interface is setup, in init_app()
266 * we just need to bring up the actual interface we want to capture in init_app()
275 LOG_INF("Type \"sample send\" to send dummy capture data to tunnel."); in init_app()
277 LOG_INF("Please enable capture manually from net-shell"); in init_app()
278 LOG_INF("Use \"net capture enable <ifindex>\" command to start " in init_app()
313 LOG_INF("Starting network capture sample"); in main()