summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorKelvin Zhang <zhangxp1998@gmail.com>2020-01-14 19:38:22 +0000
committerKelvin Zhang <zhangxp1998@gmail.com>2020-01-14 19:38:22 +0000
commita16d1e4fea64b61e2b477bab08bd5d136f2ec0d8 (patch)
tree5b19ebd2ccc3fe5ce63b2b1a57ce501eefc95bfe
parent5038987b2f58dd2afbb8f028e768cb20b3b33c03 (diff)
Address code review commnets
-rw-r--r--src/network/sniffer.rs2
-rw-r--r--src/tests/fakes/fake_input.rs2
2 files changed, 2 insertions, 2 deletions
diff --git a/src/network/sniffer.rs b/src/network/sniffer.rs
index b7dcd54..4426438 100644
--- a/src/network/sniffer.rs
+++ b/src/network/sniffer.rs
@@ -95,7 +95,7 @@ impl Sniffer {
pub fn next(&mut self) -> Option<Segment> {
let bytes = self.network_frames.next().ok()?;
// See https://github.com/libpnet/libpnet/blob/master/examples/packetdump.rs
- let payload_offset = if self.network_interface.is_loopback() {
+ let payload_offset = if self.network_interface.is_loopback() && cfg!(target_os = "macos") {
// The pnet code for BPF loopback adds a zero'd out Ethernet header
14
} else {
diff --git a/src/tests/fakes/fake_input.rs b/src/tests/fakes/fake_input.rs
index a06b617..3290ac2 100644
--- a/src/tests/fakes/fake_input.rs
+++ b/src/tests/fakes/fake_input.rs
@@ -151,7 +151,7 @@ pub fn get_interfaces() -> Vec<NetworkInterface> {
index: 42,
mac: None,
ips: vec![IpNetwork::V4("10.0.0.2".parse().unwrap())],
- // It's important that the IFF_LOOBACK bit is set to 0.
+ // It's important that the IFF_LOOPBACK bit is set to 0.
// Otherwise sniffer will attempt to start parse packets
// at offset 14
flags: 0,