pcapparse

Extracts payloads from Ethernet-encapsulated IP packets. Use GstPcapParse:src-ip, GstPcapParse:dst-ip, GstPcapParse:src-port and GstPcapParse:dst-port to restrict which packets should be included.

The supported data format is the classical libpcap file format

Example pipelines

 gst-launch-1.0 filesrc location=h264crasher.pcap ! pcapparse ! rtph264depay
 ! ffdec_h264 ! fakesink

Read from a pcap dump file using filesrc, extract the raw UDP packets, depayload and decode them.

Hierarchy

GObject
    ╰──GInitiallyUnowned
        ╰──GstObject
            ╰──GstElement
                ╰──pcapparse

Factory details

Authors: – Ole André Vadla Ravnås

Classification:Raw/Parser

Rank – none

Plugin – pcapparse

Package – GStreamer Bad Plug-ins

Pad Templates

sink

raw/x-pcap:

Presencealways

Directionsink

Object typeGstPad


src

ANY

Presencealways

Directionsrc

Object typeGstPad


Properties

caps

“caps” GstCaps *

The caps of the source pad

Flags : Read / Write


dst-ip

“dst-ip” gchararray

Destination IP to restrict to

Flags : Read / Write


dst-port

“dst-port” gint

Destination port to restrict to

Flags : Read / Write

Default value : -1


src-ip

“src-ip” gchararray

Source IP to restrict to

Flags : Read / Write


src-port

“src-port” gint

Source port to restrict to

Flags : Read / Write

Default value : -1


ts-offset

“ts-offset” gint64

Relative timestamp offset (ns) to apply (-1 = use absolute packet time)

Flags : Read / Write

Default value : 18446744073709551615


The results of the search are