Metadata-Version: 2.4
Name: pycanpcap
Version: 0.3
Summary: candump and write a pcap using scapy (and python-can)
Author-email: Ben Gardiner <ben.l.gardiner@gmail.com>
License: MIT License
Project-URL: Repository, https://github.com/BenGardiner/pycanpcap
Classifier: License :: OSI Approved :: MIT License
Classifier: Programming Language :: Python
Classifier: Programming Language :: Python :: 3.9
Requires-Python: >=3.9
Description-Content-Type: text/markdown
License-File: LICENSE
Requires-Dist: scapy>=2.4.5
Requires-Dist: python-can>=4.3.1
Dynamic: license-file

candump and write a pcap using scapy (and python-can)

NOTE: you probably don't need this tool. If you just want to use wireshark to open a candump log file you can do that directly inside wireshark in the newest versions. 

```cmd.exe
 > python -m pip install pycanpcap
 > python -m pycanpcap.log -i cantact -c 0 -w can.pcap
WARNING: No libpcap provider available ! pcap won't be used
WARNING: Wireshark is installed, but cannot read manuf !
(000.008538) PythonCANSocket_cantact_0 007#0000b5f8
(000.008700) PythonCANSocket_cantact_0 01b#0000b5f8
(000.008961) PythonCANSocket_cantact_0 055#01025afc328e5b3e
(000.009318) PythonCANSocket_cantact_0 00f#f80fb5f831
(000.018648) PythonCANSocket_cantact_0 007#0000b6f8
(000.018834) PythonCANSocket_cantact_0 01b#0000b6f8
(000.019378) PythonCANSocket_cantact_0 00f#f90fb6f85a
^C
```

1. ignore the warnings on windows
2. Ctrl-C when ready
3. open can.pcap in wireshark
4. grep the output as usual
