%FILENAME%
tpcat-latest-3-any.pkg.tar.xz

%NAME%
tpcat

%VERSION%
latest-3

%DESC%
TPCAT is based upon pcapdiff by the EFF. TPCAT will analyze two packet captures (taken on each side of the firewall as an example) and report any packets that were seen on the source capture but didn’t make it to the dest.

%GROUPS%
archstrike
archstrike-misc

%CSIZE%
137340

%ISIZE%
443392

%MD5SUM%
9f30940193995ff8e4fc726bcbec9184

%SHA256SUM%
6726503c09b01b6c41b427e15a1f9ea01d6f78859bacb47b6e03c612b97fe3da

%PGPSIG%
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

%URL%
http://sourceforge.net/projects/tpcat/

%LICENSE%
GPL

%ARCH%
any

%BUILDDATE%
1490378892

%PACKAGER%
Mike Henze <cthulu201@archstrike.org>

%DEPENDS%
python2
wxpython
python2-pcapy

