Commit graph

10 commits

Author SHA1 Message Date
Gerald Combs
e11ec68f93 Update some comments and whitespace.
svn path=/trunk/; revision=23509
2007-11-20 16:46:11 +00:00
Guy Harris
c21209b031 In relinquish_special_privs_perm(), only relinquish special privileges
if we were given them; doing so when we weren't seems to change the
apparent group set in OS X 10.5 (and possibly 10.4 - the group set
manipulated by getgroups()/setgroups() isn't the full group set, and
changing your UID might cause the credential identity resolver daemon
not to give you your full group set).

svn path=/trunk/; revision=23234
2007-10-20 03:45:47 +00:00
Gerald Combs
d2d4fcd903 Add routines under Windows to check if npf.sys is running, and to
fetch the major OS version.  If we're running Windows >= 6 (Vista)
_and_ npf.sys isn't running, warn the user in Wireshark and TShark.
Add a recent prefs item to disable the warning in Wireshark.

svn path=/trunk/; revision=22877
2007-09-15 00:18:17 +00:00
Ronnie Sahlberg
328142a89c on unix, we dont have size_t until we have imported all the other
includes    which breaks emem.h


svn path=/trunk/; revision=22790
2007-09-04 23:35:29 +00:00
Gerald Combs
92802883a6 Change the "--enable-setuid-install" option to install dumpcap and TShark
setuid instead of Wireshark.  Remove the "DANGEROUS" notices, but leave it
disabled by default.  Whine if the user runs Wireshark or TShark as root.
Add a preference to disable the whining.  Add a "setuid-root" script that
can be used to switch dumpcap and TShark's setuid-ness on and off for
development and testing.  Update the release notes and README.packaging.

svn path=/trunk/; revision=22733
2007-08-30 00:24:40 +00:00
Gerald Combs
8958bab6de Tethereal/tethereal -> TShark/tshark.
svn path=/trunk/; revision=18268
2006-05-31 17:38:42 +00:00
Anders Broman
996d4db495 Ethereal->Wireshark
svn path=/trunk/; revision=18234
2006-05-28 19:49:07 +00:00
Ronnie Sahlberg
89f022b12b name change
svn path=/trunk/; revision=18197
2006-05-21 05:12:17 +00:00
Guy Harris
c897da2ded Move the code to relinquish set-UID and set-GID privileges to a routine
in epan/privileges.c.

svn path=/trunk/; revision=17181
2006-02-06 10:27:27 +00:00
Guy Harris
4c4f18eb3f Add code to check whether the app was started with special privileges
(e.g., set-UID or set-GID), and don't load user plugs if it is.

svn path=/trunk/; revision=17174
2006-02-06 03:11:34 +00:00