diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-10 20:34:10 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-10 20:34:10 +0000 |
commit | e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc (patch) | |
tree | 68cb5ef9081156392f1dd62a00c6ccc1451b93df /wsutil/privileges.h | |
parent | Initial commit. (diff) | |
download | wireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.tar.xz wireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.zip |
Adding upstream version 4.2.2.upstream/4.2.2
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'wsutil/privileges.h')
-rw-r--r-- | wsutil/privileges.h | 66 |
1 files changed, 66 insertions, 0 deletions
diff --git a/wsutil/privileges.h b/wsutil/privileges.h new file mode 100644 index 00000000..c936228c --- /dev/null +++ b/wsutil/privileges.h @@ -0,0 +1,66 @@ +/** @file + * Declarations of routines for handling privileges. + * + * Wireshark - Network traffic analyzer + * By Gerald Combs <gerald@wireshark.org> + * Copyright 2006 Gerald Combs + * + * SPDX-License-Identifier: GPL-2.0-or-later + */ + +#ifndef __PRIVILEGES_H__ +#define __PRIVILEGES_H__ + +#include <wireshark.h> + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * Called when the program starts, to enable security features and save + * whatever credential information we'll need later. + */ +WS_DLL_PUBLIC void init_process_policies(void); + +/** + * Was this program started with special privileges? get_credential_info() + * MUST be called before calling this. + * @return true if the program was started with special privileges, + * false otherwise. + */ +WS_DLL_PUBLIC bool started_with_special_privs(void); + +/** + * Is this program running with special privileges? get_credential_info() + * MUST be called before calling this. + * @return true if the program is running with special privileges, + * false otherwise. + */ +WS_DLL_PUBLIC bool running_with_special_privs(void); + +/** + * Permanently relinquish special privileges. get_credential_info() + * MUST be called before calling this. + */ +WS_DLL_PUBLIC void relinquish_special_privs_perm(void); + +/** + * Get the current username. String must be g_free()d after use. + * @return A freshly g_alloc()ed string containing the username, + * or "UNKNOWN" on failure. + */ +WS_DLL_PUBLIC char *get_cur_username(void); + +/** + * Get the current group. String must be g_free()d after use. + * @return A freshly g_alloc()ed string containing the group, + * or "UNKNOWN" on failure. + */ +WS_DLL_PUBLIC char *get_cur_groupname(void); + +#ifdef __cplusplus +} +#endif /* __cplusplus */ + +#endif /* __PRIVILEGES_H__ */ |