Instead of failing if we can't find a netmask for the interface on which
authorguy <guy@f5534014-38df-0310-8fa8-9805f1628bb7>
Wed, 1 Nov 2000 07:38:54 +0000 (07:38 +0000)
committerguy <guy@f5534014-38df-0310-8fa8-9805f1628bb7>
Wed, 1 Nov 2000 07:38:54 +0000 (07:38 +0000)
commit56a24a8c8aae29d750582f515b28a485039d6db3
tree0dad65681f6a35aad832fbb12ce7ab141f64c492
parent43b7efd19f3d277d561437ded3e418728e6a08bd
Instead of failing if we can't find a netmask for the interface on which
we're capturing, just use a netmask of 0, and warn the user in Tethereal
(doing it in Ethereal would be more disruptive, and doing so only once
per interface in a session is a bit of work, as, in an "Update list of
packets in real time" capture the child process would have to tell the
parent that it couldn't get the netmask).

git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@2546 f5534014-38df-0310-8fa8-9805f1628bb7
capture.c
tethereal.c