mirror of
git://anongit.mindrot.org/openssh.git
synced 2024-12-22 01:50:16 +00:00
cff94beb65
Patch by Corinna Vinschen <vinschen@redhat.com>
143 lines
3.4 KiB
C
143 lines
3.4 KiB
C
/*
|
|
*
|
|
* cygwin_util.c
|
|
*
|
|
* Author: Corinna Vinschen <vinschen@cygnus.com>
|
|
*
|
|
* Copyright (c) 2000 Corinna Vinschen <vinschen@cygnus.com>, Duisburg, Germany
|
|
* All rights reserved
|
|
*
|
|
* Created: Sat Sep 02 12:17:00 2000 cv
|
|
*
|
|
* This file contains functions for forcing opened file descriptors to
|
|
* binary mode on Windows systems.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
|
|
RCSID("$Id: bsd-cygwin_util.c,v 1.5 2001/07/18 16:19:49 mouring Exp $");
|
|
|
|
#ifdef HAVE_CYGWIN
|
|
|
|
#include <fcntl.h>
|
|
#include <stdlib.h>
|
|
#include <sys/utsname.h>
|
|
#include <sys/vfs.h>
|
|
#include <windows.h>
|
|
#define is_winnt (GetVersion() < 0x80000000)
|
|
|
|
#define ntsec_on(c) ((c) && strstr((c),"ntsec") && !strstr((c),"nontsec"))
|
|
#define ntea_on(c) ((c) && strstr((c),"ntea") && !strstr((c),"nontea"))
|
|
|
|
#if defined(open) && open == binary_open
|
|
# undef open
|
|
#endif
|
|
#if defined(pipe) && open == binary_pipe
|
|
# undef pipe
|
|
#endif
|
|
|
|
int binary_open(const char *filename, int flags, ...)
|
|
{
|
|
va_list ap;
|
|
mode_t mode;
|
|
|
|
va_start(ap, flags);
|
|
mode = va_arg(ap, mode_t);
|
|
va_end(ap);
|
|
return open(filename, flags | O_BINARY, mode);
|
|
}
|
|
|
|
int binary_pipe(int fd[2])
|
|
{
|
|
int ret = pipe(fd);
|
|
|
|
if (!ret) {
|
|
setmode (fd[0], O_BINARY);
|
|
setmode (fd[1], O_BINARY);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
int check_nt_auth(int pwd_authenticated, uid_t uid)
|
|
{
|
|
/*
|
|
* The only authentication which is able to change the user
|
|
* context on NT systems is the password authentication. So
|
|
* we deny all requsts for changing the user context if another
|
|
* authentication method is used.
|
|
*
|
|
* This doesn't apply to Cygwin versions >= 1.3.2 anymore which
|
|
* uses the undocumented NtCreateToken() call to create a user
|
|
* token if the process has the appropriate privileges and if
|
|
* CYGWIN ntsec setting is on.
|
|
*/
|
|
static int has_create_token = -1;
|
|
|
|
if (is_winnt) {
|
|
if (has_create_token < 0) {
|
|
struct utsname uts;
|
|
int major_high = 0, major_low = 0, minor = 0;
|
|
char *cygwin = getenv("CYGWIN");
|
|
|
|
has_create_token = 0;
|
|
if (ntsec_on(cygwin) && !uname(&uts)) {
|
|
sscanf(uts.release, "%d.%d.%d",
|
|
&major_high, &major_low, &minor);
|
|
if (major_high > 1 ||
|
|
(major_high == 1 && (major_low > 3 ||
|
|
(major_low == 3 && minor >= 2))))
|
|
has_create_token = 1;
|
|
}
|
|
}
|
|
if (has_create_token < 1 &&
|
|
!pwd_authenticated && geteuid() != uid)
|
|
return 0;
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
int check_ntsec(const char *filename)
|
|
{
|
|
char *cygwin;
|
|
int allow_ntea = 0;
|
|
int allow_ntsec = 0;
|
|
struct statfs fsstat;
|
|
|
|
/* Windows 95/98/ME don't support file system security at all. */
|
|
if (!is_winnt)
|
|
return 0;
|
|
|
|
/* Evaluate current CYGWIN settings. */
|
|
cygwin = getenv("CYGWIN");
|
|
allow_ntea = ntea_on(cygwin);
|
|
allow_ntsec = ntsec_on(cygwin);
|
|
|
|
/*
|
|
* `ntea' is an emulation of POSIX attributes. It doesn't support
|
|
* real file level security as ntsec on NTFS file systems does
|
|
* but it supports FAT filesystems. `ntea' is minimum requirement
|
|
* for security checks.
|
|
*/
|
|
if (allow_ntea)
|
|
return 1;
|
|
|
|
/*
|
|
* Retrieve file system flags. In Cygwin, file system flags are
|
|
* copied to f_type which has no meaning in Win32 itself.
|
|
*/
|
|
if (statfs(filename, &fsstat))
|
|
return 1;
|
|
|
|
/*
|
|
* Only file systems supporting ACLs are able to set permissions.
|
|
* `ntsec' is the setting in Cygwin which switches using of NTFS
|
|
* ACLs to support POSIX permissions on files.
|
|
*/
|
|
if (fsstat.f_type & FS_PERSISTENT_ACLS)
|
|
return allow_ntsec;
|
|
|
|
return 0;
|
|
}
|
|
|
|
#endif /* HAVE_CYGWIN */
|