]>
Commit | Line | Data |
---|---|---|
3c62e7eb | 1 | /* |
2 | * | |
3 | * cygwin_util.c | |
4 | * | |
5 | * Author: Corinna Vinschen <vinschen@cygnus.com> | |
6 | * | |
7 | * Copyright (c) 2000 Corinna Vinschen <vinschen@cygnus.com>, Duisburg, Germany | |
8 | * All rights reserved | |
9 | * | |
10 | * Created: Sat Sep 02 12:17:00 2000 cv | |
11 | * | |
12 | * This file contains functions for forcing opened file descriptors to | |
13 | * binary mode on Windows systems. | |
14 | */ | |
15 | ||
0b202697 | 16 | #include "includes.h" |
17 | ||
18 | RCSID("$Id$"); | |
3c62e7eb | 19 | |
20 | #ifdef HAVE_CYGWIN | |
2f125ca1 | 21 | |
3c62e7eb | 22 | #include <fcntl.h> |
23 | #include <io.h> | |
9cd45ea4 | 24 | #include <stdlib.h> |
25 | #include <sys/vfs.h> | |
26 | #include <windows.h> | |
27 | #define is_winnt (GetVersion() < 0x80000000) | |
3c62e7eb | 28 | |
58e7f038 | 29 | #if defined(open) && open == binary_open |
30 | # undef open | |
31 | #endif | |
32 | #if defined(pipe) && open == binary_pipe | |
33 | # undef pipe | |
34 | #endif | |
35 | ||
36 | int binary_open(const char *filename, int flags, ...) | |
3c62e7eb | 37 | { |
58e7f038 | 38 | va_list ap; |
39 | mode_t mode; | |
40 | ||
41 | va_start(ap, flags); | |
42 | mode = va_arg(ap, mode_t); | |
43 | va_end(ap); | |
2f125ca1 | 44 | return open(filename, flags | O_BINARY, mode); |
3c62e7eb | 45 | } |
46 | ||
47 | int binary_pipe(int fd[2]) | |
48 | { | |
2f125ca1 | 49 | int ret = pipe(fd); |
50 | ||
51 | if (!ret) { | |
52 | setmode (fd[0], O_BINARY); | |
53 | setmode (fd[1], O_BINARY); | |
54 | } | |
55 | return ret; | |
9cd45ea4 | 56 | } |
57 | ||
2f125ca1 | 58 | int check_nt_auth(int pwd_authenticated, uid_t uid) |
9cd45ea4 | 59 | { |
60 | /* | |
2f125ca1 | 61 | * The only authentication which is able to change the user |
62 | * context on NT systems is the password authentication. So | |
63 | * we deny all requsts for changing the user context if another | |
64 | * authentication method is used. | |
65 | * This may change in future when a special openssh | |
66 | * subauthentication package is available. | |
67 | */ | |
9cd45ea4 | 68 | if (is_winnt && !pwd_authenticated && geteuid() != uid) |
69 | return 0; | |
2f125ca1 | 70 | |
9cd45ea4 | 71 | return 1; |
72 | } | |
73 | ||
2f125ca1 | 74 | int check_ntsec(const char *filename) |
9cd45ea4 | 75 | { |
76 | char *cygwin; | |
77 | int allow_ntea = 0; | |
78 | int allow_ntsec = 0; | |
79 | struct statfs fsstat; | |
80 | ||
81 | /* Windows 95/98/ME don't support file system security at all. */ | |
82 | if (!is_winnt) | |
83 | return 0; | |
84 | ||
85 | /* Evaluate current CYGWIN settings. */ | |
86 | if ((cygwin = getenv("CYGWIN")) != NULL) { | |
87 | if (strstr(cygwin, "ntea") && !strstr(cygwin, "nontea")) | |
88 | allow_ntea = 1; | |
89 | if (strstr(cygwin, "ntsec") && !strstr(cygwin, "nontsec")) | |
90 | allow_ntsec = 1; | |
91 | } | |
92 | ||
93 | /* | |
94 | * `ntea' is an emulation of POSIX attributes. It doesn't support | |
95 | * real file level security as ntsec on NTFS file systems does | |
96 | * but it supports FAT filesystems. `ntea' is minimum requirement | |
97 | * for security checks. | |
98 | */ | |
99 | if (allow_ntea) | |
100 | return 1; | |
101 | ||
102 | /* | |
103 | * Retrieve file system flags. In Cygwin, file system flags are | |
104 | * copied to f_type which has no meaning in Win32 itself. | |
105 | */ | |
106 | if (statfs(filename, &fsstat)) | |
107 | return 1; | |
108 | ||
109 | /* | |
110 | * Only file systems supporting ACLs are able to set permissions. | |
111 | * `ntsec' is the setting in Cygwin which switches using of NTFS | |
112 | * ACLs to support POSIX permissions on files. | |
113 | */ | |
114 | if (fsstat.f_type & FS_PERSISTENT_ACLS) | |
115 | return allow_ntsec; | |
116 | ||
117 | return 0; | |
3c62e7eb | 118 | } |
2f125ca1 | 119 | |
120 | #endif /* HAVE_CYGWIN */ |