4 * Copyright (c) 2000, 2001, Corinna Vinschen <vinschen@cygnus.com>
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
15 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
16 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
17 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
18 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
19 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
20 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
21 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
22 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
23 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
24 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26 * Created: Sat Sep 02 12:17:00 2000 cv
28 * This file contains functions for forcing opened file descriptors to
29 * binary mode on Windows systems.
40 #include <sys/utsname.h>
43 #define is_winnt (GetVersion() < 0x80000000)
45 #define ntsec_on(c) ((c) && strstr((c),"ntsec") && !strstr((c),"nontsec"))
46 #define ntsec_off(c) ((c) && strstr((c),"nontsec"))
47 #define ntea_on(c) ((c) && strstr((c),"ntea") && !strstr((c),"nontea"))
49 #if defined(open) && open == binary_open
52 #if defined(pipe) && open == binary_pipe
57 binary_open(const char *filename, int flags, ...)
63 mode = va_arg(ap, mode_t);
65 return (open(filename, flags | O_BINARY, mode));
69 binary_pipe(int fd[2])
74 setmode(fd[0], O_BINARY);
75 setmode(fd[1], O_BINARY);
80 #define HAS_CREATE_TOKEN 1
81 #define HAS_NTSEC_BY_DEFAULT 2
84 has_capability(int what)
87 static int has_create_token;
88 static int has_ntsec_by_default;
91 * has_capability() basically calls uname() and checks if
92 * specific capabilities of Cygwin can be evaluated from that.
93 * This simplifies the calling functions which only have to ask
94 * for a capability using has_capability() instead of having
95 * to figure that out by themselves.
102 int major_high = 0, major_low = 0, minor = 0;
103 int api_major_version = 0, api_minor_version = 0;
106 sscanf(uts.release, "%d.%d.%d", &major_high,
108 if ((c = strchr(uts.release, '(')) != NULL) {
109 sscanf(c + 1, "%d.%d", &api_major_version,
112 if (major_high > 1 ||
113 (major_high == 1 && (major_low > 3 ||
114 (major_low == 3 && minor >= 2))))
115 has_create_token = 1;
116 if (api_major_version > 0 || api_minor_version >= 56)
117 has_ntsec_by_default = 1;
122 case HAS_CREATE_TOKEN:
123 return (has_create_token);
124 case HAS_NTSEC_BY_DEFAULT:
125 return (has_ntsec_by_default);
131 check_nt_auth(int pwd_authenticated, struct passwd *pw)
134 * The only authentication which is able to change the user
135 * context on NT systems is the password authentication. So
136 * we deny all requsts for changing the user context if another
137 * authentication method is used.
139 * This doesn't apply to Cygwin versions >= 1.3.2 anymore which
140 * uses the undocumented NtCreateToken() call to create a user
141 * token if the process has the appropriate privileges and if
142 * CYGWIN ntsec setting is on.
144 static int has_create_token = -1;
149 if (has_create_token < 0) {
150 char *cygwin = getenv("CYGWIN");
152 has_create_token = 0;
153 if (has_capability(HAS_CREATE_TOKEN) &&
155 (has_capability(HAS_NTSEC_BY_DEFAULT) &&
156 !ntsec_off(cygwin))))
157 has_create_token = 1;
159 if (has_create_token < 1 &&
160 !pwd_authenticated && geteuid() != pw->pw_uid)
167 check_ntsec(const char *filename)
170 int allow_ntea = 0, allow_ntsec = 0;
171 struct statfs fsstat;
173 /* Windows 95/98/ME don't support file system security at all. */
177 /* Evaluate current CYGWIN settings. */
178 cygwin = getenv("CYGWIN");
179 allow_ntea = ntea_on(cygwin);
180 allow_ntsec = ntsec_on(cygwin) ||
181 (has_capability(HAS_NTSEC_BY_DEFAULT) && !ntsec_off(cygwin));
184 * `ntea' is an emulation of POSIX attributes. It doesn't support
185 * real file level security as ntsec on NTFS file systems does
186 * but it supports FAT filesystems. `ntea' is minimum requirement
187 * for security checks.
193 * Retrieve file system flags. In Cygwin, file system flags are
194 * copied to f_type which has no meaning in Win32 itself.
196 if (statfs(filename, &fsstat))
200 * Only file systems supporting ACLs are able to set permissions.
201 * `ntsec' is the setting in Cygwin which switches using of NTFS
202 * ACLs to support POSIX permissions on files.
204 if (fsstat.f_type & FS_PERSISTENT_ACLS)
205 return (allow_ntsec);
211 register_9x_service(void)
214 DWORD (*RegisterServiceProcess)(DWORD, DWORD);
216 /* The service register mechanism in 9x/Me is pretty different from
217 * NT/2K/XP. In NT/2K/XP we're using a special service starter
218 * application to register and control sshd as service. This method
219 * doesn't play nicely with 9x/Me. For that reason we register here
220 * as service when running under 9x/Me. This function is only called
221 * by the child sshd when it's going to daemonize.
225 if (!(kerneldll = LoadLibrary("KERNEL32.DLL")))
227 if (!(RegisterServiceProcess = (DWORD (*)(DWORD, DWORD))
228 GetProcAddress(kerneldll, "RegisterServiceProcess")))
230 RegisterServiceProcess(0, 1);
233 #endif /* HAVE_CYGWIN */