* sec_helper.cc (cygsid::getfrompw): Change parameter to `const'.
(cygsid::getfromgr): Ditto. * security.cc: Use `sys_mbstowcs' and `sys_wcstombs' throughout. (extract_nt_dom_user): Try to get user and domain from SID in pw->pw_gecos first. * security.h (class cygsid): Change parameter of getfrompw() and getfromgr() to `const'. * uinfo.cc (internal_getlogin): Change order for evaluating user information in winNT case. Drop usage of NetWkstaUserGetInfo().
This commit is contained in:
parent
98ae4ae7d5
commit
b2939a814c
@ -1,4 +1,16 @@
|
|||||||
Tue May 28 21:34:00 2001 Corinna Vinschen <corinna@vinschen.de>
|
Tue May 29 19:02:00 2001 Corinna Vinschen <corinna@vinschen.de>
|
||||||
|
|
||||||
|
* sec_helper.cc (cygsid::getfrompw): Change parameter to `const'.
|
||||||
|
(cygsid::getfromgr): Ditto.
|
||||||
|
* security.cc: Use `sys_mbstowcs' and `sys_wcstombs' throughout.
|
||||||
|
(extract_nt_dom_user): Try to get user and domain from SID in
|
||||||
|
pw->pw_gecos first.
|
||||||
|
* security.h (class cygsid): Change parameter of getfrompw() and
|
||||||
|
getfromgr() to `const'.
|
||||||
|
* uinfo.cc (internal_getlogin): Change order for evaluating user
|
||||||
|
information in winNT case. Drop usage of NetWkstaUserGetInfo().
|
||||||
|
|
||||||
|
Mon May 28 21:34:00 2001 Corinna Vinschen <corinna@vinschen.de>
|
||||||
|
|
||||||
* shortcut.c (check_shortcut): Treat only Cygwin shortcuts as symlinks.
|
* shortcut.c (check_shortcut): Treat only Cygwin shortcuts as symlinks.
|
||||||
|
|
||||||
|
@ -121,14 +121,14 @@ cygsid::getfromstr (const char *nsidstr)
|
|||||||
}
|
}
|
||||||
|
|
||||||
BOOL
|
BOOL
|
||||||
cygsid::getfrompw (struct passwd *pw)
|
cygsid::getfrompw (const struct passwd *pw)
|
||||||
{
|
{
|
||||||
char *sp = (pw && pw->pw_gecos) ? strrchr (pw->pw_gecos, ',') : NULL;
|
char *sp = (pw && pw->pw_gecos) ? strrchr (pw->pw_gecos, ',') : NULL;
|
||||||
return (*this = sp ? sp + 1 : "") != NULL;
|
return (*this = sp ? sp + 1 : "") != NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
BOOL
|
BOOL
|
||||||
cygsid::getfromgr (struct group *gr)
|
cygsid::getfromgr (const struct group *gr)
|
||||||
{
|
{
|
||||||
char *sp = (gr && gr->gr_passwd) ? gr->gr_passwd : NULL;
|
char *sp = (gr && gr->gr_passwd) ? gr->gr_passwd : NULL;
|
||||||
return (*this = sp ?: "") != NULL;
|
return (*this = sp ?: "") != NULL;
|
||||||
|
@ -22,6 +22,7 @@ details. */
|
|||||||
#include <sys/stat.h>
|
#include <sys/stat.h>
|
||||||
#include <sys/acl.h>
|
#include <sys/acl.h>
|
||||||
#include <ctype.h>
|
#include <ctype.h>
|
||||||
|
#include <winnls.h>
|
||||||
#include <wingdi.h>
|
#include <wingdi.h>
|
||||||
#include <winuser.h>
|
#include <winuser.h>
|
||||||
#include <wininet.h>
|
#include <wininet.h>
|
||||||
@ -64,12 +65,21 @@ cygwin_set_impersonation_token (const HANDLE hToken)
|
|||||||
void
|
void
|
||||||
extract_nt_dom_user (const struct passwd *pw, char *domain, char *user)
|
extract_nt_dom_user (const struct passwd *pw, char *domain, char *user)
|
||||||
{
|
{
|
||||||
|
cygsid psid;
|
||||||
|
DWORD ulen = UNLEN + 1;
|
||||||
|
DWORD dlen = INTERNET_MAX_HOST_NAME_LENGTH + 1;
|
||||||
|
SID_NAME_USE use;
|
||||||
char buf[INTERNET_MAX_HOST_NAME_LENGTH + UNLEN + 2];
|
char buf[INTERNET_MAX_HOST_NAME_LENGTH + UNLEN + 2];
|
||||||
char *c;
|
char *c;
|
||||||
|
|
||||||
strcpy (domain, "");
|
strcpy (domain, "");
|
||||||
strcpy (buf, pw->pw_name);
|
strcpy (buf, pw->pw_name);
|
||||||
debug_printf ("pw_gecos = %x (%s)", pw->pw_gecos, pw->pw_gecos);
|
debug_printf ("pw_gecos = %x (%s)", pw->pw_gecos, pw->pw_gecos);
|
||||||
|
|
||||||
|
if (psid.getfrompw (pw) &&
|
||||||
|
LookupAccountSid (NULL, psid, user, &ulen, domain, &dlen, &use))
|
||||||
|
return;
|
||||||
|
|
||||||
if (pw->pw_gecos)
|
if (pw->pw_gecos)
|
||||||
{
|
{
|
||||||
if ((c = strstr (pw->pw_gecos, "U-")) != NULL &&
|
if ((c = strstr (pw->pw_gecos, "U-")) != NULL &&
|
||||||
@ -153,7 +163,7 @@ str2buf2uni (UNICODE_STRING &tgt, WCHAR *buf, const char *srcstr)
|
|||||||
tgt.Length = strlen (srcstr) * sizeof (WCHAR);
|
tgt.Length = strlen (srcstr) * sizeof (WCHAR);
|
||||||
tgt.MaximumLength = tgt.Length + sizeof(WCHAR);
|
tgt.MaximumLength = tgt.Length + sizeof(WCHAR);
|
||||||
tgt.Buffer = (PWCHAR) buf;
|
tgt.Buffer = (PWCHAR) buf;
|
||||||
mbstowcs (buf, srcstr, tgt.MaximumLength);
|
sys_mbstowcs (buf, srcstr, tgt.MaximumLength);
|
||||||
}
|
}
|
||||||
|
|
||||||
static void
|
static void
|
||||||
@ -219,15 +229,15 @@ get_lsa_srv_inf (LSA_HANDLE lsa, char *logonserver, char *domain)
|
|||||||
&cnt, &tot, SV_TYPE_DOMAIN_CTRL, primary, NULL))
|
&cnt, &tot, SV_TYPE_DOMAIN_CTRL, primary, NULL))
|
||||||
== STATUS_SUCCESS && cnt > 0)
|
== STATUS_SUCCESS && cnt > 0)
|
||||||
{
|
{
|
||||||
wcstombs (name, buf[0].sv101_name, INTERNET_MAX_HOST_NAME_LENGTH + 1);
|
sys_wcstombs (name, buf[0].sv101_name, INTERNET_MAX_HOST_NAME_LENGTH + 1);
|
||||||
if (domain)
|
if (domain)
|
||||||
wcstombs (domain, primary, INTERNET_MAX_HOST_NAME_LENGTH + 1);
|
sys_wcstombs (domain, primary, INTERNET_MAX_HOST_NAME_LENGTH + 1);
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
wcstombs (name, account, INTERNET_MAX_HOST_NAME_LENGTH + 1);
|
sys_wcstombs (name, account, INTERNET_MAX_HOST_NAME_LENGTH + 1);
|
||||||
if (domain)
|
if (domain)
|
||||||
wcstombs (domain, account, INTERNET_MAX_HOST_NAME_LENGTH + 1);
|
sys_wcstombs (domain, account, INTERNET_MAX_HOST_NAME_LENGTH + 1);
|
||||||
}
|
}
|
||||||
if (ret == STATUS_SUCCESS)
|
if (ret == STATUS_SUCCESS)
|
||||||
NetApiBufferFree (buf);
|
NetApiBufferFree (buf);
|
||||||
@ -259,7 +269,7 @@ static BOOL
|
|||||||
get_user_groups (WCHAR *wlogonserver, cygsidlist &grp_list, char *user)
|
get_user_groups (WCHAR *wlogonserver, cygsidlist &grp_list, char *user)
|
||||||
{
|
{
|
||||||
WCHAR wuser[UNLEN + 1];
|
WCHAR wuser[UNLEN + 1];
|
||||||
mbstowcs (wuser, user, UNLEN + 1);
|
sys_mbstowcs (wuser, user, UNLEN + 1);
|
||||||
LPGROUP_USERS_INFO_0 buf;
|
LPGROUP_USERS_INFO_0 buf;
|
||||||
DWORD cnt, tot;
|
DWORD cnt, tot;
|
||||||
NET_API_STATUS ret;
|
NET_API_STATUS ret;
|
||||||
@ -282,13 +292,13 @@ get_user_groups (WCHAR *wlogonserver, cygsidlist &grp_list, char *user)
|
|||||||
DWORD dlen = INTERNET_MAX_HOST_NAME_LENGTH + 1;
|
DWORD dlen = INTERNET_MAX_HOST_NAME_LENGTH + 1;
|
||||||
SID_NAME_USE use = SidTypeInvalid;
|
SID_NAME_USE use = SidTypeInvalid;
|
||||||
|
|
||||||
wcstombs (group, buf[i].grui0_name, UNLEN + 1);
|
sys_wcstombs (group, buf[i].grui0_name, UNLEN + 1);
|
||||||
if (!LookupAccountName (NULL, group, gsid, &glen, domain, &dlen, &use))
|
if (!LookupAccountName (NULL, group, gsid, &glen, domain, &dlen, &use))
|
||||||
debug_printf ("LookupAccountName(%s): %lu\n", group, GetLastError ());
|
debug_printf ("LookupAccountName(%s): %lu\n", group, GetLastError ());
|
||||||
if (!legal_sid_type (use))
|
if (!legal_sid_type (use))
|
||||||
{
|
{
|
||||||
strcat (strcpy (group, domain), "\\");
|
strcat (strcpy (group, domain), "\\");
|
||||||
wcstombs (group + strlen (group), buf[i].grui0_name,
|
sys_wcstombs (group + strlen (group), buf[i].grui0_name,
|
||||||
UNLEN + 1 - strlen (group));
|
UNLEN + 1 - strlen (group));
|
||||||
glen = UNLEN + 1;
|
glen = UNLEN + 1;
|
||||||
dlen = INTERNET_MAX_HOST_NAME_LENGTH + 1;
|
dlen = INTERNET_MAX_HOST_NAME_LENGTH + 1;
|
||||||
@ -353,7 +363,7 @@ get_user_local_groups (WCHAR *wlogonserver, const char *logonserver,
|
|||||||
DWORD dlen = INTERNET_MAX_HOST_NAME_LENGTH + 1;
|
DWORD dlen = INTERNET_MAX_HOST_NAME_LENGTH + 1;
|
||||||
SID_NAME_USE use = SidTypeInvalid;
|
SID_NAME_USE use = SidTypeInvalid;
|
||||||
|
|
||||||
wcstombs (group, buf[i].lgrpi0_name, UNLEN + 1);
|
sys_wcstombs (group, buf[i].lgrpi0_name, UNLEN + 1);
|
||||||
if (!LookupAccountName (NULL, group, gsid, &glen, domain, &dlen, &use))
|
if (!LookupAccountName (NULL, group, gsid, &glen, domain, &dlen, &use))
|
||||||
{
|
{
|
||||||
glen = UNLEN + 1;
|
glen = UNLEN + 1;
|
||||||
@ -366,7 +376,7 @@ get_user_local_groups (WCHAR *wlogonserver, const char *logonserver,
|
|||||||
else if (!legal_sid_type (use))
|
else if (!legal_sid_type (use))
|
||||||
{
|
{
|
||||||
strcat (strcpy (group, domain), "\\");
|
strcat (strcpy (group, domain), "\\");
|
||||||
wcstombs (group + strlen (group), buf[i].lgrpi0_name,
|
sys_wcstombs (group + strlen (group), buf[i].lgrpi0_name,
|
||||||
UNLEN + 1 - strlen (group));
|
UNLEN + 1 - strlen (group));
|
||||||
glen = UNLEN + 1;
|
glen = UNLEN + 1;
|
||||||
dlen = INTERNET_MAX_HOST_NAME_LENGTH + 1;
|
dlen = INTERNET_MAX_HOST_NAME_LENGTH + 1;
|
||||||
@ -409,7 +419,7 @@ get_user_primary_group (WCHAR *wlogonserver, const char *user,
|
|||||||
return TRUE;
|
return TRUE;
|
||||||
}
|
}
|
||||||
|
|
||||||
mbstowcs (wuser, user, UNLEN + 1);
|
sys_mbstowcs (wuser, user, UNLEN + 1);
|
||||||
if (NetUserGetInfo (wlogonserver, wuser, 3, (LPBYTE *) &buf))
|
if (NetUserGetInfo (wlogonserver, wuser, 3, (LPBYTE *) &buf))
|
||||||
return FALSE;
|
return FALSE;
|
||||||
pgrpsid = usersid;
|
pgrpsid = usersid;
|
||||||
@ -435,7 +445,7 @@ get_group_sidlist (const char *logonserver, cygsidlist &grp_list,
|
|||||||
SID_NAME_USE use;
|
SID_NAME_USE use;
|
||||||
|
|
||||||
auth_pos = -1;
|
auth_pos = -1;
|
||||||
mbstowcs (wserver, logonserver, INTERNET_MAX_HOST_NAME_LENGTH + 1);
|
sys_mbstowcs (wserver, logonserver, INTERNET_MAX_HOST_NAME_LENGTH + 1);
|
||||||
if (!LookupAccountSid (NULL, usersid, user, &ulen, domain, &dlen, &use))
|
if (!LookupAccountSid (NULL, usersid, user, &ulen, domain, &dlen, &use))
|
||||||
{
|
{
|
||||||
debug_printf ("LookupAccountSid () %E");
|
debug_printf ("LookupAccountSid () %E");
|
||||||
@ -569,7 +579,8 @@ get_priv_list (LSA_HANDLE lsa, cygsid &usersid, cygsidlist &grp_list)
|
|||||||
PTOKEN_PRIVILEGES tmp;
|
PTOKEN_PRIVILEGES tmp;
|
||||||
DWORD tmp_count;
|
DWORD tmp_count;
|
||||||
|
|
||||||
wcstombs (buf, privstrs[i].Buffer, INTERNET_MAX_HOST_NAME_LENGTH + 1);
|
sys_wcstombs (buf, privstrs[i].Buffer,
|
||||||
|
INTERNET_MAX_HOST_NAME_LENGTH + 1);
|
||||||
if (!LookupPrivilegeValue (NULL, buf, &priv))
|
if (!LookupPrivilegeValue (NULL, buf, &priv))
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
|
@ -45,8 +45,8 @@ public:
|
|||||||
|
|
||||||
inline PSID set () { return psid = (PSID) sbuf; }
|
inline PSID set () { return psid = (PSID) sbuf; }
|
||||||
|
|
||||||
BOOL getfrompw (struct passwd *pw);
|
BOOL getfrompw (const struct passwd *pw);
|
||||||
BOOL getfromgr (struct group *gr);
|
BOOL getfromgr (const struct group *gr);
|
||||||
|
|
||||||
int get_id (BOOL search_grp, int *type = NULL);
|
int get_id (BOOL search_grp, int *type = NULL);
|
||||||
inline int get_uid () { return get_id (FALSE); }
|
inline int get_uid () { return get_id (FALSE); }
|
||||||
|
@ -31,62 +31,61 @@ struct passwd *
|
|||||||
internal_getlogin (cygheap_user &user)
|
internal_getlogin (cygheap_user &user)
|
||||||
{
|
{
|
||||||
char username[UNLEN + 1];
|
char username[UNLEN + 1];
|
||||||
DWORD username_len = UNLEN + 1;
|
DWORD ulen = UNLEN + 1;
|
||||||
struct passwd *pw = NULL;
|
struct passwd *pw = NULL;
|
||||||
|
|
||||||
if (!GetUserName (username, &username_len))
|
if (!GetUserName (username, &ulen))
|
||||||
user.set_name ("unknown");
|
user.set_name ("unknown");
|
||||||
else
|
else
|
||||||
user.set_name (username);
|
user.set_name (username);
|
||||||
debug_printf ("GetUserName() = %s", user.name ());
|
|
||||||
|
|
||||||
if (os_being_run == winNT)
|
if (os_being_run == winNT)
|
||||||
{
|
{
|
||||||
LPWKSTA_USER_INFO_1 wui;
|
HANDLE ptok = user.token; /* Which is INVALID_HANDLE_VALUE if no
|
||||||
NET_API_STATUS ret;
|
impersonation took place. */
|
||||||
char buf[512];
|
DWORD siz;
|
||||||
char dom[INTERNET_MAX_HOST_NAME_LENGTH + 1];
|
cygsid tu;
|
||||||
char *env, *un = NULL;
|
NET_API_STATUS ret = 0;
|
||||||
|
char domain[INTERNET_MAX_HOST_NAME_LENGTH + 1];
|
||||||
|
DWORD dlen = INTERNET_MAX_HOST_NAME_LENGTH + 1;
|
||||||
|
SID_NAME_USE use;
|
||||||
|
char buf[MAX_PATH];
|
||||||
|
|
||||||
/* First trying to get logon info from environment */
|
/* Try to get the SID either from already impersonated token
|
||||||
if ((env = getenv ("USERNAME")) != NULL)
|
or from current process first. To differ that two cases is
|
||||||
un = env;
|
important, because you can't rely on the user information
|
||||||
if ((env = getenv ("LOGONSERVER")) != NULL)
|
in a process token of a currently impersonated process. */
|
||||||
user.set_logsrv (env + 2); /* filter leading double backslashes */
|
user.set_sid (NO_SID);
|
||||||
if ((env = getenv ("USERDOMAIN")) != NULL)
|
if (ptok == INVALID_HANDLE_VALUE
|
||||||
user.set_domain (env);
|
&& !OpenProcessToken (GetCurrentProcess (),
|
||||||
/* Trust only if usernames are identical */
|
TOKEN_ADJUST_DEFAULT | TOKEN_QUERY,
|
||||||
if (un && strcasematch (user.name (), un)
|
&ptok))
|
||||||
&& user.domain () && user.logsrv ())
|
debug_printf ("OpenProcessToken(): %E");
|
||||||
debug_printf ("Domain: %s, Logon Server: %s",
|
else if (!GetTokenInformation (ptok, TokenUser, &tu, sizeof tu, &siz))
|
||||||
user.domain (), user.logsrv ());
|
debug_printf ("GetTokenInformation(): %E");
|
||||||
/* If that failed, try to get that info from NetBIOS */
|
else if (!(ret = user.set_sid (tu)))
|
||||||
else if (!(ret = NetWkstaUserGetInfo (NULL, 1, (LPBYTE *)&wui)))
|
debug_printf ("Couldn't retrieve SID from access token!");
|
||||||
|
else if (!LookupAccountSid (NULL, user.sid (), username, &ulen,
|
||||||
|
domain, &dlen, &use))
|
||||||
|
debug_printf ("LookupAccountSid (): %E");
|
||||||
|
else
|
||||||
{
|
{
|
||||||
sys_wcstombs (buf, wui->wkui1_username, UNLEN + 1);
|
user.set_name (username);
|
||||||
user.set_name (buf);
|
user.set_domain (domain);
|
||||||
sys_wcstombs (buf, wui->wkui1_logon_server,
|
}
|
||||||
INTERNET_MAX_HOST_NAME_LENGTH + 1);
|
if (get_logon_server_and_user_domain (domain, NULL))
|
||||||
user.set_logsrv (buf);
|
user.set_logsrv (domain + 2);
|
||||||
sys_wcstombs (buf, wui->wkui1_logon_domain,
|
|
||||||
INTERNET_MAX_HOST_NAME_LENGTH + 1);
|
|
||||||
user.set_domain (buf);
|
|
||||||
/* Save values in environment */
|
|
||||||
if (!strcasematch (user.name (), "SYSTEM")
|
|
||||||
&& user.domain () && user.logsrv ())
|
|
||||||
{
|
|
||||||
LPUSER_INFO_3 ui = NULL;
|
|
||||||
WCHAR wbuf[INTERNET_MAX_HOST_NAME_LENGTH + 2];
|
|
||||||
|
|
||||||
strcat (strcpy (buf, "\\\\"), user.logsrv ());
|
|
||||||
setenv ("USERNAME", user.name (), 1);
|
setenv ("USERNAME", user.name (), 1);
|
||||||
setenv ("LOGONSERVER", buf, 1);
|
setenv ("LOGONSERVER", user.logsrv (), 1);
|
||||||
setenv ("USERDOMAIN", user.domain (), 1);
|
setenv ("USERDOMAIN", user.domain (), 1);
|
||||||
/* HOMEDRIVE and HOMEPATH are wrong most of the time, too,
|
|
||||||
after changing user context! */
|
LPUSER_INFO_3 ui;
|
||||||
sys_mbstowcs (wbuf, buf, INTERNET_MAX_HOST_NAME_LENGTH + 2);
|
WCHAR wlogsrv[INTERNET_MAX_HOST_NAME_LENGTH + 1];
|
||||||
if (!NetUserGetInfo (NULL, wui->wkui1_username, 3, (LPBYTE *)&ui)
|
WCHAR wuser[UNLEN + 1];
|
||||||
|| !NetUserGetInfo (wbuf,wui->wkui1_username,3,(LPBYTE *)&ui))
|
sys_mbstowcs (wlogsrv, user.logsrv (), INTERNET_MAX_HOST_NAME_LENGTH + 1);
|
||||||
|
sys_mbstowcs (wuser, user.name (), UNLEN + 1);
|
||||||
|
if (!NetUserGetInfo (wlogsrv, wuser, 3, (LPBYTE *)&ui) ||
|
||||||
|
!NetUserGetInfo (NULL, wuser, 3, (LPBYTE *)&ui))
|
||||||
{
|
{
|
||||||
sys_wcstombs (buf, ui->usri3_home_dir, MAX_PATH);
|
sys_wcstombs (buf, ui->usri3_home_dir, MAX_PATH);
|
||||||
if (!buf[0])
|
if (!buf[0])
|
||||||
@ -96,7 +95,7 @@ internal_getlogin (cygheap_user &user)
|
|||||||
strcat (buf, "\\");
|
strcat (buf, "\\");
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
env = getenv ("SYSTEMDRIVE");
|
char *env = getenv ("SYSTEMDRIVE");
|
||||||
if (env && *env)
|
if (env && *env)
|
||||||
strcat (strcpy (buf, env), "\\");
|
strcat (strcpy (buf, env), "\\");
|
||||||
else
|
else
|
||||||
@ -108,69 +107,11 @@ internal_getlogin (cygheap_user &user)
|
|||||||
setenv ("HOMEDRIVE", buf, 1);
|
setenv ("HOMEDRIVE", buf, 1);
|
||||||
NetApiBufferFree (ui);
|
NetApiBufferFree (ui);
|
||||||
}
|
}
|
||||||
}
|
|
||||||
debug_printf ("Domain: %s, Logon Server: %s, Windows Username: %s",
|
|
||||||
user.domain (), user.logsrv (), user.name ());
|
|
||||||
NetApiBufferFree (wui);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
/* If `NetWkstaUserGetInfo' failed, try to get default values known
|
|
||||||
by local policy object.*/
|
|
||||||
debug_printf ("NetWkstaUserGetInfo() Err %d", ret);
|
|
||||||
|
|
||||||
if (get_logon_server_and_user_domain (buf, dom))
|
|
||||||
{
|
|
||||||
user.set_logsrv (buf + 2);
|
|
||||||
user.set_domain (dom);
|
|
||||||
setenv ("LOGONSERVER", buf, 1);
|
|
||||||
setenv ("USERDOMAIN", dom, 1);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
debug_printf ("get_logon_server_and_user_domain() failed");
|
|
||||||
}
|
|
||||||
if (allow_ntsec)
|
|
||||||
{
|
|
||||||
HANDLE ptok = user.token; /* Which is INVALID_HANDLE_VALUE if no
|
|
||||||
impersonation took place. */
|
|
||||||
DWORD siz;
|
|
||||||
cygsid tu;
|
|
||||||
int ret = 0;
|
|
||||||
|
|
||||||
/* Try to get the SID either from already impersonated token
|
|
||||||
or from current process first. To differ that two cases is
|
|
||||||
important, because you can't rely on the user information
|
|
||||||
in a process token of a currently impersonated process. */
|
|
||||||
if (ptok == INVALID_HANDLE_VALUE
|
|
||||||
&& !OpenProcessToken (GetCurrentProcess (),
|
|
||||||
TOKEN_ADJUST_DEFAULT | TOKEN_QUERY,
|
|
||||||
&ptok))
|
|
||||||
debug_printf ("OpenProcessToken(): %E\n");
|
|
||||||
else if (!GetTokenInformation (ptok, TokenUser, &tu, sizeof tu, &siz))
|
|
||||||
debug_printf ("GetTokenInformation(): %E");
|
|
||||||
else if (!(ret = user.set_sid (tu)))
|
|
||||||
debug_printf ("Couldn't retrieve SID from access token!");
|
|
||||||
/* If that failes, try to get the SID from localhost. This can only
|
|
||||||
be done if a domain is given because there's a chance that a local
|
|
||||||
and a domain user may have the same name. */
|
|
||||||
if (!ret && user.domain ())
|
|
||||||
{
|
|
||||||
/* Concat DOMAIN\USERNAME for the next lookup */
|
|
||||||
strcat (strcat (strcpy (buf, user.domain ()), "\\"), user.name ());
|
|
||||||
if (!(ret = lookup_name (buf, NULL, user.sid ())))
|
|
||||||
debug_printf ("Couldn't retrieve SID locally!");
|
|
||||||
}
|
|
||||||
|
|
||||||
/* If that fails, too, as a last resort try to get the SID from
|
|
||||||
the logon server. */
|
|
||||||
if (!ret && !(ret = lookup_name (user.name (), user.logsrv (),
|
|
||||||
user.sid ())))
|
|
||||||
debug_printf ("Couldn't retrieve SID from '%s'!", user.logsrv ());
|
|
||||||
|
|
||||||
/* If we have a SID, try to get the corresponding Cygwin user name
|
/* If we have a SID, try to get the corresponding Cygwin user name
|
||||||
which can be different from the Windows user name. */
|
which can be different from the Windows user name. */
|
||||||
cygsid gsid (NO_SID);
|
cygsid gsid (NO_SID);
|
||||||
if (ret)
|
if (user.sid ())
|
||||||
{
|
{
|
||||||
cygsid psid;
|
cygsid psid;
|
||||||
|
|
||||||
@ -179,28 +120,15 @@ internal_getlogin (cygheap_user &user)
|
|||||||
{
|
{
|
||||||
user.set_name (pw->pw_name);
|
user.set_name (pw->pw_name);
|
||||||
struct group *gr = getgrgid (pw->pw_gid);
|
struct group *gr = getgrgid (pw->pw_gid);
|
||||||
if (gr)
|
if (gr && !gsid.getfromgr (gr))
|
||||||
if (!gsid.getfromgr (gr))
|
|
||||||
gsid = NO_SID;
|
gsid = NO_SID;
|
||||||
extract_nt_dom_user (pw, dom, buf);
|
|
||||||
setenv ("USERNAME", buf, 1);
|
|
||||||
if (*dom)
|
|
||||||
user.set_domain (dom);
|
|
||||||
else if (user.logsrv ())
|
|
||||||
user.set_domain (user.logsrv ());
|
|
||||||
if (user.domain ())
|
|
||||||
setenv ("USERDOMAIN", user.domain (), 1);
|
|
||||||
break;
|
|
||||||
}
|
}
|
||||||
if (!strcasematch (user.name (), "SYSTEM")
|
if (!strcasematch (user.name (), "SYSTEM"))
|
||||||
&& user.domain () && user.logsrv ())
|
|
||||||
{
|
|
||||||
if (get_registry_hive_path (user.sid (), buf))
|
if (get_registry_hive_path (user.sid (), buf))
|
||||||
setenv ("USERPROFILE", buf, 1);
|
setenv ("USERPROFILE", buf, 1);
|
||||||
else
|
else
|
||||||
unsetenv ("USERPROFILE");
|
unsetenv ("USERPROFILE");
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
/* If this process is started from a non Cygwin process,
|
/* If this process is started from a non Cygwin process,
|
||||||
set token owner to the same value as token user and
|
set token owner to the same value as token user and
|
||||||
@ -220,7 +148,6 @@ internal_getlogin (cygheap_user &user)
|
|||||||
&& user.token == INVALID_HANDLE_VALUE)
|
&& user.token == INVALID_HANDLE_VALUE)
|
||||||
CloseHandle (ptok);
|
CloseHandle (ptok);
|
||||||
}
|
}
|
||||||
}
|
|
||||||
debug_printf ("Cygwins Username: %s", user.name ());
|
debug_printf ("Cygwins Username: %s", user.name ());
|
||||||
return pw ?: getpwnam(user.name ());
|
return pw ?: getpwnam(user.name ());
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user