diff options
author | marha <marha@users.sourceforge.net> | 2014-04-15 00:03:51 +0200 |
---|---|---|
committer | marha <marha@users.sourceforge.net> | 2014-04-15 00:03:51 +0200 |
commit | 95733096c20d28f239759fc28c6284f622003f09 (patch) | |
tree | 7808ffa1a18b4b9dd30a737f12ba340a7f597691 | |
parent | 86820a9ebc2d86a26511f3f2ec162e4499c1539b (diff) | |
parent | c7a23c91d421c37cc2893f6f52a1dceb0c3e9f85 (diff) | |
download | vcxsrv-95733096c20d28f239759fc28c6284f622003f09.tar.gz vcxsrv-95733096c20d28f239759fc28c6284f622003f09.tar.bz2 vcxsrv-95733096c20d28f239759fc28c6284f622003f09.zip |
Merge remote-tracking branch 'origin/released'
-rw-r--r-- | tools/plink/winnpc.c | 102 |
1 files changed, 102 insertions, 0 deletions
diff --git a/tools/plink/winnpc.c b/tools/plink/winnpc.c new file mode 100644 index 000000000..0e8ac6994 --- /dev/null +++ b/tools/plink/winnpc.c @@ -0,0 +1,102 @@ +/* + * Windows support module which deals with being a named-pipe client. + */ + +#include <stdio.h> +#include <assert.h> + +#define DEFINE_PLUG_METHOD_MACROS +#include "tree234.h" +#include "putty.h" +#include "network.h" +#include "proxy.h" +#include "ssh.h" + +#if !defined NO_SECURITY + +#include "winsecur.h" + +Socket make_handle_socket(HANDLE send_H, HANDLE recv_H, Plug plug, + int overlapped); + +Socket new_named_pipe_client(const char *pipename, Plug plug) +{ + HANDLE pipehandle; + PSID usersid, pipeowner; + PSECURITY_DESCRIPTOR psd; + char *err; + Socket ret; + + assert(strncmp(pipename, "\\\\.\\pipe\\", 9) == 0); + assert(strchr(pipename + 9, '\\') == NULL); + + while (1) { + pipehandle = CreateFile(pipename, GENERIC_READ | GENERIC_WRITE, + 0, NULL, OPEN_EXISTING, + FILE_FLAG_OVERLAPPED, NULL); + + if (pipehandle != INVALID_HANDLE_VALUE) + break; + + if (GetLastError() != ERROR_PIPE_BUSY) { + err = dupprintf("Unable to open named pipe '%s': %s", + pipename, win_strerror(GetLastError())); + ret = new_error_socket(err, plug); + sfree(err); + return ret; + } + + /* + * If we got ERROR_PIPE_BUSY, wait for the server to + * create a new pipe instance. (Since the server is + * expected to be winnps.c, which will do that immediately + * after a previous connection is accepted, that shouldn't + * take excessively long.) + */ + if (!WaitNamedPipe(pipename, NMPWAIT_USE_DEFAULT_WAIT)) { + err = dupprintf("Error waiting for named pipe '%s': %s", + pipename, win_strerror(GetLastError())); + ret = new_error_socket(err, plug); + sfree(err); + return ret; + } + } + + if ((usersid = get_user_sid()) == NULL) { + CloseHandle(pipehandle); + err = dupprintf("Unable to get user SID"); + ret = new_error_socket(err, plug); + sfree(err); + return ret; + } + + if (p_GetSecurityInfo(pipehandle, SE_KERNEL_OBJECT, + OWNER_SECURITY_INFORMATION, + &pipeowner, NULL, NULL, NULL, + &psd) != ERROR_SUCCESS) { + err = dupprintf("Unable to get named pipe security information: %s", + win_strerror(GetLastError())); + ret = new_error_socket(err, plug); + sfree(err); + CloseHandle(pipehandle); + sfree(usersid); + return ret; + } + + if (!EqualSid(pipeowner, usersid)) { + err = dupprintf("Owner of named pipe '%s' is not us", pipename); + ret = new_error_socket(err, plug); + sfree(err); + CloseHandle(pipehandle); + LocalFree(psd); + sfree(usersid); + return ret; + } + + LocalFree(psd); + sfree(usersid); + + return make_handle_socket(pipehandle, pipehandle, plug, TRUE); +} + +#endif /* !defined NO_SECURITY */ |