aboutsummaryrefslogtreecommitdiff
path: root/tools/plink
diff options
context:
space:
mode:
authormarha <marha@users.sourceforge.net>2014-04-15 00:03:24 +0200
committermarha <marha@users.sourceforge.net>2014-04-15 00:03:24 +0200
commitc7a23c91d421c37cc2893f6f52a1dceb0c3e9f85 (patch)
tree761d572d5b48a2f1ba708042ebe2bf82787c4feb /tools/plink
parent96b33f2f0df64a375e5b257a575b0ead1c2ce1a0 (diff)
downloadvcxsrv-c7a23c91d421c37cc2893f6f52a1dceb0c3e9f85.tar.gz
vcxsrv-c7a23c91d421c37cc2893f6f52a1dceb0c3e9f85.tar.bz2
vcxsrv-c7a23c91d421c37cc2893f6f52a1dceb0c3e9f85.zip
Added plink/winnpc.c
Diffstat (limited to 'tools/plink')
-rw-r--r--tools/plink/winnpc.c102
1 files changed, 102 insertions, 0 deletions
diff --git a/tools/plink/winnpc.c b/tools/plink/winnpc.c
new file mode 100644
index 000000000..0e8ac6994
--- /dev/null
+++ b/tools/plink/winnpc.c
@@ -0,0 +1,102 @@
+/*
+ * Windows support module which deals with being a named-pipe client.
+ */
+
+#include <stdio.h>
+#include <assert.h>
+
+#define DEFINE_PLUG_METHOD_MACROS
+#include "tree234.h"
+#include "putty.h"
+#include "network.h"
+#include "proxy.h"
+#include "ssh.h"
+
+#if !defined NO_SECURITY
+
+#include "winsecur.h"
+
+Socket make_handle_socket(HANDLE send_H, HANDLE recv_H, Plug plug,
+ int overlapped);
+
+Socket new_named_pipe_client(const char *pipename, Plug plug)
+{
+ HANDLE pipehandle;
+ PSID usersid, pipeowner;
+ PSECURITY_DESCRIPTOR psd;
+ char *err;
+ Socket ret;
+
+ assert(strncmp(pipename, "\\\\.\\pipe\\", 9) == 0);
+ assert(strchr(pipename + 9, '\\') == NULL);
+
+ while (1) {
+ pipehandle = CreateFile(pipename, GENERIC_READ | GENERIC_WRITE,
+ 0, NULL, OPEN_EXISTING,
+ FILE_FLAG_OVERLAPPED, NULL);
+
+ if (pipehandle != INVALID_HANDLE_VALUE)
+ break;
+
+ if (GetLastError() != ERROR_PIPE_BUSY) {
+ err = dupprintf("Unable to open named pipe '%s': %s",
+ pipename, win_strerror(GetLastError()));
+ ret = new_error_socket(err, plug);
+ sfree(err);
+ return ret;
+ }
+
+ /*
+ * If we got ERROR_PIPE_BUSY, wait for the server to
+ * create a new pipe instance. (Since the server is
+ * expected to be winnps.c, which will do that immediately
+ * after a previous connection is accepted, that shouldn't
+ * take excessively long.)
+ */
+ if (!WaitNamedPipe(pipename, NMPWAIT_USE_DEFAULT_WAIT)) {
+ err = dupprintf("Error waiting for named pipe '%s': %s",
+ pipename, win_strerror(GetLastError()));
+ ret = new_error_socket(err, plug);
+ sfree(err);
+ return ret;
+ }
+ }
+
+ if ((usersid = get_user_sid()) == NULL) {
+ CloseHandle(pipehandle);
+ err = dupprintf("Unable to get user SID");
+ ret = new_error_socket(err, plug);
+ sfree(err);
+ return ret;
+ }
+
+ if (p_GetSecurityInfo(pipehandle, SE_KERNEL_OBJECT,
+ OWNER_SECURITY_INFORMATION,
+ &pipeowner, NULL, NULL, NULL,
+ &psd) != ERROR_SUCCESS) {
+ err = dupprintf("Unable to get named pipe security information: %s",
+ win_strerror(GetLastError()));
+ ret = new_error_socket(err, plug);
+ sfree(err);
+ CloseHandle(pipehandle);
+ sfree(usersid);
+ return ret;
+ }
+
+ if (!EqualSid(pipeowner, usersid)) {
+ err = dupprintf("Owner of named pipe '%s' is not us", pipename);
+ ret = new_error_socket(err, plug);
+ sfree(err);
+ CloseHandle(pipehandle);
+ LocalFree(psd);
+ sfree(usersid);
+ return ret;
+ }
+
+ LocalFree(psd);
+ sfree(usersid);
+
+ return make_handle_socket(pipehandle, pipehandle, plug, TRUE);
+}
+
+#endif /* !defined NO_SECURITY */