diff options
author | Corinna Vinschen <corinna@vinschen.de> | 2007-03-29 16:37:36 +0000 |
---|---|---|
committer | Corinna Vinschen <corinna@vinschen.de> | 2007-03-29 16:37:36 +0000 |
commit | e6fbf13e48971335504fc66e385a168bbca41343 (patch) | |
tree | 956a1b1d710370e25fc002df74d1415acf5c1a42 /winsup/cygwin/security.h | |
parent | 519aec5d597336d58443628a2618d87620a4e2cd (diff) | |
download | cygnal-e6fbf13e48971335504fc66e385a168bbca41343.tar.gz cygnal-e6fbf13e48971335504fc66e385a168bbca41343.tar.bz2 cygnal-e6fbf13e48971335504fc66e385a168bbca41343.zip |
* cygheap.cc (cygheap_init): Fix formatting. Remove comment. Set
shared_prefix depending only on terminal service capability.
* dcrt0.cc (dll_crt0_1): Don't call set_cygwin_privileges here.
* fhandler_fifo.cc (fhandler_fifo::open): Create the mutex as global
object.
* posix_ipc.cc (ipc_mutex_init): Use cygheap->shared_prefix.
(ipc_cond_init): Ditto.
* sec_helper.cc (privilege_name): Make static. Use LookupPrivilegeName
directly to be independent of the state of cygheap.
(set_privilege): Take a LUID as parameter instead of an index value.
Only print debug output in case of failure.
(set_cygwin_privileges): Add comment. Use LookupPrivilegeValue to
get privilege LUIDs.
(init_global_security): Call set_cygwin_privileges here.
* security.h (privilege_name): Drop declaration.
(set_privilege): Declare according to above change.
(set_process_privilege): Call privilege_luid to get LUID.
(_push_thread_privilege): Ditto.
* shared.cc (open_shared): Add comment. On systems supporting the
SeCreateGlobalPrivilege, try to create/open global shared memory first.
Fall back to local shared memory if that fails.
* thread.cc (semaphore::semaphore): Use cygheap->shared_prefix.
* wincap.h (wincapc::has_create_global_privilege): New element.
* wincap.cc: Implement above element throughout.
Diffstat (limited to 'winsup/cygwin/security.h')
-rw-r--r-- | winsup/cygwin/security.h | 7 |
1 files changed, 3 insertions, 4 deletions
diff --git a/winsup/cygwin/security.h b/winsup/cygwin/security.h index 1270e105d..c5efe7f0e 100644 --- a/winsup/cygwin/security.h +++ b/winsup/cygwin/security.h @@ -321,7 +321,6 @@ enum cygpriv_idx { const LUID *privilege_luid (enum cygpriv_idx idx); const LUID *privilege_luid_by_name (const char *pname); -const char *privilege_name (enum cygpriv_idx idx); inline BOOL legal_sid_type (SID_NAME_USE type) @@ -381,10 +380,10 @@ bool get_logon_server (const char * domain, char * server, WCHAR *wserver, bool rediscovery); /* sec_helper.cc: Security helper functions. */ -int set_privilege (HANDLE token, enum cygpriv_idx privilege, bool enable); +int set_privilege (HANDLE token, const LUID *priv_luid, bool enable); void set_cygwin_privileges (HANDLE token); -#define set_process_privilege(p,v) set_privilege (hProcToken, (p), (v)) +#define set_process_privilege(p,v) set_privilege (hProcToken, privilege_luid (p), (v)) #define _push_thread_privilege(_priv, _val, _check) { \ HANDLE _dup_token = NULL; \ @@ -397,7 +396,7 @@ void set_cygwin_privileges (HANDLE token); else if (!ImpersonateLoggedOnUser (_dup_token)) \ debug_printf ("ImpersonateLoggedOnUser: %E"); \ else \ - set_privilege (_dup_token, (_priv), (_val)); + set_privilege (_dup_token, privilege_luid (_priv), (_val)); #define push_thread_privilege(_priv, _val) _push_thread_privilege(_priv,_val,1) #define push_self_privilege(_priv, _val) _push_thread_privilege(_priv,_val,0) |