summaryrefslogtreecommitdiffstats
path: root/winsup/cygwin/uinfo.cc
diff options
context:
space:
mode:
authorCorinna Vinschen <corinna@vinschen.de>2014-05-06 12:02:48 +0000
committerCorinna Vinschen <corinna@vinschen.de>2014-05-06 12:02:48 +0000
commit439b7db7850cb69d8119308c5b6f16d1e596161f (patch)
treed84452c8343f1da40e676deac5346d80570ba3eb /winsup/cygwin/uinfo.cc
parent67797a9560f77c1061ad5c901400abc7e9a4fcc2 (diff)
downloadcygnal-439b7db7850cb69d8119308c5b6f16d1e596161f.tar.gz
cygnal-439b7db7850cb69d8119308c5b6f16d1e596161f.tar.bz2
cygnal-439b7db7850cb69d8119308c5b6f16d1e596161f.zip
* grp.cc (internal_getgroups): Drop unused cygsid variable.
* sec_helper.cc (cygpsid::pstring): Use sid_sub_auth_count macro. (cygsid::get_sid): Use MAX_SUBAUTH_CNT rather than wrong constant 8. Don't call memcpy to copy subauthorities into SID, use assignment. (cygsid::getfromstr): Use MAX_SUBAUTH_CNT rather than wrong constant 8. * security.h (MAX_SUBAUTH_CNT): New definition. Set to 11 to cover Microsoft Accounts. (MAX_SID_LEN): Define in terms of SID member sizes and MAX_SUBAUTH_CNT. (DBGSID): Use MAX_SUBAUTH_CNT to define size of SubAuthority array. * uinfo.cc (pwdgrp::fetch_account_from_windows): Handle Micosoft Accounts. Handle them as well known group. Compare domain names case-insensitive. * winlean.h (PIPE_REJECT_REMOTE_CLIENTS): Drop temporary definition since Mingw64 catched up. (DNLEN): Redefine as 16. Explain why.
Diffstat (limited to 'winsup/cygwin/uinfo.cc')
-rw-r--r--winsup/cygwin/uinfo.cc20
1 files changed, 13 insertions, 7 deletions
diff --git a/winsup/cygwin/uinfo.cc b/winsup/cygwin/uinfo.cc
index 10716a3cd..48dd08ab1 100644
--- a/winsup/cygwin/uinfo.cc
+++ b/winsup/cygwin/uinfo.cc
@@ -1384,8 +1384,13 @@ pwdgrp::fetch_account_from_windows (fetch_user_arg_t &arg, cyg_ldap *pldap)
if (ret)
{
/* Builtin account? SYSTEM, for instance, is returned as SidTypeUser,
- if a process is running as LocalSystem service. */
- if (acc_type == SidTypeUser && sid_sub_auth_count (sid) <= 3)
+ if a process is running as LocalSystem service.
+ Microsoft Account? These show up in the user's group list, using the
+ undocumented security authority 11. Even though this is officially a
+ user account, it only matters as part of the group list, so we convert
+ it to a well-known group here. */
+ if (acc_type == SidTypeUser
+ && (sid_sub_auth_count (sid) <= 3 || sid_id_auth (sid) == 11))
acc_type = SidTypeWellKnownGroup;
switch (acc_type)
{
@@ -1409,7 +1414,7 @@ pwdgrp::fetch_account_from_windows (fetch_user_arg_t &arg, cyg_ldap *pldap)
is_domain_account = false;
}
/* Account domain account? */
- else if (!wcscmp (dom, cygheap->dom.account_flat_name ()))
+ else if (!wcscasecmp (dom, cygheap->dom.account_flat_name ()))
{
posix_offset = 0x30000;
if (cygheap->dom.member_machine ()
@@ -1422,7 +1427,7 @@ pwdgrp::fetch_account_from_windows (fetch_user_arg_t &arg, cyg_ldap *pldap)
else if (cygheap->dom.member_machine ())
{
/* Primary domain account? */
- if (!wcscmp (dom, cygheap->dom.primary_flat_name ()))
+ if (!wcscasecmp (dom, cygheap->dom.primary_flat_name ()))
{
posix_offset = 0x100000;
/* In theory domain should have been set to
@@ -1447,7 +1452,7 @@ pwdgrp::fetch_account_from_windows (fetch_user_arg_t &arg, cyg_ldap *pldap)
for (ULONG idx = 0;
(td = cygheap->dom.trusted_domain (idx));
++idx)
- if (!wcscmp (dom, td->NetbiosDomainName))
+ if (!wcscasecmp (dom, td->NetbiosDomainName))
{
domain = td->DnsDomainName;
posix_offset =
@@ -1636,8 +1641,9 @@ pwdgrp::fetch_account_from_windows (fetch_user_arg_t &arg, cyg_ldap *pldap)
}
break;
case SidTypeWellKnownGroup:
- name_style = (cygheap->pg.nss_prefix_always ()) ? fully_qualified
- : plus_prepended;
+ name_style = (cygheap->pg.nss_prefix_always ()
+ || sid_id_auth (sid) == 11) /* Microsoft Account */
+ ? fully_qualified : plus_prepended;
#ifdef INTERIX_COMPATIBLE
if (sid_id_auth (sid) == 5 /* SECURITY_NT_AUTHORITY */
&& sid_sub_auth_count (sid) > 1)