123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492 |
- #include "../zip.h"
- #define WIN32_LEAN_AND_MEAN
- #include <windows.h>
- #ifdef __RSXNT__
- # include "../win32/rsxntwin.h"
- #endif
- #include "../win32/nt.h"
- #ifdef NTSD_EAS
- #ifndef FILE_SHARE_DELETE
- # define FILE_SHARE_DELETE 0x00000004
- #endif
- #ifndef InterlockedExchangePointer
- # define InterlockedExchangePointer(Target, Value) \
- (PVOID)InterlockedExchange((PLONG)(Target), (LONG)(Value))
- #endif
- static BOOL Initialize(VOID);
- #if 0
- static BOOL Shutdown(VOID);
- #endif
- static VOID GetRemotePrivilegesGet(CHAR *FileName, PDWORD dwRemotePrivileges);
- static VOID InitLocalPrivileges(VOID);
- BOOL bZipInitialized = FALSE;
- HANDLE hZipInitMutex = NULL;
- BOOL g_bBackupPrivilege = FALSE;
- BOOL g_bZipSaclPrivilege = FALSE;
- VOLUMECAPS g_VolumeCaps;
- CRITICAL_SECTION VolumeCapsLock;
- static BOOL Initialize(VOID)
- {
- HANDLE hMutex;
- HANDLE hOldMutex;
- if(bZipInitialized) return TRUE;
- hMutex = CreateMutex(NULL, TRUE, NULL);
- if(hMutex == NULL) return FALSE;
- hOldMutex = (HANDLE)InterlockedExchangePointer((void *)&hZipInitMutex,
- hMutex);
- if(hOldMutex != NULL) {
-
- InterlockedExchangePointer((void *)&hZipInitMutex,
- hOldMutex);
- CloseHandle(hMutex);
-
- WaitForSingleObject(hOldMutex, INFINITE);
- ReleaseMutex(hOldMutex);
- return bZipInitialized;
- }
-
- InitializeCriticalSection( &VolumeCapsLock );
- memset(&g_VolumeCaps, 0, sizeof(VOLUMECAPS));
- InitLocalPrivileges();
- bZipInitialized = TRUE;
- ReleaseMutex(hMutex);
- return TRUE;
- }
- #if 0
- static BOOL Shutdown(VOID)
- {
-
- return TRUE;
- }
- #endif
- static VOID GetRemotePrivilegesGet(char *FileName, PDWORD dwRemotePrivileges)
- {
- HANDLE hFile;
- *dwRemotePrivileges = 0;
-
- hFile = CreateFileA(
- FileName,
- ACCESS_SYSTEM_SECURITY | GENERIC_READ | READ_CONTROL,
- FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE,
- NULL,
- OPEN_EXISTING,
- FILE_FLAG_BACKUP_SEMANTICS,
- NULL
- );
- if(hFile != INVALID_HANDLE_VALUE) {
-
- SECURITY_INFORMATION si = DACL_SECURITY_INFORMATION | SACL_SECURITY_INFORMATION;
- PSECURITY_DESCRIPTOR sd;
- DWORD cbBuf = 0;
- GetKernelObjectSecurity(hFile, si, NULL, cbBuf, &cbBuf);
- if(ERROR_INSUFFICIENT_BUFFER == GetLastError()) {
- if((sd = HeapAlloc(GetProcessHeap(), 0, cbBuf)) != NULL) {
- if(GetKernelObjectSecurity(hFile, si, sd, cbBuf, &cbBuf)) {
- *dwRemotePrivileges |= OVERRIDE_BACKUP;
- }
- HeapFree(GetProcessHeap(), 0, sd);
- }
- }
- CloseHandle(hFile);
- } else {
-
-
- hFile = CreateFileA(
- FileName,
- ACCESS_SYSTEM_SECURITY,
- FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE,
- NULL,
- OPEN_EXISTING,
- 0,
- NULL
- );
- if(hFile != INVALID_HANDLE_VALUE) {
- CloseHandle(hFile);
- *dwRemotePrivileges |= OVERRIDE_SACL;
- }
- }
- }
- BOOL ZipGetVolumeCaps(
- char *rootpath,
- char *name,
- PVOLUMECAPS VolumeCaps
- )
- {
- char TempRootPath[MAX_PATH + 1];
- DWORD cchTempRootPath = 0;
- BOOL bSuccess = TRUE;
- if(!bZipInitialized) if(!Initialize()) return FALSE;
-
- if(rootpath != NULL && rootpath[0] != '\0') {
- DWORD i;
- cchTempRootPath = lstrlen(rootpath);
- if(cchTempRootPath > MAX_PATH) return FALSE;
-
- for(i = 0 ; i <= cchTempRootPath ; i++) {
- if(rootpath[i] == '/') TempRootPath[i] = '\\';
- else TempRootPath[i] = rootpath[i];
- }
-
-
- if(TempRootPath[0] == '\\' && TempRootPath[1] == '\\') {
- DWORD slash = 0;
- for(i = 2 ; i < cchTempRootPath ; i++) {
- if(TempRootPath[i] == '\\') {
- slash++;
- if(slash == 2) {
- i++;
- TempRootPath[i] = '\0';
- cchTempRootPath = i;
- break;
- }
- }
- }
-
- if(slash == 1 && TempRootPath[cchTempRootPath] != '\\') {
- TempRootPath[cchTempRootPath] = TempRootPath[0];
- TempRootPath[cchTempRootPath+1] = '\0';
- cchTempRootPath++;
- }
- } else {
- if(TempRootPath[1] == ':') {
-
- TempRootPath[2] = '\\';
- TempRootPath[3] = '\0';
- cchTempRootPath = 3;
- } else {
-
- TempRootPath[0] = '\0';
- cchTempRootPath = 0;
- }
- }
- }
-
- EnterCriticalSection( &VolumeCapsLock );
- if(!g_VolumeCaps.bValid || lstrcmpi(g_VolumeCaps.RootPath, TempRootPath) != 0) {
-
- DWORD dwFileSystemFlags;
- DWORD dwRemotePrivileges = 0;
- BOOL bRemote = FALSE;
-
- LeaveCriticalSection( &VolumeCapsLock );
- bSuccess = GetVolumeInformation(
- (TempRootPath[0] == '\0') ? NULL : TempRootPath,
- NULL, 0,
- NULL, NULL,
- &dwFileSystemFlags,
- NULL, 0);
-
- if(bSuccess && (dwFileSystemFlags & FS_PERSISTENT_ACLS) && VolumeCaps->bUsePrivileges) {
- if(GetDriveType( (TempRootPath[0] == '\0') ? NULL : TempRootPath ) == DRIVE_REMOTE) {
- bRemote = TRUE;
-
- GetRemotePrivilegesGet(name, &dwRemotePrivileges);
- }
- }
-
- EnterCriticalSection( &VolumeCapsLock );
-
- if(bSuccess) {
- lstrcpynA(g_VolumeCaps.RootPath, TempRootPath, cchTempRootPath+1);
- g_VolumeCaps.bProcessDefer = FALSE;
- g_VolumeCaps.dwFileSystemFlags = dwFileSystemFlags;
- g_VolumeCaps.bRemote = bRemote;
- g_VolumeCaps.dwRemotePrivileges = dwRemotePrivileges;
- g_VolumeCaps.bValid = TRUE;
- }
- }
- if(bSuccess) {
-
- g_VolumeCaps.bUsePrivileges = VolumeCaps->bUsePrivileges;
- g_VolumeCaps.dwFileAttributes = VolumeCaps->dwFileAttributes;
-
- memcpy(VolumeCaps, &g_VolumeCaps, sizeof(VOLUMECAPS));
- } else {
- g_VolumeCaps.bValid = FALSE;
- }
- LeaveCriticalSection( &VolumeCapsLock );
- return bSuccess;
- }
- BOOL SecurityGet(
- char *resource,
- PVOLUMECAPS VolumeCaps,
- unsigned char *buffer,
- DWORD *cbBuffer
- )
- {
- HANDLE hFile;
- DWORD dwDesiredAccess;
- DWORD dwFlags;
- PSECURITY_DESCRIPTOR sd = (PSECURITY_DESCRIPTOR)buffer;
- SECURITY_INFORMATION RequestedInfo;
- BOOL bBackupPrivilege = FALSE;
- BOOL bSaclPrivilege = FALSE;
- BOOL bSuccess = FALSE;
- DWORD cchResourceLen;
- if(!bZipInitialized) if(!Initialize()) return FALSE;
-
-
- cchResourceLen = lstrlenA(resource);
- if(resource[cchResourceLen-1] == '/' || resource[cchResourceLen-1] == '\\')
- VolumeCaps->dwFileAttributes |= FILE_ATTRIBUTE_DIRECTORY;
-
- if(VolumeCaps->bUsePrivileges) {
- if(VolumeCaps->bRemote) {
-
- if(VolumeCaps->dwRemotePrivileges & OVERRIDE_BACKUP)
- bBackupPrivilege = TRUE;
- if(VolumeCaps->dwRemotePrivileges & OVERRIDE_SACL)
- bSaclPrivilege = TRUE;
- } else {
-
- bBackupPrivilege = g_bBackupPrivilege;
- bSaclPrivilege = g_bZipSaclPrivilege;
- }
- }
-
- dwDesiredAccess = READ_CONTROL;
- RequestedInfo = OWNER_SECURITY_INFORMATION |
- GROUP_SECURITY_INFORMATION |
- DACL_SECURITY_INFORMATION;
-
- if(bBackupPrivilege || bSaclPrivilege) {
- dwDesiredAccess |= ACCESS_SYSTEM_SECURITY;
- RequestedInfo |= SACL_SECURITY_INFORMATION;
- }
- dwFlags = 0;
-
-
- if(bBackupPrivilege || (VolumeCaps->dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY))
- dwFlags |= FILE_FLAG_BACKUP_SEMANTICS;
- hFile = CreateFileA(
- resource,
- dwDesiredAccess,
- FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE,
- NULL,
- OPEN_EXISTING,
- dwFlags,
- NULL
- );
- if(hFile == INVALID_HANDLE_VALUE) return FALSE;
- if(GetKernelObjectSecurity(hFile, RequestedInfo, sd, *cbBuffer, cbBuffer)) {
- *cbBuffer = GetSecurityDescriptorLength( sd );
- bSuccess = TRUE;
- }
- CloseHandle(hFile);
- return bSuccess;
- }
- static VOID InitLocalPrivileges(VOID)
- {
- HANDLE hToken;
- TOKEN_PRIVILEGES tp;
-
- if(!OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES, &hToken))
- return;
- tp.PrivilegeCount = 1;
- tp.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
-
- if(LookupPrivilegeValue(NULL, SE_BACKUP_NAME, &tp.Privileges[0].Luid)) {
- if(AdjustTokenPrivileges(hToken, FALSE, &tp, 0, NULL, NULL) &&
- GetLastError() == ERROR_SUCCESS) g_bBackupPrivilege = TRUE;
- }
-
- if(!g_bBackupPrivilege &&
- LookupPrivilegeValue(NULL, SE_SECURITY_NAME, &tp.Privileges[0].Luid)) {
- if(AdjustTokenPrivileges(hToken, FALSE, &tp, 0, NULL, NULL) &&
- GetLastError() == ERROR_SUCCESS) g_bZipSaclPrivilege = TRUE;
- }
- CloseHandle(hToken);
- }
- #endif
|