From 983103b0db51c6be77a93c3d2b4e7decfdc89499 Mon Sep 17 00:00:00 2001 From: Brent Cook Date: Mon, 28 Jul 2014 21:06:37 -0500 Subject: stub win32 issetugid implementation ok deraadt@ beck@ --- crypto/compat/issetugid_win.c | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 crypto/compat/issetugid_win.c (limited to 'crypto/compat/issetugid_win.c') diff --git a/crypto/compat/issetugid_win.c b/crypto/compat/issetugid_win.c new file mode 100644 index 0000000..7602a9b --- /dev/null +++ b/crypto/compat/issetugid_win.c @@ -0,0 +1,21 @@ +/* + * issetugid implementation for Windows + * Public domain + */ + +#include + +/* + * Windows does not have a native setuid/setgid functionality. + * A user must enter credentials each time a process elevates its + * privileges. + * + * So, in theory, this could always return 0, given what I know currently. + * However, it makes sense to stub out initially in 'safe' mode until we + * understand more (and determine if any disabled functionality is actually + * useful on Windows anyway). + */ +int issetugid(void) +{ + return 1; +} -- cgit v1.2.3-55-g6feb