… | |
… | |
32 | #include <cstdlib> |
32 | #include <cstdlib> |
33 | #include <cstring> |
33 | #include <cstring> |
34 | #include <csignal> |
34 | #include <csignal> |
35 | |
35 | |
36 | #include <sys/types.h> |
36 | #include <sys/types.h> |
37 | #include <sys/socket.h> |
|
|
38 | #include <unistd.h> |
37 | #include <unistd.h> |
39 | #include <fcntl.h> |
38 | #include <fcntl.h> |
40 | |
39 | |
41 | #ifdef HAVE_SYS_IOCTL_H |
40 | #ifdef HAVE_SYS_IOCTL_H |
42 | # include <sys/ioctl.h> |
41 | # include <sys/ioctl.h> |
… | |
… | |
64 | |
63 | |
65 | /* ------------------------------------------------------------------------- * |
64 | /* ------------------------------------------------------------------------- * |
66 | * GET PSEUDO TELETYPE - MASTER AND SLAVE * |
65 | * GET PSEUDO TELETYPE - MASTER AND SLAVE * |
67 | * ------------------------------------------------------------------------- */ |
66 | * ------------------------------------------------------------------------- */ |
68 | /* |
67 | /* |
69 | * Returns pty file descriptor, or -1 on failure |
68 | * Returns pty file descriptor, or -1 on failure |
70 | * If successful, ttydev is set to the name of the slave device. |
69 | * If successful, ttydev is set to the name of the slave device. |
71 | * fd_tty _may_ also be set to an open fd to the slave device |
70 | * fd_tty _may_ also be set to an open fd to the slave device |
72 | */ |
71 | */ |
73 | #if defined(UNIX98_PTY) |
72 | #if defined(UNIX98_PTY) |
|
|
73 | |
74 | static int |
74 | static int |
75 | get_pty (int *fd_tty, char **ttydev) |
75 | get_pty (int *fd_tty, char **ttydev) |
76 | { |
76 | { |
77 | int pfd; |
77 | int pfd; |
78 | |
78 | |
79 | # if defined(HAVE_GETPT) |
79 | # if defined(HAVE_GETPT) |
80 | pfd = getpt(); |
80 | pfd = getpt(); |
81 | # elif defined(HAVE_POSIX_OPENPT) |
81 | # elif defined(HAVE_POSIX_OPENPT) |
82 | pfd = posix_openpt (O_RDWR); |
82 | pfd = posix_openpt (O_RDWR); |
83 | # else |
83 | # else |
84 | pfd = open (CLONE_DEVICE, O_RDWR | O_NOCTTY, 0); |
84 | pfd = open (CLONE_DEVICE, O_RDWR | O_NOCTTY, 0); |
85 | # endif |
85 | # endif |
|
|
86 | |
86 | if (pfd >= 0) |
87 | if (pfd >= 0) |
87 | { |
88 | { |
88 | if (grantpt (pfd) == 0 /* change slave permissions */ |
89 | if (grantpt (pfd) == 0 /* change slave permissions */ |
89 | && unlockpt (pfd) == 0) |
90 | && unlockpt (pfd) == 0) |
90 | { /* slave now unlocked */ |
91 | { /* slave now unlocked */ |
91 | *ttydev = strdup (ptsname (pfd)); /* get slave's name */ |
92 | *ttydev = strdup (ptsname (pfd)); /* get slave's name */ |
92 | return pfd; |
93 | return pfd; |
93 | } |
94 | } |
94 | |
95 | |
95 | close (pfd); |
96 | close (pfd); |
96 | } |
97 | } |
97 | |
98 | |
98 | return -1; |
99 | return -1; |
99 | } |
100 | } |
|
|
101 | |
100 | #elif defined(HAVE_OPENPTY) |
102 | #elif defined(HAVE_OPENPTY) |
|
|
103 | |
101 | static int |
104 | static int |
102 | get_pty (int *fd_tty, char **ttydev) |
105 | get_pty (int *fd_tty, char **ttydev) |
103 | { |
106 | { |
104 | int pfd; |
107 | int pfd; |
105 | int res; |
108 | int res; |
106 | char tty_name[32]; |
109 | |
107 | |
|
|
108 | res = openpty (&pfd, fd_tty, tty_name, NULL, NULL); |
110 | res = openpty (&pfd, fd_tty, NULL, NULL, NULL); |
|
|
111 | |
109 | if (res != -1) |
112 | if (res != -1) |
110 | { |
113 | { |
111 | *ttydev = strdup (tty_name); |
114 | *ttydev = strdup (ttyname (*fd_tty)); |
|
|
115 | return pfd; |
|
|
116 | } |
|
|
117 | |
|
|
118 | return -1; |
|
|
119 | } |
|
|
120 | |
|
|
121 | #elif defined(HAVE__GETPTY) |
|
|
122 | |
|
|
123 | static int |
|
|
124 | get_pty (int *fd_tty, char **ttydev) |
|
|
125 | { |
|
|
126 | int pfd; |
|
|
127 | |
|
|
128 | *ttydev = _getpty (&pfd, O_RDWR | O_NONBLOCK | O_NOCTTY, 0622, 0); |
|
|
129 | |
|
|
130 | if (*ttydev != NULL) |
112 | return pfd; |
131 | return pfd; |
113 | } |
|
|
114 | |
132 | |
115 | return -1; |
133 | return -1; |
116 | } |
134 | } |
117 | #elif defined(HAVE__GETPTY) |
|
|
118 | static int |
|
|
119 | get_pty (int *fd_tty, char **ttydev) |
|
|
120 | { |
|
|
121 | int pfd; |
|
|
122 | |
135 | |
123 | *ttydev = _getpty (&pfd, O_RDWR | O_NONBLOCK | O_NOCTTY, 0622, 0); |
|
|
124 | if (*ttydev != NULL) |
|
|
125 | return pfd; |
|
|
126 | |
|
|
127 | return -1; |
|
|
128 | } |
|
|
129 | #elif defined(HAVE_DEV_PTC) |
136 | #elif defined(HAVE_DEV_PTC) |
|
|
137 | |
130 | static int |
138 | static int |
131 | get_pty (int *fd_tty, char **ttydev) |
139 | get_pty (int *fd_tty, char **ttydev) |
132 | { |
140 | { |
133 | int pfd; |
141 | int pfd; |
134 | |
142 | |
135 | if ((pfd = open ("/dev/ptc", O_RDWR | O_NOCTTY, 0)) >= 0) |
143 | if ((pfd = open ("/dev/ptc", O_RDWR | O_NOCTTY, 0)) >= 0) |
136 | { |
144 | { |
137 | *ttydev = strdup (ttyname (pfd)); |
145 | *ttydev = strdup (ttyname (pfd)); |
138 | return pfd; |
146 | return pfd; |
139 | } |
147 | } |
140 | |
148 | |
141 | return -1; |
149 | return -1; |
142 | } |
150 | } |
|
|
151 | |
143 | #elif defined(HAVE_DEV_CLONE) |
152 | #elif defined(HAVE_DEV_CLONE) |
|
|
153 | |
144 | static int |
154 | static int |
145 | get_pty (int *fd_tty, char **ttydev) |
155 | get_pty (int *fd_tty, char **ttydev) |
146 | { |
156 | { |
147 | int pfd; |
157 | int pfd; |
148 | |
158 | |
149 | if ((pfd = open ("/dev/ptym/clone", O_RDWR | O_NOCTTY, 0)) >= 0) |
159 | if ((pfd = open ("/dev/ptym/clone", O_RDWR | O_NOCTTY, 0)) >= 0) |
150 | { |
160 | { |
151 | *ttydev = strdup (ptsname (pfd)); |
161 | *ttydev = strdup (ptsname (pfd)); |
152 | return pfd; |
162 | return pfd; |
153 | } |
163 | } |
154 | |
164 | |
155 | return -1; |
165 | return -1; |
156 | } |
166 | } |
|
|
167 | |
157 | #else |
168 | #else |
|
|
169 | |
158 | /* Based on the code in openssh/openbsd-compat/bsd-openpty.c */ |
170 | /* Based on the code in openssh/openbsd-compat/bsd-openpty.c */ |
159 | static int |
171 | static int |
160 | get_pty (int *fd_tty, char **ttydev) |
172 | get_pty (int *fd_tty, char **ttydev) |
161 | { |
173 | { |
162 | int pfd; |
174 | int pfd; |
163 | int i; |
175 | int i; |
164 | char pty_name[32]; |
176 | char pty_name[32]; |
165 | char tty_name[32]; |
177 | char tty_name[32]; |
166 | const char *majors = "pqrstuvwxyzabcde"; |
178 | const char *majors = "pqrstuvwxyzabcde"; |
167 | const char *minors = "0123456789abcdef"; |
179 | const char *minors = "0123456789abcdef"; |
|
|
180 | |
168 | for (i = 0; i < 256; i++) |
181 | for (i = 0; i < 256; i++) |
169 | { |
182 | { |
170 | snprintf(pty_name, 32, "/dev/pty%c%c", majors[i / 16], minors[i % 16]); |
183 | snprintf(pty_name, 32, "/dev/pty%c%c", majors[i / 16], minors[i % 16]); |
171 | snprintf(tty_name, 32, "/dev/tty%c%c", majors[i / 16], minors[i % 16]); |
184 | snprintf(tty_name, 32, "/dev/tty%c%c", majors[i / 16], minors[i % 16]); |
|
|
185 | |
172 | if ((pfd = open (pty_name, O_RDWR | O_NOCTTY, 0)) == -1) |
186 | if ((pfd = open (pty_name, O_RDWR | O_NOCTTY, 0)) == -1) |
173 | { |
187 | { |
174 | snprintf(pty_name, 32, "/dev/ptyp%d", i); |
188 | snprintf(pty_name, 32, "/dev/ptyp%d", i); |
175 | snprintf(tty_name, 32, "/dev/ttyp%d", i); |
189 | snprintf(tty_name, 32, "/dev/ttyp%d", i); |
176 | if ((pfd = open (pty_name, O_RDWR | O_NOCTTY, 0)) == -1) |
190 | if ((pfd = open (pty_name, O_RDWR | O_NOCTTY, 0)) == -1) |
177 | continue; |
191 | continue; |
178 | } |
192 | } |
|
|
193 | |
179 | if (access (tty_name, R_OK | W_OK) == 0) |
194 | if (access (tty_name, R_OK | W_OK) == 0) |
180 | { |
195 | { |
181 | *ttydev = strdup (tty_name); |
196 | *ttydev = strdup (tty_name); |
182 | return pfd; |
197 | return pfd; |
183 | } |
198 | } |
184 | |
199 | |
185 | close (pfd); |
200 | close (pfd); |
186 | } |
201 | } |
187 | } |
202 | |
|
|
203 | return -1; |
|
|
204 | } |
|
|
205 | |
188 | #endif |
206 | #endif |
189 | |
207 | |
190 | /*----------------------------------------------------------------------*/ |
208 | /*----------------------------------------------------------------------*/ |
191 | /* |
209 | /* |
192 | * Returns tty file descriptor, or -1 on failure |
210 | * Returns tty file descriptor, or -1 on failure |
193 | */ |
211 | */ |
194 | static int |
212 | static int |
195 | get_tty (char *ttydev) |
213 | get_tty (char *ttydev) |
196 | { |
214 | { |
197 | return open (ttydev, O_RDWR | O_NOCTTY, 0); |
215 | return open (ttydev, O_RDWR | O_NOCTTY, 0); |
… | |
… | |
202 | * Make our tty a controlling tty so that /dev/tty points to us |
220 | * Make our tty a controlling tty so that /dev/tty points to us |
203 | */ |
221 | */ |
204 | static int |
222 | static int |
205 | control_tty (int fd_tty) |
223 | control_tty (int fd_tty) |
206 | { |
224 | { |
|
|
225 | int fd; |
|
|
226 | |
207 | setsid (); |
227 | setsid (); |
208 | |
228 | |
209 | #if defined(HAVE_DEV_PTMX) && defined(I_PUSH) |
229 | #if defined(HAVE_DEV_PTMX) && defined(I_PUSH) |
210 | /* |
230 | /* |
211 | * Push STREAMS modules: |
231 | * Push STREAMS modules: |
… | |
… | |
232 | ioctl (fd_tty, I_PUSH, "ldterm"); |
252 | ioctl (fd_tty, I_PUSH, "ldterm"); |
233 | ioctl (fd_tty, I_PUSH, "ttcompat"); |
253 | ioctl (fd_tty, I_PUSH, "ttcompat"); |
234 | } |
254 | } |
235 | #endif |
255 | #endif |
236 | |
256 | |
|
|
257 | #ifdef TIOCSCTTY |
237 | ioctl (fd_tty, TIOCSCTTY, NULL); |
258 | ioctl (fd_tty, TIOCSCTTY, NULL); |
|
|
259 | #else |
|
|
260 | fd = open (ttyname (fd_tty), O_RDWR); |
|
|
261 | if (fd >= 0) |
|
|
262 | close (fd); |
|
|
263 | #endif |
238 | |
264 | |
239 | int fd = open ("/dev/tty", O_WRONLY); |
265 | fd = open ("/dev/tty", O_WRONLY); |
240 | if (fd < 0) |
266 | if (fd < 0) |
241 | return -1; /* fatal */ |
267 | return -1; /* fatal */ |
242 | |
268 | |
243 | close (fd); |
269 | close (fd); |
244 | |
270 | |
… | |
… | |
328 | } |
354 | } |
329 | |
355 | |
330 | void |
356 | void |
331 | ptytty_unix::put () |
357 | ptytty_unix::put () |
332 | { |
358 | { |
|
|
359 | if (name) |
|
|
360 | { |
333 | chmod (name, RESTORE_TTY_MODE); |
361 | chmod (name, RESTORE_TTY_MODE); |
334 | chown (name, 0, ttyconf.gid); |
362 | chown (name, 0, ttyconf.gid); |
|
|
363 | } |
335 | |
364 | |
336 | close_tty (); |
365 | close_tty (); |
337 | |
366 | |
338 | if (pty >= 0) |
367 | if (pty >= 0) |
339 | close (pty); |
368 | close (pty); |
… | |
… | |
372 | } |
401 | } |
373 | |
402 | |
374 | return true; |
403 | return true; |
375 | } |
404 | } |
376 | |
405 | |
377 | ///////////////////////////////////////////////////////////////////////////// |
|
|
378 | // helper/proxy support |
|
|
379 | |
|
|
380 | #if PTYTTY_HELPER |
|
|
381 | |
|
|
382 | static int sock_fd = -1, lock_fd = -1; |
|
|
383 | static int helper_pid, owner_pid; |
|
|
384 | |
|
|
385 | struct command |
|
|
386 | { |
|
|
387 | enum { get, login, destroy } type; |
|
|
388 | |
|
|
389 | ptytty *id; |
|
|
390 | |
|
|
391 | bool login_shell; |
|
|
392 | int cmd_pid; |
|
|
393 | char hostname[512]; // arbitrary, but should be plenty |
|
|
394 | }; |
|
|
395 | |
|
|
396 | struct ptytty_proxy : ptytty |
|
|
397 | { |
|
|
398 | ptytty *id; |
|
|
399 | |
|
|
400 | ptytty_proxy () |
|
|
401 | : id(0) |
|
|
402 | { |
|
|
403 | } |
|
|
404 | |
|
|
405 | ~ptytty_proxy (); |
|
|
406 | |
|
|
407 | bool get (); |
|
|
408 | void login (int cmd_pid, bool login_shell, const char *hostname); |
|
|
409 | }; |
|
|
410 | |
|
|
411 | bool |
|
|
412 | ptytty_proxy::get () |
|
|
413 | { |
|
|
414 | command cmd; |
|
|
415 | |
|
|
416 | cmd.type = command::get; |
|
|
417 | |
|
|
418 | write (sock_fd, &cmd, sizeof (cmd)); |
|
|
419 | |
|
|
420 | if (read (sock_fd, &id, sizeof (id)) != sizeof (id)) |
|
|
421 | ptytty_fatal ("protocol error while creating pty using helper process, aborting.\n"); |
|
|
422 | |
|
|
423 | if (!id) |
|
|
424 | return false; |
|
|
425 | |
|
|
426 | if ((pty = recv_fd (sock_fd)) < 0 |
|
|
427 | || (tty = recv_fd (sock_fd)) < 0) |
|
|
428 | ptytty_fatal ("protocol error while reading pty/tty fds from helper process, aborting.\n"); |
|
|
429 | |
|
|
430 | return true; |
|
|
431 | } |
|
|
432 | |
|
|
433 | void |
|
|
434 | ptytty_proxy::login (int cmd_pid, bool login_shell, const char *hostname) |
|
|
435 | { |
|
|
436 | command cmd; |
|
|
437 | |
|
|
438 | cmd.type = command::login; |
|
|
439 | cmd.id = id; |
|
|
440 | cmd.cmd_pid = cmd_pid; |
|
|
441 | cmd.login_shell = login_shell; |
|
|
442 | strncpy (cmd.hostname, hostname, sizeof (cmd.hostname)); |
|
|
443 | |
|
|
444 | write (sock_fd, &cmd, sizeof (cmd)); |
|
|
445 | } |
|
|
446 | |
|
|
447 | ptytty_proxy::~ptytty_proxy () |
|
|
448 | { |
|
|
449 | if (id) |
|
|
450 | { |
|
|
451 | command cmd; |
|
|
452 | |
|
|
453 | cmd.type = command::destroy; |
|
|
454 | cmd.id = id; |
|
|
455 | |
|
|
456 | write (sock_fd, &cmd, sizeof (cmd)); |
|
|
457 | } |
|
|
458 | } |
|
|
459 | |
|
|
460 | static |
|
|
461 | void serve () |
|
|
462 | { |
|
|
463 | command cmd; |
|
|
464 | vector<ptytty *> ptys; |
|
|
465 | |
|
|
466 | while (read (sock_fd, &cmd, sizeof (command)) == sizeof (command)) |
|
|
467 | { |
|
|
468 | if (cmd.type == command::get) |
|
|
469 | { |
|
|
470 | // -> id ptyfd ttyfd |
|
|
471 | cmd.id = new ptytty_unix; |
|
|
472 | |
|
|
473 | if (cmd.id->get ()) |
|
|
474 | { |
|
|
475 | write (sock_fd, &cmd.id, sizeof (cmd.id)); |
|
|
476 | ptys.push_back (cmd.id); |
|
|
477 | |
|
|
478 | ptytty::send_fd (sock_fd, cmd.id->pty); |
|
|
479 | ptytty::send_fd (sock_fd, cmd.id->tty); |
|
|
480 | } |
|
|
481 | else |
|
|
482 | { |
|
|
483 | delete cmd.id; |
|
|
484 | cmd.id = 0; |
|
|
485 | write (sock_fd, &cmd.id, sizeof (cmd.id)); |
|
|
486 | } |
|
|
487 | } |
|
|
488 | else if (cmd.type == command::login) |
|
|
489 | { |
|
|
490 | #if UTMP_SUPPORT |
|
|
491 | if (find (ptys.begin (), ptys.end (), cmd.id) != ptys.end ()) |
|
|
492 | { |
|
|
493 | cmd.hostname[sizeof (cmd.hostname) - 1] = 0; |
|
|
494 | cmd.id->login (cmd.cmd_pid, cmd.login_shell, cmd.hostname); |
|
|
495 | } |
|
|
496 | #endif |
|
|
497 | } |
|
|
498 | else if (cmd.type == command::destroy) |
|
|
499 | { |
|
|
500 | vector<ptytty *>::iterator pty = find (ptys.begin (), ptys.end (), cmd.id); |
|
|
501 | |
|
|
502 | if (pty != ptys.end ()) |
|
|
503 | { |
|
|
504 | delete *pty; |
|
|
505 | ptys.erase (pty); |
|
|
506 | } |
|
|
507 | } |
|
|
508 | else |
|
|
509 | break; |
|
|
510 | } |
|
|
511 | |
|
|
512 | // destroy all ptys |
|
|
513 | for (vector<ptytty *>::iterator i = ptys.end (); i-- > ptys.begin (); ) |
|
|
514 | delete *i; |
|
|
515 | } |
|
|
516 | |
|
|
517 | void |
|
|
518 | ptytty::use_helper () |
|
|
519 | { |
|
|
520 | int pid = getpid (); |
|
|
521 | |
|
|
522 | if (sock_fd >= 0 && pid == owner_pid) |
|
|
523 | return; |
|
|
524 | |
|
|
525 | owner_pid = pid; |
|
|
526 | |
|
|
527 | int sv[2]; |
|
|
528 | |
|
|
529 | if (socketpair (AF_UNIX, SOCK_STREAM, 0, sv)) |
|
|
530 | ptytty_fatal ("could not create socket to communicate with pty/sessiondb helper, aborting.\n"); |
|
|
531 | |
|
|
532 | #ifdef PTYTTY_REENTRANT |
|
|
533 | int lv[2]; |
|
|
534 | |
|
|
535 | if (socketpair (AF_UNIX, SOCK_STREAM, 0, lv)) |
|
|
536 | ptytty_fatal ("could not create socket to communicate with pty/sessiondb helper, aborting.\n"); |
|
|
537 | #endif |
|
|
538 | |
|
|
539 | helper_pid = fork (); |
|
|
540 | |
|
|
541 | if (helper_pid < 0) |
|
|
542 | ptytty_fatal ("could not create pty/sessiondb helper process, aborting.\n"); |
|
|
543 | |
|
|
544 | if (helper_pid) |
|
|
545 | { |
|
|
546 | // client, process |
|
|
547 | sock_fd = sv[0]; |
|
|
548 | close (sv[1]); |
|
|
549 | fcntl (sock_fd, F_SETFD, FD_CLOEXEC); |
|
|
550 | #ifdef PTYTTY_REENTRANT |
|
|
551 | lock_fd = lv[0]; |
|
|
552 | close (lv[1]); |
|
|
553 | fcntl (lock_fd, F_SETFD, FD_CLOEXEC); |
|
|
554 | #endif |
|
|
555 | } |
|
|
556 | else |
|
|
557 | { |
|
|
558 | // server, pty-helper |
|
|
559 | sock_fd = sv[1]; |
|
|
560 | #ifdef PTYTTY_REENTRANT |
|
|
561 | lock_fd = lv[1]; |
|
|
562 | #endif |
|
|
563 | |
|
|
564 | chdir ("/"); |
|
|
565 | |
|
|
566 | signal (SIGHUP, SIG_IGN); |
|
|
567 | signal (SIGTERM, SIG_IGN); |
|
|
568 | signal (SIGINT, SIG_IGN); |
|
|
569 | signal (SIGPIPE, SIG_IGN); |
|
|
570 | |
|
|
571 | for (int fd = 0; fd < 1023; fd++) |
|
|
572 | if (fd != sock_fd && fd != lock_fd) |
|
|
573 | close (fd); |
|
|
574 | |
|
|
575 | serve (); |
|
|
576 | _exit (EXIT_SUCCESS); |
|
|
577 | } |
|
|
578 | } |
|
|
579 | |
|
|
580 | #endif |
|
|
581 | |
|
|
582 | ptytty * |
|
|
583 | ptytty::create () |
|
|
584 | { |
|
|
585 | #if PTYTTY_HELPER |
|
|
586 | if (helper_pid && getpid () == owner_pid) |
|
|
587 | // use helper process |
|
|
588 | return new ptytty_proxy; |
|
|
589 | else |
|
|
590 | #endif |
|
|
591 | return new ptytty_unix; |
|
|
592 | } |
|
|
593 | |
|
|
594 | void |
|
|
595 | ptytty::init () |
|
|
596 | { |
|
|
597 | uid_t uid = getuid (); |
|
|
598 | gid_t gid = getgid (); |
|
|
599 | |
|
|
600 | // before doing anything else, check for setuid/setgid operation, |
|
|
601 | // start the helper process and drop privileges |
|
|
602 | if (uid != geteuid () |
|
|
603 | || gid != getegid ()) |
|
|
604 | { |
|
|
605 | #if PTYTTY_HELPER |
|
|
606 | use_helper (); |
|
|
607 | #else |
|
|
608 | ptytty_warn ("running setuid/setgid without pty helper compiled in, continuing unprivileged.\n"); |
|
|
609 | #endif |
|
|
610 | |
|
|
611 | drop_privileges (); |
|
|
612 | } |
|
|
613 | } |
|
|
614 | |
|
|
615 | void |
|
|
616 | ptytty::drop_privileges () |
|
|
617 | { |
|
|
618 | uid_t uid = getuid (); |
|
|
619 | gid_t gid = getgid (); |
|
|
620 | |
|
|
621 | // drop privileges |
|
|
622 | #if HAVE_SETRESUID |
|
|
623 | setresgid (gid, gid, gid); |
|
|
624 | setresuid (uid, uid, uid); |
|
|
625 | #elif HAVE_SETREUID |
|
|
626 | setregid (gid, gid); |
|
|
627 | setreuid (uid, uid); |
|
|
628 | #elif HAVE_SETUID |
|
|
629 | setgid (gid); |
|
|
630 | setuid (uid); |
|
|
631 | #endif |
|
|
632 | |
|
|
633 | if (uid != geteuid () |
|
|
634 | || gid != getegid ()) |
|
|
635 | ptytty_fatal ("unable to drop privileges, aborting.\n"); |
|
|
636 | } |
|
|
637 | |
|
|
638 | ///////////////////////////////////////////////////////////////////////////// |
|
|
639 | // C API |
|
|
640 | |
|
|
641 | #ifndef NO_C_API |
|
|
642 | |
|
|
643 | #define DEFINE_METHOD(retval, name, args1, args2) \ |
|
|
644 | extern "C" retval ptytty_ ## name args1 \ |
|
|
645 | { return ((struct ptytty *)ptytty)->name args2; } |
|
|
646 | |
|
|
647 | DEFINE_METHOD(int,pty,(void *ptytty),) |
|
|
648 | DEFINE_METHOD(int,tty,(void *ptytty),) |
|
|
649 | DEFINE_METHOD(int,get,(void *ptytty),()) |
|
|
650 | DEFINE_METHOD(void,login,(void *ptytty, int cmd_pid, bool login_shell, const char *hostname),(cmd_pid,login_shell,hostname)) |
|
|
651 | |
|
|
652 | DEFINE_METHOD(void,close_tty,(void *ptytty),()) |
|
|
653 | DEFINE_METHOD(int,make_controlling_tty,(void *ptytty),()) |
|
|
654 | DEFINE_METHOD(void,set_utf8_mode,(void *ptytty, int on),(on)) |
|
|
655 | |
|
|
656 | #define DEFINE_STATIC(retval, name, args) \ |
|
|
657 | extern "C" retval ptytty_ ## name args \ |
|
|
658 | { return ptytty::name args; } |
|
|
659 | |
|
|
660 | DEFINE_STATIC(void,drop_privileges,()) |
|
|
661 | DEFINE_STATIC(void,use_helper,()) |
|
|
662 | DEFINE_STATIC(void,init,()) |
|
|
663 | |
|
|
664 | DEFINE_STATIC(void *,create,()) |
|
|
665 | |
|
|
666 | void ptytty_delete (void *ptytty) |
|
|
667 | { |
|
|
668 | delete (struct ptytty *)ptytty; |
|
|
669 | } |
|
|
670 | |
|
|
671 | // send_fd, recv_fd not exposed |
|
|
672 | |
|
|
673 | #endif |
|
|