1 |
// This file is part of libptytty. Do not make local modifications. |
2 |
// http://software.schmorp.de/pkg/libptytty |
3 |
|
4 |
/*----------------------------------------------------------------------* |
5 |
* File: ptytty.C |
6 |
*----------------------------------------------------------------------* |
7 |
* |
8 |
* All portions of code are copyright by their respective author/s. |
9 |
* Copyright (c) 1999-2001 Geoff Wing <gcw@pobox.com> |
10 |
* Copyright (c) 2004-2006 Marc Lehmann <pcg@goof.com> |
11 |
* Copyright (c) 2006 Emanuele Giaquinta <e.giaquinta@glauco.it> |
12 |
* |
13 |
* This program is free software; you can redistribute it and/or modify |
14 |
* it under the terms of the GNU General Public License as published by |
15 |
* the Free Software Foundation; either version 2 of the License, or |
16 |
* (at your option) any later version. |
17 |
* |
18 |
* This program is distributed in the hope that it will be useful, |
19 |
* but WITHOUT ANY WARRANTY; without even the implied warranty of |
20 |
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
21 |
* GNU General Public License for more details. |
22 |
* |
23 |
* You should have received a copy of the GNU General Public License |
24 |
* along with this program; if not, write to the Free Software |
25 |
* Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. |
26 |
*---------------------------------------------------------------------*/ |
27 |
|
28 |
#include "../config.h" |
29 |
|
30 |
#include "ptytty.h" |
31 |
|
32 |
#include <cstdlib> |
33 |
#include <cstring> |
34 |
#include <csignal> |
35 |
|
36 |
#include <sys/types.h> |
37 |
#include <sys/socket.h> |
38 |
#include <unistd.h> |
39 |
#include <fcntl.h> |
40 |
|
41 |
#ifdef HAVE_SYS_IOCTL_H |
42 |
# include <sys/ioctl.h> |
43 |
#endif |
44 |
#if defined(HAVE_DEV_PTMX) && defined(HAVE_SYS_STROPTS_H) |
45 |
# include <sys/stropts.h> /* for I_PUSH */ |
46 |
#endif |
47 |
#ifdef HAVE_ISASTREAM |
48 |
# include <stropts.h> |
49 |
#endif |
50 |
#if defined(HAVE_PTY_H) |
51 |
# include <pty.h> |
52 |
#elif defined(HAVE_LIBUTIL_H) |
53 |
# include <libutil.h> |
54 |
#elif defined(HAVE_UTIL_H) |
55 |
# include <util.h> |
56 |
#endif |
57 |
#ifdef TTY_GID_SUPPORT |
58 |
#include <grp.h> |
59 |
#endif |
60 |
|
61 |
#include <cstdio> |
62 |
|
63 |
///////////////////////////////////////////////////////////////////////////// |
64 |
|
65 |
/* ------------------------------------------------------------------------- * |
66 |
* GET PSEUDO TELETYPE - MASTER AND SLAVE * |
67 |
* ------------------------------------------------------------------------- */ |
68 |
/* |
69 |
* Returns pty file descriptor, or -1 on failure |
70 |
* If successful, ttydev is set to the name of the slave device. |
71 |
* fd_tty _may_ also be set to an open fd to the slave device |
72 |
*/ |
73 |
#if defined(UNIX98_PTY) |
74 |
static int |
75 |
get_pty (int *fd_tty, char **ttydev) |
76 |
{ |
77 |
int pfd; |
78 |
|
79 |
# if defined(HAVE_GETPT) |
80 |
pfd = getpt(); |
81 |
# elif defined(HAVE_POSIX_OPENPT) |
82 |
pfd = posix_openpt (O_RDWR); |
83 |
# else |
84 |
pfd = open (CLONE_DEVICE, O_RDWR | O_NOCTTY, 0); |
85 |
# endif |
86 |
if (pfd >= 0) |
87 |
{ |
88 |
if (grantpt (pfd) == 0 /* change slave permissions */ |
89 |
&& unlockpt (pfd) == 0) |
90 |
{ /* slave now unlocked */ |
91 |
*ttydev = strdup (ptsname (pfd)); /* get slave's name */ |
92 |
return pfd; |
93 |
} |
94 |
|
95 |
close (pfd); |
96 |
} |
97 |
|
98 |
return -1; |
99 |
} |
100 |
#elif defined(HAVE_OPENPTY) |
101 |
static int |
102 |
get_pty (int *fd_tty, char **ttydev) |
103 |
{ |
104 |
int pfd; |
105 |
int res; |
106 |
char tty_name[32]; |
107 |
|
108 |
res = openpty (&pfd, fd_tty, tty_name, NULL, NULL); |
109 |
if (res != -1) |
110 |
{ |
111 |
*ttydev = strdup (tty_name); |
112 |
return pfd; |
113 |
} |
114 |
|
115 |
return -1; |
116 |
} |
117 |
#elif defined(HAVE__GETPTY) |
118 |
static int |
119 |
get_pty (int *fd_tty, char **ttydev) |
120 |
{ |
121 |
int pfd; |
122 |
|
123 |
*ttydev = _getpty (&pfd, O_RDWR | O_NONBLOCK | O_NOCTTY, 0622, 0); |
124 |
if (*ttydev != NULL) |
125 |
return pfd; |
126 |
|
127 |
return -1; |
128 |
} |
129 |
#elif defined(HAVE_DEV_PTC) |
130 |
static int |
131 |
get_pty (int *fd_tty, char **ttydev) |
132 |
{ |
133 |
int pfd; |
134 |
|
135 |
if ((pfd = open ("/dev/ptc", O_RDWR | O_NOCTTY, 0)) >= 0) |
136 |
{ |
137 |
*ttydev = strdup (ttyname (pfd)); |
138 |
return pfd; |
139 |
} |
140 |
|
141 |
return -1; |
142 |
} |
143 |
#elif defined(HAVE_DEV_CLONE) |
144 |
static int |
145 |
get_pty (int *fd_tty, char **ttydev) |
146 |
{ |
147 |
int pfd; |
148 |
|
149 |
if ((pfd = open ("/dev/ptym/clone", O_RDWR | O_NOCTTY, 0)) >= 0) |
150 |
{ |
151 |
*ttydev = strdup (ptsname (pfd)); |
152 |
return pfd; |
153 |
} |
154 |
|
155 |
return -1; |
156 |
} |
157 |
#else |
158 |
/* Based on the code in openssh/openbsd-compat/bsd-openpty.c */ |
159 |
static int |
160 |
get_pty (int *fd_tty, char **ttydev) |
161 |
{ |
162 |
int pfd; |
163 |
int i; |
164 |
char pty_name[32]; |
165 |
char tty_name[32]; |
166 |
const char *majors = "pqrstuvwxyzabcde"; |
167 |
const char *minors = "0123456789abcdef"; |
168 |
for (i = 0; i < 256; i++) |
169 |
{ |
170 |
snprintf(pty_name, 32, "/dev/pty%c%c", majors[i / 16], minors[i % 16]); |
171 |
snprintf(tty_name, 32, "/dev/tty%c%c", majors[i / 16], minors[i % 16]); |
172 |
if ((pfd = open (pty_name, O_RDWR | O_NOCTTY, 0)) == -1) |
173 |
{ |
174 |
snprintf(pty_name, 32, "/dev/ptyp%d", i); |
175 |
snprintf(tty_name, 32, "/dev/ttyp%d", i); |
176 |
if ((pfd = open (pty_name, O_RDWR | O_NOCTTY, 0)) == -1) |
177 |
continue; |
178 |
} |
179 |
if (access (tty_name, R_OK | W_OK) == 0) |
180 |
{ |
181 |
*ttydev = strdup (tty_name); |
182 |
return pfd; |
183 |
} |
184 |
|
185 |
close (pfd); |
186 |
} |
187 |
} |
188 |
#endif |
189 |
|
190 |
/*----------------------------------------------------------------------*/ |
191 |
/* |
192 |
* Returns tty file descriptor, or -1 on failure |
193 |
*/ |
194 |
static int |
195 |
get_tty (char *ttydev) |
196 |
{ |
197 |
return open (ttydev, O_RDWR | O_NOCTTY, 0); |
198 |
} |
199 |
|
200 |
/*----------------------------------------------------------------------*/ |
201 |
/* |
202 |
* Make our tty a controlling tty so that /dev/tty points to us |
203 |
*/ |
204 |
static int |
205 |
control_tty (int fd_tty) |
206 |
{ |
207 |
setsid (); |
208 |
|
209 |
#if defined(HAVE_DEV_PTMX) && defined(I_PUSH) |
210 |
/* |
211 |
* Push STREAMS modules: |
212 |
* ptem: pseudo-terminal hardware emulation module. |
213 |
* ldterm: standard terminal line discipline. |
214 |
* ttcompat: V7, 4BSD and XENIX STREAMS compatibility module. |
215 |
* |
216 |
* After we push the STREAMS modules, the first open () on the slave side |
217 |
* (i.e. the next section between the dashes giving us "tty opened OK") |
218 |
* should make the "ptem" (or "ldterm" depending upon either which OS |
219 |
* version or which set of manual pages you have) module give us a |
220 |
* controlling terminal. We must already have close ()d the master side |
221 |
* fd in this child process before we push STREAMS modules on because the |
222 |
* documentation is really unclear about whether it is any close () on |
223 |
* the master side or the last close () - i.e. a proper STREAMS dismantling |
224 |
* close () - on the master side which causes a hang up to be sent |
225 |
* through - Geoff Wing |
226 |
*/ |
227 |
# ifdef HAVE_ISASTREAM |
228 |
if (isastream (fd_tty) == 1) |
229 |
# endif |
230 |
{ |
231 |
ioctl (fd_tty, I_PUSH, "ptem"); |
232 |
ioctl (fd_tty, I_PUSH, "ldterm"); |
233 |
ioctl (fd_tty, I_PUSH, "ttcompat"); |
234 |
} |
235 |
#endif |
236 |
|
237 |
ioctl (fd_tty, TIOCSCTTY, NULL); |
238 |
|
239 |
int fd = open ("/dev/tty", O_WRONLY); |
240 |
if (fd < 0) |
241 |
return -1; /* fatal */ |
242 |
|
243 |
close (fd); |
244 |
|
245 |
return 0; |
246 |
} |
247 |
|
248 |
void |
249 |
ptytty::close_tty () |
250 |
{ |
251 |
if (tty < 0) |
252 |
return; |
253 |
|
254 |
close (tty); |
255 |
tty = -1; |
256 |
} |
257 |
|
258 |
bool |
259 |
ptytty::make_controlling_tty () |
260 |
{ |
261 |
return control_tty (tty) >= 0; |
262 |
} |
263 |
|
264 |
void |
265 |
ptytty::set_utf8_mode (bool on) |
266 |
{ |
267 |
#ifdef IUTF8 |
268 |
if (pty < 0) |
269 |
return; |
270 |
|
271 |
struct termios tio; |
272 |
|
273 |
if (tcgetattr (pty, &tio) != -1) |
274 |
{ |
275 |
tcflag_t new_cflag = tio.c_iflag; |
276 |
|
277 |
if (on) |
278 |
new_cflag |= IUTF8; |
279 |
else |
280 |
new_cflag &= ~IUTF8; |
281 |
|
282 |
if (new_cflag != tio.c_iflag) |
283 |
{ |
284 |
tio.c_iflag = new_cflag; |
285 |
tcsetattr (pty, TCSANOW, &tio); |
286 |
} |
287 |
} |
288 |
#endif |
289 |
} |
290 |
|
291 |
static struct ttyconf { |
292 |
gid_t gid; |
293 |
mode_t mode; |
294 |
|
295 |
ttyconf () |
296 |
{ |
297 |
#ifdef TTY_GID_SUPPORT |
298 |
struct group *gr = getgrnam ("tty"); |
299 |
|
300 |
if (gr) |
301 |
{ /* change group ownership of tty to "tty" */ |
302 |
mode = S_IRUSR | S_IWUSR | S_IWGRP; |
303 |
gid = gr->gr_gid; |
304 |
} |
305 |
else |
306 |
#endif /* TTY_GID_SUPPORT */ |
307 |
{ |
308 |
mode = S_IRUSR | S_IWUSR | S_IWGRP | S_IWOTH; |
309 |
gid = 0; |
310 |
} |
311 |
} |
312 |
} ttyconf; |
313 |
|
314 |
ptytty_unix::ptytty_unix () |
315 |
{ |
316 |
name = 0; |
317 |
#if UTMP_SUPPORT |
318 |
cmd_pid = 0; |
319 |
#endif |
320 |
} |
321 |
|
322 |
ptytty_unix::~ptytty_unix () |
323 |
{ |
324 |
#if UTMP_SUPPORT |
325 |
logout (); |
326 |
#endif |
327 |
put (); |
328 |
} |
329 |
|
330 |
void |
331 |
ptytty_unix::put () |
332 |
{ |
333 |
chmod (name, RESTORE_TTY_MODE); |
334 |
chown (name, 0, ttyconf.gid); |
335 |
|
336 |
close_tty (); |
337 |
|
338 |
if (pty >= 0) |
339 |
close (pty); |
340 |
|
341 |
free (name); |
342 |
|
343 |
pty = tty = -1; |
344 |
name = 0; |
345 |
} |
346 |
|
347 |
bool |
348 |
ptytty_unix::get () |
349 |
{ |
350 |
/* get master (pty) */ |
351 |
if ((pty = get_pty (&tty, &name)) < 0) |
352 |
return false; |
353 |
|
354 |
fcntl (pty, F_SETFL, O_NONBLOCK); |
355 |
|
356 |
/* get slave (tty) */ |
357 |
if (tty < 0) |
358 |
{ |
359 |
#ifndef NO_SETOWNER_TTYDEV |
360 |
chown (name, getuid (), ttyconf.gid); /* fail silently */ |
361 |
chmod (name, ttyconf.mode); |
362 |
# ifdef HAVE_REVOKE |
363 |
revoke (name); |
364 |
# endif |
365 |
#endif |
366 |
|
367 |
if ((tty = get_tty (name)) < 0) |
368 |
{ |
369 |
put (); |
370 |
return false; |
371 |
} |
372 |
} |
373 |
|
374 |
return true; |
375 |
} |
376 |
|
377 |
///////////////////////////////////////////////////////////////////////////// |
378 |
// helper/proxy support |
379 |
|
380 |
#if PTYTTY_HELPER |
381 |
|
382 |
static int sock_fd = -1, lock_fd = -1; |
383 |
static int helper_pid, owner_pid; |
384 |
|
385 |
struct command |
386 |
{ |
387 |
enum { get, login, destroy } type; |
388 |
|
389 |
ptytty *id; |
390 |
|
391 |
bool login_shell; |
392 |
int cmd_pid; |
393 |
char hostname[512]; // arbitrary, but should be plenty |
394 |
}; |
395 |
|
396 |
struct ptytty_proxy : ptytty |
397 |
{ |
398 |
ptytty *id; |
399 |
|
400 |
ptytty_proxy () |
401 |
: id(0) |
402 |
{ |
403 |
} |
404 |
|
405 |
~ptytty_proxy (); |
406 |
|
407 |
bool get (); |
408 |
void login (int cmd_pid, bool login_shell, const char *hostname); |
409 |
}; |
410 |
|
411 |
bool |
412 |
ptytty_proxy::get () |
413 |
{ |
414 |
command cmd; |
415 |
|
416 |
cmd.type = command::get; |
417 |
|
418 |
write (sock_fd, &cmd, sizeof (cmd)); |
419 |
|
420 |
if (read (sock_fd, &id, sizeof (id)) != sizeof (id)) |
421 |
ptytty_fatal ("protocol error while creating pty using helper process, aborting.\n"); |
422 |
|
423 |
if (!id) |
424 |
return false; |
425 |
|
426 |
if ((pty = recv_fd (sock_fd)) < 0 |
427 |
|| (tty = recv_fd (sock_fd)) < 0) |
428 |
ptytty_fatal ("protocol error while reading pty/tty fds from helper process, aborting.\n"); |
429 |
|
430 |
return true; |
431 |
} |
432 |
|
433 |
void |
434 |
ptytty_proxy::login (int cmd_pid, bool login_shell, const char *hostname) |
435 |
{ |
436 |
command cmd; |
437 |
|
438 |
cmd.type = command::login; |
439 |
cmd.id = id; |
440 |
cmd.cmd_pid = cmd_pid; |
441 |
cmd.login_shell = login_shell; |
442 |
strncpy (cmd.hostname, hostname, sizeof (cmd.hostname)); |
443 |
|
444 |
write (sock_fd, &cmd, sizeof (cmd)); |
445 |
} |
446 |
|
447 |
ptytty_proxy::~ptytty_proxy () |
448 |
{ |
449 |
if (id) |
450 |
{ |
451 |
command cmd; |
452 |
|
453 |
cmd.type = command::destroy; |
454 |
cmd.id = id; |
455 |
|
456 |
write (sock_fd, &cmd, sizeof (cmd)); |
457 |
} |
458 |
} |
459 |
|
460 |
static |
461 |
void serve () |
462 |
{ |
463 |
command cmd; |
464 |
vector<ptytty *> ptys; |
465 |
|
466 |
while (read (sock_fd, &cmd, sizeof (command)) == sizeof (command)) |
467 |
{ |
468 |
if (cmd.type == command::get) |
469 |
{ |
470 |
// -> id ptyfd ttyfd |
471 |
cmd.id = new ptytty_unix; |
472 |
|
473 |
if (cmd.id->get ()) |
474 |
{ |
475 |
write (sock_fd, &cmd.id, sizeof (cmd.id)); |
476 |
ptys.push_back (cmd.id); |
477 |
|
478 |
ptytty::send_fd (sock_fd, cmd.id->pty); |
479 |
ptytty::send_fd (sock_fd, cmd.id->tty); |
480 |
} |
481 |
else |
482 |
{ |
483 |
delete cmd.id; |
484 |
cmd.id = 0; |
485 |
write (sock_fd, &cmd.id, sizeof (cmd.id)); |
486 |
} |
487 |
} |
488 |
else if (cmd.type == command::login) |
489 |
{ |
490 |
#if UTMP_SUPPORT |
491 |
if (find (ptys.begin (), ptys.end (), cmd.id) != ptys.end ()) |
492 |
{ |
493 |
cmd.hostname[sizeof (cmd.hostname) - 1] = 0; |
494 |
cmd.id->login (cmd.cmd_pid, cmd.login_shell, cmd.hostname); |
495 |
} |
496 |
#endif |
497 |
} |
498 |
else if (cmd.type == command::destroy) |
499 |
{ |
500 |
vector<ptytty *>::iterator pty = find (ptys.begin (), ptys.end (), cmd.id); |
501 |
|
502 |
if (pty != ptys.end ()) |
503 |
{ |
504 |
delete *pty; |
505 |
ptys.erase (pty); |
506 |
} |
507 |
} |
508 |
else |
509 |
break; |
510 |
} |
511 |
|
512 |
// destroy all ptys |
513 |
for (vector<ptytty *>::iterator i = ptys.end (); i-- > ptys.begin (); ) |
514 |
delete *i; |
515 |
} |
516 |
|
517 |
void |
518 |
ptytty::use_helper () |
519 |
{ |
520 |
int pid = getpid (); |
521 |
|
522 |
if (sock_fd >= 0 && pid == owner_pid) |
523 |
return; |
524 |
|
525 |
owner_pid = pid; |
526 |
|
527 |
int sv[2]; |
528 |
|
529 |
if (socketpair (AF_UNIX, SOCK_STREAM, 0, sv)) |
530 |
ptytty_fatal ("could not create socket to communicate with pty/sessiondb helper, aborting.\n"); |
531 |
|
532 |
#ifdef PTYTTY_REENTRANT |
533 |
int lv[2]; |
534 |
|
535 |
if (socketpair (AF_UNIX, SOCK_STREAM, 0, lv)) |
536 |
ptytty_fatal ("could not create socket to communicate with pty/sessiondb helper, aborting.\n"); |
537 |
#endif |
538 |
|
539 |
helper_pid = fork (); |
540 |
|
541 |
if (helper_pid < 0) |
542 |
ptytty_fatal ("could not create pty/sessiondb helper process, aborting.\n"); |
543 |
|
544 |
if (helper_pid) |
545 |
{ |
546 |
// client, process |
547 |
sock_fd = sv[0]; |
548 |
close (sv[1]); |
549 |
fcntl (sock_fd, F_SETFD, FD_CLOEXEC); |
550 |
#ifdef PTYTTY_REENTRANT |
551 |
lock_fd = lv[0]; |
552 |
close (lv[1]); |
553 |
fcntl (lock_fd, F_SETFD, FD_CLOEXEC); |
554 |
#endif |
555 |
} |
556 |
else |
557 |
{ |
558 |
// server, pty-helper |
559 |
sock_fd = sv[1]; |
560 |
#ifdef PTYTTY_REENTRANT |
561 |
lock_fd = lv[1]; |
562 |
#endif |
563 |
|
564 |
chdir ("/"); |
565 |
|
566 |
signal (SIGHUP, SIG_IGN); |
567 |
signal (SIGTERM, SIG_IGN); |
568 |
signal (SIGINT, SIG_IGN); |
569 |
signal (SIGPIPE, SIG_IGN); |
570 |
|
571 |
for (int fd = 0; fd < 1023; fd++) |
572 |
if (fd != sock_fd && fd != lock_fd) |
573 |
close (fd); |
574 |
|
575 |
serve (); |
576 |
_exit (EXIT_SUCCESS); |
577 |
} |
578 |
} |
579 |
|
580 |
#endif |
581 |
|
582 |
ptytty * |
583 |
ptytty::create () |
584 |
{ |
585 |
#if PTYTTY_HELPER |
586 |
if (helper_pid && getpid () == owner_pid) |
587 |
// use helper process |
588 |
return new ptytty_proxy; |
589 |
else |
590 |
#endif |
591 |
return new ptytty_unix; |
592 |
} |
593 |
|
594 |
void |
595 |
ptytty::init () |
596 |
{ |
597 |
uid_t uid = getuid (); |
598 |
gid_t gid = getgid (); |
599 |
|
600 |
// before doing anything else, check for setuid/setgid operation, |
601 |
// start the helper process and drop privileges |
602 |
if (uid != geteuid () |
603 |
|| gid != getegid ()) |
604 |
{ |
605 |
#if PTYTTY_HELPER |
606 |
use_helper (); |
607 |
#else |
608 |
ptytty_warn ("running setuid/setgid without pty helper compiled in, continuing unprivileged.\n"); |
609 |
#endif |
610 |
|
611 |
drop_privileges (); |
612 |
} |
613 |
} |
614 |
|
615 |
void |
616 |
ptytty::drop_privileges () |
617 |
{ |
618 |
uid_t uid = getuid (); |
619 |
gid_t gid = getgid (); |
620 |
|
621 |
// drop privileges |
622 |
#if HAVE_SETRESUID |
623 |
setresgid (gid, gid, gid); |
624 |
setresuid (uid, uid, uid); |
625 |
#elif HAVE_SETREUID |
626 |
setregid (gid, gid); |
627 |
setreuid (uid, uid); |
628 |
#elif HAVE_SETUID |
629 |
setgid (gid); |
630 |
setuid (uid); |
631 |
#endif |
632 |
|
633 |
if (uid != geteuid () |
634 |
|| gid != getegid ()) |
635 |
ptytty_fatal ("unable to drop privileges, aborting.\n"); |
636 |
} |
637 |
|
638 |
///////////////////////////////////////////////////////////////////////////// |
639 |
// C API |
640 |
|
641 |
#ifndef NO_C_API |
642 |
|
643 |
#define DEFINE_METHOD(retval, name, args1, args2) \ |
644 |
extern "C" retval ptytty_ ## name args1 \ |
645 |
{ return ((struct ptytty *)ptytty)->name args2; } |
646 |
|
647 |
DEFINE_METHOD(int,pty,(void *ptytty),) |
648 |
DEFINE_METHOD(int,tty,(void *ptytty),) |
649 |
DEFINE_METHOD(int,get,(void *ptytty),()) |
650 |
DEFINE_METHOD(void,login,(void *ptytty, int cmd_pid, bool login_shell, const char *hostname),(cmd_pid,login_shell,hostname)) |
651 |
|
652 |
DEFINE_METHOD(void,close_tty,(void *ptytty),()) |
653 |
DEFINE_METHOD(int,make_controlling_tty,(void *ptytty),()) |
654 |
DEFINE_METHOD(void,set_utf8_mode,(void *ptytty, int on),(on)) |
655 |
|
656 |
#define DEFINE_STATIC(retval, name, args) \ |
657 |
extern "C" retval ptytty_ ## name args \ |
658 |
{ return ptytty::name args; } |
659 |
|
660 |
DEFINE_STATIC(void,drop_privileges,()) |
661 |
DEFINE_STATIC(void,use_helper,()) |
662 |
DEFINE_STATIC(void,init,()) |
663 |
|
664 |
DEFINE_STATIC(void *,create,()) |
665 |
|
666 |
void ptytty_delete (void *ptytty) |
667 |
{ |
668 |
delete (struct ptytty *)ptytty; |
669 |
} |
670 |
|
671 |
// send_fd, recv_fd not exposed |
672 |
|
673 |
#endif |