… | |
… | |
32 | #include <cstdlib> |
32 | #include <cstdlib> |
33 | #include <cstring> |
33 | #include <cstring> |
34 | #include <csignal> |
34 | #include <csignal> |
35 | |
35 | |
36 | #include <sys/types.h> |
36 | #include <sys/types.h> |
37 | #include <sys/socket.h> |
|
|
38 | #include <unistd.h> |
37 | #include <unistd.h> |
39 | #include <fcntl.h> |
38 | #include <fcntl.h> |
40 | |
39 | |
41 | #ifdef HAVE_SYS_IOCTL_H |
40 | #ifdef HAVE_SYS_IOCTL_H |
42 | # include <sys/ioctl.h> |
41 | # include <sys/ioctl.h> |
… | |
… | |
69 | * Returns pty file descriptor, or -1 on failure |
68 | * Returns pty file descriptor, or -1 on failure |
70 | * If successful, ttydev is set to the name of the slave device. |
69 | * If successful, ttydev is set to the name of the slave device. |
71 | * fd_tty _may_ also be set to an open fd to the slave device |
70 | * fd_tty _may_ also be set to an open fd to the slave device |
72 | */ |
71 | */ |
73 | #if defined(UNIX98_PTY) |
72 | #if defined(UNIX98_PTY) |
|
|
73 | |
74 | static int |
74 | static int |
75 | get_pty (int *fd_tty, char **ttydev) |
75 | get_pty (int *fd_tty, char **ttydev) |
76 | { |
76 | { |
77 | int pfd; |
77 | int pfd; |
78 | |
78 | |
79 | # if defined(HAVE_GETPT) |
79 | # if defined(HAVE_GETPT) |
80 | pfd = getpt(); |
80 | pfd = getpt(); |
81 | # elif defined(HAVE_POSIX_OPENPT) |
81 | # elif defined(HAVE_POSIX_OPENPT) |
82 | pfd = posix_openpt (O_RDWR); |
82 | pfd = posix_openpt (O_RDWR); |
83 | # else |
83 | # else |
84 | pfd = open (CLONE_DEVICE, O_RDWR | O_NOCTTY, 0); |
84 | pfd = open (CLONE_DEVICE, O_RDWR | O_NOCTTY, 0); |
85 | # endif |
85 | # endif |
|
|
86 | |
86 | if (pfd >= 0) |
87 | if (pfd >= 0) |
87 | { |
88 | { |
88 | if (grantpt (pfd) == 0 /* change slave permissions */ |
89 | if (grantpt (pfd) == 0 /* change slave permissions */ |
89 | && unlockpt (pfd) == 0) |
90 | && unlockpt (pfd) == 0) |
90 | { /* slave now unlocked */ |
91 | { /* slave now unlocked */ |
91 | *ttydev = strdup (ptsname (pfd)); /* get slave's name */ |
92 | *ttydev = strdup (ptsname (pfd)); /* get slave's name */ |
92 | return pfd; |
93 | return pfd; |
93 | } |
94 | } |
94 | |
95 | |
95 | close (pfd); |
96 | close (pfd); |
96 | } |
97 | } |
97 | |
98 | |
98 | return -1; |
99 | return -1; |
99 | } |
100 | } |
|
|
101 | |
100 | #elif defined(HAVE_OPENPTY) |
102 | #elif defined(HAVE_OPENPTY) |
|
|
103 | |
101 | static int |
104 | static int |
102 | get_pty (int *fd_tty, char **ttydev) |
105 | get_pty (int *fd_tty, char **ttydev) |
103 | { |
106 | { |
104 | int pfd; |
107 | int pfd; |
105 | int res; |
108 | int res; |
106 | char tty_name[32]; |
109 | char tty_name[32]; |
107 | |
110 | |
108 | res = openpty (&pfd, fd_tty, tty_name, NULL, NULL); |
111 | res = openpty (&pfd, fd_tty, tty_name, NULL, NULL); |
|
|
112 | |
109 | if (res != -1) |
113 | if (res != -1) |
110 | { |
114 | { |
111 | *ttydev = strdup (tty_name); |
115 | *ttydev = strdup (tty_name); |
|
|
116 | return pfd; |
|
|
117 | } |
|
|
118 | |
|
|
119 | return -1; |
|
|
120 | } |
|
|
121 | |
|
|
122 | #elif defined(HAVE__GETPTY) |
|
|
123 | |
|
|
124 | static int |
|
|
125 | get_pty (int *fd_tty, char **ttydev) |
|
|
126 | { |
|
|
127 | int pfd; |
|
|
128 | |
|
|
129 | *ttydev = _getpty (&pfd, O_RDWR | O_NONBLOCK | O_NOCTTY, 0622, 0); |
|
|
130 | |
|
|
131 | if (*ttydev != NULL) |
112 | return pfd; |
132 | return pfd; |
113 | } |
|
|
114 | |
133 | |
115 | return -1; |
134 | return -1; |
116 | } |
135 | } |
117 | #elif defined(HAVE__GETPTY) |
|
|
118 | static int |
|
|
119 | get_pty (int *fd_tty, char **ttydev) |
|
|
120 | { |
|
|
121 | int pfd; |
|
|
122 | |
136 | |
123 | *ttydev = _getpty (&pfd, O_RDWR | O_NONBLOCK | O_NOCTTY, 0622, 0); |
|
|
124 | if (*ttydev != NULL) |
|
|
125 | return pfd; |
|
|
126 | |
|
|
127 | return -1; |
|
|
128 | } |
|
|
129 | #elif defined(HAVE_DEV_PTC) |
137 | #elif defined(HAVE_DEV_PTC) |
|
|
138 | |
130 | static int |
139 | static int |
131 | get_pty (int *fd_tty, char **ttydev) |
140 | get_pty (int *fd_tty, char **ttydev) |
132 | { |
141 | { |
133 | int pfd; |
142 | int pfd; |
134 | |
143 | |
135 | if ((pfd = open ("/dev/ptc", O_RDWR | O_NOCTTY, 0)) >= 0) |
144 | if ((pfd = open ("/dev/ptc", O_RDWR | O_NOCTTY, 0)) >= 0) |
136 | { |
145 | { |
137 | *ttydev = strdup (ttyname (pfd)); |
146 | *ttydev = strdup (ttyname (pfd)); |
138 | return pfd; |
147 | return pfd; |
139 | } |
148 | } |
140 | |
149 | |
141 | return -1; |
150 | return -1; |
142 | } |
151 | } |
|
|
152 | |
143 | #elif defined(HAVE_DEV_CLONE) |
153 | #elif defined(HAVE_DEV_CLONE) |
|
|
154 | |
144 | static int |
155 | static int |
145 | get_pty (int *fd_tty, char **ttydev) |
156 | get_pty (int *fd_tty, char **ttydev) |
146 | { |
157 | { |
147 | int pfd; |
158 | int pfd; |
148 | |
159 | |
149 | if ((pfd = open ("/dev/ptym/clone", O_RDWR | O_NOCTTY, 0)) >= 0) |
160 | if ((pfd = open ("/dev/ptym/clone", O_RDWR | O_NOCTTY, 0)) >= 0) |
150 | { |
161 | { |
151 | *ttydev = strdup (ptsname (pfd)); |
162 | *ttydev = strdup (ptsname (pfd)); |
152 | return pfd; |
163 | return pfd; |
153 | } |
164 | } |
154 | |
165 | |
155 | return -1; |
166 | return -1; |
156 | } |
167 | } |
|
|
168 | |
157 | #else |
169 | #else |
|
|
170 | |
158 | /* Based on the code in openssh/openbsd-compat/bsd-openpty.c */ |
171 | /* Based on the code in openssh/openbsd-compat/bsd-openpty.c */ |
159 | static int |
172 | static int |
160 | get_pty (int *fd_tty, char **ttydev) |
173 | get_pty (int *fd_tty, char **ttydev) |
161 | { |
174 | { |
162 | int pfd; |
175 | int pfd; |
163 | int i; |
176 | int i; |
164 | char pty_name[32]; |
177 | char pty_name[32]; |
165 | char tty_name[32]; |
178 | char tty_name[32]; |
166 | const char *majors = "pqrstuvwxyzabcde"; |
179 | const char *majors = "pqrstuvwxyzabcde"; |
167 | const char *minors = "0123456789abcdef"; |
180 | const char *minors = "0123456789abcdef"; |
|
|
181 | |
168 | for (i = 0; i < 256; i++) |
182 | for (i = 0; i < 256; i++) |
169 | { |
183 | { |
170 | snprintf(pty_name, 32, "/dev/pty%c%c", majors[i / 16], minors[i % 16]); |
184 | snprintf(pty_name, 32, "/dev/pty%c%c", majors[i / 16], minors[i % 16]); |
171 | snprintf(tty_name, 32, "/dev/tty%c%c", majors[i / 16], minors[i % 16]); |
185 | snprintf(tty_name, 32, "/dev/tty%c%c", majors[i / 16], minors[i % 16]); |
|
|
186 | |
172 | if ((pfd = open (pty_name, O_RDWR | O_NOCTTY, 0)) == -1) |
187 | if ((pfd = open (pty_name, O_RDWR | O_NOCTTY, 0)) == -1) |
173 | { |
188 | { |
174 | snprintf(pty_name, 32, "/dev/ptyp%d", i); |
189 | snprintf(pty_name, 32, "/dev/ptyp%d", i); |
175 | snprintf(tty_name, 32, "/dev/ttyp%d", i); |
190 | snprintf(tty_name, 32, "/dev/ttyp%d", i); |
176 | if ((pfd = open (pty_name, O_RDWR | O_NOCTTY, 0)) == -1) |
191 | if ((pfd = open (pty_name, O_RDWR | O_NOCTTY, 0)) == -1) |
177 | continue; |
192 | continue; |
178 | } |
193 | } |
|
|
194 | |
179 | if (access (tty_name, R_OK | W_OK) == 0) |
195 | if (access (tty_name, R_OK | W_OK) == 0) |
180 | { |
196 | { |
181 | *ttydev = strdup (tty_name); |
197 | *ttydev = strdup (tty_name); |
182 | return pfd; |
198 | return pfd; |
183 | } |
199 | } |
184 | |
200 | |
185 | close (pfd); |
201 | close (pfd); |
186 | } |
202 | } |
187 | } |
203 | |
|
|
204 | return -1; |
|
|
205 | } |
|
|
206 | |
188 | #endif |
207 | #endif |
189 | |
208 | |
190 | /*----------------------------------------------------------------------*/ |
209 | /*----------------------------------------------------------------------*/ |
191 | /* |
210 | /* |
192 | * Returns tty file descriptor, or -1 on failure |
211 | * Returns tty file descriptor, or -1 on failure |
… | |
… | |
328 | } |
347 | } |
329 | |
348 | |
330 | void |
349 | void |
331 | ptytty_unix::put () |
350 | ptytty_unix::put () |
332 | { |
351 | { |
|
|
352 | if (name) |
|
|
353 | { |
333 | chmod (name, RESTORE_TTY_MODE); |
354 | chmod (name, RESTORE_TTY_MODE); |
334 | chown (name, 0, ttyconf.gid); |
355 | chown (name, 0, ttyconf.gid); |
|
|
356 | } |
335 | |
357 | |
336 | close_tty (); |
358 | close_tty (); |
337 | |
359 | |
338 | if (pty >= 0) |
360 | if (pty >= 0) |
339 | close (pty); |
361 | close (pty); |
… | |
… | |
372 | } |
394 | } |
373 | |
395 | |
374 | return true; |
396 | return true; |
375 | } |
397 | } |
376 | |
398 | |
377 | ///////////////////////////////////////////////////////////////////////////// |
|
|
378 | // helper/proxy support |
|
|
379 | |
|
|
380 | #if PTYTTY_HELPER |
|
|
381 | |
|
|
382 | static int sock_fd = -1, lock_fd = -1; |
|
|
383 | static int helper_pid, owner_pid; |
|
|
384 | |
|
|
385 | struct command |
|
|
386 | { |
|
|
387 | enum { get, login, destroy } type; |
|
|
388 | |
|
|
389 | ptytty *id; |
|
|
390 | |
|
|
391 | bool login_shell; |
|
|
392 | int cmd_pid; |
|
|
393 | char hostname[512]; // arbitrary, but should be plenty |
|
|
394 | }; |
|
|
395 | |
|
|
396 | struct ptytty_proxy : ptytty |
|
|
397 | { |
|
|
398 | ptytty *id; |
|
|
399 | |
|
|
400 | ptytty_proxy () |
|
|
401 | : id(0) |
|
|
402 | { |
|
|
403 | } |
|
|
404 | |
|
|
405 | ~ptytty_proxy (); |
|
|
406 | |
|
|
407 | bool get (); |
|
|
408 | void login (int cmd_pid, bool login_shell, const char *hostname); |
|
|
409 | }; |
|
|
410 | |
|
|
411 | #if PTYTTY_REENTRANT |
|
|
412 | # define NEED_TOKEN do { char ch; read (lock_fd, &ch, 1); } while (0) |
|
|
413 | # define GIVE_TOKEN do { char ch; write (lock_fd, &ch, 1); } while (0) |
|
|
414 | #else |
|
|
415 | # define NEED_TOKEN (void)0 |
|
|
416 | # define GIVE_TOKEN (void)0 |
|
|
417 | #endif |
|
|
418 | |
|
|
419 | bool |
|
|
420 | ptytty_proxy::get () |
|
|
421 | { |
|
|
422 | NEED_TOKEN; |
|
|
423 | |
|
|
424 | command cmd; |
|
|
425 | |
|
|
426 | cmd.type = command::get; |
|
|
427 | |
|
|
428 | write (sock_fd, &cmd, sizeof (cmd)); |
|
|
429 | |
|
|
430 | if (read (sock_fd, &id, sizeof (id)) != sizeof (id)) |
|
|
431 | ptytty_fatal ("protocol error while creating pty using helper process, aborting.\n"); |
|
|
432 | |
|
|
433 | if (!id) |
|
|
434 | { |
|
|
435 | GIVE_TOKEN; |
|
|
436 | return false; |
|
|
437 | } |
|
|
438 | |
|
|
439 | if ((pty = recv_fd (sock_fd)) < 0 |
|
|
440 | || (tty = recv_fd (sock_fd)) < 0) |
|
|
441 | ptytty_fatal ("protocol error while reading pty/tty fds from helper process, aborting.\n"); |
|
|
442 | |
|
|
443 | GIVE_TOKEN; |
|
|
444 | return true; |
|
|
445 | } |
|
|
446 | |
|
|
447 | void |
|
|
448 | ptytty_proxy::login (int cmd_pid, bool login_shell, const char *hostname) |
|
|
449 | { |
|
|
450 | NEED_TOKEN; |
|
|
451 | |
|
|
452 | command cmd; |
|
|
453 | |
|
|
454 | cmd.type = command::login; |
|
|
455 | cmd.id = id; |
|
|
456 | cmd.cmd_pid = cmd_pid; |
|
|
457 | cmd.login_shell = login_shell; |
|
|
458 | strncpy (cmd.hostname, hostname, sizeof (cmd.hostname)); |
|
|
459 | |
|
|
460 | write (sock_fd, &cmd, sizeof (cmd)); |
|
|
461 | |
|
|
462 | GIVE_TOKEN; |
|
|
463 | } |
|
|
464 | |
|
|
465 | ptytty_proxy::~ptytty_proxy () |
|
|
466 | { |
|
|
467 | if (id) |
|
|
468 | { |
|
|
469 | NEED_TOKEN; |
|
|
470 | |
|
|
471 | command cmd; |
|
|
472 | |
|
|
473 | cmd.type = command::destroy; |
|
|
474 | cmd.id = id; |
|
|
475 | |
|
|
476 | write (sock_fd, &cmd, sizeof (cmd)); |
|
|
477 | |
|
|
478 | GIVE_TOKEN; |
|
|
479 | } |
|
|
480 | } |
|
|
481 | |
|
|
482 | static |
|
|
483 | void serve () |
|
|
484 | { |
|
|
485 | command cmd; |
|
|
486 | vector<ptytty *> ptys; |
|
|
487 | |
|
|
488 | for (;;) |
|
|
489 | { |
|
|
490 | GIVE_TOKEN; |
|
|
491 | |
|
|
492 | if (read (sock_fd, &cmd, sizeof (command)) != sizeof (command)) |
|
|
493 | break; |
|
|
494 | |
|
|
495 | if (cmd.type == command::get) |
|
|
496 | { |
|
|
497 | // -> id ptyfd ttyfd |
|
|
498 | cmd.id = new ptytty_unix; |
|
|
499 | |
|
|
500 | if (cmd.id->get ()) |
|
|
501 | { |
|
|
502 | write (sock_fd, &cmd.id, sizeof (cmd.id)); |
|
|
503 | ptys.push_back (cmd.id); |
|
|
504 | |
|
|
505 | ptytty::send_fd (sock_fd, cmd.id->pty); |
|
|
506 | ptytty::send_fd (sock_fd, cmd.id->tty); |
|
|
507 | } |
|
|
508 | else |
|
|
509 | { |
|
|
510 | delete cmd.id; |
|
|
511 | cmd.id = 0; |
|
|
512 | write (sock_fd, &cmd.id, sizeof (cmd.id)); |
|
|
513 | } |
|
|
514 | } |
|
|
515 | else if (cmd.type == command::login) |
|
|
516 | { |
|
|
517 | #if UTMP_SUPPORT |
|
|
518 | if (find (ptys.begin (), ptys.end (), cmd.id) != ptys.end ()) |
|
|
519 | { |
|
|
520 | cmd.hostname[sizeof (cmd.hostname) - 1] = 0; |
|
|
521 | cmd.id->login (cmd.cmd_pid, cmd.login_shell, cmd.hostname); |
|
|
522 | } |
|
|
523 | #endif |
|
|
524 | } |
|
|
525 | else if (cmd.type == command::destroy) |
|
|
526 | { |
|
|
527 | vector<ptytty *>::iterator pty = find (ptys.begin (), ptys.end (), cmd.id); |
|
|
528 | |
|
|
529 | if (pty != ptys.end ()) |
|
|
530 | { |
|
|
531 | delete *pty; |
|
|
532 | ptys.erase (pty); |
|
|
533 | } |
|
|
534 | } |
|
|
535 | else |
|
|
536 | break; |
|
|
537 | |
|
|
538 | NEED_TOKEN; |
|
|
539 | } |
|
|
540 | |
|
|
541 | // destroy all ptys |
|
|
542 | for (vector<ptytty *>::iterator i = ptys.end (); i-- > ptys.begin (); ) |
|
|
543 | delete *i; |
|
|
544 | } |
|
|
545 | |
|
|
546 | void |
|
|
547 | ptytty::use_helper () |
|
|
548 | { |
|
|
549 | #ifndef PTYTTY_NO_PID_CHECK |
|
|
550 | int pid = getpid (); |
|
|
551 | #endif |
|
|
552 | |
|
|
553 | if (sock_fd >= 0 |
|
|
554 | #ifndef PTYTTY_NO_PID_CHECK |
|
|
555 | && pid == owner_pid |
|
|
556 | #endif |
|
|
557 | ) |
|
|
558 | return; |
|
|
559 | |
|
|
560 | #ifndef PTYTTY_NO_PID_CHECK |
|
|
561 | owner_pid = pid; |
|
|
562 | #endif |
|
|
563 | |
|
|
564 | int sv[2]; |
|
|
565 | |
|
|
566 | if (socketpair (AF_UNIX, SOCK_STREAM, 0, sv)) |
|
|
567 | ptytty_fatal ("could not create socket to communicate with pty/sessiondb helper, aborting.\n"); |
|
|
568 | |
|
|
569 | #ifdef PTYTTY_REENTRANT |
|
|
570 | int lv[2]; |
|
|
571 | |
|
|
572 | if (socketpair (AF_UNIX, SOCK_STREAM, 0, lv)) |
|
|
573 | ptytty_fatal ("could not create socket to communicate with pty/sessiondb helper, aborting.\n"); |
|
|
574 | #endif |
|
|
575 | |
|
|
576 | helper_pid = fork (); |
|
|
577 | |
|
|
578 | if (helper_pid < 0) |
|
|
579 | ptytty_fatal ("could not create pty/sessiondb helper process, aborting.\n"); |
|
|
580 | |
|
|
581 | if (helper_pid) |
|
|
582 | { |
|
|
583 | // client, process |
|
|
584 | sock_fd = sv[0]; |
|
|
585 | close (sv[1]); |
|
|
586 | fcntl (sock_fd, F_SETFD, FD_CLOEXEC); |
|
|
587 | #ifdef PTYTTY_REENTRANT |
|
|
588 | lock_fd = lv[0]; |
|
|
589 | close (lv[1]); |
|
|
590 | fcntl (lock_fd, F_SETFD, FD_CLOEXEC); |
|
|
591 | #endif |
|
|
592 | } |
|
|
593 | else |
|
|
594 | { |
|
|
595 | // server, pty-helper |
|
|
596 | sock_fd = sv[1]; |
|
|
597 | #ifdef PTYTTY_REENTRANT |
|
|
598 | lock_fd = lv[1]; |
|
|
599 | #endif |
|
|
600 | |
|
|
601 | chdir ("/"); |
|
|
602 | |
|
|
603 | signal (SIGHUP, SIG_IGN); |
|
|
604 | signal (SIGTERM, SIG_IGN); |
|
|
605 | signal (SIGINT, SIG_IGN); |
|
|
606 | signal (SIGPIPE, SIG_IGN); |
|
|
607 | |
|
|
608 | for (int fd = 0; fd < 1023; fd++) |
|
|
609 | if (fd != sock_fd && fd != lock_fd) |
|
|
610 | close (fd); |
|
|
611 | |
|
|
612 | serve (); |
|
|
613 | _exit (EXIT_SUCCESS); |
|
|
614 | } |
|
|
615 | } |
|
|
616 | |
|
|
617 | #endif |
|
|
618 | |
|
|
619 | ptytty * |
|
|
620 | ptytty::create () |
|
|
621 | { |
|
|
622 | #if PTYTTY_HELPER |
|
|
623 | if (helper_pid |
|
|
624 | # ifndef PTYTTY_NO_PID_CHECK |
|
|
625 | && getpid () == owner_pid |
|
|
626 | # endif |
|
|
627 | ) |
|
|
628 | // use helper process |
|
|
629 | return new ptytty_proxy; |
|
|
630 | else |
|
|
631 | #endif |
|
|
632 | return new ptytty_unix; |
|
|
633 | } |
|
|
634 | |
|
|
635 | void |
|
|
636 | ptytty::init () |
|
|
637 | { |
|
|
638 | uid_t uid = getuid (); |
|
|
639 | gid_t gid = getgid (); |
|
|
640 | |
|
|
641 | // before doing anything else, check for setuid/setgid operation, |
|
|
642 | // start the helper process and drop privileges |
|
|
643 | if (uid != geteuid () |
|
|
644 | || gid != getegid ()) |
|
|
645 | { |
|
|
646 | #if PTYTTY_HELPER |
|
|
647 | use_helper (); |
|
|
648 | #else |
|
|
649 | ptytty_warn ("running setuid/setgid without pty helper compiled in, continuing unprivileged.\n"); |
|
|
650 | #endif |
|
|
651 | |
|
|
652 | drop_privileges (); |
|
|
653 | } |
|
|
654 | } |
|
|
655 | |
|
|
656 | void |
|
|
657 | ptytty::drop_privileges () |
|
|
658 | { |
|
|
659 | uid_t uid = getuid (); |
|
|
660 | gid_t gid = getgid (); |
|
|
661 | |
|
|
662 | // drop privileges |
|
|
663 | #if HAVE_SETRESUID |
|
|
664 | setresgid (gid, gid, gid); |
|
|
665 | setresuid (uid, uid, uid); |
|
|
666 | #elif HAVE_SETREUID |
|
|
667 | setregid (gid, gid); |
|
|
668 | setreuid (uid, uid); |
|
|
669 | #elif HAVE_SETUID |
|
|
670 | setgid (gid); |
|
|
671 | setuid (uid); |
|
|
672 | #endif |
|
|
673 | |
|
|
674 | if (uid != geteuid () |
|
|
675 | || gid != getegid ()) |
|
|
676 | ptytty_fatal ("unable to drop privileges, aborting.\n"); |
|
|
677 | } |
|
|
678 | |
|
|
679 | ///////////////////////////////////////////////////////////////////////////// |
|
|
680 | // C API |
|
|
681 | |
|
|
682 | #ifndef PTYTTY_NO_C_API |
|
|
683 | |
|
|
684 | typedef void *PTYTTY; |
|
|
685 | |
|
|
686 | #define DEFINE_METHOD(retval, name, args1, args2) \ |
|
|
687 | extern "C" retval ptytty_ ## name args1 \ |
|
|
688 | { return ((struct ptytty *)ptytty)->name args2; } |
|
|
689 | |
|
|
690 | DEFINE_METHOD(int,pty,(PTYTTY ptytty),) |
|
|
691 | DEFINE_METHOD(int,tty,(PTYTTY ptytty),) |
|
|
692 | DEFINE_METHOD(int,get,(PTYTTY ptytty),()) |
|
|
693 | DEFINE_METHOD(void,login,(PTYTTY ptytty, int cmd_pid, bool login_shell, const char *hostname),(cmd_pid,login_shell,hostname)) |
|
|
694 | |
|
|
695 | DEFINE_METHOD(void,close_tty,(PTYTTY ptytty),()) |
|
|
696 | DEFINE_METHOD(int,make_controlling_tty,(PTYTTY ptytty),()) |
|
|
697 | DEFINE_METHOD(void,set_utf8_mode,(PTYTTY ptytty, int on),(on)) |
|
|
698 | |
|
|
699 | #define DEFINE_STATIC(retval, name, args) \ |
|
|
700 | extern "C" retval ptytty_ ## name args \ |
|
|
701 | { return ptytty::name args; } |
|
|
702 | |
|
|
703 | DEFINE_STATIC(void,drop_privileges,()) |
|
|
704 | DEFINE_STATIC(void,use_helper,()) |
|
|
705 | DEFINE_STATIC(void,init,()) |
|
|
706 | |
|
|
707 | DEFINE_STATIC(PTYTTY ,create,()) |
|
|
708 | |
|
|
709 | void ptytty_delete (PTYTTY ptytty) |
|
|
710 | { |
|
|
711 | delete (struct ptytty *)ptytty; |
|
|
712 | } |
|
|
713 | |
|
|
714 | // send_fd, recv_fd not exposed |
|
|
715 | |
|
|
716 | #endif |
|
|