]> andersk Git - gssapi-openssh.git/blame - openssh/sshpty.c
Import of OpenSSH 3.9p1
[gssapi-openssh.git] / openssh / sshpty.c
CommitLineData
3c0ef626 1/*
2 * Author: Tatu Ylonen <ylo@cs.hut.fi>
3 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
4 * All rights reserved
5 * Allocating a pseudo-terminal, and making it the controlling tty.
6 *
7 * As far as I am concerned, the code I have written for this software
8 * can be used freely for any purpose. Any derived versions of this
9 * software must be clearly marked as such, and if the derived work is
10 * incompatible with the protocol description in the RFC file, it must be
11 * called by a name other than "ssh" or "Secure Shell".
12 */
13
14#include "includes.h"
c9f39d2c 15RCSID("$OpenBSD: sshpty.c,v 1.12 2004/06/21 17:36:31 avsm Exp $");
3c0ef626 16
17#ifdef HAVE_UTIL_H
18# include <util.h>
19#endif /* HAVE_UTIL_H */
20
21#include "sshpty.h"
22#include "log.h"
23#include "misc.h"
24
3c0ef626 25#ifdef HAVE_PTY_H
26# include <pty.h>
27#endif
3c0ef626 28
29#ifndef O_NOCTTY
30#define O_NOCTTY 0
31#endif
32
33/*
34 * Allocates and opens a pty. Returns 0 if no pty could be allocated, or
35 * nonzero if a pty was successfully allocated. On success, open file
36 * descriptors for the pty and tty sides and the name of the tty side are
37 * returned (the buffer must be able to hold at least 64 characters).
38 */
39
40int
41pty_allocate(int *ptyfd, int *ttyfd, char *namebuf, int namebuflen)
42{
3c0ef626 43 /* openpty(3) exists in OSF/1 and some other os'es */
44 char *name;
45 int i;
46
47 i = openpty(ptyfd, ttyfd, NULL, NULL, NULL);
48 if (i < 0) {
49 error("openpty: %.100s", strerror(errno));
50 return 0;
51 }
52 name = ttyname(*ttyfd);
53 if (!name)
54 fatal("openpty returns device for which ttyname fails.");
55
56 strlcpy(namebuf, name, namebuflen); /* possible truncation */
57 return 1;
3c0ef626 58}
59
60/* Releases the tty. Its ownership is returned to root, and permissions to 0666. */
61
62void
c9f39d2c 63pty_release(const char *tty)
3c0ef626 64{
c9f39d2c 65 if (chown(tty, (uid_t) 0, (gid_t) 0) < 0)
66 error("chown %.100s 0 0 failed: %.100s", tty, strerror(errno));
67 if (chmod(tty, (mode_t) 0666) < 0)
68 error("chmod %.100s 0666 failed: %.100s", tty, strerror(errno));
3c0ef626 69}
70
0fff78ff 71/* Makes the tty the process's controlling tty and sets it to sane modes. */
3c0ef626 72
73void
c9f39d2c 74pty_make_controlling_tty(int *ttyfd, const char *tty)
3c0ef626 75{
76 int fd;
77#ifdef USE_VHANGUP
78 void *old;
79#endif /* USE_VHANGUP */
80
41b2f314 81#ifdef _UNICOS
3c0ef626 82 if (setsid() < 0)
83 error("setsid: %.100s", strerror(errno));
84
c9f39d2c 85 fd = open(tty, O_RDWR|O_NOCTTY);
3c0ef626 86 if (fd != -1) {
0fff78ff 87 signal(SIGHUP, SIG_IGN);
3c0ef626 88 ioctl(fd, TCVHUP, (char *)NULL);
0fff78ff 89 signal(SIGHUP, SIG_DFL);
3c0ef626 90 setpgid(0, 0);
91 close(fd);
92 } else {
93 error("Failed to disconnect from controlling tty.");
94 }
95
96 debug("Setting controlling tty using TCSETCTTY.");
97 ioctl(*ttyfd, TCSETCTTY, NULL);
98 fd = open("/dev/tty", O_RDWR);
99 if (fd < 0)
c9f39d2c 100 error("%.100s: %.100s", tty, strerror(errno));
3c0ef626 101 close(*ttyfd);
f5799ae1 102 *ttyfd = fd;
41b2f314 103#else /* _UNICOS */
3c0ef626 104
105 /* First disconnect from the old controlling tty. */
106#ifdef TIOCNOTTY
107 fd = open(_PATH_TTY, O_RDWR | O_NOCTTY);
108 if (fd >= 0) {
109 (void) ioctl(fd, TIOCNOTTY, NULL);
110 close(fd);
111 }
112#endif /* TIOCNOTTY */
113 if (setsid() < 0)
114 error("setsid: %.100s", strerror(errno));
115
116 /*
117 * Verify that we are successfully disconnected from the controlling
118 * tty.
119 */
120 fd = open(_PATH_TTY, O_RDWR | O_NOCTTY);
121 if (fd >= 0) {
122 error("Failed to disconnect from controlling tty.");
123 close(fd);
124 }
125 /* Make it our controlling tty. */
126#ifdef TIOCSCTTY
127 debug("Setting controlling tty using TIOCSCTTY.");
128 if (ioctl(*ttyfd, TIOCSCTTY, NULL) < 0)
129 error("ioctl(TIOCSCTTY): %.100s", strerror(errno));
130#endif /* TIOCSCTTY */
131#ifdef HAVE_NEWS4
132 if (setpgrp(0,0) < 0)
133 error("SETPGRP %s",strerror(errno));
134#endif /* HAVE_NEWS4 */
135#ifdef USE_VHANGUP
0fff78ff 136 old = signal(SIGHUP, SIG_IGN);
3c0ef626 137 vhangup();
0fff78ff 138 signal(SIGHUP, old);
3c0ef626 139#endif /* USE_VHANGUP */
c9f39d2c 140 fd = open(tty, O_RDWR);
3c0ef626 141 if (fd < 0) {
c9f39d2c 142 error("%.100s: %.100s", tty, strerror(errno));
3c0ef626 143 } else {
144#ifdef USE_VHANGUP
145 close(*ttyfd);
146 *ttyfd = fd;
147#else /* USE_VHANGUP */
148 close(fd);
149#endif /* USE_VHANGUP */
150 }
151 /* Verify that we now have a controlling tty. */
152 fd = open(_PATH_TTY, O_WRONLY);
153 if (fd < 0)
154 error("open /dev/tty failed - could not set controlling tty: %.100s",
e9a17296 155 strerror(errno));
cdd66111 156 else
3c0ef626 157 close(fd);
41b2f314 158#endif /* _UNICOS */
3c0ef626 159}
160
161/* Changes the window size associated with the pty. */
162
163void
164pty_change_window_size(int ptyfd, int row, int col,
e9a17296 165 int xpixel, int ypixel)
3c0ef626 166{
167 struct winsize w;
680cee3b 168
3c0ef626 169 w.ws_row = row;
170 w.ws_col = col;
171 w.ws_xpixel = xpixel;
172 w.ws_ypixel = ypixel;
173 (void) ioctl(ptyfd, TIOCSWINSZ, &w);
174}
175
176void
c9f39d2c 177pty_setowner(struct passwd *pw, const char *tty)
3c0ef626 178{
179 struct group *grp;
180 gid_t gid;
181 mode_t mode;
182 struct stat st;
183
184 /* Determine the group to make the owner of the tty. */
185 grp = getgrnam("tty");
186 if (grp) {
187 gid = grp->gr_gid;
188 mode = S_IRUSR | S_IWUSR | S_IWGRP;
189 } else {
190 gid = pw->pw_gid;
191 mode = S_IRUSR | S_IWUSR | S_IWGRP | S_IWOTH;
192 }
193
194 /*
195 * Change owner and mode of the tty as required.
196 * Warn but continue if filesystem is read-only and the uids match/
197 * tty is owned by root.
198 */
c9f39d2c 199 if (stat(tty, &st))
200 fatal("stat(%.100s) failed: %.100s", tty,
3c0ef626 201 strerror(errno));
202
203 if (st.st_uid != pw->pw_uid || st.st_gid != gid) {
c9f39d2c 204 if (chown(tty, pw->pw_uid, gid) < 0) {
e9a17296 205 if (errno == EROFS &&
680cee3b 206 (st.st_uid == pw->pw_uid || st.st_uid == 0))
6a9b3198 207 debug("chown(%.100s, %u, %u) failed: %.100s",
c9f39d2c 208 tty, (u_int)pw->pw_uid, (u_int)gid,
e9a17296 209 strerror(errno));
3c0ef626 210 else
680cee3b 211 fatal("chown(%.100s, %u, %u) failed: %.100s",
c9f39d2c 212 tty, (u_int)pw->pw_uid, (u_int)gid,
e9a17296 213 strerror(errno));
3c0ef626 214 }
215 }
216
217 if ((st.st_mode & (S_IRWXU|S_IRWXG|S_IRWXO)) != mode) {
c9f39d2c 218 if (chmod(tty, mode) < 0) {
3c0ef626 219 if (errno == EROFS &&
220 (st.st_mode & (S_IRGRP | S_IROTH)) == 0)
6a9b3198 221 debug("chmod(%.100s, 0%o) failed: %.100s",
c9f39d2c 222 tty, (u_int)mode, strerror(errno));
3c0ef626 223 else
224 fatal("chmod(%.100s, 0%o) failed: %.100s",
c9f39d2c 225 tty, (u_int)mode, strerror(errno));
3c0ef626 226 }
227 }
228}
This page took 0.216502 seconds and 5 git commands to generate.