summaryrefslogtreecommitdiff
path: root/sshpty.c
diff options
context:
space:
mode:
authorDarren Tucker <dtucker@zip.com.au>2004-06-22 12:56:01 +1000
committerDarren Tucker <dtucker@zip.com.au>2004-06-22 12:56:01 +1000
commit3f9fdc71219d498a996c4e4ca8330df7f598fb5d (patch)
tree902072deed2ca26a5b0b3fa5f3749783e0bd62e6 /sshpty.c
parentb357afc0a03a4238a01acf5d9641ebda9f71d500 (diff)
- avsm@cvs.openbsd.org 2004/06/21 17:36:31
[auth-rsa.c auth2-gss.c auth2-pubkey.c authfile.c canohost.c channels.c cipher.c dns.c kex.c monitor.c monitor_fdpass.c monitor_wrap.c monitor_wrap.h nchan.c packet.c progressmeter.c scp.c sftp-server.c sftp.c ssh-gss.h ssh-keygen.c ssh.c sshconnect.c sshconnect1.c sshlogin.c sshpty.c] make ssh -Wshadow clean, no functional changes markus@ ok There are also some portable-specific -Wshadow warnings to be fixed in monitor.c and montior_wrap.c.
Diffstat (limited to 'sshpty.c')
-rw-r--r--sshpty.c40
1 files changed, 20 insertions, 20 deletions
diff --git a/sshpty.c b/sshpty.c
index 0fe3891b6..efd1dfefa 100644
--- a/sshpty.c
+++ b/sshpty.c
@@ -12,7 +12,7 @@
12 */ 12 */
13 13
14#include "includes.h" 14#include "includes.h"
15RCSID("$OpenBSD: sshpty.c,v 1.11 2004/01/11 21:55:06 deraadt Exp $"); 15RCSID("$OpenBSD: sshpty.c,v 1.12 2004/06/21 17:36:31 avsm Exp $");
16 16
17#ifdef HAVE_UTIL_H 17#ifdef HAVE_UTIL_H
18# include <util.h> 18# include <util.h>
@@ -60,18 +60,18 @@ pty_allocate(int *ptyfd, int *ttyfd, char *namebuf, int namebuflen)
60/* Releases the tty. Its ownership is returned to root, and permissions to 0666. */ 60/* Releases the tty. Its ownership is returned to root, and permissions to 0666. */
61 61
62void 62void
63pty_release(const char *ttyname) 63pty_release(const char *tty)
64{ 64{
65 if (chown(ttyname, (uid_t) 0, (gid_t) 0) < 0) 65 if (chown(tty, (uid_t) 0, (gid_t) 0) < 0)
66 error("chown %.100s 0 0 failed: %.100s", ttyname, strerror(errno)); 66 error("chown %.100s 0 0 failed: %.100s", tty, strerror(errno));
67 if (chmod(ttyname, (mode_t) 0666) < 0) 67 if (chmod(tty, (mode_t) 0666) < 0)
68 error("chmod %.100s 0666 failed: %.100s", ttyname, strerror(errno)); 68 error("chmod %.100s 0666 failed: %.100s", tty, strerror(errno));
69} 69}
70 70
71/* Makes the tty the process's controlling tty and sets it to sane modes. */ 71/* Makes the tty the process's controlling tty and sets it to sane modes. */
72 72
73void 73void
74pty_make_controlling_tty(int *ttyfd, const char *ttyname) 74pty_make_controlling_tty(int *ttyfd, const char *tty)
75{ 75{
76 int fd; 76 int fd;
77#ifdef USE_VHANGUP 77#ifdef USE_VHANGUP
@@ -82,7 +82,7 @@ pty_make_controlling_tty(int *ttyfd, const char *ttyname)
82 if (setsid() < 0) 82 if (setsid() < 0)
83 error("setsid: %.100s", strerror(errno)); 83 error("setsid: %.100s", strerror(errno));
84 84
85 fd = open(ttyname, O_RDWR|O_NOCTTY); 85 fd = open(tty, O_RDWR|O_NOCTTY);
86 if (fd != -1) { 86 if (fd != -1) {
87 signal(SIGHUP, SIG_IGN); 87 signal(SIGHUP, SIG_IGN);
88 ioctl(fd, TCVHUP, (char *)NULL); 88 ioctl(fd, TCVHUP, (char *)NULL);
@@ -97,7 +97,7 @@ pty_make_controlling_tty(int *ttyfd, const char *ttyname)
97 ioctl(*ttyfd, TCSETCTTY, NULL); 97 ioctl(*ttyfd, TCSETCTTY, NULL);
98 fd = open("/dev/tty", O_RDWR); 98 fd = open("/dev/tty", O_RDWR);
99 if (fd < 0) 99 if (fd < 0)
100 error("%.100s: %.100s", ttyname, strerror(errno)); 100 error("%.100s: %.100s", tty, strerror(errno));
101 close(*ttyfd); 101 close(*ttyfd);
102 *ttyfd = fd; 102 *ttyfd = fd;
103#else /* _UNICOS */ 103#else /* _UNICOS */
@@ -137,9 +137,9 @@ pty_make_controlling_tty(int *ttyfd, const char *ttyname)
137 vhangup(); 137 vhangup();
138 signal(SIGHUP, old); 138 signal(SIGHUP, old);
139#endif /* USE_VHANGUP */ 139#endif /* USE_VHANGUP */
140 fd = open(ttyname, O_RDWR); 140 fd = open(tty, O_RDWR);
141 if (fd < 0) { 141 if (fd < 0) {
142 error("%.100s: %.100s", ttyname, strerror(errno)); 142 error("%.100s: %.100s", tty, strerror(errno));
143 } else { 143 } else {
144#ifdef USE_VHANGUP 144#ifdef USE_VHANGUP
145 close(*ttyfd); 145 close(*ttyfd);
@@ -174,7 +174,7 @@ pty_change_window_size(int ptyfd, int row, int col,
174} 174}
175 175
176void 176void
177pty_setowner(struct passwd *pw, const char *ttyname) 177pty_setowner(struct passwd *pw, const char *tty)
178{ 178{
179 struct group *grp; 179 struct group *grp;
180 gid_t gid; 180 gid_t gid;
@@ -196,33 +196,33 @@ pty_setowner(struct passwd *pw, const char *ttyname)
196 * Warn but continue if filesystem is read-only and the uids match/ 196 * Warn but continue if filesystem is read-only and the uids match/
197 * tty is owned by root. 197 * tty is owned by root.
198 */ 198 */
199 if (stat(ttyname, &st)) 199 if (stat(tty, &st))
200 fatal("stat(%.100s) failed: %.100s", ttyname, 200 fatal("stat(%.100s) failed: %.100s", tty,
201 strerror(errno)); 201 strerror(errno));
202 202
203 if (st.st_uid != pw->pw_uid || st.st_gid != gid) { 203 if (st.st_uid != pw->pw_uid || st.st_gid != gid) {
204 if (chown(ttyname, pw->pw_uid, gid) < 0) { 204 if (chown(tty, pw->pw_uid, gid) < 0) {
205 if (errno == EROFS && 205 if (errno == EROFS &&
206 (st.st_uid == pw->pw_uid || st.st_uid == 0)) 206 (st.st_uid == pw->pw_uid || st.st_uid == 0))
207 debug("chown(%.100s, %u, %u) failed: %.100s", 207 debug("chown(%.100s, %u, %u) failed: %.100s",
208 ttyname, (u_int)pw->pw_uid, (u_int)gid, 208 tty, (u_int)pw->pw_uid, (u_int)gid,
209 strerror(errno)); 209 strerror(errno));
210 else 210 else
211 fatal("chown(%.100s, %u, %u) failed: %.100s", 211 fatal("chown(%.100s, %u, %u) failed: %.100s",
212 ttyname, (u_int)pw->pw_uid, (u_int)gid, 212 tty, (u_int)pw->pw_uid, (u_int)gid,
213 strerror(errno)); 213 strerror(errno));
214 } 214 }
215 } 215 }
216 216
217 if ((st.st_mode & (S_IRWXU|S_IRWXG|S_IRWXO)) != mode) { 217 if ((st.st_mode & (S_IRWXU|S_IRWXG|S_IRWXO)) != mode) {
218 if (chmod(ttyname, mode) < 0) { 218 if (chmod(tty, mode) < 0) {
219 if (errno == EROFS && 219 if (errno == EROFS &&
220 (st.st_mode & (S_IRGRP | S_IROTH)) == 0) 220 (st.st_mode & (S_IRGRP | S_IROTH)) == 0)
221 debug("chmod(%.100s, 0%o) failed: %.100s", 221 debug("chmod(%.100s, 0%o) failed: %.100s",
222 ttyname, (u_int)mode, strerror(errno)); 222 tty, (u_int)mode, strerror(errno));
223 else 223 else
224 fatal("chmod(%.100s, 0%o) failed: %.100s", 224 fatal("chmod(%.100s, 0%o) failed: %.100s",
225 ttyname, (u_int)mode, strerror(errno)); 225 tty, (u_int)mode, strerror(errno));
226 } 226 }
227 } 227 }
228} 228}