diff options
author | Darren Tucker <dtucker@zip.com.au> | 2004-06-22 12:56:01 +1000 |
---|---|---|
committer | Darren Tucker <dtucker@zip.com.au> | 2004-06-22 12:56:01 +1000 |
commit | 3f9fdc71219d498a996c4e4ca8330df7f598fb5d (patch) | |
tree | 902072deed2ca26a5b0b3fa5f3749783e0bd62e6 /sshpty.c | |
parent | b357afc0a03a4238a01acf5d9641ebda9f71d500 (diff) |
- avsm@cvs.openbsd.org 2004/06/21 17:36:31
[auth-rsa.c auth2-gss.c auth2-pubkey.c authfile.c canohost.c channels.c
cipher.c dns.c kex.c monitor.c monitor_fdpass.c monitor_wrap.c
monitor_wrap.h nchan.c packet.c progressmeter.c scp.c sftp-server.c sftp.c
ssh-gss.h ssh-keygen.c ssh.c sshconnect.c sshconnect1.c sshlogin.c
sshpty.c]
make ssh -Wshadow clean, no functional changes
markus@ ok
There are also some portable-specific -Wshadow warnings to be fixed in
monitor.c and montior_wrap.c.
Diffstat (limited to 'sshpty.c')
-rw-r--r-- | sshpty.c | 40 |
1 files changed, 20 insertions, 20 deletions
@@ -12,7 +12,7 @@ | |||
12 | */ | 12 | */ |
13 | 13 | ||
14 | #include "includes.h" | 14 | #include "includes.h" |
15 | RCSID("$OpenBSD: sshpty.c,v 1.11 2004/01/11 21:55:06 deraadt Exp $"); | 15 | RCSID("$OpenBSD: sshpty.c,v 1.12 2004/06/21 17:36:31 avsm Exp $"); |
16 | 16 | ||
17 | #ifdef HAVE_UTIL_H | 17 | #ifdef HAVE_UTIL_H |
18 | # include <util.h> | 18 | # include <util.h> |
@@ -60,18 +60,18 @@ pty_allocate(int *ptyfd, int *ttyfd, char *namebuf, int namebuflen) | |||
60 | /* Releases the tty. Its ownership is returned to root, and permissions to 0666. */ | 60 | /* Releases the tty. Its ownership is returned to root, and permissions to 0666. */ |
61 | 61 | ||
62 | void | 62 | void |
63 | pty_release(const char *ttyname) | 63 | pty_release(const char *tty) |
64 | { | 64 | { |
65 | if (chown(ttyname, (uid_t) 0, (gid_t) 0) < 0) | 65 | if (chown(tty, (uid_t) 0, (gid_t) 0) < 0) |
66 | error("chown %.100s 0 0 failed: %.100s", ttyname, strerror(errno)); | 66 | error("chown %.100s 0 0 failed: %.100s", tty, strerror(errno)); |
67 | if (chmod(ttyname, (mode_t) 0666) < 0) | 67 | if (chmod(tty, (mode_t) 0666) < 0) |
68 | error("chmod %.100s 0666 failed: %.100s", ttyname, strerror(errno)); | 68 | error("chmod %.100s 0666 failed: %.100s", tty, strerror(errno)); |
69 | } | 69 | } |
70 | 70 | ||
71 | /* Makes the tty the process's controlling tty and sets it to sane modes. */ | 71 | /* Makes the tty the process's controlling tty and sets it to sane modes. */ |
72 | 72 | ||
73 | void | 73 | void |
74 | pty_make_controlling_tty(int *ttyfd, const char *ttyname) | 74 | pty_make_controlling_tty(int *ttyfd, const char *tty) |
75 | { | 75 | { |
76 | int fd; | 76 | int fd; |
77 | #ifdef USE_VHANGUP | 77 | #ifdef USE_VHANGUP |
@@ -82,7 +82,7 @@ pty_make_controlling_tty(int *ttyfd, const char *ttyname) | |||
82 | if (setsid() < 0) | 82 | if (setsid() < 0) |
83 | error("setsid: %.100s", strerror(errno)); | 83 | error("setsid: %.100s", strerror(errno)); |
84 | 84 | ||
85 | fd = open(ttyname, O_RDWR|O_NOCTTY); | 85 | fd = open(tty, O_RDWR|O_NOCTTY); |
86 | if (fd != -1) { | 86 | if (fd != -1) { |
87 | signal(SIGHUP, SIG_IGN); | 87 | signal(SIGHUP, SIG_IGN); |
88 | ioctl(fd, TCVHUP, (char *)NULL); | 88 | ioctl(fd, TCVHUP, (char *)NULL); |
@@ -97,7 +97,7 @@ pty_make_controlling_tty(int *ttyfd, const char *ttyname) | |||
97 | ioctl(*ttyfd, TCSETCTTY, NULL); | 97 | ioctl(*ttyfd, TCSETCTTY, NULL); |
98 | fd = open("/dev/tty", O_RDWR); | 98 | fd = open("/dev/tty", O_RDWR); |
99 | if (fd < 0) | 99 | if (fd < 0) |
100 | error("%.100s: %.100s", ttyname, strerror(errno)); | 100 | error("%.100s: %.100s", tty, strerror(errno)); |
101 | close(*ttyfd); | 101 | close(*ttyfd); |
102 | *ttyfd = fd; | 102 | *ttyfd = fd; |
103 | #else /* _UNICOS */ | 103 | #else /* _UNICOS */ |
@@ -137,9 +137,9 @@ pty_make_controlling_tty(int *ttyfd, const char *ttyname) | |||
137 | vhangup(); | 137 | vhangup(); |
138 | signal(SIGHUP, old); | 138 | signal(SIGHUP, old); |
139 | #endif /* USE_VHANGUP */ | 139 | #endif /* USE_VHANGUP */ |
140 | fd = open(ttyname, O_RDWR); | 140 | fd = open(tty, O_RDWR); |
141 | if (fd < 0) { | 141 | if (fd < 0) { |
142 | error("%.100s: %.100s", ttyname, strerror(errno)); | 142 | error("%.100s: %.100s", tty, strerror(errno)); |
143 | } else { | 143 | } else { |
144 | #ifdef USE_VHANGUP | 144 | #ifdef USE_VHANGUP |
145 | close(*ttyfd); | 145 | close(*ttyfd); |
@@ -174,7 +174,7 @@ pty_change_window_size(int ptyfd, int row, int col, | |||
174 | } | 174 | } |
175 | 175 | ||
176 | void | 176 | void |
177 | pty_setowner(struct passwd *pw, const char *ttyname) | 177 | pty_setowner(struct passwd *pw, const char *tty) |
178 | { | 178 | { |
179 | struct group *grp; | 179 | struct group *grp; |
180 | gid_t gid; | 180 | gid_t gid; |
@@ -196,33 +196,33 @@ pty_setowner(struct passwd *pw, const char *ttyname) | |||
196 | * Warn but continue if filesystem is read-only and the uids match/ | 196 | * Warn but continue if filesystem is read-only and the uids match/ |
197 | * tty is owned by root. | 197 | * tty is owned by root. |
198 | */ | 198 | */ |
199 | if (stat(ttyname, &st)) | 199 | if (stat(tty, &st)) |
200 | fatal("stat(%.100s) failed: %.100s", ttyname, | 200 | fatal("stat(%.100s) failed: %.100s", tty, |
201 | strerror(errno)); | 201 | strerror(errno)); |
202 | 202 | ||
203 | if (st.st_uid != pw->pw_uid || st.st_gid != gid) { | 203 | if (st.st_uid != pw->pw_uid || st.st_gid != gid) { |
204 | if (chown(ttyname, pw->pw_uid, gid) < 0) { | 204 | if (chown(tty, pw->pw_uid, gid) < 0) { |
205 | if (errno == EROFS && | 205 | if (errno == EROFS && |
206 | (st.st_uid == pw->pw_uid || st.st_uid == 0)) | 206 | (st.st_uid == pw->pw_uid || st.st_uid == 0)) |
207 | debug("chown(%.100s, %u, %u) failed: %.100s", | 207 | debug("chown(%.100s, %u, %u) failed: %.100s", |
208 | ttyname, (u_int)pw->pw_uid, (u_int)gid, | 208 | tty, (u_int)pw->pw_uid, (u_int)gid, |
209 | strerror(errno)); | 209 | strerror(errno)); |
210 | else | 210 | else |
211 | fatal("chown(%.100s, %u, %u) failed: %.100s", | 211 | fatal("chown(%.100s, %u, %u) failed: %.100s", |
212 | ttyname, (u_int)pw->pw_uid, (u_int)gid, | 212 | tty, (u_int)pw->pw_uid, (u_int)gid, |
213 | strerror(errno)); | 213 | strerror(errno)); |
214 | } | 214 | } |
215 | } | 215 | } |
216 | 216 | ||
217 | if ((st.st_mode & (S_IRWXU|S_IRWXG|S_IRWXO)) != mode) { | 217 | if ((st.st_mode & (S_IRWXU|S_IRWXG|S_IRWXO)) != mode) { |
218 | if (chmod(ttyname, mode) < 0) { | 218 | if (chmod(tty, mode) < 0) { |
219 | if (errno == EROFS && | 219 | if (errno == EROFS && |
220 | (st.st_mode & (S_IRGRP | S_IROTH)) == 0) | 220 | (st.st_mode & (S_IRGRP | S_IROTH)) == 0) |
221 | debug("chmod(%.100s, 0%o) failed: %.100s", | 221 | debug("chmod(%.100s, 0%o) failed: %.100s", |
222 | ttyname, (u_int)mode, strerror(errno)); | 222 | tty, (u_int)mode, strerror(errno)); |
223 | else | 223 | else |
224 | fatal("chmod(%.100s, 0%o) failed: %.100s", | 224 | fatal("chmod(%.100s, 0%o) failed: %.100s", |
225 | ttyname, (u_int)mode, strerror(errno)); | 225 | tty, (u_int)mode, strerror(errno)); |
226 | } | 226 | } |
227 | } | 227 | } |
228 | } | 228 | } |