| 1 |
--- dropbear.old/svr-authpubkey.c.orig 2006-06-03 14:54:43.000000000 +0000 |
--- dropbear-0.51/svr-authpubkey.c.orig 2008-06-12 10:35:41.000000000 +0200 |
| 2 |
+++ dropbear.dev/svr-authpubkey.c 2006-06-03 15:03:19.000000000 +0000 |
+++ dropbear-0.51/svr-authpubkey.c 2008-06-12 10:36:32.000000000 +0200 |
| 3 |
@@ -176,6 +176,8 @@ |
@@ -176,6 +176,8 @@ |
| 4 |
goto out; |
goto out; |
| 5 |
} |
} |
| 6 |
|
|
| 7 |
+ if (ses.authstate.pw->pw_uid != 0) { |
+ if (ses.authstate.pw_uid != 0) { |
| 8 |
+ |
+ |
| 9 |
/* we don't need to check pw and pw_dir for validity, since |
/* we don't need to check pw and pw_dir for validity, since |
| 10 |
* its been done in checkpubkeyperms. */ |
* its been done in checkpubkeyperms. */ |
| 11 |
len = strlen(ses.authstate.pw->pw_dir); |
len = strlen(ses.authstate.pw_dir); |
| 12 |
@@ -187,6 +189,9 @@ |
@@ -187,6 +189,9 @@ |
| 13 |
|
|
| 14 |
/* open the file */ |
/* open the file */ |
| 23 |
goto out; |
goto out; |
| 24 |
} |
} |
| 25 |
|
|
| 26 |
+ if (ses.authstate.pw->pw_uid != 0) { |
+ if (ses.authstate.pw_uid != 0) { |
| 27 |
+ |
+ |
| 28 |
/* allocate max required pathname storage, |
/* allocate max required pathname storage, |
| 29 |
* = path + "/.ssh/authorized_keys" + '\0' = pathlen + 22 */ |
* = path + "/.ssh/authorized_keys" + '\0' = pathlen + 22 */ |