1 --- dropbear.old/svr-authpubkey.c.orig 2006-06-03 14:54:43.000000000 +0000
2 +++ dropbear.dev/svr-authpubkey.c 2006-06-03 15:03:19.000000000 +0000
7 + if (ses.authstate.pw->pw_uid != 0) {
9 /* we don't need to check pw and pw_dir for validity, since
10 * its been done in checkpubkeyperms. */
11 len = strlen(ses.authstate.pw->pw_dir);
15 authfile = fopen(filename, "r");
17 + authfile = fopen("/etc/dropbear/authorized_keys","r");
19 if (authfile == NULL) {
26 + if (ses.authstate.pw->pw_uid != 0) {
28 /* allocate max required pathname storage,
29 * = path + "/.ssh/authorized_keys" + '\0' = pathlen + 22 */
30 filename = m_malloc(len + 22);
32 if (checkfileperm(filename) != DROPBEAR_SUCCESS) {
36 + if (checkfileperm("/etc/dropbear") != DROPBEAR_SUCCESS) {
39 + if (checkfileperm("/etc/dropbear/authorized_keys") != DROPBEAR_SUCCESS) {
44 /* file looks ok, return success */
45 ret = DROPBEAR_SUCCESS;