|
@@ -1,7 +1,7 @@
|
|
|
$Id: update-patches 24 2008-08-31 14:56:13Z wbx $
|
|
|
---- dropbear-0.52.orig/svr-authpubkey.c 2008-11-11 15:09:03.000000000 +0100
|
|
|
-+++ dropbear-0.52/svr-authpubkey.c 2009-03-19 19:29:53.000000000 +0100
|
|
|
-@@ -209,6 +209,8 @@ static int checkpubkey(unsigned char* al
|
|
|
+--- dropbear-2014.63.orig/svr-authpubkey.c 2014-02-19 15:05:24.000000000 +0100
|
|
|
++++ dropbear-2014.63/svr-authpubkey.c 2014-02-27 16:29:05.000000000 +0100
|
|
|
+@@ -208,6 +208,8 @@ static int checkpubkey(unsigned char* al
|
|
|
goto out;
|
|
|
}
|
|
|
|
|
@@ -10,7 +10,7 @@ $Id: update-patches 24 2008-08-31 14:56:13Z wbx $
|
|
|
/* we don't need to check pw and pw_dir for validity, since
|
|
|
* its been done in checkpubkeyperms. */
|
|
|
len = strlen(ses.authstate.pw_dir);
|
|
|
-@@ -220,6 +222,9 @@ static int checkpubkey(unsigned char* al
|
|
|
+@@ -219,6 +221,9 @@ static int checkpubkey(unsigned char* al
|
|
|
|
|
|
/* open the file */
|
|
|
authfile = fopen(filename, "r");
|
|
@@ -20,7 +20,7 @@ $Id: update-patches 24 2008-08-31 14:56:13Z wbx $
|
|
|
if (authfile == NULL) {
|
|
|
goto out;
|
|
|
}
|
|
|
-@@ -372,6 +377,8 @@ static int checkpubkeyperms() {
|
|
|
+@@ -371,6 +376,8 @@ static int checkpubkeyperms() {
|
|
|
goto out;
|
|
|
}
|
|
|
|
|
@@ -29,7 +29,7 @@ $Id: update-patches 24 2008-08-31 14:56:13Z wbx $
|
|
|
/* allocate max required pathname storage,
|
|
|
* = path + "/.ssh/authorized_keys" + '\0' = pathlen + 22 */
|
|
|
filename = m_malloc(len + 22);
|
|
|
-@@ -393,6 +400,14 @@ static int checkpubkeyperms() {
|
|
|
+@@ -392,6 +399,14 @@ static int checkpubkeyperms() {
|
|
|
if (checkfileperm(filename) != DROPBEAR_SUCCESS) {
|
|
|
goto out;
|
|
|
}
|