=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/Attic/auth1.c,v retrieving revision 1.40.2.2 retrieving revision 1.40.2.3 diff -u -r1.40.2.2 -r1.40.2.3 --- src/usr.bin/ssh/Attic/auth1.c 2002/10/11 14:51:52 1.40.2.2 +++ src/usr.bin/ssh/Attic/auth1.c 2003/04/03 22:35:16 1.40.2.3 @@ -10,7 +10,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth1.c,v 1.40.2.2 2002/10/11 14:51:52 miod Exp $"); +RCSID("$OpenBSD: auth1.c,v 1.40.2.3 2003/04/03 22:35:16 miod Exp $"); #include "xmalloc.h" #include "rsa.h" @@ -150,7 +150,7 @@ snprintf(info, sizeof(info), " tktuser %.100s", client_user); - + /* Send response to client */ packet_start( SSH_SMSG_AUTH_KERBEROS_RESPONSE); @@ -288,7 +288,6 @@ debug("rcvd SSH_CMSG_AUTH_TIS_RESPONSE"); if (options.challenge_response_authentication == 1) { char *response = packet_get_string(&dlen); - debug("got response '%s'", response); packet_check_eom(); authenticated = verify_response(authctxt, response); memset(response, 'r', dlen); @@ -315,8 +314,7 @@ authctxt->user); /* Special handling for root */ - if (!use_privsep && - authenticated && authctxt->pw->pw_uid == 0 && + if (authenticated && authctxt->pw->pw_uid == 0 && !auth_root_allowed(get_authname(type))) authenticated = 0;