[BACK]Return to uidswap.c CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Diff for /src/usr.bin/ssh/uidswap.c between version 1.1 and 1.2

version 1.1, 1999/09/26 20:53:38 version 1.2, 1999/09/30 08:34:25
Line 28 
Line 28 
    Additionally, they must work regardless of whether the system has     Additionally, they must work regardless of whether the system has
    POSIX saved uids or not. */     POSIX saved uids or not. */
   
 #ifdef HAVE_SETEUID  
   
 #ifdef _POSIX_SAVED_IDS  #ifdef _POSIX_SAVED_IDS
 /* Lets assume that posix saved ids also work with seteuid, even though that  /* Lets assume that posix saved ids also work with seteuid, even though that
    is not part of the posix specification. */     is not part of the posix specification. */
Line 95 
Line 93 
   if (setuid(uid) < 0)    if (setuid(uid) < 0)
     debug("setuid %d: %.100s", (int)uid, strerror(errno));      debug("setuid %d: %.100s", (int)uid, strerror(errno));
 }  }
   
 #else /* HAVE_SETEUID */  
   
 YOUR_SYSTEM_DOES_NOT_PERMIT_UID_SWAPPING_READ_AND_EDIT_UIDSWAP_C;  
 /* If we ever come here, if means that your system does not support any of  
    the uid swapping methods we are aware of.  Tough.  This means that  
    ssh will have to read certain files as root, which causes some security  
    problems.  Unless your are very concerned about security, you can  
    comment out the above line.  The effect is that local users on your  
    machine might be able to read each other's files.  Also, you may encounter  
    problems if home directories are on a NFS volume.  You may also  
    encounter other problems; please don't complain unless you have some idea  
    how to fix it. */  
   
 void temporarily_use_uid(uid_t uid)  
 {  
 }  
   
 void restore_uid()  
 {  
 }  
   
 void permanently_set_uid(uid_t uid)  
 {  
   if (setuid(uid) < 0)  
     debug("setuid %d: %.100s", (int)uid, strerror(errno));  
 }  
   
 #endif /* HAVE_SETEUID */  

Legend:
Removed from v.1.1  
changed lines
  Added in v.1.2