19991119
- Merged PAM buffer overrun patch from Chip Salzenberg <chip@valinux.com>
+ - Merged OpenBSD CVS changes
+ - [auth-rhosts.c auth-rsa.c ssh-agent.c sshconnect.c sshd.c]
+ more %d vs. %s in fmt-strings
+ - [authfd.c]
+ Integers should not be printed with %s
19991118
- Merged OpenBSD CVS changes
group or world writable. */
if (stat(pw->pw_dir, &st) < 0)
{
- log("Rhosts authentication refused for %.100: no home directory %.200s",
+ log("Rhosts authentication refused for %.100s: no home directory %.200s",
pw->pw_name, pw->pw_dir);
packet_send_debug("Rhosts authentication refused for %.100: no home directory %.200s",
pw->pw_name, pw->pw_dir);
/* check the real bits */
if (bits != BN_num_bits(n))
- error("Warning: error in %s, line %d: keysize mismatch: "
+ error("Warning: error in %s, line %ld: keysize mismatch: "
"actual size %d vs. announced %d.",
file, linenum, BN_num_bits(n), bits);
*comment = buffer_get_string(&auth->identities, NULL);
if (bits != BN_num_bits(n))
- error("Warning: keysize mismatch: actual %d, announced %s",
+ error("Warning: keysize mismatch: actual %d, announced %u",
BN_num_bits(n), bits);
/* Decrement the number of remaining entries. */
-/* $OpenBSD: ssh-agent.c,v 1.18 1999/11/15 20:53:24 markus Exp $ */
+/* $OpenBSD: ssh-agent.c,v 1.19 1999/11/18 14:00:49 markus Exp $ */
/*
*/
#include "includes.h"
-RCSID("$OpenBSD: ssh-agent.c,v 1.18 1999/11/15 20:53:24 markus Exp $");
+RCSID("$OpenBSD: ssh-agent.c,v 1.19 1999/11/18 14:00:49 markus Exp $");
#include "ssh.h"
#include "rsa.h"
buffer_get_bignum(&e->input, n);
if (bits != BN_num_bits(n))
- error("Warning: keysize mismatch: actual %d, announced %s",
+ error("Warning: keysize mismatch: actual %d, announced %d",
BN_num_bits(n), bits);
/* Check if we have the key. */
if (cipher_mask() & supported_ciphers & (1 << ssh_cipher_default))
options.cipher = ssh_cipher_default;
else {
- debug("Cipher %d not supported, using %.100s instead.",
+ debug("Cipher %s not supported, using %.100s instead.",
cipher_name(ssh_cipher_default),
cipher_name(SSH_FALLBACK_CIPHER));
options.cipher = SSH_FALLBACK_CIPHER;
if (bits != BN_num_bits(client_host_key_n))
error("Warning: keysize mismatch for client_host_key: "
- "actual %d, announced %s", BN_num_bits(client_host_key_n), bits);
-
+ "actual %d, announced %d", BN_num_bits(client_host_key_n), bits);
packet_integrity_check(plen, (4 + ulen) + 4 + elen + nlen, type);
authenticated = auth_rhosts_rsa(pw, client_user,