- stevesk@cvs.openbsd.org 2001/02/04 06:30:12
[auth2.c authfd.c packet.c]
remove duplicate #include's; ok markus@
+ - deraadt@cvs.openbsd.org 2001/02/04 16:56:23
+ [scp.c sshd.c]
+ alpha happiness
+ - stevesk@cvs.openbsd.org 2001/02/04 15:12:17
+ [sshd.c]
+ precedence; ok markus@
+ - deraadt@cvs.openbsd.org 2001/02/04 08:14:15
+ [ssh.c sshd.c]
+ make the alpha happy
20010104
- (bal) I think this is the last of the bsd-*.h that don't belong.
*/
#include "includes.h"
-RCSID("$OpenBSD: scp.c,v 1.51 2001/01/21 19:05:55 markus Exp $");
+RCSID("$OpenBSD: scp.c,v 1.53 2001/02/04 23:56:22 deraadt Exp $");
#include "xmalloc.h"
#include "atomicio.h"
i++;
abbrevsize >>= 10;
}
- snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf), " %5d %c%c ",
- (int) abbrevsize, prefixes[i], prefixes[i] == ' ' ? ' ' : 'B');
+ snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf), " %5lu %c%c ",
+ (unsigned long) abbrevsize, prefixes[i], prefixes[i] == ' ' ? ' ' : 'B');
timersub(&now, &lastupdate, &wait);
if (cursize > lastsize) {
int len;
int interactive = 0;
- debug("client_init id %d arg %d", id, (int)arg);
+ debug("client_init id %d arg %ld", id, (long)arg);
if (no_shell_flag)
goto done;
*/
#include "includes.h"
-RCSID("$OpenBSD: sshd.c,v 1.159 2001/01/29 19:47:31 markus Exp $");
+RCSID("$OpenBSD: sshd.c,v 1.163 2001/02/04 23:56:23 deraadt Exp $");
#include <openssl/dh.h>
#include <openssl/bn.h>
log("Disabling protocol version 2. Could not load host key");
options.protocol &= ~SSH_PROTO_2;
}
- if (! options.protocol & (SSH_PROTO_1|SSH_PROTO_2)) {
+ if (!(options.protocol & (SSH_PROTO_1|SSH_PROTO_2))) {
log("sshd: no hostkeys available -- exiting.\n");
exit(1);
}
if (len < 0 || len > sizeof(session_key)) {
error("do_connection: bad session key len from %s: "
"session_key_int %d > sizeof(session_key) %d",
- get_remote_ipaddr(), len, sizeof(session_key));
+ get_remote_ipaddr(), len, (int)sizeof(session_key));
rsafail++;
} else {
memset(session_key, 0, sizeof(session_key));