From 2ad775105ceb2c460a0557dc40fdc3b5a77128a7 Mon Sep 17 00:00:00 2001 From: damien Date: Thu, 18 Nov 1999 21:25:48 +0000 Subject: [PATCH] - Merged OpenBSD CVS changes - [auth-rhosts.c auth-rsa.c ssh-agent.c sshconnect.c sshd.c] more %d vs. %s in fmt-strings - [authfd.c] Integers should not be printed with %s --- ChangeLog | 5 +++++ auth-rhosts.c | 2 +- auth-rsa.c | 2 +- authfd.c | 2 +- ssh-agent.c | 6 +++--- sshconnect.c | 2 +- sshd.c | 3 +-- 7 files changed, 13 insertions(+), 9 deletions(-) diff --git a/ChangeLog b/ChangeLog index f9889b4d..71fdc4a6 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,5 +1,10 @@ 19991119 - Merged PAM buffer overrun patch from Chip Salzenberg + - Merged OpenBSD CVS changes + - [auth-rhosts.c auth-rsa.c ssh-agent.c sshconnect.c sshd.c] + more %d vs. %s in fmt-strings + - [authfd.c] + Integers should not be printed with %s 19991118 - Merged OpenBSD CVS changes diff --git a/auth-rhosts.c b/auth-rhosts.c index c1f1034e..8149be6b 100644 --- a/auth-rhosts.c +++ b/auth-rhosts.c @@ -213,7 +213,7 @@ int auth_rhosts(struct passwd *pw, const char *client_user) group or world writable. */ if (stat(pw->pw_dir, &st) < 0) { - log("Rhosts authentication refused for %.100: no home directory %.200s", + log("Rhosts authentication refused for %.100s: no home directory %.200s", pw->pw_name, pw->pw_dir); packet_send_debug("Rhosts authentication refused for %.100: no home directory %.200s", pw->pw_name, pw->pw_dir); diff --git a/auth-rsa.c b/auth-rsa.c index c4e52fbb..8a8eca98 100644 --- a/auth-rsa.c +++ b/auth-rsa.c @@ -265,7 +265,7 @@ auth_rsa(struct passwd *pw, BIGNUM *client_n) /* check the real bits */ if (bits != BN_num_bits(n)) - error("Warning: error in %s, line %d: keysize mismatch: " + error("Warning: error in %s, line %ld: keysize mismatch: " "actual size %d vs. announced %d.", file, linenum, BN_num_bits(n), bits); diff --git a/authfd.c b/authfd.c index 0f0d1db6..f5851d28 100644 --- a/authfd.c +++ b/authfd.c @@ -212,7 +212,7 @@ ssh_get_next_identity(AuthenticationConnection *auth, *comment = buffer_get_string(&auth->identities, NULL); if (bits != BN_num_bits(n)) - error("Warning: keysize mismatch: actual %d, announced %s", + error("Warning: keysize mismatch: actual %d, announced %u", BN_num_bits(n), bits); /* Decrement the number of remaining entries. */ diff --git a/ssh-agent.c b/ssh-agent.c index 743cdb20..296bb4c7 100644 --- a/ssh-agent.c +++ b/ssh-agent.c @@ -1,4 +1,4 @@ -/* $OpenBSD: ssh-agent.c,v 1.18 1999/11/15 20:53:24 markus Exp $ */ +/* $OpenBSD: ssh-agent.c,v 1.19 1999/11/18 14:00:49 markus Exp $ */ /* @@ -16,7 +16,7 @@ The authentication agent program. */ #include "includes.h" -RCSID("$OpenBSD: ssh-agent.c,v 1.18 1999/11/15 20:53:24 markus Exp $"); +RCSID("$OpenBSD: ssh-agent.c,v 1.19 1999/11/18 14:00:49 markus Exp $"); #include "ssh.h" #include "rsa.h" @@ -197,7 +197,7 @@ process_remove_identity(SocketEntry *e) buffer_get_bignum(&e->input, n); if (bits != BN_num_bits(n)) - error("Warning: keysize mismatch: actual %d, announced %s", + error("Warning: keysize mismatch: actual %d, announced %d", BN_num_bits(n), bits); /* Check if we have the key. */ diff --git a/sshconnect.c b/sshconnect.c index 99c88adf..3f6277f0 100644 --- a/sshconnect.c +++ b/sshconnect.c @@ -1354,7 +1354,7 @@ void ssh_login(int host_key_valid, if (cipher_mask() & supported_ciphers & (1 << ssh_cipher_default)) options.cipher = ssh_cipher_default; else { - debug("Cipher %d not supported, using %.100s instead.", + debug("Cipher %s not supported, using %.100s instead.", cipher_name(ssh_cipher_default), cipher_name(SSH_FALLBACK_CIPHER)); options.cipher = SSH_FALLBACK_CIPHER; diff --git a/sshd.c b/sshd.c index bb2b0acd..cbd555f0 100644 --- a/sshd.c +++ b/sshd.c @@ -1394,8 +1394,7 @@ do_authloop(struct passwd *pw) if (bits != BN_num_bits(client_host_key_n)) error("Warning: keysize mismatch for client_host_key: " - "actual %d, announced %s", BN_num_bits(client_host_key_n), bits); - + "actual %d, announced %d", BN_num_bits(client_host_key_n), bits); packet_integrity_check(plen, (4 + ulen) + 4 + elen + nlen, type); authenticated = auth_rhosts_rsa(pw, client_user, -- 2.45.2