summaryrefslogtreecommitdiff
path: root/sshd.c
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2005-06-17 12:59:34 +1000
committerDamien Miller <djm@mindrot.org>2005-06-17 12:59:34 +1000
commiteccb9de72aa29da5a3fad87a4287b32438689c1f (patch)
tree9b8ef20a7e454b984e0ad67b54b2bdc5577aa2fa /sshd.c
parent677257fe07dd2b9a58817e1d42fc2c25bb618a4d (diff)
- djm@cvs.openbsd.org 2005/06/17 02:44:33
[auth-rsa.c auth.c auth1.c auth2-chall.c auth2-gss.c authfd.c authfile.c] [bufaux.c canohost.c channels.c cipher.c clientloop.c dns.c gss-serv.c] [kex.c kex.h key.c mac.c match.c misc.c packet.c packet.h scp.c] [servconf.c session.c session.h sftp-client.c sftp-server.c sftp.c] [ssh-keyscan.c ssh-rsa.c sshconnect.c sshconnect1.c sshconnect2.c sshd.c] make this -Wsign-compare clean; ok avsm@ markus@ NB. auth1.c changes not committed yet (conflicts with uncommitted sync) NB2. more work may be needed to make portable Wsign-compare clean
Diffstat (limited to 'sshd.c')
-rw-r--r--sshd.c7
1 files changed, 4 insertions, 3 deletions
diff --git a/sshd.c b/sshd.c
index ed4158801..b0d65575f 100644
--- a/sshd.c
+++ b/sshd.c
@@ -42,7 +42,7 @@
42 */ 42 */
43 43
44#include "includes.h" 44#include "includes.h"
45RCSID("$OpenBSD: sshd.c,v 1.310 2005/06/16 08:00:00 markus Exp $"); 45RCSID("$OpenBSD: sshd.c,v 1.311 2005/06/17 02:44:33 djm Exp $");
46 46
47#include <openssl/dh.h> 47#include <openssl/dh.h>
48#include <openssl/bn.h> 48#include <openssl/bn.h>
@@ -358,7 +358,8 @@ key_regeneration_alarm(int sig)
358static void 358static void
359sshd_exchange_identification(int sock_in, int sock_out) 359sshd_exchange_identification(int sock_in, int sock_out)
360{ 360{
361 int i, mismatch; 361 u_int i;
362 int mismatch;
362 int remote_major, remote_minor; 363 int remote_major, remote_minor;
363 int major, minor; 364 int major, minor;
364 char *s; 365 char *s;
@@ -1900,7 +1901,7 @@ do_ssh1_kex(void)
1900 if (!rsafail) { 1901 if (!rsafail) {
1901 BN_mask_bits(session_key_int, sizeof(session_key) * 8); 1902 BN_mask_bits(session_key_int, sizeof(session_key) * 8);
1902 len = BN_num_bytes(session_key_int); 1903 len = BN_num_bytes(session_key_int);
1903 if (len < 0 || len > sizeof(session_key)) { 1904 if (len < 0 || (u_int)len > sizeof(session_key)) {
1904 error("do_connection: bad session key len from %s: " 1905 error("do_connection: bad session key len from %s: "
1905 "session_key_int %d > sizeof(session_key) %lu", 1906 "session_key_int %d > sizeof(session_key) %lu",
1906 get_remote_ipaddr(), len, (u_long)sizeof(session_key)); 1907 get_remote_ipaddr(), len, (u_long)sizeof(session_key));