summaryrefslogtreecommitdiff
path: root/sshd.c
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2002-06-11 16:42:49 +0000
committerBen Lindstrom <mouring@eviladmin.org>2002-06-11 16:42:49 +0000
commitce0f6342702a660f97b57cbdeb671feb02bae382 (patch)
treef8243804c8a0c71372d6a4fe92759a034e9dce38 /sshd.c
parentf9c4884c8effe6dd78ab3ed4e42ed69c4a8652d0 (diff)
- mpech@cvs.openbsd.org 2002/06/11 05:46:20
[auth-krb4.c monitor.h serverloop.c session.c ssh-agent.c sshd.c] pid_t cleanup. Markus need this now to keep hacking. markus@, millert@ ok
Diffstat (limited to 'sshd.c')
-rw-r--r--sshd.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/sshd.c b/sshd.c
index 2f810b9c1..705d4768b 100644
--- a/sshd.c
+++ b/sshd.c
@@ -42,7 +42,7 @@
42 */ 42 */
43 43
44#include "includes.h" 44#include "includes.h"
45RCSID("$OpenBSD: sshd.c,v 1.244 2002/05/29 11:21:57 markus Exp $"); 45RCSID("$OpenBSD: sshd.c,v 1.245 2002/06/11 05:46:20 mpech Exp $");
46 46
47#include <openssl/dh.h> 47#include <openssl/dh.h>
48#include <openssl/bn.h> 48#include <openssl/bn.h>
@@ -574,7 +574,7 @@ privsep_preauth(void)
574 if (pid == -1) { 574 if (pid == -1) {
575 fatal("fork of unprivileged child failed"); 575 fatal("fork of unprivileged child failed");
576 } else if (pid != 0) { 576 } else if (pid != 0) {
577 debug2("Network child is on pid %d", pid); 577 debug2("Network child is on pid %ld", (long)pid);
578 578
579 close(pmonitor->m_recvfd); 579 close(pmonitor->m_recvfd);
580 authctxt = monitor_child_preauth(pmonitor); 580 authctxt = monitor_child_preauth(pmonitor);
@@ -630,7 +630,7 @@ privsep_postauth(Authctxt *authctxt)
630 if (pmonitor->m_pid == -1) 630 if (pmonitor->m_pid == -1)
631 fatal("fork of unprivileged child failed"); 631 fatal("fork of unprivileged child failed");
632 else if (pmonitor->m_pid != 0) { 632 else if (pmonitor->m_pid != 0) {
633 debug2("User child is on pid %d", pmonitor->m_pid); 633 debug2("User child is on pid %ld", (long)pmonitor->m_pid);
634 close(pmonitor->m_recvfd); 634 close(pmonitor->m_recvfd);
635 monitor_child_postauth(pmonitor); 635 monitor_child_postauth(pmonitor);
636 636
@@ -1173,7 +1173,7 @@ main(int ac, char **av)
1173 */ 1173 */
1174 f = fopen(options.pid_file, "wb"); 1174 f = fopen(options.pid_file, "wb");
1175 if (f) { 1175 if (f) {
1176 fprintf(f, "%u\n", (u_int) getpid()); 1176 fprintf(f, "%ld\n", (long) getpid());
1177 fclose(f); 1177 fclose(f);
1178 } 1178 }
1179 } 1179 }
@@ -1320,7 +1320,7 @@ main(int ac, char **av)
1320 if (pid < 0) 1320 if (pid < 0)
1321 error("fork: %.100s", strerror(errno)); 1321 error("fork: %.100s", strerror(errno));
1322 else 1322 else
1323 debug("Forked child %d.", pid); 1323 debug("Forked child %ld.", (long)pid);
1324 1324
1325 close(startup_p[1]); 1325 close(startup_p[1]);
1326 1326