summaryrefslogtreecommitdiff
path: root/sshd.c
diff options
context:
space:
mode:
Diffstat (limited to 'sshd.c')
-rw-r--r--sshd.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/sshd.c b/sshd.c
index e38d9b986..e32911299 100644
--- a/sshd.c
+++ b/sshd.c
@@ -40,7 +40,7 @@
40 */ 40 */
41 41
42#include "includes.h" 42#include "includes.h"
43RCSID("$OpenBSD: sshd.c,v 1.159 2001/01/29 19:47:31 markus Exp $"); 43RCSID("$OpenBSD: sshd.c,v 1.163 2001/02/04 23:56:23 deraadt Exp $");
44 44
45#include <openssl/dh.h> 45#include <openssl/dh.h>
46#include <openssl/bn.h> 46#include <openssl/bn.h>
@@ -723,7 +723,7 @@ main(int ac, char **av)
723 log("Disabling protocol version 2. Could not load host key"); 723 log("Disabling protocol version 2. Could not load host key");
724 options.protocol &= ~SSH_PROTO_2; 724 options.protocol &= ~SSH_PROTO_2;
725 } 725 }
726 if (! options.protocol & (SSH_PROTO_1|SSH_PROTO_2)) { 726 if (!(options.protocol & (SSH_PROTO_1|SSH_PROTO_2))) {
727 log("sshd: no hostkeys available -- exiting.\n"); 727 log("sshd: no hostkeys available -- exiting.\n");
728 exit(1); 728 exit(1);
729 } 729 }
@@ -1348,7 +1348,7 @@ do_ssh1_kex(void)
1348 if (len < 0 || len > sizeof(session_key)) { 1348 if (len < 0 || len > sizeof(session_key)) {
1349 error("do_connection: bad session key len from %s: " 1349 error("do_connection: bad session key len from %s: "
1350 "session_key_int %d > sizeof(session_key) %d", 1350 "session_key_int %d > sizeof(session_key) %d",
1351 get_remote_ipaddr(), len, sizeof(session_key)); 1351 get_remote_ipaddr(), len, (int)sizeof(session_key));
1352 rsafail++; 1352 rsafail++;
1353 } else { 1353 } else {
1354 memset(session_key, 0, sizeof(session_key)); 1354 memset(session_key, 0, sizeof(session_key));