diff options
author | dtucker <dtucker> | 2003-09-22 11:05:50 +0000 |
---|---|---|
committer | dtucker <dtucker> | 2003-09-22 11:05:50 +0000 |
commit | 6727af7992e1c80c51771dc3a6b1b2afe486b86f (patch) | |
tree | 253c2b616ab21784a7ab4e155e147bc201fd3a30 /authfd.c | |
parent | a2f31a3a2e9b5035a66f5918db5821cc1ad29dcf (diff) | |
download | openssh-6727af7992e1c80c51771dc3a6b1b2afe486b86f.tar.gz |
- miod@cvs.openbsd.org 2003/09/18 13:02:21
[authfd.c bufaux.c dh.c mac.c ssh-keygen.c]
A few signedness fixes for harmless situations; markus@ ok
Diffstat (limited to 'authfd.c')
-rw-r--r-- | authfd.c | 9 |
1 files changed, 5 insertions, 4 deletions
@@ -35,7 +35,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: authfd.c,v 1.61 2003/06/28 16:23:06 deraadt Exp $"); +RCSID("$OpenBSD: authfd.c,v 1.62 2003/09/18 13:02:21 miod Exp $"); #include <openssl/evp.h> @@ -114,7 +114,8 @@ ssh_get_authentication_socket(void) static int ssh_request_reply(AuthenticationConnection *auth, Buffer *request, Buffer *reply) { - int l, len; + int l; + u_int len; char buf[1024]; /* Get the length of the message, and format it in the buffer. */ @@ -147,7 +148,7 @@ ssh_request_reply(AuthenticationConnection *auth, Buffer *request, Buffer *reply /* Extract the length, and check it for sanity. */ len = GET_32BIT(buf); if (len > 256 * 1024) - fatal("Authentication response too long: %d", len); + fatal("Authentication response too long: %u", len); /* Read the rest of the response in to the buffer. */ buffer_clear(reply); @@ -292,7 +293,7 @@ ssh_get_num_identities(AuthenticationConnection *auth, int version) /* Get the number of entries in the response and check it for sanity. */ auth->howmany = buffer_get_int(&auth->identities); - if (auth->howmany > 1024) + if ((u_int)auth->howmany > 1024) fatal("Too many identities in authentication reply: %d", auth->howmany); |