View | Details | Raw Unified | Return to bug 565
Collapse All | Expand All

(-)authfile.c (-1 / +1 lines)
Lines 511-517 Link Here
511
		error("@         WARNING: UNPROTECTED PRIVATE KEY FILE!          @");
511
		error("@         WARNING: UNPROTECTED PRIVATE KEY FILE!          @");
512
		error("@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@");
512
		error("@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@");
513
		error("Permissions 0%3.3o for '%s' are too open.",
513
		error("Permissions 0%3.3o for '%s' are too open.",
514
		    st.st_mode & 0777, filename);
514
		    (u_int)st.st_mode & 0777, filename);
515
		error("It is recommended that your private key files are NOT accessible by others.");
515
		error("It is recommended that your private key files are NOT accessible by others.");
516
		error("This private key will be ignored.");
516
		error("This private key will be ignored.");
517
		return 0;
517
		return 0;
(-)monitor.c (-1 / +1 lines)
Lines 1020-1026 Link Here
1020
static void
1020
static void
1021
mm_session_close(Session *s)
1021
mm_session_close(Session *s)
1022
{
1022
{
1023
	debug3("%s: session %d pid %d", __func__, s->self, s->pid);
1023
	debug3("%s: session %d pid %ld", __func__, s->self, (long)s->pid);
1024
	if (s->ttyfd != -1) {
1024
	if (s->ttyfd != -1) {
1025
		debug3("%s: tty %s ptyfd %d",  __func__, s->tty, s->ptyfd);
1025
		debug3("%s: tty %s ptyfd %d",  __func__, s->tty, s->ptyfd);
1026
		fatal_remove_cleanup(session_pty_cleanup2, (void *)s);
1026
		fatal_remove_cleanup(session_pty_cleanup2, (void *)s);
(-)sftp-common.c (-2 / +2 lines)
Lines 206-213 Link Here
206
		tbuf[0] = '\0';
206
		tbuf[0] = '\0';
207
	ulen = MAX(strlen(user), 8);
207
	ulen = MAX(strlen(user), 8);
208
	glen = MAX(strlen(group), 8);
208
	glen = MAX(strlen(group), 8);
209
	snprintf(buf, sizeof buf, "%s %3d %-*s %-*s %8llu %s %s", mode,
209
	snprintf(buf, sizeof buf, "%s %3u %-*s %-*s %8llu %s %s", mode,
210
	    st->st_nlink, ulen, user, glen, group,
210
	    (u_int)st->st_nlink, ulen, user, glen, group,
211
	    (unsigned long long)st->st_size, tbuf, name);
211
	    (unsigned long long)st->st_size, tbuf, name);
212
	return xstrdup(buf);
212
	return xstrdup(buf);
213
}
213
}
(-)sshd.c (-1 / +1 lines)
Lines 556-562 Link Here
556
#else
556
#else
557
	gidset[0] = pw->pw_gid;
557
	gidset[0] = pw->pw_gid;
558
	if (setgid(pw->pw_gid) < 0)
558
	if (setgid(pw->pw_gid) < 0)
559
		fatal("setgid failed for %u", pw->pw_gid );
559
		fatal("setgid failed for %u", (u_int)pw->pw_gid );
560
	if (setgroups(1, gidset) < 0)
560
	if (setgroups(1, gidset) < 0)
561
		fatal("setgroups: %.100s", strerror(errno));
561
		fatal("setgroups: %.100s", strerror(errno));
562
	permanently_set_uid(pw);
562
	permanently_set_uid(pw);
(-)sshpty.c (-2 / +2 lines)
Lines 290-299 Link Here
290
			if (errno == EROFS &&
290
			if (errno == EROFS &&
291
			    (st.st_mode & (S_IRGRP | S_IROTH)) == 0)
291
			    (st.st_mode & (S_IRGRP | S_IROTH)) == 0)
292
				debug("chmod(%.100s, 0%o) failed: %.100s",
292
				debug("chmod(%.100s, 0%o) failed: %.100s",
293
				    ttyname, mode, strerror(errno));
293
				    ttyname, (u_int)mode, strerror(errno));
294
			else
294
			else
295
				fatal("chmod(%.100s, 0%o) failed: %.100s",
295
				fatal("chmod(%.100s, 0%o) failed: %.100s",
296
				    ttyname, mode, strerror(errno));
296
				    ttyname, (u_int)mode, strerror(errno));
297
		}
297
		}
298
	}
298
	}
299
}
299
}

Return to bug 565