From ee844912c94226a09c95e4140c158d9c4f37a0b5 Mon Sep 17 00:00:00 2001 From: Ben Lindstrom Date: Sat, 9 Nov 2002 15:43:23 +0000 Subject: - markus@cvs.openbsd.org 2002/10/23 10:40:16 [bufaux.c] %u for u_int --- ChangeLog | 5 ++++- bufaux.c | 4 ++-- 2 files changed, 6 insertions(+), 3 deletions(-) diff --git a/ChangeLog b/ChangeLog index 7120cceec..9d4a185ee 100644 --- a/ChangeLog +++ b/ChangeLog @@ -6,6 +6,9 @@ - markus@cvs.openbsd.org 2002/10/23 10:32:13 [packet.c] use %u for u_int + - markus@cvs.openbsd.org 2002/10/23 10:40:16 + [bufaux.c] + %u for u_int 20021021 - (djm) Bug #400: Kill ssh-rand-helper children on timeout, patch from @@ -783,4 +786,4 @@ save auth method before monitor_reset_key_state(); bugzilla bug #284; ok provos@ -$Id: ChangeLog,v 1.2501 2002/11/09 15:41:39 mouring Exp $ +$Id: ChangeLog,v 1.2502 2002/11/09 15:43:23 mouring Exp $ diff --git a/bufaux.c b/bufaux.c index d3dc674ce..3c276b810 100644 --- a/bufaux.c +++ b/bufaux.c @@ -37,7 +37,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: bufaux.c,v 1.27 2002/06/26 08:53:12 markus Exp $"); +RCSID("$OpenBSD: bufaux.c,v 1.28 2002/10/23 10:40:16 markus Exp $"); #include #include "bufaux.h" @@ -225,7 +225,7 @@ buffer_get_string(Buffer *buffer, u_int *length_ptr) /* Get the length. */ len = buffer_get_int(buffer); if (len > 256 * 1024) - fatal("buffer_get_string: bad string length %d", len); + fatal("buffer_get_string: bad string length %u", len); /* Allocate space for the string. Add one byte for a null character. */ value = xmalloc(len + 1); /* Get the string. */ -- cgit v1.2.3