diff options
author | 2002-06-26 14:49:36 +0000 | |
---|---|---|
committer | 2002-06-26 14:49:36 +0000 | |
commit | 6db122766794253305eec1d7cff6bfc5e88afd8b (patch) | |
tree | fb8daa42bb26fae4d7c799f46a8e44a7fd1d7cb2 | |
parent | configrom input failover + some KNF (diff) | |
download | wireguard-openbsd-6db122766794253305eec1d7cff6bfc5e88afd8b.tar.xz wireguard-openbsd-6db122766794253305eec1d7cff6bfc5e88afd8b.zip |
correct %u
-rw-r--r-- | usr.bin/ssh/monitor.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/usr.bin/ssh/monitor.c b/usr.bin/ssh/monitor.c index 8d23f780c1a..b91643a6e63 100644 --- a/usr.bin/ssh/monitor.c +++ b/usr.bin/ssh/monitor.c @@ -25,7 +25,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: monitor.c,v 1.18 2002/06/26 13:20:57 deraadt Exp $"); +RCSID("$OpenBSD: monitor.c,v 1.19 2002/06/26 14:49:36 deraadt Exp $"); #include <openssl/dh.h> @@ -441,7 +441,7 @@ mm_answer_sign(int socket, Buffer *m) p = buffer_get_string(m, &datlen); if (datlen != 20) - fatal("%s: data length incorrect: %d", __func__, datlen); + fatal("%s: data length incorrect: %u", __func__, datlen); /* save session id, it will be passed on the first call */ if (session_id2_len == 0) { @@ -455,7 +455,7 @@ mm_answer_sign(int socket, Buffer *m) if (key_sign(key, &signature, &siglen, p, datlen) < 0) fatal("%s: key_sign failed", __func__); - debug3("%s: signature %p(%d)", __func__, signature, siglen); + debug3("%s: signature %p(%u)", __func__, signature, siglen); buffer_clear(m); buffer_put_string(m, signature, siglen); |