# HG changeset patch # User Chocobo1 # Date 1451968353 -28800 # Node ID 888e3d17e962bacb802bc4e87a1ff3e178690b1f # Parent a0062a354a8094f4fac86a2e42d1ec5fd12d4d6d Fix print format specifier diff -r a0062a354a80 -r 888e3d17e962 cli-runopts.c --- a/cli-runopts.c Tue Jan 05 12:25:10 2016 +0800 +++ b/cli-runopts.c Tue Jan 05 12:32:33 2016 +0800 @@ -538,7 +538,7 @@ if (opts.recv_window != DEFAULT_RECV_WINDOW) { - int written = snprintf(ret+total, len-total, "-W %d ", opts.recv_window); + int written = snprintf(ret+total, len-total, "-W %u ", opts.recv_window); total += written; } diff -r a0062a354a80 -r 888e3d17e962 cli-tcpfwd.c --- a/cli-tcpfwd.c Tue Jan 05 12:25:10 2016 +0800 +++ b/cli-tcpfwd.c Tue Jan 05 12:32:33 2016 +0800 @@ -273,7 +273,7 @@ goto out; } - snprintf(portstring, sizeof(portstring), "%d", fwd->connectport); + snprintf(portstring, sizeof(portstring), "%u", fwd->connectport); channel->conn_pending = connect_remote(fwd->connectaddr, portstring, channel_connect_done, channel); channel->prio = DROPBEAR_CHANNEL_PRIO_UNKNOWABLE; diff -r a0062a354a80 -r 888e3d17e962 svr-session.c --- a/svr-session.c Tue Jan 05 12:25:10 2016 +0800 +++ b/svr-session.c Tue Jan 05 12:32:33 2016 +0800 @@ -160,7 +160,7 @@ } else if (ses.authstate.pw_name) { /* we have a potential user */ snprintf(fmtbuf, sizeof(fmtbuf), - "Exit before auth (user '%s', %d fails): %s", + "Exit before auth (user '%s', %u fails): %s", ses.authstate.pw_name, ses.authstate.failcount, format); } else { /* before userauth */ diff -r a0062a354a80 -r 888e3d17e962 svr-tcpfwd.c --- a/svr-tcpfwd.c Tue Jan 05 12:25:10 2016 +0800 +++ b/svr-tcpfwd.c Tue Jan 05 12:32:33 2016 +0800 @@ -269,7 +269,7 @@ goto out; } - snprintf(portstring, sizeof(portstring), "%d", destport); + snprintf(portstring, sizeof(portstring), "%u", destport); channel->conn_pending = connect_remote(desthost, portstring, channel_connect_done, channel); channel->prio = DROPBEAR_CHANNEL_PRIO_UNKNOWABLE; diff -r a0062a354a80 -r 888e3d17e962 svr-x11fwd.c --- a/svr-x11fwd.c Tue Jan 05 12:25:10 2016 +0800 +++ b/svr-x11fwd.c Tue Jan 05 12:32:33 2016 +0800 @@ -142,7 +142,7 @@ } /* create the DISPLAY string */ - val = snprintf(display, sizeof(display), "localhost:%d.%d", + val = snprintf(display, sizeof(display), "localhost:%d.%u", chansess->x11port - X11BASEPORT, chansess->x11screennum); if (val < 0 || val >= (int)sizeof(display)) { /* string was truncated */ @@ -152,7 +152,7 @@ addnewvar("DISPLAY", display); /* create the xauth string */ - val = snprintf(display, sizeof(display), "unix:%d.%d", + val = snprintf(display, sizeof(display), "unix:%d.%u", chansess->x11port - X11BASEPORT, chansess->x11screennum); if (val < 0 || val >= (int)sizeof(display)) { /* string was truncated */ diff -r a0062a354a80 -r 888e3d17e962 tcp-accept.c --- a/tcp-accept.c Tue Jan 05 12:25:10 2016 +0800 +++ b/tcp-accept.c Tue Jan 05 12:32:33 2016 +0800 @@ -121,7 +121,7 @@ TRACE(("enter listen_tcpfwd")) /* first we try to bind, so don't need to do so much cleanup on failure */ - snprintf(portstring, sizeof(portstring), "%d", tcpinfo->listenport); + snprintf(portstring, sizeof(portstring), "%u", tcpinfo->listenport); nsocks = dropbear_listen(tcpinfo->listenaddr, portstring, socks, DROPBEAR_MAX_SOCKS, &errstring, &ses.maxfd);