[openssh-commits] [openssh] 01/01: Use fatal_fr not fatal_r when passing r.
git+noreply at mindrot.org
git+noreply at mindrot.org
Mon Oct 19 10:55:46 AEDT 2020
This is an automated email from the git hooks/post-receive script.
dtucker pushed a commit to branch master
in repository openssh.
commit 7715a3b171049afa1feffb1d5a1245dfac36ce99
Author: Darren Tucker <dtucker at dtucker.net>
Date: Mon Oct 19 10:54:41 2020 +1100
Use fatal_fr not fatal_r when passing r.
Caught by the PAM -Werror tinderbox build.
---
monitor_wrap.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/monitor_wrap.c b/monitor_wrap.c
index 8cfd4b41..5f40cc82 100644
--- a/monitor_wrap.c
+++ b/monitor_wrap.c
@@ -415,7 +415,7 @@ mm_auth_password(struct ssh *ssh, char *password)
if ((r = sshbuf_get_u32(m, &maxtries)) != 0)
fatal_fr(r, "parse PAM");
if (maxtries > INT_MAX)
- fatal_f(r, "bad maxtries");
+ fatal_fr(r, "bad maxtries");
sshpam_set_maxtries_reached(maxtries);
#endif
--
To stop receiving notification emails like this one, please contact
djm at mindrot.org.
More information about the openssh-commits
mailing list