[openssh-commits] [openssh] 01/01: Use fatal_fr not fatal_r when passing r.

git+noreply at mindrot.org git+noreply at mindrot.org
Mon Oct 19 10:55:46 AEDT 2020

This is an automated email from the git hooks/post-receive script.

dtucker pushed a commit to branch master
in repository openssh.

commit 7715a3b171049afa1feffb1d5a1245dfac36ce99
Author: Darren Tucker <dtucker at dtucker.net>
Date:   Mon Oct 19 10:54:41 2020 +1100

    Use fatal_fr not fatal_r when passing r.
    Caught by the PAM -Werror tinderbox build.
 monitor_wrap.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/monitor_wrap.c b/monitor_wrap.c
index 8cfd4b41..5f40cc82 100644
--- a/monitor_wrap.c
+++ b/monitor_wrap.c
@@ -415,7 +415,7 @@ mm_auth_password(struct ssh *ssh, char *password)
 	if ((r = sshbuf_get_u32(m, &maxtries)) != 0)
 		fatal_fr(r, "parse PAM");
 	if (maxtries > INT_MAX)
-		fatal_f(r, "bad maxtries");
+		fatal_fr(r, "bad maxtries");

To stop receiving notification emails like this one, please contact
djm at mindrot.org.

More information about the openssh-commits mailing list