Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:11933 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 23216 invoked by uid 1010); 5 Aug 2004 13:40:16 -0000 Delivered-To: ezmlm-scan-internals@lists.php.net Delivered-To: ezmlm-internals@lists.php.net Received: (qmail 23162 invoked from network); 5 Aug 2004 13:40:16 -0000 Received: from unknown (HELO rod.elitel.it) (212.34.224.163) by pb1.pair.com with SMTP; 5 Aug 2004 13:40:16 -0000 Received: (qmail 79972 invoked from network); 5 Aug 2004 13:49:03 -0000 Received: from unknown (HELO astrid.santinoli.com) (212.34.243.153) by rod.elitel.it with SMTP; 5 Aug 2004 13:49:03 -0000 Received: by astrid.santinoli.com (Postfix, from userid 502) id 365D04816B; Thu, 5 Aug 2004 15:41:11 +0200 (CEST) Date: Thu, 5 Aug 2004 15:41:11 +0200 To: internals@lists.php.net Message-ID: <20040805134111.GA927@astrid.santinoli.com> Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="a8Wt8u1KmwUX3Y2C" Content-Disposition: inline Organization: Fastpath Research User-Agent: Mutt/1.5.6i Subject: [PATCH] Format specifiers in rfc1867.c From: u235@libero.it (David Santinoli) --a8Wt8u1KmwUX3Y2C Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Hi, while working on rfc1867.c for the MD5/SHA1 patch, I found that the printf-style format specifiers used for diagnostic output do not always match the declarations of the variables to be printed. The attached patch fixes the mismatch. Cheers, David -- David Santinoli, Milano + Independent Linux/Unix consultant + http://www.santinoli.com --a8Wt8u1KmwUX3Y2C Content-Type: text/plain; charset=us-ascii Content-Disposition: attachment; filename="rfc1867-cvs-1.160-format.diff" --- main/rfc1867-cvs-1.160.c 2004-08-04 16:42:17.000000000 +0200 +++ main/rfc1867.c 2004-08-05 00:26:32.000000000 +0200 @@ -786,7 +786,7 @@ zend_llist header; if (SG(request_info).content_length > SG(post_max_size)) { - sapi_module.sapi_error(E_WARNING, "POST Content-Length of %d bytes exceeds the limit of %d bytes", SG(request_info).content_length, SG(post_max_size)); + sapi_module.sapi_error(E_WARNING, "POST Content-Length of %ld bytes exceeds the limit of %ld bytes", SG(request_info).content_length, SG(post_max_size)); return; } @@ -981,7 +981,7 @@ if (wlen < blen) { #if DEBUG_FILE_UPLOAD - sapi_module.sapi_error(E_NOTICE, "Only %d bytes were written, expected to write %ld", wlen, blen); + sapi_module.sapi_error(E_NOTICE, "Only %d bytes were written, expected to write %d", wlen, blen); #endif cancel_upload = UPLOAD_ERROR_C; } else { --a8Wt8u1KmwUX3Y2C--