From 178b6315788208560d89cfd9964db7ea99bcc89e Mon Sep 17 00:00:00 2001 From: =?utf8?q?Julius=20B=C3=BCnger?= Date: Wed, 22 Jul 2015 09:37:27 +0000 Subject: [PATCH] -logging --- src/rps/gnunet-service-rps.c | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/src/rps/gnunet-service-rps.c b/src/rps/gnunet-service-rps.c index 3b585e9f7..ce4a14348 100644 --- a/src/rps/gnunet-service-rps.c +++ b/src/rps/gnunet-service-rps.c @@ -1641,7 +1641,7 @@ handle_peer_pull_reply (void *cls, sizeof (struct GNUNET_PeerIdentity) != ntohl (in_msg->num_peers)) { LOG (GNUNET_ERROR_TYPE_ERROR, - "message says it sends %" PRIu64 " peers, have space for %i peers\n", + "message says it sends %" PRIu32 " peers, have space for %i peers\n", ntohl (in_msg->num_peers), (ntohs (msg->size) - sizeof (struct GNUNET_RPS_P2P_PullReplyMessage)) / sizeof (struct GNUNET_PeerIdentity)); @@ -1877,8 +1877,9 @@ handle_client_act_malicious (void *cls, mal_type = ntohl (in_msg->type); LOG (GNUNET_ERROR_TYPE_DEBUG, - "Now acting malicious type %" PRIu32 "\n", - mal_type); + "Now acting malicious type %" PRIu32 ", got %" PRIu32 " peers.\n", + mal_type, + ntohl (in_msg->num_peers)); if (1 == mal_type) { /* Try to maximise representation */ -- 2.25.1