From c0961e09b200cbe4f243cbb588362904eaa1ce60 Mon Sep 17 00:00:00 2001 From: Denys Vlasenko Date: Tue, 2 Jul 2019 13:10:19 +0200 Subject: [PATCH] ntpd: commonalize message strings function old new delta recv_and_process_peer_pkt 961 973 +12 ------------------------------------------------------------------------------ (add/remove: 0/0 grow/shrink: 1/0 up/down: 12/0) Total: 12 bytes text data bss dec hex filename 953108 481 7288 960877 ea96d busybox_old 953086 481 7288 960855 ea957 busybox_unstripped Signed-off-by: Denys Vlasenko --- networking/ntpd.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/networking/ntpd.c b/networking/ntpd.c index 2700cf515..465c74d6c 100644 --- a/networking/ntpd.c +++ b/networking/ntpd.c @@ -2018,7 +2018,7 @@ recv_and_process_peer_pkt(peer_t *p) #if ENABLE_FEATURE_NTP_AUTH if (size != NTP_MSGSIZE_NOAUTH && size != NTP_MSGSIZE_MD5_AUTH && size != NTP_MSGSIZE_SHA1_AUTH) { - bb_error_msg("malformed packet received from %s", p->p_dotted); + bb_error_msg("malformed packet received from %s: size %u", p->p_dotted, (int)size); return; } if (p->key_entry && hashes_differ(p, &msg)) { @@ -2027,7 +2027,7 @@ recv_and_process_peer_pkt(peer_t *p) } #else if (size != NTP_MSGSIZE_NOAUTH && size != NTP_MSGSIZE_MD5_AUTH) { - bb_error_msg("malformed packet received from %s", p->p_dotted); + bb_error_msg("malformed packet received from %s: size %u", p->p_dotted, (int)size); return; } #endif -- 2.25.1