diff options
author | Denys Vlasenko <vda.linux@googlemail.com> | 2019-07-02 13:10:19 +0200 |
---|---|---|
committer | Denys Vlasenko <vda.linux@googlemail.com> | 2019-07-02 13:10:19 +0200 |
commit | c0961e09b200cbe4f243cbb588362904eaa1ce60 (patch) | |
tree | ab794de5b3720672d81d243fed7f2c72aaa87e93 | |
parent | 6937487be73cd4563b876413277a295a5fe2f32c (diff) | |
download | busybox-w32-c0961e09b200cbe4f243cbb588362904eaa1ce60.tar.gz busybox-w32-c0961e09b200cbe4f243cbb588362904eaa1ce60.tar.bz2 busybox-w32-c0961e09b200cbe4f243cbb588362904eaa1ce60.zip |
ntpd: commonalize message strings
function old new delta
recv_and_process_peer_pkt 961 973 +12
------------------------------------------------------------------------------
(add/remove: 0/0 grow/shrink: 1/0 up/down: 12/0) Total: 12 bytes
text data bss dec hex filename
953108 481 7288 960877 ea96d busybox_old
953086 481 7288 960855 ea957 busybox_unstripped
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
-rw-r--r-- | networking/ntpd.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/networking/ntpd.c b/networking/ntpd.c index 2700cf515..465c74d6c 100644 --- a/networking/ntpd.c +++ b/networking/ntpd.c | |||
@@ -2018,7 +2018,7 @@ recv_and_process_peer_pkt(peer_t *p) | |||
2018 | 2018 | ||
2019 | #if ENABLE_FEATURE_NTP_AUTH | 2019 | #if ENABLE_FEATURE_NTP_AUTH |
2020 | if (size != NTP_MSGSIZE_NOAUTH && size != NTP_MSGSIZE_MD5_AUTH && size != NTP_MSGSIZE_SHA1_AUTH) { | 2020 | if (size != NTP_MSGSIZE_NOAUTH && size != NTP_MSGSIZE_MD5_AUTH && size != NTP_MSGSIZE_SHA1_AUTH) { |
2021 | bb_error_msg("malformed packet received from %s", p->p_dotted); | 2021 | bb_error_msg("malformed packet received from %s: size %u", p->p_dotted, (int)size); |
2022 | return; | 2022 | return; |
2023 | } | 2023 | } |
2024 | if (p->key_entry && hashes_differ(p, &msg)) { | 2024 | if (p->key_entry && hashes_differ(p, &msg)) { |
@@ -2027,7 +2027,7 @@ recv_and_process_peer_pkt(peer_t *p) | |||
2027 | } | 2027 | } |
2028 | #else | 2028 | #else |
2029 | if (size != NTP_MSGSIZE_NOAUTH && size != NTP_MSGSIZE_MD5_AUTH) { | 2029 | if (size != NTP_MSGSIZE_NOAUTH && size != NTP_MSGSIZE_MD5_AUTH) { |
2030 | bb_error_msg("malformed packet received from %s", p->p_dotted); | 2030 | bb_error_msg("malformed packet received from %s: size %u", p->p_dotted, (int)size); |
2031 | return; | 2031 | return; |
2032 | } | 2032 | } |
2033 | #endif | 2033 | #endif |