diff options
-rw-r--r-- | src/vty/buffer.c | 2 | ||||
-rw-r--r-- | src/vty/vty.c | 4 |
2 files changed, 3 insertions, 3 deletions
diff --git a/src/vty/buffer.c b/src/vty/buffer.c index def2f522..e0abe813 100644 --- a/src/vty/buffer.c +++ b/src/vty/buffer.c @@ -299,7 +299,7 @@ buffer_flush_window(struct buffer * b, int fd, int width, int height, zlog_warn("%s: growing iov array to %d; " "width %d, height %d, size %lu", __func__, iov_alloc, width, height, - (u_long) b->size); + (unsigned long) b->size); iov = XREALLOC(MTYPE_TMP, iov, iov_alloc * sizeof(*iov)); diff --git a/src/vty/vty.c b/src/vty/vty.c index f34e5291..230d74c0 100644 --- a/src/vty/vty.c +++ b/src/vty/vty.c @@ -623,11 +623,11 @@ vty_telnet_option (struct vty *vty, unsigned char *buf, int nbytes) if (vty->sb_len != TELNET_NAWS_SB_LEN) vty_out(vty,"RFC 1073 violation detected: telnet NAWS option " "should send %d characters, but we received %lu", - TELNET_NAWS_SB_LEN, (u_long)vty->sb_len); + TELNET_NAWS_SB_LEN, (unsigned long)vty->sb_len); else if (sizeof(vty->sb_buf) < TELNET_NAWS_SB_LEN) vty_out(vty, "Bug detected: sizeof(vty->sb_buf) %lu < %d, " "too small to handle the telnet NAWS option", - (u_long)sizeof(vty->sb_buf), TELNET_NAWS_SB_LEN); + (unsigned long)sizeof(vty->sb_buf), TELNET_NAWS_SB_LEN); else { vty->width = ((vty->sb_buf[1] << 8)|vty->sb_buf[2]); |