summaryrefslogtreecommitdiff
path: root/source3/auth/auth_sam.c
diff options
context:
space:
mode:
authorTim Potter <tpot@samba.org>2003-07-24 23:46:27 +0000
committerTim Potter <tpot@samba.org>2003-07-24 23:46:27 +0000
commit77373f1f8e3b2f61e9bbcd9fadfb83257d390cf2 (patch)
tree868eab178760cb8f28489cde34e1328b3f9dfbca /source3/auth/auth_sam.c
parent60097e0d8d3db07eecf1773d74f8376ea4059b05 (diff)
downloadsamba-77373f1f8e3b2f61e9bbcd9fadfb83257d390cf2.tar.gz
samba-77373f1f8e3b2f61e9bbcd9fadfb83257d390cf2.tar.bz2
samba-77373f1f8e3b2f61e9bbcd9fadfb83257d390cf2.zip
More printf fixes - size_t is long on some architectures.
(This used to be commit ba4d334b822248d8ab929c9568533431603d967e)
Diffstat (limited to 'source3/auth/auth_sam.c')
-rw-r--r--source3/auth/auth_sam.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/source3/auth/auth_sam.c b/source3/auth/auth_sam.c
index 012696f46a..4c120de9ae 100644
--- a/source3/auth/auth_sam.c
+++ b/source3/auth/auth_sam.c
@@ -44,12 +44,12 @@ static BOOL smb_pwd_check_ntlmv1(const DATA_BLOB *nt_response,
}
if (sec_blob->length != 8) {
- DEBUG(0, ("smb_pwd_check_ntlmv1: incorrect challenge size (%d)\n", sec_blob->length));
+ DEBUG(0, ("smb_pwd_check_ntlmv1: incorrect challenge size (%l)\n", sec_blob->length));
return False;
}
if (nt_response->length != 24) {
- DEBUG(0, ("smb_pwd_check_ntlmv1: incorrect password length (%d)\n", nt_response->length));
+ DEBUG(0, ("smb_pwd_check_ntlmv1: incorrect password length (%l)\n", nt_response->length));
return False;
}
@@ -103,7 +103,7 @@ static BOOL smb_pwd_check_ntlmv2(const DATA_BLOB *ntv2_response,
/* We MUST have more than 16 bytes, or the stuff below will go
crazy. No known implementation sends less than the 24 bytes
for LMv2, let alone NTLMv2. */
- DEBUG(0, ("smb_pwd_check_ntlmv2: incorrect password length (%d)\n",
+ DEBUG(0, ("smb_pwd_check_ntlmv2: incorrect password length (%l)\n",
ntv2_response->length));
return False;
}
@@ -233,7 +233,7 @@ static NTSTATUS sam_password_ok(const struct auth_context *auth_context,
if (auth_flags & AUTH_FLAG_LM_RESP) {
if (user_info->lm_resp.length != 24) {
- DEBUG(2,("sam_password_ok: invalid LanMan password length (%d) for user %s\n",
+ DEBUG(2,("sam_password_ok: invalid LanMan password length (%l) for user %s\n",
user_info->nt_resp.length, pdb_get_username(sampass)));
}