diff options
author | Tim Potter <tpot@samba.org> | 2003-07-25 04:24:40 +0000 |
---|---|---|
committer | Tim Potter <tpot@samba.org> | 2003-07-25 04:24:40 +0000 |
commit | 7d833de662b83f026b54a236588da27dd8899630 (patch) | |
tree | a4c1867432592d3732bbc2a366eb6ef7549c64bd /source3/auth/auth_sam.c | |
parent | 5a9030546420e0bd82b946e779cdd5831ed3d73b (diff) | |
download | samba-7d833de662b83f026b54a236588da27dd8899630.tar.gz samba-7d833de662b83f026b54a236588da27dd8899630.tar.bz2 samba-7d833de662b83f026b54a236588da27dd8899630.zip |
More printf portability fixes. Got caught out by some gcc'isms last
time. )-:
(This used to be commit 59dae1da66a5eb7e128263bd578f167d8746e9f0)
Diffstat (limited to 'source3/auth/auth_sam.c')
-rw-r--r-- | source3/auth/auth_sam.c | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/source3/auth/auth_sam.c b/source3/auth/auth_sam.c index 4c120de9ae..fb66d53cd4 100644 --- a/source3/auth/auth_sam.c +++ b/source3/auth/auth_sam.c @@ -44,12 +44,12 @@ static BOOL smb_pwd_check_ntlmv1(const DATA_BLOB *nt_response, } if (sec_blob->length != 8) { - DEBUG(0, ("smb_pwd_check_ntlmv1: incorrect challenge size (%l)\n", sec_blob->length)); + DEBUG(0, ("smb_pwd_check_ntlmv1: incorrect challenge size (%lu)\n", (unsigned long)sec_blob->length)); return False; } if (nt_response->length != 24) { - DEBUG(0, ("smb_pwd_check_ntlmv1: incorrect password length (%l)\n", nt_response->length)); + DEBUG(0, ("smb_pwd_check_ntlmv1: incorrect password length (%lu)\n", (unsigned long)nt_response->length)); return False; } @@ -103,8 +103,8 @@ static BOOL smb_pwd_check_ntlmv2(const DATA_BLOB *ntv2_response, /* We MUST have more than 16 bytes, or the stuff below will go crazy. No known implementation sends less than the 24 bytes for LMv2, let alone NTLMv2. */ - DEBUG(0, ("smb_pwd_check_ntlmv2: incorrect password length (%l)\n", - ntv2_response->length)); + DEBUG(0, ("smb_pwd_check_ntlmv2: incorrect password length (%lu)\n", + (unsigned long)ntv2_response->length)); return False; } @@ -233,8 +233,8 @@ static NTSTATUS sam_password_ok(const struct auth_context *auth_context, if (auth_flags & AUTH_FLAG_LM_RESP) { if (user_info->lm_resp.length != 24) { - DEBUG(2,("sam_password_ok: invalid LanMan password length (%l) for user %s\n", - user_info->nt_resp.length, pdb_get_username(sampass))); + DEBUG(2,("sam_password_ok: invalid LanMan password length (%lu) for user %s\n", + (unsigned long)user_info->nt_resp.length, pdb_get_username(sampass))); } if (!lp_lanman_auth()) { |