summaryrefslogtreecommitdiff
path: root/source3/smbd
diff options
context:
space:
mode:
authorTim Potter <tpot@samba.org>2003-07-25 04:24:40 +0000
committerTim Potter <tpot@samba.org>2003-07-25 04:24:40 +0000
commit7d833de662b83f026b54a236588da27dd8899630 (patch)
treea4c1867432592d3732bbc2a366eb6ef7549c64bd /source3/smbd
parent5a9030546420e0bd82b946e779cdd5831ed3d73b (diff)
downloadsamba-7d833de662b83f026b54a236588da27dd8899630.tar.gz
samba-7d833de662b83f026b54a236588da27dd8899630.tar.bz2
samba-7d833de662b83f026b54a236588da27dd8899630.zip
More printf portability fixes. Got caught out by some gcc'isms last
time. )-: (This used to be commit 59dae1da66a5eb7e128263bd578f167d8746e9f0)
Diffstat (limited to 'source3/smbd')
-rw-r--r--source3/smbd/close.c4
-rw-r--r--source3/smbd/sesssetup.c2
-rw-r--r--source3/smbd/utmp.c4
3 files changed, 5 insertions, 5 deletions
diff --git a/source3/smbd/close.c b/source3/smbd/close.c
index c2db901ea7..0700aeaa0a 100644
--- a/source3/smbd/close.c
+++ b/source3/smbd/close.c
@@ -163,8 +163,8 @@ static int close_normal_file(files_struct *fsp, BOOL normal_close)
share_entry_count = del_share_mode(fsp, &share_entry);
- DEBUG(10,("close_normal_file: share_entry_count = %l for file %s\n",
- share_entry_count, fsp->fsp_name ));
+ DEBUG(10,("close_normal_file: share_entry_count = %lu for file %s\n",
+ (unsigned long)share_entry_count, fsp->fsp_name ));
/*
* We delete on close if it's the last open, and the
diff --git a/source3/smbd/sesssetup.c b/source3/smbd/sesssetup.c
index 8e02f65951..bc3ac6ac64 100644
--- a/source3/smbd/sesssetup.c
+++ b/source3/smbd/sesssetup.c
@@ -375,7 +375,7 @@ static int reply_spnego_negotiate(connection_struct *conn,
}
free(OIDs[i]);
}
- DEBUG(3,("Got secblob of size %l\n", secblob.length));
+ DEBUG(3,("Got secblob of size %lu\n", (unsigned long)secblob.length));
#ifdef HAVE_KRB5
if (got_kerberos && (SEC_ADS == lp_security())) {
diff --git a/source3/smbd/utmp.c b/source3/smbd/utmp.c
index aaf081a21e..6ff2f586ba 100644
--- a/source3/smbd/utmp.c
+++ b/source3/smbd/utmp.c
@@ -491,8 +491,8 @@ static BOOL sys_utmp_fill(struct utmp *u,
* If size limit proves troublesome, then perhaps use "ut_id_encode()".
*/
if (strlen(id_str) > sizeof(u->ut_line)) {
- DEBUG(1,("id_str [%s] is too long for %l char utmp field\n",
- id_str, sizeof(u->ut_line)));
+ DEBUG(1,("id_str [%s] is too long for %lu char utmp field\n",
+ id_str, (unsigned long)sizeof(u->ut_line)));
return False;
}
utmp_strcpy(u->ut_line, id_str, sizeof(u->ut_line));