From e835621799647ee70630b389fb53d15b15d68355 Mon Sep 17 00:00:00 2001 From: Andrew Tridgell Date: Sun, 17 Jul 2005 09:20:52 +0000 Subject: r8520: fixed a pile of warnings from the build farm gcc -Wall output on S390. This is an attempt to avoid the panic we're seeing in the automatic builds. The main fixes are: - assumptions that sizeof(size_t) == sizeof(int), mostly in printf formats - use of NULL format statements to perform dn searches. - assumption that sizeof() returns an int (This used to be commit a58ea6b3854973b694d2b1e22323ed7eb00e3a3f) --- source4/torture/auth/ntlmssp.c | 6 ++++-- source4/torture/auth/pac.c | 4 ++-- 2 files changed, 6 insertions(+), 4 deletions(-) (limited to 'source4/torture/auth') diff --git a/source4/torture/auth/ntlmssp.c b/source4/torture/auth/ntlmssp.c index 578acb4441..c012ee5174 100644 --- a/source4/torture/auth/ntlmssp.c +++ b/source4/torture/auth/ntlmssp.c @@ -73,7 +73,8 @@ BOOL torture_ntlmssp_self_check(void) dump_data_pw("NTLMSSP expected sig: ", expected_sig.data, expected_sig.length); if (sig.length != expected_sig.length) { - printf("Wrong sig length: %d != %d\n", sig.length, expected_sig.length); + printf("Wrong sig length: %d != %d\n", + (int)sig.length, (int)expected_sig.length); return False; } @@ -125,7 +126,8 @@ BOOL torture_ntlmssp_self_check(void) dump_data_pw("NTLMSSP expected sig: ", expected_sig.data, expected_sig.length); if (sig.length != expected_sig.length) { - printf("Wrong sig length: %d != %d\n", sig.length, expected_sig.length); + printf("Wrong sig length: %d != %d\n", + (int)sig.length, (int)expected_sig.length); return False; } diff --git a/source4/torture/auth/pac.c b/source4/torture/auth/pac.c index f03b20b286..21c3119e31 100644 --- a/source4/torture/auth/pac.c +++ b/source4/torture/auth/pac.c @@ -303,14 +303,14 @@ static BOOL torture_pac_saved_check(void) */ if (tmp_blob.length != validate_blob.length) { DEBUG(0, ("PAC push failed: orignial buffer length[%u] != created buffer length[%u]\n", - tmp_blob.length, validate_blob.length)); + (unsigned)tmp_blob.length, (unsigned)validate_blob.length)); talloc_free(mem_ctx); return False; } if (memcmp(tmp_blob.data, validate_blob.data, tmp_blob.length) != 0) { DEBUG(0, ("PAC push failed: length[%u] matches, but data does not\n", - tmp_blob.length)); + (unsigned)tmp_blob.length)); talloc_free(mem_ctx); return False; } -- cgit