"GSSAPI didn't encrypt message");
} else {
if (debug)
- fprintf(stderr, "sealed (%s) %d bytes\n",
+ fprintf(stderr, "sealed (%s) %lu bytes\n",
clevel==PROT_P?"ENC":"MIC",
- out_buf.length);
+ (unsigned long) out_buf.length);
length=out_buf.length;
memcpy(out, out_buf.value, out_buf.length);
gss_release_buffer(&min_stat, &out_buf);
/*
* kadmin/dbutil/dump.c
*
- * Copyright 1990,1991,2001,2006 by the Massachusetts Institute of Technology.
+ * Copyright 1990,1991,2001,2006,2008 by the Massachusetts Institute of Technology.
* All Rights Reserved.
*
* Export of this software from the United States of America may
* First put out strings representing the length of the variable
* length data in this record, then the name and the primary key type.
*/
- fprintf(arg->ofile, "%d\t%d\t%d\t%d\t%d\t%d\t%s\t%d\t", strlen(name),
- strlen(mod_name),
+ fprintf(arg->ofile, "%lu\t%lu\t%d\t%d\t%d\t%d\t%s\t%d\t",
+ (unsigned long) strlen(name),
+ (unsigned long) strlen(mod_name),
(krb5_int32) pkey->key_data_length[0],
(krb5_int32) akey->key_data_length[0],
(krb5_int32) pkey->key_data_length[1],
if (counter + skip == entry->n_tl_data) {
/* Pound out header */
- fprintf(arg->ofile, "%d\t%d\t%d\t%d\t%d\t%s\t",
+ fprintf(arg->ofile, "%d\t%lu\t%d\t%d\t%d\t%s\t",
(int) entry->len,
- strlen(name),
+ (unsigned long) strlen(name),
counter,
(int) entry->n_key_data,
(int) entry->e_length,
fail_princ:
if (!success) {
krb5_klog_syslog(LOG_ERR, "bad service principal %.*s%s",
- slen, gss_str.value, sdots);
+ (int) slen, (char *) gss_str.value, sdots);
}
gss_release_buffer(&min_stat, &gss_str);
krb5_free_principal(kctx, princ);
if ((params.mask & REQUIRED_PARAMS) != REQUIRED_PARAMS) {
krb5_klog_syslog(LOG_ERR, "%s: Missing required configuration values "
- "while initializing, aborting", whoami,
+ "(%lx) while initializing, aborting", whoami,
(params.mask & REQUIRED_PARAMS) ^ REQUIRED_PARAMS);
fprintf(stderr, "%s: Missing required configuration values "
"(%lx) while initializing, aborting\n", whoami,
if (setsockopt(schpw, SOL_SOCKET, SO_REUSEADDR,
(char *) &allowed, sizeof(allowed)) < 0) {
const char *e_txt = krb5_get_error_message (context, ret);
- krb5_klog_syslog(LOG_ERR, "main",
+ krb5_klog_syslog(LOG_ERR,
"cannot set SO_REUSEADDR on simple chpw socket: %s",
e_txt);
fprintf(stderr,
if (procname != NULL)
krb5_klog_syslog(LOG_NOTICE, "WARNING! Forged/garbled request: %s, "
"claimed client = %.*s%s, server = %.*s%s, addr = %s",
- procname, clen, client.value, cdots,
- slen, server.value, sdots, a);
+ procname, (int) clen, (char *) client.value, cdots,
+ (int) slen, (char *) server.value, sdots, a);
else
krb5_klog_syslog(LOG_NOTICE, "WARNING! Forged/garbled request: %d, "
"claimed client = %.*s%s, server = %.*s%s, addr = %s",
- proc, clen, client.value, cdots,
- slen, server.value, sdots, a);
+ proc, (int) clen, (char *) client.value, cdots,
+ (int) slen, (char *) server.value, sdots, a);
(void) gss_release_buffer(&minor, &client);
(void) gss_release_buffer(&minor, &server);
log_badauth_display_status_1(m, minor_stat,
GSS_C_MECH_CODE, 1);
} else
- krb5_klog_syslog(LOG_ERR, "GSS-API authentication error %s: "
- "recursive failure!", msg);
+ krb5_klog_syslog(LOG_ERR, "GSS-API authentication error %.*s: "
+ "recursive failure!", (int) msg.length,
+ (char *) msg.value);
return;
}
- krb5_klog_syslog(LOG_NOTICE, "%s %s", m, (char *)msg.value);
+ krb5_klog_syslog(LOG_NOTICE, "%s %.*s", m, (int)msg.length,
+ (char *)msg.value);
(void) gss_release_buffer(&minor_stat, &msg);
if (!msg_ctx)
trunc_name(&clen, &cdots);
krb5_klog_syslog(LOG_NOTICE, "chpw request from %s for %.*s%s: %s",
inet_ntoa(((struct sockaddr_in *)&remote_addr)->sin_addr),
- clen, clientstr, cdots,
+ (int) clen, clientstr, cdots,
ret ? krb5_get_error_message (context, ret) : "success");
krb5_free_unparsed_name(context, clientstr);
case ENOENT: code_string = "ENOENT"; break;
default:
- fprintf(stderr, "**** CODE %d (%s) ***\n", code,
+ fprintf(stderr, "**** CODE %ld (%s) ***\n", (long) code,
error_message (code));
code_string = "UNKNOWN";
break;
tl->tl_data_length = tmp;
if (tl->tl_data_length != strlen(argv1[2])) {
sprintf(interp->result, "specified length %d does not "
- "match length %d of string \"%s\"", tmp,
- strlen(argv1[2]), argv1[2]);
+ "match length %lu of string \"%s\"", tmp,
+ (unsigned long) strlen(argv1[2]), argv1[2]);
retcode = TCL_ERROR;
goto finished;
}
case EINVAL: code_string = "EINVAL"; break;
case ENOENT: code_string = "ENOENT"; break;
default:
- fprintf(stderr, "**** CODE %d (%s) ***\n", code,
+ fprintf(stderr, "**** CODE %ld (%s) ***\n", (long) code,
error_message (code));
code_string = "UNKNOWN";
break;