+2001-07-09 Ezra Peisach <epeisach@mit.edu>
+
+ * pmap_rmt.c, svc.c, svc_simple.c, svc_udp.c, svc_tcp.c,
+ xdr_array.c, xdr_reference.c : Include string.h for memset and
+ memcmp prototypes.
+
+ * auth_gssapi.c, auth_gssapi_misc.c, svc_auth_gssapi.c: Cast
+ argment to PRINTF to match format.
+
2001-07-08 Ezra Peisach <epeisach@mit.edu>
* svc.c (xprt_register): If svc_fdset has not been initilized,
return FALSE;
} else if (out_buf.length != sizeof(rpc_u_int32)) {
PRINTF(("gssapi_unseal_seq: unseal gave %d bytes\n",
- out_buf.length));
+ (int) out_buf.length));
gss_release_buffer(&minor_stat, &out_buf);
return FALSE;
}
}
PRINTF(("gssapi_wrap_data: %d bytes data, %d bytes sealed\n",
- in_buf.length, out_buf.length));
+ (int) in_buf.length, (int) out_buf.length));
/* write the token */
if (! xdr_bytes(out_xdrs, (char **) &out_buf.value,
XDR_DESTROY(&xdrs);
PRINTF(("svcauth_gssapi: got credentials, version %d, client_handle len %d\n",
- creds.version, creds.client_handle.length));
+ creds.version, (int) creds.client_handle.length));
if (creds.version != 2) {
PRINTF(("svcauth_gssapi: bad credential version\n"));
PRINTF(("svcauth_gssapi: incoming client_handle %d, len %d\n",
*((rpc_u_int32 *) creds.client_handle.value),
- creds.client_handle.length));
+ (int) creds.client_handle.length));
client_data = get_client(&creds.client_handle);
if (client_data == NULL) {
if (creds.client_handle.length != 0) {
PRINTF(("svcauth_gssapi: freeing client_handle len %d\n",
- creds.client_handle.length));
+ (int) creds.client_handle.length));
gssrpc_xdr_free(xdr_authgssapi_creds, &creds);
}
error:
if (creds.client_handle.length != 0) {
PRINTF(("svcauth_gssapi: freeing client_handle len %d\n",
- creds.client_handle.length));
+ (int) creds.client_handle.length));
gssrpc_xdr_free(xdr_authgssapi_creds, &creds);
}