[Opendnssec-commits] [keihatsu.kirei.se/svn/dnssec] r1655 - trunk/hsmbully/src

Jakob Schlyter jakob at kirei.se
Wed Aug 19 07:57:55 CEST 2009


Author: jakob
Date: 2009-08-19 07:57:54 +0200 (Wed, 19 Aug 2009)
New Revision: 1655

Modified:
   trunk/hsmbully/src/hsmbully.c
Log:
fix some printf format strings

Modified: trunk/hsmbully/src/hsmbully.c
===================================================================
--- trunk/hsmbully/src/hsmbully.c	2009-08-18 14:22:58 UTC (rev 1654)
+++ trunk/hsmbully/src/hsmbully.c	2009-08-19 05:57:54 UTC (rev 1655)
@@ -233,7 +233,7 @@
 		{ CKA_DERIVE, &false, sizeof (false) },
 	};
 	if (verbosity >= 3) {
-		printf ("   - Creating key pair with %d bit modulus\n", keybits);
+		printf ("   - Creating key pair with %lu bit modulus\n", keybits);
 	}
 	return P11("C_GenerateKeyPair") (
 			seshdl,
@@ -693,7 +693,7 @@
 	minbytes = mech_sha1_rsa_pkcs.ulMinKeySize / 8;
 	maxbytes = mech_sha1_rsa_pkcs.ulMaxKeySize / 8;
 	if (verbosity >= 3) {
-		printf ("   - Key sizes supported by this token range from %d to %d bits\n", minbytes * 8, maxbytes * 8);
+		printf ("   - Key sizes supported by this token range from %lu to %lu bits\n", minbytes * 8, maxbytes * 8);
 	}
 
 	/*
@@ -712,7 +712,7 @@
 		};
 		uint8_t *modulus;
 		if (verbosity >= 4) {
-			printf ("%8d\b\b\b\b\b\b\b\b", maxbytes-curbytes);
+			printf ("%8lu\b\b\b\b\b\b\b\b", maxbytes-curbytes);
 		}
 		retval = newkeypair (seshdl, modbits, &pub, &priv);
 		TESTRV ("Creating key pair in modulus size test", retval);
@@ -979,7 +979,7 @@
 		exit (1);
 	}
 	if (strlen (newval) > maxstrlen) {
-		fprintf (stderr, "The %s PIN should not exceed %d characters\n", kind, maxstrlen);
+		fprintf (stderr, "The %s PIN should not exceed %lu characters\n", kind, maxstrlen);
 		exit (1);
 	}
 	this = newval;




More information about the Opendnssec-commits mailing list