summaryrefslogtreecommitdiffstats
path: root/src/kadmin/server/ovsec_kadmd.c
diff options
context:
space:
mode:
authorKen Raeburn <raeburn@mit.edu>2008-06-03 00:13:25 +0000
committerKen Raeburn <raeburn@mit.edu>2008-06-03 00:13:25 +0000
commit6fe8f27be1d27d9bd6c5fc87c912e4265807a281 (patch)
tree98e770d7502128f9b32013bb26524d3de30929f1 /src/kadmin/server/ovsec_kadmd.c
parent06e1f0c16efa014716317b3510dfc5306e2559e1 (diff)
downloadkrb5-6fe8f27be1d27d9bd6c5fc87c912e4265807a281.tar.gz
krb5-6fe8f27be1d27d9bd6c5fc87c912e4265807a281.tar.xz
krb5-6fe8f27be1d27d9bd6c5fc87c912e4265807a281.zip
Fix various minor format-string issues
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@20356 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/kadmin/server/ovsec_kadmd.c')
-rw-r--r--src/kadmin/server/ovsec_kadmd.c20
1 files changed, 11 insertions, 9 deletions
diff --git a/src/kadmin/server/ovsec_kadmd.c b/src/kadmin/server/ovsec_kadmd.c
index e5e4e307fc..659ebfba38 100644
--- a/src/kadmin/server/ovsec_kadmd.c
+++ b/src/kadmin/server/ovsec_kadmd.c
@@ -337,7 +337,7 @@ int main(int argc, char *argv[])
if ((params.mask & REQUIRED_PARAMS) != REQUIRED_PARAMS) {
krb5_klog_syslog(LOG_ERR, "%s: Missing required configuration values "
- "while initializing, aborting", whoami,
+ "(%lx) while initializing, aborting", whoami,
(params.mask & REQUIRED_PARAMS) ^ REQUIRED_PARAMS);
fprintf(stderr, "%s: Missing required configuration values "
"(%lx) while initializing, aborting\n", whoami,
@@ -406,7 +406,7 @@ int main(int argc, char *argv[])
if (setsockopt(schpw, SOL_SOCKET, SO_REUSEADDR,
(char *) &allowed, sizeof(allowed)) < 0) {
const char *e_txt = krb5_get_error_message (context, ret);
- krb5_klog_syslog(LOG_ERR, "main",
+ krb5_klog_syslog(LOG_ERR,
"cannot set SO_REUSEADDR on simple chpw socket: %s",
e_txt);
fprintf(stderr,
@@ -1029,13 +1029,13 @@ void log_badverf(gss_name_t client_name, gss_name_t server_name,
if (procname != NULL)
krb5_klog_syslog(LOG_NOTICE, "WARNING! Forged/garbled request: %s, "
"claimed client = %.*s%s, server = %.*s%s, addr = %s",
- procname, clen, client.value, cdots,
- slen, server.value, sdots, a);
+ procname, (int) clen, (char *) client.value, cdots,
+ (int) slen, (char *) server.value, sdots, a);
else
krb5_klog_syslog(LOG_NOTICE, "WARNING! Forged/garbled request: %d, "
"claimed client = %.*s%s, server = %.*s%s, addr = %s",
- proc, clen, client.value, cdots,
- slen, server.value, sdots, a);
+ proc, (int) clen, (char *) client.value, cdots,
+ (int) slen, (char *) server.value, sdots, a);
(void) gss_release_buffer(&minor, &client);
(void) gss_release_buffer(&minor, &server);
@@ -1125,12 +1125,14 @@ void log_badauth_display_status_1(char *m, OM_uint32 code, int type,
log_badauth_display_status_1(m, minor_stat,
GSS_C_MECH_CODE, 1);
} else
- krb5_klog_syslog(LOG_ERR, "GSS-API authentication error %s: "
- "recursive failure!", msg);
+ krb5_klog_syslog(LOG_ERR, "GSS-API authentication error %.*s: "
+ "recursive failure!", (int) msg.length,
+ (char *) msg.value);
return;
}
- krb5_klog_syslog(LOG_NOTICE, "%s %s", m, (char *)msg.value);
+ krb5_klog_syslog(LOG_NOTICE, "%s %.*s", m, (int)msg.length,
+ (char *)msg.value);
(void) gss_release_buffer(&minor_stat, &msg);
if (!msg_ctx)