fix build warnings 25/155825/1 accepted/tizen/unified/20171018.062328 submit/tizen/20171017.052524
authorjkjo92 <jkjo92@samsung.com>
Mon, 16 Oct 2017 08:22:12 +0000 (17:22 +0900)
committerjkjo92 <jkjo92@samsung.com>
Mon, 16 Oct 2017 08:22:12 +0000 (17:22 +0900)
Change-Id: Iefb23fcfd723ac8b414c477f26744eacfa6d4125
Signed-off-by: jkjo92 <jkjo92@samsung.com>
common/cryptoutil/src/AsmCrypto.cpp
common/uafv1tlvutil/src/DeRegReqTlvEncoder.cpp
common/uafv1tlvutil/src/RegReqTlvEncoder.cpp
common/uafv1tlvutil/src/Tlv.cpp
common/uafv1tlvutil/src/Uafv1KrdTlvEncoder.cpp

index a8ed962..8f35618 100755 (executable)
@@ -262,7 +262,7 @@ AsmCrypto::getAsmToken(void)
                        SAFE_DELETE(realpath_res);
                        return std::string();
                } else if (size > 1000) {
-                       _ERR("Too big config file, size=[%d], allowed=[1000]", size);
+                       _ERR("Too big config file, size=[%d], allowed=[1000]", (int)size);
                        fclose(file);
                        _END;
 
index e792dd1..1e793f8 100755 (executable)
@@ -115,7 +115,6 @@ DeRegReqTlvEncoder::decode(const unsigned char *rawData)
 
                case TAG_KEYHANDLE_ACCESS_TOKEN:
                        getDeRegReqInfo->khATok = (Buffer*)__buffTlvEncoder.decode(rawData + rawIter);
-                       _INFO("keyHandleAccessToken [%s]", getDeRegReqInfo->khATok);
                        foundMember = true;
                        break;
 
index d8c5a2d..cf3adc4 100755 (executable)
@@ -115,14 +115,13 @@ RegAssertionTlvEncoder::decode(const unsigned char *rawData)
                case TAG_APPID:
                        _INFO("");
                        getRegReqInfo->appId = (char*)__strTlvEncoder.decode(rawData + rawIter);
-                       _INFO("appId = [%d]", getRegReqInfo->appId);
+                       _INFO("appId = [%s]", getRegReqInfo->appId);
                        foundMember = true;
                        break;
 
                case TAG_FINAL_CHALLENGE:
                        _INFO("");
                        getRegReqInfo->fch = (Buffer*)__buffTlvEncoder.decode(rawData + rawIter);
-                       _INFO("finalChallenge = [%s]", getRegReqInfo->fch);
                        foundMember = true;
                        break;
 
index 6a13a03..46a6a67 100755 (executable)
@@ -82,7 +82,6 @@ tlv_decode(const uint8_t *tlv_buffer_in)
                tlv->val = (uint8_t *)calloc(1, tlv->len);
                memcpy(tlv->val, tlv_buffer_in + 2 + 2, tlv->len);
        }
-       _INFO("[%0002x][%d]", tlv->tag, tlv->len);
 
        return tlv;
 }
index 592d6f7..8d7781f 100755 (executable)
@@ -118,7 +118,6 @@ Uafv1KrdTlvEncoder::decode(const unsigned char *rawData)
 
                        case TAG_FINAL_CHALLENGE:
                                getKrdInfo->fch = (Buffer*)__buffTlvEncoder.decode(rawData + rawIter);
-                               _INFO("Final Challenge [%s]", getKrdInfo->fch);
                                foundMember = true;
                                break;