Updating debug logs for format check enforcement 39/195139/2
authorAbhishek Vijay <abhishek.v@samsung.com>
Tue, 11 Dec 2018 05:41:19 +0000 (11:11 +0530)
committerAbhishek Vijay <abhishek.v@samsung.com>
Tue, 11 Dec 2018 12:54:53 +0000 (18:24 +0530)
Change-Id: I35bab775a3b38877a2f5d82082011704305fe993
Signed-off-by: Abhishek Vijay <abhishek.v@samsung.com>
common/src/account_crypto_service.c
common/src/account_key_handler.c

index 7078e5eeeca2a345fef21ca571b774b0f21656a5..cb7855cb91e5601f03a93cfc5b79f0ebc3b82da5 100644 (file)
@@ -294,7 +294,7 @@ int encrypt_access_token(account_s *account)
                account->access_token = NULL;
                if (ret == _ACCOUNT_ERROR_NONE) {
                        account->access_token = encrypted_token;
-                       _INFO("after access_token, encrypted_token size=[%d]", strlen(account->access_token));
+                       _INFO("after access_token, encrypted_token size=[%zu]", strlen(account->access_token));
                } else {
                        /* To Do : fail */
                        _ERR("_encrypt_data fail");
index 2d27f06ff0291c3bb53700cc57f42a047fb7c904..8537c2e58d47a0d67296869790e02339a182a593 100644 (file)
@@ -76,7 +76,7 @@ static int _get_app_mkey(unsigned char **mkey, int *mkey_len)
        if (!mkey_buffer)
                return CKMC_ERROR_UNKNOWN;
 
-       _INFO("before mkey_buffer->size=[%d]", mkey_buffer->size);
+       _INFO("before mkey_buffer->size=[%zu]", mkey_buffer->size);
        *mkey_len = mkey_buffer->size;
        *mkey = (unsigned char *)malloc((*mkey_len)+1);
        if (*mkey == NULL) {