Fixed format error 48/195648/2 accepted/tizen/unified/20181219.063354 submit/tizen/20181218.125545
authorhyunuktak <hyunuk.tak@samsung.com>
Mon, 17 Dec 2018 04:57:52 +0000 (13:57 +0900)
committerhyunuktak <hyunuk.tak@samsung.com>
Mon, 17 Dec 2018 05:17:59 +0000 (14:17 +0900)
Change-Id: I92d6c7bac6d2c49fc138f0d19174b2ec7603ffe7
Signed-off-by: hyunuktak <hyunuk.tak@samsung.com>
gtest/netstat.cpp
packaging/net-config.spec
src/mptcp-internal.c
src/signal-handler.c
src/vpnsvc-internal.c
src/wifi-eap-config.c
src/wifi-firmware.c

index 02b8f20..96a276c 100755 (executable)
@@ -35,7 +35,7 @@ NetStat::~NetStat()
 
 error_e NetStat::GetWifiTotalTxBytes(void)
 {
-       uint64_t tx_bytes = 0;
+       unsigned long long tx_bytes = 0;
        GVariant *message = NULL;
        error_e error = ERROR_NONE;
 
@@ -61,7 +61,7 @@ error_e NetStat::GetWifiTotalTxBytes(void)
 
 error_e NetStat::GetWifiTotalRxBytes(void)
 {
-       uint64_t rx_bytes = 0;
+       unsigned long long rx_bytes = 0;
        GVariant *message = NULL;
        error_e error = ERROR_NONE;
 
@@ -87,7 +87,7 @@ error_e NetStat::GetWifiTotalRxBytes(void)
 
 error_e NetStat::GetWifiLastTxBytes(void)
 {
-       uint64_t tx_bytes = 0;
+       unsigned long long tx_bytes = 0;
        GVariant *message = NULL;
        error_e error = ERROR_NONE;
 
@@ -113,7 +113,7 @@ error_e NetStat::GetWifiLastTxBytes(void)
 
 error_e NetStat::GetWifiLastRxBytes(void)
 {
-       uint64_t rx_bytes = 0;
+       unsigned long long rx_bytes = 0;
        GVariant *message = NULL;
        error_e error = ERROR_NONE;
 
index 6b69fdc..84600bf 100755 (executable)
@@ -1,6 +1,6 @@
 Name:          net-config
 Summary:       TIZEN Network Configuration service
-Version:       1.1.138
+Version:       1.1.139
 Release:       3
 Group:         System/Network
 License:       Apache-2.0
index 61ebbf1..ff197bc 100755 (executable)
@@ -25,7 +25,7 @@ static gboolean __write_mptcp_parameter(const char* key, const char* value)
                return FALSE;
        }
 
-       DBG("write mptcp parameter. len: %d, value: %s", strlen(value), value);
+       DBG("write mptcp parameter. len: %zd, value: %s", strlen(value), value);
        if (write(fd, value, strlen(value)) < 0) {
                ERR("Fail to write %s to %s", value, path);
                close(fd);
index 8dcef2c..d653171 100755 (executable)
@@ -862,7 +862,7 @@ static void _supplicant_wifi_wps_connected(GVariant *param)
                if (g_strcmp0(key, "SSID") == 0) {
                        const char *t_key = NULL;
                        t_key = g_variant_get_fixed_array(variant, &ssid_len, sizeof(guchar));
-                       INFO("wps ssid_len is %d ", ssid_len);
+                       INFO("wps ssid_len is %zd ", ssid_len);
                        if (t_key == NULL) {
                                g_free(key);
                                g_variant_unref(variant);
@@ -1032,7 +1032,7 @@ static void _supplicant_wifi_wps_credentials(GVariant *param)
                        const char *t_key = NULL;
                        key_len = g_variant_get_size(variant);
 
-                       INFO("wps password len %d ", key_len);
+                       INFO("wps password len %zd ", key_len);
                        if (key_len > 0) {
                                t_key = g_variant_get_fixed_array(variant, &key_len,
                                                  sizeof(guchar));
@@ -1050,7 +1050,7 @@ static void _supplicant_wifi_wps_credentials(GVariant *param)
                        const char *t_key = NULL;
                        t_key = g_variant_get_fixed_array(variant, &ssid_len,
                                                  sizeof(guchar));
-                       INFO("wps ssid_len is %d ", ssid_len);
+                       INFO("wps ssid_len is %zd ", ssid_len);
                        if (!t_key) {
                                g_free(key);
                                g_variant_unref(variant);
index b4cbafb..0c71d45 100755 (executable)
@@ -758,7 +758,7 @@ int vpn_service_init(const char* iface_name, size_t iface_name_len, int fd, vpns
        struct ifreq ifr;
        char buf[BUF_SIZE_FOR_ERR] = { 0 };
 
-       DBG("enter vpn_daemon_init, iface_name : %s, iface_name_len : %d, fd : %d\n", iface_name, iface_name_len, fd);
+       DBG("enter vpn_daemon_init, iface_name : %s, iface_name_len : %zd, fd : %d\n", iface_name, iface_name_len, fd);
 
        memset(&ifr, 0, sizeof(ifr));
 
index 48597c9..5b40642 100755 (executable)
@@ -208,7 +208,7 @@ static gboolean __netconfig_copy_config(const char *src, const char *dst)
                g_error_free(error);
        }
 
-       INFO("Successfully installed[%d]", length);
+       INFO("Successfully installed[%zd]", length);
        g_free(buf);
 
        if (remove(src) != 0)
index ba63664..0c3118f 100755 (executable)
@@ -239,7 +239,7 @@ static int __netconfig_set_rps_cpus(void)
                        close(fd);
                        return -1;
                } else {
-                       DBG("read size = %d", count);
+                       DBG("read size = %zd", count);
                }
 
                if (r_buf[0] == 'e') {
@@ -265,7 +265,7 @@ static int __netconfig_set_rps_cpus(void)
                        close(fd);
                        return -1;
                } else {
-                       DBG("write size = %d", count);
+                       DBG("write size = %zd", count);
                }
 
                close(fd);