diff options
author | Tomasz Swierczek <t.swierczek@samsung.com> | 2019-01-03 08:58:46 +0100 |
---|---|---|
committer | Tomasz Swierczek <t.swierczek@samsung.com> | 2019-01-03 09:02:26 +0100 |
commit | 59c2799ace667fe952f68a5f0aa4ba9ca1e5523d (patch) | |
tree | 8b11dd846c9902a45b76bd9ae513f15af8be9631 /srcs/crypto_service.c | |
parent | 0edb5247b441d2386fb416e0108e21f27b836f19 (diff) | |
download | libwebappenc-59c2799ace667fe952f68a5f0aa4ba9ca1e5523d.tar.gz libwebappenc-59c2799ace667fe952f68a5f0aa4ba9ca1e5523d.tar.bz2 libwebappenc-59c2799ace667fe952f68a5f0aa4ba9ca1e5523d.zip |
Adjust format strings to new dlogsubmit/tizen_5.0/20190122.114721submit/tizen/20190103.090249accepted/tizen/unified/20190104.061340accepted/tizen/5.0/unified/20190130.053738tizen_5.0accepted/tizen_5.0_unified
Change-Id: Ie0843905a6a23f9225072bff7583f77350349537
Diffstat (limited to 'srcs/crypto_service.c')
-rw-r--r-- | srcs/crypto_service.c | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/srcs/crypto_service.c b/srcs/crypto_service.c index bd83eba..c28c0cd 100644 --- a/srcs/crypto_service.c +++ b/srcs/crypto_service.c @@ -1,5 +1,5 @@ /* - * Copyright (c) 2016 Samsung Electronics Co., Ltd All Rights Reserved + * Copyright (c) 2016 - 2019 Samsung Electronics Co., Ltd All Rights Reserved * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -240,11 +240,11 @@ int encrypt_aes_cbc(const crypto_element_s *ce, const raw_buffer_s *data, _initialize(); - WAE_SLOGI("Encryption Started. size=%d", data->size); + WAE_SLOGI("Encryption Started. size=%zu", data->size); /* check input paramter */ if (ce->dek->size != 32) { - WAE_SLOGE("Encryption Failed. Invalid Key Length. key_len=%d", ce->dek->size); + WAE_SLOGE("Encryption Failed. Invalid Key Length. key_len=%zu", ce->dek->size); return WAE_ERROR_INVALID_PARAMETER; } @@ -299,7 +299,7 @@ int encrypt_aes_cbc(const crypto_element_s *ce, const raw_buffer_s *data, *pencrypted_data = encrypted_data; - WAE_SLOGI("Encryption Ended Successfully. encrypted_len: %d", encrypted_data->size); + WAE_SLOGI("Encryption Ended Successfully. encrypted_len: %zu", encrypted_data->size); error: if (ctx != NULL) @@ -324,11 +324,11 @@ int decrypt_aes_cbc(const crypto_element_s *ce, const raw_buffer_s *encrypted_da _initialize(); - WAE_SLOGI("Decryption Started. size=%d", encrypted_data->size); + WAE_SLOGI("Decryption Started. size=%zu", encrypted_data->size); /* check input paramter */ if (ce->dek->size != 32) { - WAE_SLOGE("Decryption Failed. Invalid Key Length. key_len=%d", ce->dek->size); + WAE_SLOGE("Decryption Failed. Invalid Key Length. key_len=%zu", ce->dek->size); return WAE_ERROR_INVALID_PARAMETER; } @@ -383,7 +383,7 @@ int decrypt_aes_cbc(const crypto_element_s *ce, const raw_buffer_s *encrypted_da *pdata = data; - WAE_SLOGI("Decryption Ended Successfully. decrypted_len: %d", data->size); + WAE_SLOGI("Decryption Ended Successfully. decrypted_len: %zu", data->size); error: if (ctx != NULL) |