return usage();
#else
if (ap_getpass("New password: ", pwin, sizeof(pwin)) != 0) {
- ap_snprintf(record, (rlen - 1), "password too long (>%d)",
- sizeof(pwin) - 1);
+ ap_snprintf(record, (rlen - 1), "password too long (>%lu)",
+ (unsigned long) (sizeof(pwin) - 1));
return ERR_OVERFLOW;
}
ap_getpass("Re-type new password: ", pwv, sizeof(pwv));
}
strcpy(pwfilename, argv[i]);
if (strlen(argv[i + 1]) > (sizeof(user) - 1)) {
- fprintf(stderr, "%s: username too long (>%d)\n", argv[0],
- sizeof(user) - 1);
+ fprintf(stderr, "%s: username too long (>%lu)\n", argv[0],
+ (unsigned long)(sizeof(user) - 1));
return ERR_OVERFLOW;
}
}
}
if (noninteractive) {
if (strlen(argv[i + 2]) > (sizeof(password) - 1)) {
- fprintf(stderr, "%s: password too long (>%d)\n", argv[0],
- sizeof(password) - 1);
+ fprintf(stderr, "%s: password too long (>%lu)\n", argv[0],
+ (unsigned long)(sizeof(password) - 1));
return ERR_OVERFLOW;
}
strcpy(password, argv[i + 2]);