if (strength > key_len * BITS_PER_BYTE)
{
DBG1(DBG_LIB, "%d bit block encryption key not sufficient for security "
- "strength of % bits", key_len * BITS_PER_BYTE, strength);
+ "strength of %u bits", key_len * BITS_PER_BYTE, strength);
return NULL;
}
if (personalization_str.len > seed_len)
{
DBG1(DBG_LIB, "personalization string length of %d bytes is larger "
- "than seed length of % bytes", personalization_str.len, seed_len);
+ "than seed length of %u bytes", personalization_str.len, seed_len);
crypter->destroy(crypter);
return NULL;
}
if (strength > out_len * BITS_PER_BYTE)
{
- DBG1(DBG_LIB, "%N not sufficient for security strength of % bits",
+ DBG1(DBG_LIB, "%N not sufficient for security strength of %u bits",
pseudo_random_function_names, prf_type, strength);
prf->destroy(prf);
return NULL;