--- api/alsa/src/Clib/bglalsa.c.orig 2015-12-21 05:31:11.000000000 -0700
+++ api/alsa/src/Clib/bglalsa.c 2017-02-11 16:44:56.776663486 -0700
@@ -400,7 +400,7 @@ loop:
goto loop;
}
} else {
- fprintf( stderr, "%s:%d snd_pcm_writei (%d<0) -> %s\n",
+ fprintf( stderr, "%s:%d snd_pcm_writei (%ld<0) -> %s\n",
__FILE__, __LINE__, written, snd_strerror( written ) );
if( snd_pcm_state( pcm ) == SND_PCM_STATE_SUSPENDED ) {
--- api/avahi/src/Clib/bglavahi.c.orig 2015-12-21 05:31:11.000000000 -0700
+++ api/avahi/src/Clib/bglavahi.c 2017-02-11 16:44:56.777663481 -0700
@@ -476,7 +476,7 @@ bgl_avahi_string_list_to_list( AvahiStri
/*---------------------------------------------------------------------*/
AvahiStringList *
bgl_avahi_list_to_string_list( obj_t p ) {
- AvahiStringList *l = avahi_string_list_new( 0L );
+ AvahiStringList *l = avahi_string_list_new( NULL );
while( PAIRP( p ) ) {
l = avahi_string_list_add( l, BSTRING_TO_STRING( CAR( p ) ) );
--- api/ssl/src/C/bglssl.c.orig 2017-01-26 00:13:39.000000000 -0700
+++ api/ssl/src/C/bglssl.c 2017-02-03 14:19:11.030067182 -0700
@@ -3191,7 +3191,7 @@ bgl_ssl_cipher_init( ssl_cipher cipher,
NULL, NULL, NULL, 0 );
if( !EVP_CIPHER_CTX_set_key_length( ctx, key_len )) {
- fprintf( stderr, "node-crypto : Invalid key length %d\n", klen );
+ fprintf( stderr, "node-crypto : Invalid key length %ld\n", klen );
BGL_EVP_CIPHER_CTX_reset( ctx );
BGL_EVP_CIPHER_CTX_free( ctx );
return 0;
@@ -3240,7 +3240,7 @@ bgl_ssl_cipher_initiv( ssl_cipher cipher
if( EVP_CIPHER_iv_length( cipher->BgL_z42cipherz42 ) != ivlen &&
!(EVP_CIPHER_mode( cipher->BgL_z42cipherz42) == EVP_CIPH_ECB_MODE &&
ivlen == 0) ) {
- fprintf( stderr, "node-crypto : Invalid IV length %d\n", ivlen );
+ fprintf( stderr, "node-crypto : Invalid IV length %ld\n", ivlen );
return 0;
} else {
EVP_CIPHER_CTX *ctx = BGL_EVP_CIPHER_CTX_new();
@@ -3250,7 +3250,7 @@ bgl_ssl_cipher_initiv( ssl_cipher cipher
EVP_CipherInit_ex( ctx, cipher->BgL_z42cipherz42, NULL, NULL, NULL, enc );
if( !EVP_CIPHER_CTX_set_key_length( ctx, klen ) ) {
- fprintf( stderr, "node-crypto : Invalid key length %d\n", klen );
+ fprintf( stderr, "node-crypto : Invalid key length %ld\n", klen );
BGL_EVP_CIPHER_CTX_reset( ctx );
BGL_EVP_CIPHER_CTX_free( ctx );
return 0;
--- comptime/Cc/exec.c.orig 2017-02-11 16:44:56.779663470 -0700
+++ comptime/Cc/exec.c 2017-02-11 16:45:40.222428692 -0700
@@ -305,7 +305,7 @@ extern "C"
BSTRING_TO_STRING(BGl_za2shellza2z00zzengine_paramz00);
BgL_arg1030z00_32 =
execl(BgL_auxz00_113, BgL_auxz00_115, BgL_auxz00_117,
- BgL_auxz00_119, ((long) 0));
+ BgL_auxz00_119, NULL);
}
bgl_display_obj(BINT(BgL_arg1030z00_32), BgL_port1017z00_31);
}
--- runtime/Clib/crgc.c.orig 2015-12-21 05:31:11.000000000 -0700
+++ runtime/Clib/crgc.c 2017-02-11 16:44:56.780663465 -0700
@@ -896,7 +896,7 @@ int rgc_debug_port( obj_t port, char *ms
long bufpos = INPUT_PORT( port ).bufpos;
int eof = INPUT_PORT( port ).eof;
- fprintf( stderr, "RGC_DEBUG(%s) port=%p:%s mstart=%d mstop=%d forward=%d bpos=%d bsiz=%d %s\n", msg,
+ fprintf( stderr, "RGC_DEBUG(%s) port=%p:%s mstart=%ld mstop=%ld forward=%ld bpos=%ld bsiz=%ld %s\n", msg,
port, BSTRING_TO_STRING( INPUT_PORT_NAME( port ) ),
matchstart, matchstop, forward, bufpos, bufsiz,
eof ? "eof" : "" );
--- runtime/Clib/cwriter.c.orig 2015-12-21 05:31:11.000000000 -0700
+++ runtime/Clib/cwriter.c 2017-02-11 16:44:56.781663460 -0700
@@ -612,7 +612,7 @@ bgl_write_socket( obj_t o, obj_t op ) {
48 + (STRINGP( SOCKET( o ).hostname ) ?
STRING_LENGTH( SOCKET( o ).hostname ) :
sizeof( "localhost" )),
- "#<socket:%s.%d.%x>",
+ "#<socket:%s.%d.%lx>",
STRINGP( SOCKET( o ).hostname ) ?
BSTRING_TO_STRING( SOCKET( o ).hostname ) :
"localhost",