Blob Blame History Raw
--- api/alsa/src/Clib/bglalsa.c.orig	2015-12-21 05:31:11.000000000 -0700
+++ api/alsa/src/Clib/bglalsa.c	2017-02-11 16:44:56.776663486 -0700
@@ -400,7 +400,7 @@ loop:
 	 goto loop;
       }
    } else {
-      fprintf( stderr, "%s:%d snd_pcm_writei (%d<0) -> %s\n",
+      fprintf( stderr, "%s:%d snd_pcm_writei (%ld<0) -> %s\n",
 	       __FILE__, __LINE__, written, snd_strerror( written ) );
    
       if( snd_pcm_state( pcm ) == SND_PCM_STATE_SUSPENDED ) {
--- api/avahi/src/Clib/bglavahi.c.orig	2015-12-21 05:31:11.000000000 -0700
+++ api/avahi/src/Clib/bglavahi.c	2017-02-11 16:44:56.777663481 -0700
@@ -476,7 +476,7 @@ bgl_avahi_string_list_to_list( AvahiStri
 /*---------------------------------------------------------------------*/
 AvahiStringList *
 bgl_avahi_list_to_string_list( obj_t p ) {
-   AvahiStringList *l = avahi_string_list_new( 0L );
+   AvahiStringList *l = avahi_string_list_new( NULL );
 
    while( PAIRP( p ) ) {
       l = avahi_string_list_add( l, BSTRING_TO_STRING( CAR( p ) ) );
--- api/ssl/src/C/bglssl.c.orig	2017-01-26 00:13:39.000000000 -0700
+++ api/ssl/src/C/bglssl.c	2017-02-03 14:19:11.030067182 -0700
@@ -3191,7 +3191,7 @@ bgl_ssl_cipher_init( ssl_cipher cipher,
 			 NULL, NULL, NULL, 0 );
       
       if( !EVP_CIPHER_CTX_set_key_length( ctx, key_len )) {
-	 fprintf( stderr, "node-crypto : Invalid key length %d\n", klen );
+	 fprintf( stderr, "node-crypto : Invalid key length %ld\n", klen );
 	 BGL_EVP_CIPHER_CTX_reset( ctx );
 	 BGL_EVP_CIPHER_CTX_free( ctx );
 	 return 0;
@@ -3240,7 +3240,7 @@ bgl_ssl_cipher_initiv( ssl_cipher cipher
    if( EVP_CIPHER_iv_length( cipher->BgL_z42cipherz42 ) != ivlen &&
        !(EVP_CIPHER_mode( cipher->BgL_z42cipherz42) == EVP_CIPH_ECB_MODE &&
 	 ivlen == 0) ) {
-      fprintf( stderr, "node-crypto : Invalid IV length %d\n", ivlen );
+      fprintf( stderr, "node-crypto : Invalid IV length %ld\n", ivlen );
       return 0;
    } else {
       EVP_CIPHER_CTX *ctx = BGL_EVP_CIPHER_CTX_new();
@@ -3250,7 +3250,7 @@ bgl_ssl_cipher_initiv( ssl_cipher cipher
       EVP_CipherInit_ex( ctx, cipher->BgL_z42cipherz42, NULL, NULL, NULL, enc );
       
       if( !EVP_CIPHER_CTX_set_key_length( ctx, klen ) ) {
-	 fprintf( stderr, "node-crypto : Invalid key length %d\n", klen );
+	 fprintf( stderr, "node-crypto : Invalid key length %ld\n", klen );
 	 BGL_EVP_CIPHER_CTX_reset( ctx );
 	 BGL_EVP_CIPHER_CTX_free( ctx );
 	 return 0;
--- comptime/Cc/exec.c.orig	2017-02-11 16:44:56.779663470 -0700
+++ comptime/Cc/exec.c	2017-02-11 16:45:40.222428692 -0700
@@ -305,7 +305,7 @@ extern "C"
 									BSTRING_TO_STRING(BGl_za2shellza2z00zzengine_paramz00);
 								BgL_arg1030z00_32 =
 									execl(BgL_auxz00_113, BgL_auxz00_115, BgL_auxz00_117,
-									BgL_auxz00_119, ((long) 0));
+									BgL_auxz00_119, NULL);
 							}
 							bgl_display_obj(BINT(BgL_arg1030z00_32), BgL_port1017z00_31);
 						}
--- runtime/Clib/crgc.c.orig	2015-12-21 05:31:11.000000000 -0700
+++ runtime/Clib/crgc.c	2017-02-11 16:44:56.780663465 -0700
@@ -896,7 +896,7 @@ int rgc_debug_port( obj_t port, char *ms
    long bufpos = INPUT_PORT( port ).bufpos;
    int eof = INPUT_PORT( port ).eof;
    
-   fprintf( stderr, "RGC_DEBUG(%s) port=%p:%s mstart=%d mstop=%d forward=%d bpos=%d bsiz=%d %s\n", msg, 
+   fprintf( stderr, "RGC_DEBUG(%s) port=%p:%s mstart=%ld mstop=%ld forward=%ld bpos=%ld bsiz=%ld %s\n", msg, 
 	    port, BSTRING_TO_STRING( INPUT_PORT_NAME( port ) ),
 	    matchstart, matchstop, forward, bufpos, bufsiz,
 	    eof ? "eof" : "" );
--- runtime/Clib/cwriter.c.orig	2015-12-21 05:31:11.000000000 -0700
+++ runtime/Clib/cwriter.c	2017-02-11 16:44:56.781663460 -0700
@@ -612,7 +612,7 @@ bgl_write_socket( obj_t o, obj_t op ) {
 	       48 + (STRINGP( SOCKET( o ).hostname ) ?
 		     STRING_LENGTH( SOCKET( o ).hostname ) :
 		     sizeof( "localhost" )),
-	       "#<socket:%s.%d.%x>",
+	       "#<socket:%s.%d.%lx>",
 	       STRINGP( SOCKET( o ).hostname ) ?
 	       BSTRING_TO_STRING( SOCKET( o ).hostname ) :
 	       "localhost",