New functions to allow RSA_METHODs to be changed without poking round in
[openssl.git] / crypto / mem.c
index 83085fea077c4a96a5b713ed4a4ac64d32ceff57..01f189bfc983a92cd80a0c2024b4d5eaafc69e7e 100644 (file)
@@ -58,9 +58,9 @@
 
 #include <stdio.h>
 #include <stdlib.h>
-#include "buffer.h"
-#include "bio.h"
-#include "lhash.h"
+#include <openssl/buffer.h>
+#include <openssl/bio.h>
+#include <openssl/lhash.h>
 #include "cryptlib.h"
 
 #ifdef CRYPTO_MDEBUG
@@ -308,8 +308,8 @@ static void print_leak(MEM *m, MEM_LEAK *l)
 
        if(m->addr == (char *)l->bio)
            return;
-       sprintf(buf,"%5ld file=%s, line=%d, number=%d, address=%08lX\n",
-               m->order,m->file,m->line,m->num,(long)m->addr);
+       sprintf(buf,"%5lu file=%s, line=%d, number=%d, address=%08lX\n",
+               m->order,m->file,m->line,m->num,(unsigned long)m->addr);
        BIO_puts(l->bio,buf);
        l->chunks++;
        l->bytes+=m->num;
@@ -336,8 +336,8 @@ void CRYPTO_mem_leaks(BIO *b)
 
 #if 0
        lh_stats_bio(mh,b);
-        lh_node_stats_bio(mh,b);
-        lh_node_usage_stats_bio(mh,b);
+       lh_node_stats_bio(mh,b);
+       lh_node_usage_stats_bio(mh,b);
 #endif
        }