From: Amos Jeffries Date: Tue, 30 Dec 2014 14:37:32 +0000 (-0800) Subject: Fix 'field precision specifier '.*' expects argument of type 'int' X-Git-Tag: merge-candidate-3-v1~402 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=bb64d87960915b8f4e5ba159049d5c9d5e545e01;p=thirdparty%2Fsquid.git Fix 'field precision specifier '.*' expects argument of type 'int' --- diff --git a/src/adaptation/icap/ModXact.cc b/src/adaptation/icap/ModXact.cc index f85092e754..50a1345e80 100644 --- a/src/adaptation/icap/ModXact.cc +++ b/src/adaptation/icap/ModXact.cc @@ -1367,7 +1367,7 @@ void Adaptation::Icap::ModXact::makeRequestHeaders(MemBuf &buf) resultLen += base64_encode_update(&ctx, base64buf+resultLen, 1, reinterpret_cast(":")); resultLen += base64_encode_update(&ctx, base64buf+resultLen, request->extacl_passwd.size(), reinterpret_cast(request->extacl_passwd.rawBuf())); resultLen += base64_encode_final(&ctx, base64buf+resultLen); - buf.Printf("Proxy-Authorization: Basic %.*s\r\n", resultLen, base64buf); + buf.Printf("Proxy-Authorization: Basic %.*s\r\n", (int)resultLen, base64buf); } // share the cross-transactional database records if needed @@ -1528,7 +1528,7 @@ void Adaptation::Icap::ModXact::makeUsernameHeader(const HttpRequest *request, M uint8_t base64buf[base64_encode_len(MAX_LOGIN_SZ)]; size_t resultLen = base64_encode_update(&ctx, base64buf, strlen(value), reinterpret_cast(value)); resultLen += base64_encode_final(&ctx, base64buf+resultLen); - buf.Printf("%s: %.*s\r\n", TheConfig.client_username_header, resultLen, base64buf); + buf.Printf("%s: %.*s\r\n", TheConfig.client_username_header, (int)resultLen, base64buf); } else buf.Printf("%s: %s\r\n", TheConfig.client_username_header, value); } diff --git a/src/http.cc b/src/http.cc index 75dd9a995a..a88a92d9c7 100644 --- a/src/http.cc +++ b/src/http.cc @@ -1627,7 +1627,7 @@ httpFixupAuthentication(HttpRequest * request, const HttpHeader * hdr_in, HttpHe blen = base64_encode_update(&ctx, loginbuf, strlen(username), reinterpret_cast(username)); blen += base64_encode_update(&ctx, loginbuf+blen, strlen(request->peer_login +1), reinterpret_cast(request->peer_login +1)); blen += base64_encode_final(&ctx, loginbuf+blen); - httpHeaderPutStrf(hdr_out, header, "Basic %.*s", blen, loginbuf); + httpHeaderPutStrf(hdr_out, header, "Basic %.*s", (int)blen, loginbuf); return; } @@ -1640,7 +1640,7 @@ httpFixupAuthentication(HttpRequest * request, const HttpHeader * hdr_in, HttpHe blen += base64_encode_update(&ctx, loginbuf+blen, 1, reinterpret_cast(":")); blen += base64_encode_update(&ctx, loginbuf+blen, request->extacl_passwd.size(), reinterpret_cast(request->extacl_passwd.rawBuf())); blen += base64_encode_final(&ctx, loginbuf+blen); - httpHeaderPutStrf(hdr_out, header, "Basic %.*s", blen, loginbuf); + httpHeaderPutStrf(hdr_out, header, "Basic %.*s", (int)blen, loginbuf); return; } // if no external user credentials are available to fake authentication with PASS acts like PASSTHRU @@ -1665,7 +1665,7 @@ httpFixupAuthentication(HttpRequest * request, const HttpHeader * hdr_in, HttpHe blen = base64_encode_update(&ctx, loginbuf, strlen(request->peer_login), reinterpret_cast(request->peer_login)); blen += base64_encode_final(&ctx, loginbuf+blen); - httpHeaderPutStrf(hdr_out, header, "Basic %.*s", blen, loginbuf); + httpHeaderPutStrf(hdr_out, header, "Basic %.*s", (int)blen, loginbuf); return; } @@ -1808,7 +1808,7 @@ HttpStateData::httpBuildRequestHeader(HttpRequest * request, blen += base64_encode_final(&ctx, result+blen); result[blen] = '\0'; if (blen) - httpHeaderPutStrf(hdr_out, HDR_AUTHORIZATION, "Basic %.*s", blen, result); + httpHeaderPutStrf(hdr_out, HDR_AUTHORIZATION, "Basic %.*s", (int)blen, result); } } diff --git a/tools/cachemgr.cc b/tools/cachemgr.cc index 49b5ed081c..4d8ef60a48 100644 --- a/tools/cachemgr.cc +++ b/tools/cachemgr.cc @@ -1196,11 +1196,11 @@ make_auth_header(const cachemgr_request * req) blen += base64_encode_final(&ctx, str64+blen); str64[blen] = '\0'; - stringLength += snprintf(buf, sizeof(buf), "Authorization: Basic %.*s\r\n", blen, str64); + stringLength += snprintf(buf, sizeof(buf), "Authorization: Basic %.*s\r\n", (int)blen, str64); assert(stringLength < sizeof(buf)); - snprintf(&buf[stringLength], sizeof(buf) - stringLength, "Proxy-Authorization: Basic %.*s\r\n", blen, str64); + snprintf(&buf[stringLength], sizeof(buf) - stringLength, "Proxy-Authorization: Basic %.*s\r\n", (int)blen, str64); xfree(str64); return buf; diff --git a/tools/squidclient/squidclient.cc b/tools/squidclient/squidclient.cc index 54ded3df33..66f506fab9 100644 --- a/tools/squidclient/squidclient.cc +++ b/tools/squidclient/squidclient.cc @@ -435,7 +435,7 @@ main(int argc, char *argv[]) blen += base64_encode_update(&ctx, reinterpret_cast(buf+blen), 1, reinterpret_cast(":")); blen += base64_encode_update(&ctx, reinterpret_cast(buf+blen), strlen(password), reinterpret_cast(password)); blen += base64_encode_final(&ctx, reinterpret_cast(buf+blen)); - snprintf(buf, BUFSIZ, "Proxy-Authorization: Basic %.*s\r\n", blen, buf); + snprintf(buf, BUFSIZ, "Proxy-Authorization: Basic %.*s\r\n", (int)blen, buf); strcat(msg, buf); } if (www_user) { @@ -453,7 +453,7 @@ main(int argc, char *argv[]) blen += base64_encode_update(&ctx, reinterpret_cast(buf+blen), 1, reinterpret_cast(":")); blen += base64_encode_update(&ctx, reinterpret_cast(buf+blen), strlen(password), reinterpret_cast(password)); blen += base64_encode_final(&ctx, reinterpret_cast(buf+blen)); - snprintf(buf, BUFSIZ, "Authorization: Basic %.*s\r\n", blen, buf); + snprintf(buf, BUFSIZ, "Authorization: Basic %.*s\r\n", (int)blen, buf); strcat(msg, buf); } #if HAVE_GSSAPI