{
// Allocate the authorization string since Windows KDCs can have
// arbitrarily large credentials...
- int authsize = 10 + // "Negotiate "
- (((int)output_token.length * 4 / 3 + 3) & ~3) + 1;
+ size_t authsize = (size_t)(10 + // "Negotiate "
+ ((output_token.length * 4 / 3 + 3) & ~3U) + 1);
// Base64 + nul
httpSetAuthString(http, NULL, NULL);
}
// If the attribute contains a single "all" keyword, return NULL...
- count = ippGetCount(requested);
+ count = (size_t)ippGetCount(requested);
if (count == 1 && !strcmp(ippGetString(requested, 0, NULL), "all"))
return (NULL);
if (temp->num_values <= 1)
alloc_values = 1;
else
- alloc_values = (temp->num_values + IPP_MAX_VALUES - 1) & (size_t)~(IPP_MAX_VALUES - 1);
+ alloc_values = (temp->num_values + IPP_MAX_VALUES - 1) & ~(IPP_MAX_VALUES - 1);
if (element < alloc_values)
{
STACK_OF(GENERAL_NAME) *names = NULL;
// subjectAltName values
- DEBUG_printf("1cupsAreCredentialsValidForName: certs=%p(num=%d), cert=%p", certs, sk_X509_num(certs), cert);
+ DEBUG_printf("1cupsAreCredentialsValidForName: certs=%p(num=%d), cert=%p", (void *)certs, sk_X509_num(certs), (void *)cert);
X509_NAME_get_text_by_NID(X509_get_subject_name(cert), NID_commonName, subjectName, sizeof(subjectName));
DEBUG_printf("1cupsAreCredentialsValidForName: subjectName=\"%s\"", subjectName);
if (!result)
{
names = X509_get_ext_d2i(cert, NID_subject_alt_name, /*crit*/NULL, /*idx*/NULL);
- DEBUG_printf("1cupsAreCredentialsValidForName: names=%p", names);
+ DEBUG_printf("1cupsAreCredentialsValidForName: names=%p", (void *)names);
}
if (names)