This commit is contained in:
Viktor Szakats 2026-03-09 00:28:30 +01:00
parent e9112f7076
commit d005d0b643
No known key found for this signature in database
8 changed files with 12 additions and 11 deletions

View file

@ -257,7 +257,7 @@ static OM_uint32 stub_gss_init_sec_context(
}
/* Token format: creds:target:type:padding */
used = curl_msnprintf(token, length, "%s:%.*s:%d:", creds,
used = curl_msnprintf(token, length, "%s:%.*s:%u:", creds,
(int)target_desc.length,
(const char *)target_desc.value,
ctx->sent);

View file

@ -153,7 +153,8 @@ static CURLcode httpchunk_readwrite(struct Curl_easy *data,
if(ch->hexindex == 0) {
/* This is illegal data, we received junk where we expected
a hexadecimal digit. */
failf(data, "chunk hex-length char not a hex digit: 0x%x", *buf);
failf(data, "chunk hex-length char not a hex digit: 0x%x",
(unsigned int)*buf);
ch->state = CHUNK_FAILED;
ch->last_code = CHUNKE_ILLEGAL_HEX;
return CURLE_RECV_ERROR;

View file

@ -427,7 +427,7 @@ static CURLcode mqtt_verify_connack(struct Curl_easy *data)
if(ptr[0] != 0x00 || ptr[1] != 0x00) {
failf(data, "Expected %02x%02x but got %02x%02x",
0x00U, 0x00U, ptr[0], ptr[1]);
0x00U, 0x00U, (unsigned char)ptr[0], (unsigned char)ptr[1]);
curlx_dyn_reset(&mq->recvbuf);
return CURLE_WEIRD_SERVER_REPLY;
}

View file

@ -2412,7 +2412,7 @@ static int quic_gtls_handshake_cb(gnutls_session_t session, unsigned int htype,
DEBUGASSERT(data);
if(!data)
return 0;
CURL_TRC_CF(data, cf, "SSL message: %s %s [%d]",
CURL_TRC_CF(data, cf, "SSL message: %s %s [%u]",
incoming ? "<-" : "->", gtls_hs_msg_name(htype), htype);
switch(htype) {
case GNUTLS_HANDSHAKE_NEW_SESSION_TICKET: {

View file

@ -563,7 +563,7 @@ static void cf_quiche_process_ev(struct Curl_cfilter *cf,
default:
CURL_TRC_CF(data, cf, "[%" PRIu64 "] recv, unhandled event %d",
stream->id, quiche_h3_event_type(ev));
stream->id, (int)quiche_h3_event_type(ev));
break;
}
}
@ -1051,7 +1051,7 @@ static CURLcode h3_open_stream(struct Curl_cfilter *cf,
goto out;
}
else {
CURL_TRC_CF(data, cf, "send_request(%s) -> %" PRIu64,
CURL_TRC_CF(data, cf, "send_request(%s) -> %" PRId64,
Curl_bufref_ptr(&data->state.url), rv);
}
result = CURLE_SEND_ERROR;

View file

@ -127,7 +127,7 @@ static ssize_t gtls_pull(void *s, void *buf, size_t blen)
}
result = Curl_conn_cf_recv(cf->next, data, buf, blen, &nread);
CURL_TRC_CF(data, cf, "glts_pull(len=%zu) -> %d, %zd", blen, result, nread);
CURL_TRC_CF(data, cf, "glts_pull(len=%zu) -> %d, %zu", blen, result, nread);
backend->gtls.io_result = result;
if(result) {
/* !checksrc! disable ERRNOVAR 1 */
@ -793,7 +793,7 @@ static int gtls_handshake_cb(gnutls_session_t session, unsigned int htype,
if(when) { /* after message has been processed */
struct Curl_easy *data = CF_DATA_CURRENT(cf);
if(data) {
CURL_TRC_CF(data, cf, "handshake: %s message type %d",
CURL_TRC_CF(data, cf, "handshake: %s message type %u",
incoming ? "incoming" : "outgoing", htype);
switch(htype) {
case GNUTLS_HANDSHAKE_NEW_SESSION_TICKET: {
@ -1619,7 +1619,7 @@ CURLcode Curl_gtls_verifyserver(struct Curl_cfilter *cf,
if(data->set.ssl.certinfo && chain.certs) {
if(chain.num_certs > MAX_ALLOWED_CERT_AMOUNT) {
failf(data, "%u certificates is more than allowed (%u)",
failf(data, "%u certificates is more than allowed (%d)",
chain.num_certs, MAX_ALLOWED_CERT_AMOUNT);
result = CURLE_SSL_CONNECT_ERROR;
goto out;

View file

@ -279,7 +279,7 @@ static CURLcode get_pkey_rsa(struct Curl_easy *data,
#else
RSA_get0_key(rsa, &n, &e, NULL);
#endif /* HAVE_EVP_PKEY_GET_PARAMS */
BIO_printf(mem, "%d", n ? BN_num_bits(n) : 0);
BIO_printf(mem, "%d", (int)(n ? BN_num_bits(n) : 0));
result = push_certinfo(data, mem, "RSA Public Key", i);
if(!result) {
result = print_pubkey_BN(rsa, n, i);

View file

@ -199,7 +199,7 @@ static int my_progress_d_cb(void *userdata,
(struct rustls_connection *)tls->internals);
assert(v);
curl_mfprintf(stderr, "[t-%zu] info rustls TLS version 0x%x\n",
t->idx, v);
t->idx, (unsigned int)v);
break;
}
#endif