gfe-relnote: n/a(code clean up) Fix quiche compile errors in envoy.

PiperOrigin-RevId: 252905372
Change-Id: Iae4dffd588d67ea6e80a3d90910c8629175c7cb6
diff --git a/quic/core/quic_framer.cc b/quic/core/quic_framer.cc
index 3267710..d186ad3 100644
--- a/quic/core/quic_framer.cc
+++ b/quic/core/quic_framer.cc
@@ -5118,7 +5118,6 @@
       const size_t num_encoded_gaps =
           (total_gap + std::numeric_limits<uint8_t>::max() - 1) /
           std::numeric_limits<uint8_t>::max();
-      DCHECK_LE(0u, num_encoded_gaps);
 
       // Append empty ACK blocks because the gap is longer than a single gap.
       for (size_t i = 1;
diff --git a/quic/core/tls_handshaker.cc b/quic/core/tls_handshaker.cc
index e27f5dd..aeadfd4 100644
--- a/quic/core/tls_handshaker.cc
+++ b/quic/core/tls_handshaker.cc
@@ -112,6 +112,9 @@
       return ENCRYPTION_HANDSHAKE;
     case ssl_encryption_application:
       return ENCRYPTION_FORWARD_SECURE;
+    default:
+      QUIC_BUG << "Invalid ssl_encryption_level_t " << static_cast<int>(level);
+      return ENCRYPTION_INITIAL;
   }
 }
 
@@ -128,7 +131,7 @@
     case ENCRYPTION_FORWARD_SECURE:
       return ssl_encryption_application;
     default:
-      QUIC_BUG << "Invalid encryption level " << level;
+      QUIC_BUG << "Invalid encryption level " << static_cast<int>(level);
       return ssl_encryption_initial;
   }
 }
diff --git a/quic/platform/api/quic_ip_address.cc b/quic/platform/api/quic_ip_address.cc
index 6390016..6db0838 100644
--- a/quic/platform/api/quic_ip_address.cc
+++ b/quic/platform/api/quic_ip_address.cc
@@ -218,7 +218,7 @@
     return true;
   }
   DCHECK_LT(static_cast<size_t>(bytes_to_check), sizeof(address_.bytes));
-  int mask = (~0) << (8u - bits_to_check);
+  int mask = (~0u) << (8u - bits_to_check);
   return (lhs[bytes_to_check] & mask) == (rhs[bytes_to_check] & mask);
 }