CLEANUP: init: address a coverity warning about possible multiply overflow

In issue #1585 Coverity suspects a risk of multiply overflow when
calculating the SSL cache size, though in practice the cache is
limited to 2^32 anyway thus it cannot really happen. Nevertheless,
casting the operation should be sufficient to avoid marking it as a
false positive.
diff --git a/src/haproxy.c b/src/haproxy.c
index 1d66126..130bc9b 100644
--- a/src/haproxy.c
+++ b/src/haproxy.c
@@ -2302,7 +2302,7 @@
 		int64_t mem = global.rlimit_memmax * 1048576ULL;
 		int retried = 0;
 
-		mem -= global.tune.sslcachesize * 200; // about 200 bytes per SSL cache entry
+		mem -= global.tune.sslcachesize * 200ULL; // about 200 bytes per SSL cache entry
 		mem -= global.maxzlibmem;
 		mem = mem * MEM_USABLE_RATIO;