forked from wolfSSL/wolfssl
fix windows session ticket warnings
This commit is contained in:
@@ -13753,7 +13753,7 @@ int DoSessionTicket(WOLFSSL* ssl,
|
||||
WOLFSSL_MSG("Bad user ticket encrypt size");
|
||||
return BAD_TICKET_KEY_CB_SZ;
|
||||
}
|
||||
c16toa(encLen, et->enc_len);
|
||||
c16toa((word16)encLen, et->enc_len);
|
||||
ssl->session.ticketLen = (word16)(encLen + WOLFSSL_TICKET_FIXED_SZ);
|
||||
if (encLen < WOLFSSL_TICKET_ENC_SZ) {
|
||||
/* move mac up since whole enc buffer not used */
|
||||
|
@@ -920,7 +920,7 @@ WOLFSSL_API int wolfSSL_set_SessionTicket(WOLFSSL* ssl, byte* buf, word32 bufSz)
|
||||
|
||||
if (bufSz > 0)
|
||||
XMEMCPY(ssl->session.ticket, buf, bufSz);
|
||||
ssl->session.ticketLen = bufSz;
|
||||
ssl->session.ticketLen = (word16)bufSz;
|
||||
|
||||
return SSL_SUCCESS;
|
||||
}
|
||||
|
@@ -1807,7 +1807,7 @@ static word16 TLSX_SessionTicket_GetSize(SessionTicket* ticket, int isRequest)
|
||||
static word16 TLSX_SessionTicket_Write(SessionTicket* ticket, byte* output,
|
||||
int isRequest)
|
||||
{
|
||||
int offset = 0; /* empty ticket */
|
||||
word16 offset = 0; /* empty ticket */
|
||||
|
||||
if (isRequest && ticket) {
|
||||
XMEMCPY(output + offset, ticket->data, ticket->size);
|
||||
|
Reference in New Issue
Block a user