forked from wolfSSL/wolfssl
Merge pull request #7880 from ColtonWilley/tls13_send_cert_use_signed_len
Use signed variable for length calculation in SendTls13Certificate
This commit is contained in:
@@ -8462,12 +8462,13 @@ static int SendTls13Certificate(WOLFSSL* ssl)
|
|||||||
int ret = 0;
|
int ret = 0;
|
||||||
word32 certSz, certChainSz, headerSz, listSz, payloadSz;
|
word32 certSz, certChainSz, headerSz, listSz, payloadSz;
|
||||||
word16 extSz = 0;
|
word16 extSz = 0;
|
||||||
word32 length, maxFragment;
|
word32 maxFragment;
|
||||||
word32 len = 0;
|
word32 len = 0;
|
||||||
word32 idx = 0;
|
word32 idx = 0;
|
||||||
word32 offset = OPAQUE16_LEN;
|
word32 offset = OPAQUE16_LEN;
|
||||||
byte* p = NULL;
|
byte* p = NULL;
|
||||||
byte certReqCtxLen = 0;
|
byte certReqCtxLen = 0;
|
||||||
|
sword32 length;
|
||||||
#ifdef WOLFSSL_POST_HANDSHAKE_AUTH
|
#ifdef WOLFSSL_POST_HANDSHAKE_AUTH
|
||||||
byte* certReqCtx = NULL;
|
byte* certReqCtx = NULL;
|
||||||
#endif
|
#endif
|
||||||
@@ -8513,7 +8514,7 @@ static int SendTls13Certificate(WOLFSSL* ssl)
|
|||||||
listSz = 0;
|
listSz = 0;
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
if (!ssl->buffers.certificate) {
|
if (!ssl->buffers.certificate || !ssl->buffers.certificate->buffer) {
|
||||||
WOLFSSL_MSG("Send Cert missing certificate buffer");
|
WOLFSSL_MSG("Send Cert missing certificate buffer");
|
||||||
return NO_CERT_ERROR;
|
return NO_CERT_ERROR;
|
||||||
}
|
}
|
||||||
@@ -8604,7 +8605,7 @@ static int SendTls13Certificate(WOLFSSL* ssl)
|
|||||||
#endif /* WOLFSSL_DTLS13 */
|
#endif /* WOLFSSL_DTLS13 */
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
fragSz = min(length, maxFragment);
|
fragSz = min((word32)length, maxFragment);
|
||||||
sendSz += fragSz;
|
sendSz += fragSz;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user