mirror of https://github.com/wolfSSL/wolfssl.git
fix windows session ticket warnings
parent
74cc2274fa
commit
cedd41432c
|
@ -13753,7 +13753,7 @@ int DoSessionTicket(WOLFSSL* ssl,
|
|||
WOLFSSL_MSG("Bad user ticket encrypt size");
|
||||
return BAD_TICKET_KEY_CB_SZ;
|
||||
}
|
||||
c16toa(encLen, et->enc_len);
|
||||
c16toa((word16)encLen, et->enc_len);
|
||||
ssl->session.ticketLen = (word16)(encLen + WOLFSSL_TICKET_FIXED_SZ);
|
||||
if (encLen < WOLFSSL_TICKET_ENC_SZ) {
|
||||
/* move mac up since whole enc buffer not used */
|
||||
|
|
|
@ -920,7 +920,7 @@ WOLFSSL_API int wolfSSL_set_SessionTicket(WOLFSSL* ssl, byte* buf, word32 bufSz)
|
|||
|
||||
if (bufSz > 0)
|
||||
XMEMCPY(ssl->session.ticket, buf, bufSz);
|
||||
ssl->session.ticketLen = bufSz;
|
||||
ssl->session.ticketLen = (word16)bufSz;
|
||||
|
||||
return SSL_SUCCESS;
|
||||
}
|
||||
|
|
|
@ -1807,7 +1807,7 @@ static word16 TLSX_SessionTicket_GetSize(SessionTicket* ticket, int isRequest)
|
|||
static word16 TLSX_SessionTicket_Write(SessionTicket* ticket, byte* output,
|
||||
int isRequest)
|
||||
{
|
||||
int offset = 0; /* empty ticket */
|
||||
word16 offset = 0; /* empty ticket */
|
||||
|
||||
if (isRequest && ticket) {
|
||||
XMEMCPY(output + offset, ticket->data, ticket->size);
|
||||
|
|
Loading…
Reference in New Issue