if (BUF_MEM_grow(pkt->buf, newlen) == 0)
return 0;
}
- pkt->written += len;
*allocbytes = (unsigned char *)pkt->buf->data + pkt->curr;
+ pkt->written += len;
pkt->curr += len;
return 1;
return 1;
}
-/* Store the |value| of length |size| at location |data| */
-static int put_value(unsigned char *data, size_t value, size_t size)
+/* Store the |value| of length |len| at location |data| */
+static int put_value(unsigned char *data, size_t value, size_t len)
{
- for (data += size - 1; size > 0; size--) {
+ for (data += len - 1; len > 0; len--) {
*data = (unsigned char)(value & 0xff);
data--;
value >>= 8;
size_t packlen = pkt->written - sub->pwritten;
if (packlen == 0
- && sub->flags & WPACKET_FLAGS_NON_ZERO_LENGTH)
+ && (sub->flags & WPACKET_FLAGS_NON_ZERO_LENGTH) != 0)
return 0;
if (packlen == 0
/* Internal API, so should not fail */
assert(size <= sizeof(unsigned int));
+
if (size > sizeof(unsigned int)
|| !WPACKET_allocate_bytes(pkt, size, &data)
|| !put_value(data, val, size))
const unsigned char *psig, size_t psiglen)
{
size_t i;
+
for (i = 0; i < psiglen; i += 2, psig += 2) {
if (tls12_sigalg_allowed(s, SSL_SECOP_SIGALG_SUPPORTED, psig)) {
if (!WPACKET_put_bytes(pkt, psig[0], 1)