/* key and in data are 00 01 02 ... */
for (i = 0; i < sizeof(key); i++)
- key[i] = i;
+ key[i] = (unsigned char)i;
for (i = 0; i < inlen; i++)
- in[i] = i;
+ in[i] = (unsigned char)i;
if (!TEST_true(SipHash_Init(&siphash, key, expectedlen, 0, 0)))
return 0;
* time. It could be any value as long as it is not within tolerance.
* This should mean the ticket is rejected.
*/
- if (!TEST_true(SSL_SESSION_set_time(sess, time(NULL) - 20)))
+ if (!TEST_true(SSL_SESSION_set_time(sess, (long)(time(NULL) - 20))))
goto end;
}
for (prot = in; prot < in + inlen; prot += protlen) {
protlen = *prot++;
- if (in + inlen - prot < protlen)
+ if (in + inlen < prot + protlen)
return SSL_TLSEXT_ERR_NOACK;
if (protlen == strlen(servalpn)