From 2c2a1afcd640b790057f45d918d5ec8dcd83a26b Mon Sep 17 00:00:00 2001 From: tb Date: Tue, 7 Jun 2022 17:52:00 +0000 Subject: [PATCH] Switch sid_ctx_length in SSL, SSL_CTX and SSL_SESSION to a size_t ok jsing --- lib/libssl/ssl_locl.h | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/lib/libssl/ssl_locl.h b/lib/libssl/ssl_locl.h index e311661e2d3..f5728003eab 100644 --- a/lib/libssl/ssl_locl.h +++ b/lib/libssl/ssl_locl.h @@ -1,4 +1,4 @@ -/* $OpenBSD: ssl_locl.h,v 1.393 2022/06/07 17:42:35 tb Exp $ */ +/* $OpenBSD: ssl_locl.h,v 1.394 2022/06/07 17:52:00 tb Exp $ */ /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * @@ -473,7 +473,7 @@ struct ssl_session_st { /* this is used to determine whether the session is being reused in * the appropriate context. It is up to the application to set this, * via SSL_new */ - unsigned int sid_ctx_length; + size_t sid_ctx_length; unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; /* Peer provided leaf (end-entity) certificate. */ @@ -888,7 +888,7 @@ struct ssl_ctx_st { STACK_OF(X509) *extra_certs; int verify_mode; - unsigned int sid_ctx_length; + size_t sid_ctx_length; unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; X509_VERIFY_PARAM *param; @@ -1082,7 +1082,7 @@ struct ssl_st { /* the session_id_context is used to ensure sessions are only reused * in the appropriate context */ - unsigned int sid_ctx_length; + size_t sid_ctx_length; unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; /* This can also be in the session once a session is established */ -- 2.20.1