summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/dsa/dsa_asn1.c
diff options
context:
space:
mode:
authorderaadt <>2014-06-01 15:10:53 +0000
committerderaadt <>2014-06-01 15:10:53 +0000
commit8651fd5ff025be46cca91efe623b138186b69326 (patch)
treebc12934adc4c0e00a726ccf40c62146741fd5626 /src/lib/libcrypto/dsa/dsa_asn1.c
parent80aec33a6fd0623b001a8f27386db1459998842b (diff)
downloadopenbsd-8651fd5ff025be46cca91efe623b138186b69326.tar.gz
openbsd-8651fd5ff025be46cca91efe623b138186b69326.tar.bz2
openbsd-8651fd5ff025be46cca91efe623b138186b69326.zip
Commit this before the head-scratching leads to premature baldness:
memset(a->data, 0, (unsigned int)a->max); but the decl is: size_t max; size_t could be larger than int, especially in some of the systems OpenSSL purports to support. How do _intentionally truncating_ casts like enter into a codebase? Lack of understanding of C, at a minimum. Generally the objects are small, but this code is _intentionally unready_ for large objects. ok miod
Diffstat (limited to 'src/lib/libcrypto/dsa/dsa_asn1.c')
0 files changed, 0 insertions, 0 deletions