diff options
author | deraadt <> | 2014-06-01 15:10:53 +0000 |
---|---|---|
committer | deraadt <> | 2014-06-01 15:10:53 +0000 |
commit | 717067e4cee6765e5c81f8fe6701a5d4741d6e76 (patch) | |
tree | bc12934adc4c0e00a726ccf40c62146741fd5626 /src/lib/libcrypto/objects/obj_dat.c | |
parent | 6b8bbf5f4a65c20c4b46db917994f581df398522 (diff) | |
download | openbsd-717067e4cee6765e5c81f8fe6701a5d4741d6e76.tar.gz openbsd-717067e4cee6765e5c81f8fe6701a5d4741d6e76.tar.bz2 openbsd-717067e4cee6765e5c81f8fe6701a5d4741d6e76.zip |
Commit this before the head-scratching leads to premature baldness:
memset(a->data, 0, (unsigned int)a->max);
but the decl is:
size_t max;
size_t could be larger than int, especially in some of the systems OpenSSL
purports to support.
How do _intentionally truncating_ casts like enter into a codebase?
Lack of understanding of C, at a minimum. Generally the objects are
small, but this code is _intentionally unready_ for large objects.
ok miod
Diffstat (limited to 'src/lib/libcrypto/objects/obj_dat.c')
0 files changed, 0 insertions, 0 deletions