diff options
author | Theo de Raadt <deraadt@cvs.openbsd.org> | 2014-06-01 15:10:54 +0000 |
---|---|---|
committer | Theo de Raadt <deraadt@cvs.openbsd.org> | 2014-06-01 15:10:54 +0000 |
commit | a918d16c5c56917eca54272018ae30883ed218ec (patch) | |
tree | 3a688d819f3e93430abd417a17aebfb2cd718209 /lib/libc/sys/access.2 | |
parent | 7b75e731cdc2a1f01a3cf19e037bd2be99ff017a (diff) |
Commit this before the head-scratching leads to premature baldness:
memset(a->data, 0, (unsigned int)a->max);
but the decl is:
size_t max;
size_t could be larger than int, especially in some of the systems OpenSSL
purports to support.
How do _intentionally truncating_ casts like enter into a codebase?
Lack of understanding of C, at a minimum. Generally the objects are
small, but this code is _intentionally unready_ for large objects.
ok miod
Diffstat (limited to 'lib/libc/sys/access.2')
0 files changed, 0 insertions, 0 deletions