commit | c23bf6e23caf8a812c0cdd86e83ca87d987abb1b | [log] [tgz] |
---|---|---|
author | Simon Butcher <simon.butcher@arm.com> | Tue Dec 22 23:53:04 2015 +0000 |
committer | Simon Butcher <simon.butcher@arm.com> | Tue Dec 22 23:53:04 2015 +0000 |
tree | fd9669715f30b8db902631210b51e0c3732a2363 | |
parent | 15f0bbef2d4b2577dd6bdfb00712d2086ef297d3 [diff] |
Avoid seemingly-possible overflow By looking just at that test, it looks like 2 + dn_size could overflow. In fact that can't happen as that would mean we've read a CA cert of size is too big to be represented by a size_t. However, it's best for code to be more obviously free of overflow without having to reason about the bigger picture.