diff options
author | David Oberhollenzer <david.oberhollenzer@sigma-star.at> | 2019-08-26 09:13:59 +0200 |
---|---|---|
committer | David Oberhollenzer <david.oberhollenzer@sigma-star.at> | 2019-08-26 09:20:31 +0200 |
commit | f5c0f0c75181d5e7fa56d11fa59a32a1c088020a (patch) | |
tree | ff50595ab17bff0350df94880b903eeab8aa9986 /tests/tar_ustar.c | |
parent | c92a9513c9e21691b36868052c2d9489ab4be87b (diff) |
Tune the paranoia down a bit
size_t is guaranteed to be large enough to measure the size of things in
memory, so when doing exactely that (e.g. strlen(a) + strlen(b)), checking
for overflow is pointless since both objects are already in memory. If the
addition would overflow, the two strings would occupy more memory than
addressable.
(Possible exception being some kind of harward style architecture with
the two strings being in different kinds of memory of course.)
Signed-off-by: David Oberhollenzer <david.oberhollenzer@sigma-star.at>
Diffstat (limited to 'tests/tar_ustar.c')
0 files changed, 0 insertions, 0 deletions