Module Name:src
Committed By: rillig
Date: Mon Oct 3 05:34:31 UTC 2022
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/lib: keyring.c
Log Message:
netpgp: fix build with Clang (since 2022-10-01)
error: passing 'char [1]' to parameter of type 'const uint8_t *'
Module Name:src
Committed By: rillig
Date: Mon Oct 3 05:34:31 UTC 2022
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/lib: keyring.c
Log Message:
netpgp: fix build with Clang (since 2022-10-01)
error: passing 'char [1]' to parameter of type 'const uint8_t *'
Module Name:src
Committed By: rillig
Date: Sat Oct 1 22:21:31 UTC 2022
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/lib: keyring.c
Log Message:
netpgpkeys: properly terminate string before calling strdup
$ MALLOC_CONF=junk:true netpgpkeys \
--export-key \
Module Name:src
Committed By: rillig
Date: Sat Oct 1 22:21:31 UTC 2022
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/lib: keyring.c
Log Message:
netpgpkeys: properly terminate string before calling strdup
$ MALLOC_CONF=junk:true netpgpkeys \
--export-key \
Module Name:src
Committed By: rillig
Date: Sat Aug 27 12:55:34 UTC 2022
Modified Files:
src/crypto/external/bsd/netpgp/dist/bindings/lua: netpgp.lua
Log Message:
netpgp: fix indentation in Lua binding example program
To generate a diff of this commit:
cvs rdiff -u -r1.7
Module Name:src
Committed By: rillig
Date: Sat Aug 27 12:55:34 UTC 2022
Modified Files:
src/crypto/external/bsd/netpgp/dist/bindings/lua: netpgp.lua
Log Message:
netpgp: fix indentation in Lua binding example program
To generate a diff of this commit:
cvs rdiff -u -r1.7
Module Name:src
Committed By: rillig
Date: Sat Aug 27 08:57:23 UTC 2022
Modified Files:
src/crypto/external/bsd/netpgp/dist/bindings/lua: netpgp.lua
Log Message:
netpgp: fail if the shared library cannot be loaded
To generate a diff of this commit:
cvs rdiff -u -r1.6
Module Name:src
Committed By: rillig
Date: Sat Aug 27 08:57:23 UTC 2022
Modified Files:
src/crypto/external/bsd/netpgp/dist/bindings/lua: netpgp.lua
Log Message:
netpgp: fail if the shared library cannot be loaded
To generate a diff of this commit:
cvs rdiff -u -r1.6
Module Name:src
Committed By: rillig
Date: Sat Aug 27 08:35:01 UTC 2022
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/lib: netpgp.c
Log Message:
netpgp: fix use after free when writing keyring
Same pattern as in the previous commit.
To generate a diff of this
Module Name:src
Committed By: rillig
Date: Sat Aug 27 08:35:01 UTC 2022
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/lib: netpgp.c
Log Message:
netpgp: fix use after free when writing keyring
Same pattern as in the previous commit.
To generate a diff of this
Module Name:src
Committed By: rillig
Date: Sat Aug 27 08:30:06 UTC 2022
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/lib: netpgp.c
Log Message:
netpgp: fix use after free when reading pubkey
To reproduce:
srcdir=...
objdir=...
cd
Module Name:src
Committed By: rillig
Date: Sat Aug 27 08:30:06 UTC 2022
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/lib: netpgp.c
Log Message:
netpgp: fix use after free when reading pubkey
To reproduce:
srcdir=...
objdir=...
cd
Module Name:src
Committed By: jhigh
Date: Fri Aug 26 19:18:38 UTC 2022
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/lib: create.c crypto.h misc.c
netpgpsdk.h openssl_crypto.c packet-parse.c packet-print.c
packet-show.c packet.h
Module Name:src
Committed By: jhigh
Date: Fri Aug 26 19:18:38 UTC 2022
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/lib: create.c crypto.h misc.c
netpgpsdk.h openssl_crypto.c packet-parse.c packet-print.c
packet-show.c packet.h
Module Name:src
Committed By: christos
Date: Tue Oct 8 18:47:11 UTC 2019
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/netpgpverify: libverify.c
Log Message:
grow the buffer a little.
To generate a diff of this commit:
cvs rdiff -u -r1.13 -r1.14 \
Module Name:src
Committed By: christos
Date: Tue Oct 8 18:47:11 UTC 2019
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/netpgpverify: libverify.c
Log Message:
grow the buffer a little.
To generate a diff of this commit:
cvs rdiff -u -r1.13 -r1.14 \
In article <20180403220010.ga5...@britannica.bec.de>,
Joerg Sonnenberger wrote:
>On Tue, Apr 03, 2018 at 09:57:15PM +, Sevan Janiyan wrote:
>> Module Name: src
>> Committed By:sevan
>> Date:Tue Apr 3 21:57:15 UTC 2018
>>
>> Modified Files:
>>
On Tue, Apr 03, 2018 at 09:57:15PM +, Sevan Janiyan wrote:
> Module Name: src
> Committed By: sevan
> Date: Tue Apr 3 21:57:15 UTC 2018
>
> Modified Files:
> src/crypto/external/bsd/netpgp/dist/src/lib: libnetpgp.3
> src/crypto/external/bsd/netpgp/dist/src/libbn:
In article <20180401232528.1e523f...@cvs.netbsd.org>,
Sevan Janiyan wrote:
>-=-=-=-=-=-
>
>Module Name: src
>Committed By: sevan
>Date: Sun Apr 1 23:25:28 UTC 2018
>
>Modified Files:
> src/crypto/external/bsd/netpgp/dist/src/lib: libnetpgp.3
>
>Log
Thanks, but I'd really like it if netpgp would work the same on all pkgsrc
platforms:
The linux man page for getpass(3) (https://linux.die.net/man/3/getpass)
says:
The function *getpass*() returns a pointer to a static buffer containing
(the first *PASS_MAX* bytes of) the password without the
On 7/21/11 4:49 AM, Martin Husemann wrote:
On Thu, Jul 21, 2011 at 07:11:56AM +0100, Iain Hibbert wrote:
I thought that I agreed with Jukka, it seemed to be a complaint with no
specific content except that you were uncomfortable (unfamilar?) with
atf.
I'm mostly with Iain here, though I have
On 7/21/11 2:11 AM, Iain Hibbert wrote:
PS the predictable consequence that you cannot fold in external test
programs did not come true, see tests/lib/libevent/t_event.sh for example,
though I note that the number of libevent tests are misrepresented in the
atf-total since the test program
On 7/21/11 10:33 AM, Julio Merino wrote:
On 7/21/11 4:49 AM, Martin Husemann wrote:
However, from my very practical experience (from all relevant sides:
running
tests, writing/extending them, and most importantly: fixing the troubles
they show) it is not the framework that causes most problems
On Thu, Jul 21, 2011 at 10:45:55AM -0700, Jeff Rizzo wrote:
I believe this is a general gdb complaint, not specific to atf. I've
run into this issue as well - there are some workarounds (threaded
debugging works somewhat on core dumps), but it's a giant pain given
than one of the key
On Jul,Thursday 21 2011, at 8:15 PM, Martin Husemann wrote:
On Thu, Jul 21, 2011 at 10:45:55AM -0700, Jeff Rizzo wrote:
I believe this is a general gdb complaint, not specific to atf. I've
run into this issue as well - there are some workarounds (threaded
debugging works somewhat on core
On Wed, Jun 29, 2011 at 03:05:09PM +0100, Julio Merino wrote:
Perhaps if atf were less intrusive...?
What do you mean? I think it needs to be quite intrusive
(sandboxing, etc.). Unquestionably the old /regress-style is not
the way to go. Even if you dislike some parts of the API,
On Wed, Jul 20, 2011 at 08:03:59AM +, David Holland wrote:
In just about every other test suite I've used (which includes some
very large ones with turing complete/scripted test harness programs
and other fancy stuff) there are test programs and test driver
scripts, but all the pieces have
On 6/28/11 7:25 AM, Jukka Ruohonen wrote:
On Tue, Jun 28, 2011 at 08:12:26AM +0200, Alistair Crooks wrote:
3. they are candidates for modifying to work under atf, I have yet to
get the time to do that
4. luke kindly made some gnu autotests for them a while ago
[...]
and if someone was to
On Tue, Jun 28, 2011 at 06:50:50AM +, David Holland wrote:
Perhaps if atf were less intrusive...?
What do you mean? I think it needs to be quite intrusive (sandboxing, etc.).
Unquestionably the old /regress-style is not the way to go. Even if you
dislike some parts of the API, already the
On 6/29/11 2:59 PM, Jukka Ruohonen wrote:
On Tue, Jun 28, 2011 at 06:50:50AM +, David Holland wrote:
Perhaps if atf were less intrusive...?
What do you mean? I think it needs to be quite intrusive (sandboxing, etc.).
Unquestionably the old /regress-style is not the way to go. Even if you
On Wed, 29 Jun 2011, Jukka Ruohonen wrote:
On Wed, Jun 29, 2011 at 10:50:22AM +0100, Julio Merino wrote:
One of the ideas floating around in my head is to make atf-run (well,
kyua) support foreign tests. The most basic form of this would be
programs that just return 0 on success or 1 on
On Tue, Jun 28, 2011 at 07:45:07AM +0300, Jukka Ruohonen wrote:
On Tue, Jun 28, 2011 at 03:29:39AM +, Alistair G. Crooks wrote:
Module Name:src
Committed By: agc
Date: Tue Jun 28 03:29:38 UTC 2011
Modified Files:
On Tue, Jun 28, 2011 at 08:12:26AM +0200, Alistair Crooks wrote:
3. they are candidates for modifying to work under atf, I have yet to
get the time to do that
4. luke kindly made some gnu autotests for them a while ago
[...]
and if someone was to offer to convert these tests to atf
On Tue, Jun 28, 2011 at 09:25:32AM +0300, Jukka Ruohonen wrote:
But I think this entails a wider discussion about how the tests
shipped with third-party software could be integrated to atf(7). In
case of netpgp(1) this is easy; a relatively small code base for
which both in-house tests and
In article 20100815163624.8645d17...@cvs.netbsd.org,
Alistair G. Crooks source-changes-d@NetBSD.org wrote:
-=-=-=-=-=-
Module Name: src
Committed By: agc
Date: Sun Aug 15 16:36:24 UTC 2010
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/lib: misc.c packet-parse.c
On Sun, Aug 15, 2010 at 05:16:47PM +, Christos Zoulas wrote:
In article 20100815163624.8645d17...@cvs.netbsd.org,
Alistair G. Crooks source-changes-d@NetBSD.org wrote:
-=-=-=-=-=-
Module Name: src
Committed By:agc
Date:Sun Aug 15 16:36:24 UTC 2010
Modified
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/lib: keyring.h packet-print.c
Added Files:
src/crypto/external/bsd/netpgp/dist/src/lib: mj.c mj.h
Log Message:
add a minimalist JSON implementation, and add a new function to access the
data, and serialise it using JSON.
On Mon, Jul 26, 2010 at 03:56:07AM -0700, Tom Spindler wrote:
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/lib: keyring.h packet-print.c
Added Files:
src/crypto/external/bsd/netpgp/dist/src/lib: mj.c mj.h
Log Message:
add a minimalist JSON implementation, and add
On Sat, 26 Jun 2010, David Holland wrote:
I suppose the best available comprehensive solution is to use PRIu***
garble in the code and then if necessary have autoconf figure out what
the garble should expand to based on SIZE_MAX.
Yes.
--apb (Alan Barrett)
On Sun, Jun 27, 2010 at 08:10:41PM +0200, Joerg Sonnenberger wrote:
Compromising the autoconfiguration not work properly in the name of
cross-compilation, though, is misguided. Can't you have it run the
test if it's not a cross-compiler and only if it is fall back to the
platform test?
On Sat, Jun 26, 2010 at 06:25:23AM +0200, Joerg Sonnenberger wrote:
It would be better to make this a check which is size_t dependent,
rather than platform-dependent.
The idea is to black list platforms that don't do %zu and there is no
way to do that without breaking
In article 20100625183016.ac0be17...@cvs.netbsd.org,
Alistair G. Crooks source-changes-d@NetBSD.org wrote:
-=-=-=-=-=-
Module Name: src
Committed By: agc
Date: Fri Jun 25 18:30:16 UTC 2010
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/lib: misc.c
Log Message:
Fix
On Fri, Jun 25, 2010 at 08:40:26PM +, Christos Zoulas wrote:
In article 20100625183016.ac0be17...@cvs.netbsd.org,
Alistair G. Crooks source-changes-d@NetBSD.org wrote:
-=-=-=-=-=-
Module Name: src
Committed By:agc
Date:Fri Jun 25 18:30:16 UTC 2010
Modified
On Fri, Jun 25, 2010 at 11:54:32PM +0200, Alistair Crooks wrote:
Even in C99, the %lu method will work unless size_t is bigger than
unsigned long *and* the value being printed exceeds ULONG_MAX, which
is unlikely to happen in practice.
Actually, it doesn't. This method breaks
On Sat, Jun 26, 2010 at 01:32:05AM +0200, Joerg Sonnenberger wrote:
On Fri, Jun 25, 2010 at 11:54:32PM +0200, Alistair Crooks wrote:
Even in C99, the %lu method will work unless size_t is bigger than
unsigned long *and* the value being printed exceeds ULONG_MAX, which
is
In message: 20100626032531.ga14...@britannica.bec.de
Joerg Sonnenberger jo...@britannica.bec.de writes:
: On Sat, Jun 26, 2010 at 05:11:39AM +0200, Alistair Crooks wrote:
: On Sat, Jun 26, 2010 at 01:32:05AM +0200, Joerg Sonnenberger wrote:
: On Fri, Jun 25, 2010 at 11:54:32PM
Module Name:src
Committed By: agc
Date: Mon Mar 8 08:56:03 UTC 2010
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/lib: keyring.c
Log Message:
ensure that we have an element in the array before we try to store a value
in it.
To generate a diff of this commit:
Module Name:src
Committed By: agc
Date: Mon Mar 8 07:37:24 UTC 2010
Modified Files:
src/crypto/external/bsd/netpgp/dist: TODO configure configure.ac
src/crypto/external/bsd/netpgp/dist/src/lib: keyring.c packet-parse.c
packet-print.c version.h
Module Name:src
Committed By: agc
Date: Fri Mar 5 16:30:05 UTC 2010
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/lib: keyring.c netpgp.c
Log Message:
clean up some lint that crept in.
To generate a diff of this commit:
cvs rdiff -u -r1.28 -r1.29 \
Module Name:src
Committed By: agc
Date: Fri Mar 5 19:58:39 UTC 2010
Modified Files:
src/crypto/external/bsd/netpgp/dist: TODO configure configure.ac
src/crypto/external/bsd/netpgp/dist/src/lib: fastctype.h types.h
version.h
Module Name:src
Committed By: agc
Date: Fri Mar 5 19:58:39 UTC 2010
Modified Files:
src/crypto/external/bsd/netpgp/dist: TODO configure configure.ac
src/crypto/external/bsd/netpgp/dist/src/lib: fastctype.h types.h
version.h
Why do we want to have another ad-hoc HTTP implementation? Wouldn't a
small *CGI script be good enough?
Joerg
On Mon, Mar 01, 2010 at 07:41:57AM +, Alistair G. Crooks wrote:
Module Name: src
Committed By: agc
Date: Mon Mar 1 07:41:57 UTC 2010
Added Files:
not really, i tried to shoehorn all of this into bozo, and it wasn't
willing to do it, and its cgi subsystem doesn't lend itself to this
kind of thing. i'm fairly intimate with most of bozo's internals,
too.
the server itself is not that large. if there's a common server-side
library that can
Joerg Sonnenberger wrote:
Why do we want to have another ad-hoc HTTP implementation? Wouldn't a
small *CGI script be good enough?
Argument for a separate implementation: it runs as a standalone daemon
on a different port than the default for HTTP, as a decoupled service
from your normal httpd.
Module Name:src
Committed By: agc
Date: Mon Mar 1 07:41:57 UTC 2010
Added Files:
src/crypto/external/bsd/netpgp/dist/src/hkpd: Makefile hkpd.c hkpd.h
main.c
Log Message:
add an embryonic httpd key server (hkpd) to netpgp. this is based on the
discontinued
Module Name:src
Committed By: agc
Date: Mon Mar 1 07:41:57 UTC 2010
Added Files:
src/crypto/external/bsd/netpgp/dist/src/hkpd: Makefile hkpd.c hkpd.h
main.c
Log Message:
add an embryonic httpd key server (hkpd) to netpgp. this is based on the
discontinued
Module Name:src
Committed By: agc
Date: Mon Mar 1 07:52:21 UTC 2010
Added Files:
src/crypto/external/bsd/netpgp/dist/src/hkpclient: hkpclient.lua
optparse.lua tst
Log Message:
add the scripts used to test the hkpd.
fwiw, the hkp client script is -
Module Name:src
Committed By: agc
Date: Mon Mar 1 07:52:21 UTC 2010
Added Files:
src/crypto/external/bsd/netpgp/dist/src/hkpclient: hkpclient.lua
optparse.lua tst
Log Message:
add the scripts used to test the hkpd.
fwiw, the hkp client script is -
Module Name:src
Committed By: wiz
Date: Wed Feb 24 08:22:59 UTC 2010
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/netpgp: netpgp.1
Log Message:
New sentence, new line; remove trailing whitespace.
To generate a diff of this commit:
cvs rdiff -u -r1.8 -r1.9 \
Module Name:src
Committed By: agc
Date: Tue Feb 23 01:24:45 UTC 2010
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/lib: netpgp.c validate.c
src/crypto/external/bsd/netpgp/dist/src/netpgp: netpgp.1
Log Message:
fix a bug in verifying memory.
add two
Module Name:src
Committed By: agc
Date: Sat Feb 13 00:14:00 UTC 2010
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/lib: signature.h
Log Message:
let's get modern int types defined so that netpgp will build on mac os x
To generate a diff of this commit:
cvs
Module Name:src
Committed By: agc
Date: Thu Feb 11 17:46:09 UTC 2010
Modified Files:
src/crypto/external/bsd/netpgp/dist: configure.ac
src/crypto/external/bsd/netpgp/dist/src/lib: netpgp.c version.h
Log Message:
changes to 1.99.18/20100211
small steps, but lots
Module Name:src
Committed By: agc
Date: Fri Feb 12 03:38:48 UTC 2010
Modified Files:
src/crypto/external/bsd/netpgp/dist: TODO configure.ac
src/crypto/external/bsd/netpgp/dist/src/lib: create.c crypto.c crypto.h
keyring.h netpgp.c packet-print.c
Module Name:src
Committed By: agc
Date: Mon Feb 8 17:19:12 UTC 2010
Modified Files:
src/crypto/external/bsd/netpgp/dist: TODO configure configure.ac
src/crypto/external/bsd/netpgp/dist/src/lib: crypto.c crypto.h
packet-print.c packet.h reader.c
Module Name:src
Committed By: dsl
Date: Sat Feb 6 10:50:52 UTC 2010
Modified Files:
src/crypto/external/bsd/netpgp/dist/src/lib: packet-parse.c validate.c
Log Message:
Fix printf formats on amd64 (and probably other 64bit systems).
To generate a diff of this commit:
Module Name:src
Committed By: agc
Date: Sat Feb 6 02:24:34 UTC 2010
Modified Files:
src/crypto/external/bsd/netpgp/dist: TODO configure configure.ac tst
src/crypto/external/bsd/netpgp/dist/include: netpgp.h
src/crypto/external/bsd/netpgp/dist/src/lib:
On Tue, May 26, 2009 at 09:12:39AM +0200, Joerg Sonnenberger wrote:
On Tue, May 26, 2009 at 05:40:03AM +, Luke Mewburn wrote:
Log Message:
Improve SHA256_CTX checks; OS/X provides it in CommonCrypto/CommonDigest.h
even though their openssl/sha.h is too old.
I think I will hit
On Tue, May 26, 2009 at 05:40:03AM +, Luke Mewburn wrote:
Log Message:
Improve SHA256_CTX checks; OS/X provides it in CommonCrypto/CommonDigest.h
even though their openssl/sha.h is too old.
I think I will hit similiar issues with libarchive at some points, so do
you have more details here?
On Mon, May 11, 2009 at 10:32:30AM -0400, Perry E. Metzger wrote:
The only thing I will directly advocate for (besides scrapping the
current UI) is something like the ssh-agent functionality. It is painful
having to type in your passphrase for every email message you read,
every one you
David Holland dholland-sourcechan...@netbsd.org writes:
On Mon, May 11, 2009 at 10:32:30AM -0400, Perry E. Metzger wrote:
The only thing I will directly advocate for (besides scrapping the
current UI) is something like the ssh-agent functionality. It is painful
having to type in your
In article 20090525160949.gr14...@nef.pbox.org,
Alistair Crooks a...@pkgsrc.org wrote:
Hi Arnaud, everyone,
On Thu, May 21, 2009 at 10:59:04PM -0400, Arnaud Lacombe wrote:
I've been seeing a lot of commit and activity in netpgp. Do you mind
sending me a small paragraph [for the next CVS
Hi Alistair,
I've been seeing a lot of commit and activity in netpgp. Do you mind
sending me a small paragraph [for the next CVS activity report] about
what you're doing in it and what is already possible and what
direction does it take ?
Thanks !
- Arnaud
On Thu, May 21, 2009 at 10:28 PM,
Alistair G. Crooks a...@netbsd.org writes:
+ allow a choice of hash algorithms for the signature digest (rather
than hardcoding SHA1 - it is looking as though collisions are easier
to manufacture based on recent findings)
+ move default signature RSA hash algorithm to SHA256 (from SHA1).
Alistair Crooks a...@pkgsrc.org writes:
I'll look into providing that somehow (I've been of the opinion that
we need one binary for key management, and one binary for
signing/verification and encrypting/decrypting for a while now - it's
the way that the old nbpg SoC project was going too),
On Mon, May 11, 2009 at 10:32:30AM -0400, Perry E. Metzger wrote:
| The only thing I will directly advocate for (besides scrapping the
| current UI) is something like the ssh-agent functionality. It is painful
| having to type in your passphrase for every email message you read,
| every
Simon Burge sim...@netbsd.org writes:
Perry E. Metzger wrote:
[ ... ] Encrypted swap should
be the default -- either using cgd or by simply encrypting the blocks as
they go in and out without using the cgd layer.
You've benchmarked the effect of this, especially on older hardware?
No, but
On Sat, May 09, 2009 at 03:46:28AM +0100, Alistair Crooks wrote:
[...] since there's no way of changing a PGP passphrase
short of generating a new key.
Huh? Sure, you have a need to deal with keyring copies from before
the change, maybe with some more rm -P and its limtations, but
otherwise,
On Mon, May 11, 2009 at 02:55:03AM +0100, Alistair Crooks wrote:
On Mon, May 11, 2009 at 11:09:40AM +1000, Daniel Carosone wrote:
On Sat, May 09, 2009 at 03:46:28AM +0100, Alistair Crooks wrote:
[...] since there's no way of changing a PGP passphrase
short of generating a new key.
On Mon, May 11, 2009 at 12:11:03PM +1000, Daniel Carosone wrote:
On Mon, May 11, 2009 at 02:55:03AM +0100, Alistair Crooks wrote:
On Mon, May 11, 2009 at 11:09:40AM +1000, Daniel Carosone wrote:
On Sat, May 09, 2009 at 03:46:28AM +0100, Alistair Crooks wrote:
[...] since there's no
On Wed, May 06, 2009 at 12:57:06PM +0200, Klaus Klein wrote:
On Tue, May 05, 2009 at 11:38:36PM +, David Holland wrote:
On Wed, May 06, 2009 at 12:33:00AM +0100, Alistair Crooks wrote:
Imagine someone embedding this library in their (embedded) product.
Having the library dump core
On Wed, May 06, 2009 at 03:52:15PM +0100, Alistair Crooks wrote:
You're right, if you believe that the failure of a runtime check for
the length of time_t being greater than or equal to 4 bytes is
sufficient to abort an application.
...which can and should be a compile-time assertion.
Joerg
On Wed, May 06, 2009 at 06:47:37PM +0200, Joerg Sonnenberger wrote:
On Wed, May 06, 2009 at 03:52:15PM +0100, Alistair Crooks wrote:
You're right, if you believe that the failure of a runtime check for
the length of time_t being greater than or equal to 4 bytes is
sufficient to abort an
82 matches
Mail list logo