From d4d87d7eada1b69674ece975f14db942c6de1cae Mon Sep 17 00:00:00 2001 From: Daniel Stenberg Date: Sun, 3 Apr 2016 10:46:36 +0200 Subject: unit1604: fix snprintf follow-up to 0326b06 sizeof(pointer) is no good for the buffer size! Reported-by: Viktor Szakats --- tests/unit/unit1604.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'tests/unit/unit1604.c') diff --git a/tests/unit/unit1604.c b/tests/unit/unit1604.c index 3fb9636ee..242be0005 100644 --- a/tests/unit/unit1604.c +++ b/tests/unit/unit1604.c @@ -45,7 +45,7 @@ static void unit_stop(void) static char *getflagstr(int flags) { char *buf = malloc(256); fail_unless(buf, "out of memory"); - snprintf(buf, sizeof(buf), "%s,%s,%s,%s", + snprintf(buf, 256, "%s,%s,%s,%s", ((flags & SANITIZE_ALLOW_COLONS) ? "SANITIZE_ALLOW_COLONS" : ""), ((flags & SANITIZE_ALLOW_PATH) ? "SANITIZE_ALLOW_PATH" : ""), ((flags & SANITIZE_ALLOW_RESERVED) ? "SANITIZE_ALLOW_RESERVED" : ""), @@ -56,7 +56,7 @@ static char *getflagstr(int flags) { static char *getcurlcodestr(int cc) { char *buf = malloc(256); fail_unless(buf, "out of memory"); - snprintf(buf, sizeof(buf), "%s (%d)", + snprintf(buf, 256, "%s (%d)", (cc == SANITIZE_ERR_OK ? "SANITIZE_ERR_OK" : cc == SANITIZE_ERR_BAD_ARGUMENT ? "SANITIZE_ERR_BAD_ARGUMENT" : cc == SANITIZE_ERR_INVALID_PATH ? "SANITIZE_ERR_INVALID_PATH" : -- cgit v1.2.3