d696e7d91e
In `read_next_b64_code()`, the result of fgetc() is stored into a char, but later compared against EOF, which is generally -1. On platforms where char is unsigned, this generates a compiler warning/error that the comparison will never be true (causing a build failure). The value will never match, with the function ultimately bailing with a "Too many bad symbols are detected" error. On platforms with signed char, EOF is detected, but a file containing a 0xFF character will causes a premature end of file exit of the loop. Fix this by changing the result to an int. Fixes #3794. Signed-off-by: Nayna Jain <nayna@linux.ibm.com> Signed-off-by: David Brown <david.brown@linaro.org> |
||
---|---|---|
.. | ||
00README.md | ||
_GNU_SOURCE-redefined.txt | ||
add-aes-ecb-to-psa.txt | ||
add_cipher_transparent_driver.txt | ||
add_sign_verify_keygen_transparent_driver.txt | ||
adjusting sliding_window_size_PR3592.txt | ||
android-socklen_t.txt | ||
bugfix_3524.txt | ||
bugfix_3794.txt | ||
bugfix_PR3294.txt | ||
fix-rsa-blinding.txt | ||
psa_error_invalid_argument_for_invalid_cipher_input_sizes.txt |