Coverity complained about "overflow_before_widen" because
there is a theoretical overflow that can happen even though
the target value is wide enough. For useful values of max_days
this is irrelevant but Coverity is not wrong, so change the
code accordingly.
Change-Id: Ie7308d549182a95b86cd113e4a8cc65ff45ba3d7
Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com>
Acked-by: Gert Doering <gert@greenie.muc.de>
Gerrit URL: https://gerrit.openvpn.net/c/openvpn/+/1385
Message-Id: <
20251122162553.12254-1-gert@greenie.muc.de>
URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg34585.html
Signed-off-by: Gert Doering <gert@greenie.muc.de>
int64_t timestamp;
memcpy(×tamp, metadata + 1, sizeof(int64_t));
timestamp = (int64_t)ntohll((uint64_t)timestamp);
- int64_t max_age_in_seconds = max_days * 24 * 60 * 60;
+ int64_t max_age_in_seconds = (int64_t)max_days * 24 * 60 * 60;
if (now - timestamp > max_age_in_seconds)
{
msg(M_WARN, "ERROR: Client key is too old.");