if (slen <= 0) break;
if (acutest_verbose_level_ >= 3) printf("%s - Read %p (%zu)\n", __FUNCTION__, preq, (size_t)slen);
+
+ /*
+ * Coverity considers data read from a file to be tainted,
+ * and considers its use to be a defect--but almost all the
+ * rest of the loop validates the pointer to the extent
+ * possible--all of the pointer should be read, its talloc
+ * "dynamic type" had better be right, and it should either
+ * be freed or have a statethe demuxer can handle or ignore.
+ * This isn't like a range check on a numeric value;
+ * Coverity doesn't recognize it as validation.
+ */
TEST_CHECK(slen == sizeof(preq));
talloc_get_type_abort(preq, test_proto_request_t);