chunk->datalen += read_result;
log_debug(LD_NET,"Read %ld bytes. %d on inbuf.", (long)read_result,
(int)buf->datalen);
- tor_assert(read_result <= INT_MAX - 1);
+ tor_assert(read_result <= BUF_MAX_LEN);
return (int)read_result;
}
}
tor_assert(reached_eof);
tor_assert(SOCKET_OK(fd));
- if (BUG(buf->datalen > INT_MAX - 1))
+ if (BUG(buf->datalen > BUF_MAX_LEN))
return -1;
- if (BUG(buf->datalen > INT_MAX - 1 - at_most))
+ if (BUG(buf->datalen > BUF_MAX_LEN - at_most))
return -1;
while (at_most > total_read) {
check();
if (r < 0)
return r; /* Error */
- tor_assert(total_read+r <= INT_MAX - 1);
+ tor_assert(total_read+r <= BUF_MAX_LEN);
total_read += r;
if ((size_t)r < readlen) { /* eof, block, or no more to read. */
break;
} else {
*buf_flushlen -= write_result;
buf_drain(buf, write_result);
- tor_assert(write_result <= INT_MAX - 1);
+ tor_assert(write_result <= BUF_MAX_LEN);
return (int)write_result;
}
}
if (r == 0 || (size_t)r < flushlen0) /* can't flush any more now. */
break;
}
- tor_assert(flushed <= INT_MAX - 1);
+ tor_assert(flushed <= BUF_MAX_LEN);
return (int)flushed;
}
check_no_tls_errors();
- IF_BUG_ONCE(buf->datalen > INT_MAX - 1)
+ IF_BUG_ONCE(buf->datalen > BUF_MAX_LEN)
return TOR_TLS_ERROR_MISC;
- IF_BUG_ONCE(buf->datalen > INT_MAX - 1 - at_most)
+ IF_BUG_ONCE(buf->datalen > BUF_MAX_LEN - at_most)
return TOR_TLS_ERROR_MISC;
while (at_most > total_read) {
r = read_to_chunk_tls(buf, chunk, tls, readlen);
if (r < 0)
return r; /* Error */
- tor_assert(total_read+r <= INT_MAX - 1);
+ tor_assert(total_read+r <= BUF_MAX_LEN);
total_read += r;
if ((size_t)r < readlen) /* eof, block, or no more to read. */
break;
if (r == 0) /* Can't flush any more now. */
break;
} while (sz > 0);
- tor_assert(flushed <= INT_MAX - 1);
+ tor_assert(flushed <= BUF_MAX_LEN);
return (int)flushed;
}