From ce0a7cadadb973216399e70d3a69f352b0843deb Mon Sep 17 00:00:00 2001 From: Pauli Date: Wed, 2 Nov 2022 12:20:16 +1100 Subject: [PATCH] Coverity 1516624: Fix overrun memory access. Not possible to hit but good to address. Reviewed-by: Hugo Landau Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/19576) --- test/punycode_test.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/test/punycode_test.c b/test/punycode_test.c index 113d04b7a98..9d8171346ca 100644 --- a/test/punycode_test.c +++ b/test/punycode_test.c @@ -154,7 +154,7 @@ static int test_punycode(int n) if (!TEST_true(ossl_punycode_decode(tc->encoded, strlen(tc->encoded), buffer, &bsize))) return 0; - for (i = 0; i < sizeof(tc->raw); i++) + for (i = 0; i < OSSL_NELEM(tc->raw); i++) if (tc->raw[i] == 0) break; if (!TEST_mem_eq(buffer, bsize * sizeof(*buffer), -- 2.47.3