From e7387f7557ae3bde7e4b75befedd88ee04913b49 Mon Sep 17 00:00:00 2001 From: Yang Tse Date: Wed, 17 Oct 2007 18:06:32 +0000 Subject: [PATCH] Fix overflow detection, thanks to Patrick Monnerat detecting test failure condition: http://curl.haxx.se/mail/lib-2007-10/0152.html --- lib/url.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/lib/url.c b/lib/url.c index eab1d6d55..35d2d046b 100644 --- a/lib/url.c +++ b/lib/url.c @@ -1039,8 +1039,9 @@ CURLcode Curl_setopt(struct SessionHandle *data, CURLoption option, * Check that request length does not overflow the size_t type. */ - if ((data->set.postfieldsize < 0) || - (data->set.postfieldsize > (curl_off_t)((size_t)-1))) + if ((sizeof(curl_off_t) != sizeof(size_t)) && + ((data->set.postfieldsize < 0) || + (data->set.postfieldsize > (curl_off_t)((size_t)-1)))) result = CURLE_OUT_OF_MEMORY; else { char * p; -- 2.40.0