summaryrefslogtreecommitdiffstats
path: root/PC/os2emx/getpathp.c
diff options
context:
space:
mode:
Diffstat (limited to 'PC/os2emx/getpathp.c')
-rw-r--r--PC/os2emx/getpathp.c13
1 files changed, 12 insertions, 1 deletions
diff --git a/PC/os2emx/getpathp.c b/PC/os2emx/getpathp.c
index 4a4c893..7bfd19e 100644
--- a/PC/os2emx/getpathp.c
+++ b/PC/os2emx/getpathp.c
@@ -132,7 +132,16 @@ ismodule(char *filename)
return 0;
}
-/* guarantees buffer will never overflow MAXPATHLEN+1 bytes */
+/* Add a path component, by appending stuff to buffer.
+ buffer must have at least MAXPATHLEN + 1 bytes allocated, and contain a
+ NUL-terminated string with no more than MAXPATHLEN characters (not counting
+ the trailing NUL). It's a fatal error if it contains a string longer than
+ that (callers must be careful!). If these requirements are met, it's
+ guaranteed that buffer will still be a NUL-terminated string with no more
+ than MAXPATHLEN characters at exit. If stuff is too long, only as much of
+ stuff as fits will be appended.
+*/
+
static void
join(char *buffer, char *stuff)
{
@@ -144,6 +153,8 @@ join(char *buffer, char *stuff)
if (n > 0 && !is_sep(buffer[n-1]) && n < MAXPATHLEN)
buffer[n++] = SEP;
}
+ if (n > MAXPATHLEN)
+ Py_FatalError("buffer overflow in getpathp.c's joinpath()");
k = strlen(stuff);
if (n + k > MAXPATHLEN)
k = MAXPATHLEN - n;