Calin Juravle 85c5202a64 Fix broken pointer overflow check ns_name_unpack()
Many compilers may optimize away the overflow check `msg + l < msg',
where `msg' is a pointer and `l' is an integer, because pointer
overflow is undefined behavior in C.

Use a safe precondition test `l >= eom - msg' instead.
Bug: 13219633

Change-Id: I3fca2125834073cc36d7e9c4e586e97842265a59
2014-03-06 18:39:29 +00:00
..
2014-02-11 22:16:04 -08:00
2014-02-21 14:30:18 -08:00
2014-03-04 00:58:31 +00:00
2013-12-20 11:26:19 -08:00
2014-01-07 13:46:11 -08:00