(/home/sate/Testcases/c/cve/wireshark-1.2.0/epan/dtd_preparse.c) |
| |
| 1694 | | | YY_BUFFER_STATE Dtd_PreParse__scan_buffer (char * base, yy_size_t size ) |
| 1695 | | | { |
| 1696 | | | YY_BUFFER_STATE b; |
| 1697 | | | |
| 1698 | | | if ( size < 2 || |
| 1699 | | | base[size-2] != YY_END_OF_BUFFER_CHAR || |
| 1700 | | | base[size-1] != YY_END_OF_BUFFER_CHAR ) |
| 1701 | | | |
| 1702 | | | return 0; |
| 1703 | | | |
| 1704 | | | b = (YY_BUFFER_STATE) Dtd_PreParse_alloc(sizeof( struct yy_buffer_state ) ); |
Unreachable Call
The highlighted code will not execute under any circumstances. This may be because of: |
|
| 1705 | | | if ( ! b ) |
| 1706 | | | YY_FATAL_ERROR( "out of dynamic memory in Dtd_PreParse__scan_buffer()" ); |
| 1707 | | | |
| 1708 | | | b->yy_buf_size = size - 2; |
| 1709 | | | b->yy_buf_pos = b->yy_ch_buf = base; |
| 1710 | | | b->yy_is_our_buffer = 0; |
| 1711 | | | b->yy_input_file = 0; |
| 1712 | | | b->yy_n_chars = b->yy_buf_size; |
| 1713 | | | b->yy_is_interactive = 0; |
| 1714 | | | b->yy_at_bol = 1; |
| 1715 | | | b->yy_fill_buffer = 0; |
| 1716 | | | b->yy_buffer_status = YY_BUFFER_NEW; |
| 1717 | | | |
| 1718 | | | Dtd_PreParse__switch_to_buffer(b ); |
| 1719 | | | |
| 1720 | | | return b; |
| 1721 | | | } |
| |