(/home/sate/Testcases/c/cve/wireshark-1.2.0/epan/uat_load.c) |
| |
| 1758 | | | YY_BUFFER_STATE uat_load__scan_buffer (char * base, yy_size_t size ) |
| 1759 | | | { |
| 1760 | | | YY_BUFFER_STATE b; |
| 1761 | | | |
| 1762 | | | if ( size < 2 || |
| 1763 | | | base[size-2] != YY_END_OF_BUFFER_CHAR || |
| 1764 | | | base[size-1] != YY_END_OF_BUFFER_CHAR ) |
| 1765 | | | |
| 1766 | | | return 0; |
| 1767 | | | |
| 1768 | | | b = (YY_BUFFER_STATE) uat_load_alloc(sizeof( struct yy_buffer_state ) ); |
Unreachable Call
The highlighted code will not execute under any circumstances. This may be because of: |
|
| 1769 | | | if ( ! b ) |
| 1770 | | | YY_FATAL_ERROR( "out of dynamic memory in uat_load__scan_buffer()" ); |
| 1771 | | | |
| 1772 | | | b->yy_buf_size = size - 2; |
| 1773 | | | b->yy_buf_pos = b->yy_ch_buf = base; |
| 1774 | | | b->yy_is_our_buffer = 0; |
| 1775 | | | b->yy_input_file = 0; |
| 1776 | | | b->yy_n_chars = b->yy_buf_size; |
| 1777 | | | b->yy_is_interactive = 0; |
| 1778 | | | b->yy_at_bol = 1; |
| 1779 | | | b->yy_fill_buffer = 0; |
| 1780 | | | b->yy_buffer_status = YY_BUFFER_NEW; |
| 1781 | | | |
| 1782 | | | uat_load__switch_to_buffer(b ); |
| 1783 | | | |
| 1784 | | | return b; |
| 1785 | | | } |
| |