pugixml/src
Arseny Kapoulkine 38edf255ae Work around -fsanitize=integer issues
Integer sanitizer is flagging unsigned integer overflow in several
functions in pugixml; unsigned integer overflow is well defined but it
may not necessarily be intended.

Apart from hash functions, both string_to_integer and integer_to_string
use unsigned overflow - string_to_integer uses it to perform
two-complement negation so that the bulk of the operation can run using
unsigned integers. This makes it possible to simplify overflow checking.
Similarly integer_to_string negates the number before generating a
decimal representation, but negating is impossible without unsigned
overflow or special-casing certain integer limits.

For now just silence the integer overflow using a special attribute;
also move unsigned overflow into string_to_integer from get_value_* so
that we have fewer functions marked with the attribute.

Fixes #133.
2017-04-03 23:35:24 -07:00
..
pugiconfig.hpp Update copyright year to 2017 2017-01-26 20:12:06 -08:00
pugixml.cpp Work around -fsanitize=integer issues 2017-04-03 23:35:24 -07:00
pugixml.hpp Update copyright year to 2017 2017-01-26 20:12:06 -08:00