args->flags)) < 0)
goto cleanup;
+ if (nsecrets > REMOTE_SECRET_LIST_MAX) {
+ virReportError(VIR_ERR_RPC,
+ _("Too many secrets '%d' for limit '%d'"),
+ nsecrets, REMOTE_SECRET_LIST_MAX);
+ goto cleanup;
+ }
+
if (secrets && nsecrets) {
if (VIR_ALLOC_N(ret->secrets.secrets_val, nsecrets) < 0)
goto cleanup;
(char *) &ret) == -1)
goto done;
+ if (ret.secrets.secrets_len > REMOTE_SECRET_LIST_MAX) {
+ virReportError(VIR_ERR_RPC,
+ _("Too many secrets '%d' for limit '%d'"),
+ ret.secrets.secrets_len, REMOTE_SECRET_LIST_MAX);
+ goto cleanup;
+ }
+
if (secrets) {
if (VIR_ALLOC_N(tmp_secrets, ret.secrets.secrets_len + 1) < 0)
goto cleanup;
/*
* Upper limit on list of secrets.
*/
-const REMOTE_SECRET_UUID_LIST_MAX = 16384;
+const REMOTE_SECRET_LIST_MAX = 16384;
/*
* Upper limit on list of CPUs accepted when computing a baseline CPU.
};
struct remote_connect_list_secrets_ret {
- remote_nonnull_string uuids<REMOTE_SECRET_UUID_LIST_MAX>; /* insert@1 */
+ remote_nonnull_string uuids<REMOTE_SECRET_LIST_MAX>; /* insert@1 */
};
struct remote_secret_lookup_by_uuid_args {
};
struct remote_connect_list_all_secrets_ret {
- remote_nonnull_secret secrets<>;
+ remote_nonnull_secret secrets<REMOTE_SECRET_LIST_MAX>;
unsigned int ret;
};