I wonder if it's worth adding a delta with debian for this strncmp() fix, though.
The upstream patch switches to strcmp(), arguing that these buffers are always null terminated. In that case, even the incorrect size_t parameter for strncmp() (source of the warning) won't matter, as the comparison will always stop at the \0.
I wonder if it's worth adding a delta with debian for this strncmp() fix, though.
The upstream patch switches to strcmp(), arguing that these buffers are always null terminated. In that case, even the incorrect size_t parameter for strncmp() (source of the warning) won't matter, as the comparison will always stop at the \0.