@@ -53,7 +53,7 @@ func TestReaderBytes(t *testing.T) {
5353)
5454bytes , err := os .ReadFile (fileName )
5555require .NoError (t , err )
56- reader , err := FromBytes (bytes )
56+ reader , err := OpenBytes (bytes )
5757require .NoError (t , err , "unexpected error while opening bytes: %v" , err )
5858
5959checkMetadata (t , reader , ipVersion , recordSize )
@@ -1260,7 +1260,7 @@ func TestMetadataBuildTime(t *testing.T) {
12601260}
12611261
12621262func TestIntegerOverflowProtection (t * testing.T ) {
1263- // Test that FromBytes detects integer overflow in search tree size calculation
1263+ // Test that OpenBytes detects integer overflow in search tree size calculation
12641264t .Run ("NodeCount overflow protection" , func (t * testing.T ) {
12651265// Create metadata that would cause overflow: very large NodeCount
12661266// For a 64-bit system with RecordSize=32, this should trigger overflow
@@ -1289,14 +1289,14 @@ func TestIntegerOverflowProtection(t *testing.T) {
12891289
12901290// Since we can't easily create an invalid MMDB file that parses but has overflow values,
12911291// we test the core logic validation here and rely on integration tests
1292- // for the full FromBytes flow
1292+ // for the full OpenBytes flow
12931293
12941294if metadata .NodeCount > 0 && metadata .RecordSize > 0 {
12951295recordSizeQuarter := metadata .RecordSize / 4
12961296if recordSizeQuarter > 0 {
12971297maxNodes := ^ uint (0 ) / recordSizeQuarter
12981298if metadata .NodeCount > maxNodes {
1299- // This is what should happen in FromBytes
1299+ // This is what should happen in OpenBytes
13001300err := mmdberrors .NewInvalidDatabaseError ("database tree size would overflow" )
13011301assert .Equal (t , "database tree size would overflow" , err .Error ())
13021302}
0 commit comments