[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #17868 [Core Tor/Tor]: base64_decode_nopad() destination buffer length problem



#17868: base64_decode_nopad() destination buffer length problem
-----------------------------+------------------------------------
 Reporter:  dgoulet          |          Owner:  nikkolasg
     Type:  defect           |         Status:  needs_revision
 Priority:  Medium           |      Milestone:  Tor: 0.3.1.x-final
Component:  Core Tor/Tor     |        Version:
 Severity:  Normal           |     Resolution:
 Keywords:  review-group-12  |  Actual Points:
Parent ID:  #19531           |         Points:  2
 Reviewer:  dgoulet          |        Sponsor:  SponsorR-can
-----------------------------+------------------------------------

Comment (by catalyst):

 Further findings:
 * Nothing besides test code currently calls `base64_decode_nopad()`
 * `base64_decode_nopad()` probably has no reason to exist if
 `base64_decode()` is sufficiently lenient

 [moved comment from parent ticket]

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17868#comment:40>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs