[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #17868 [Core Tor/Tor]: base64_decode_nopad() destination buffer length problem
#17868: base64_decode_nopad() destination buffer length problem
-----------------------------+------------------------------------
Reporter: dgoulet | Owner: nikkolasg
Type: defect | Status: needs_revision
Priority: Medium | Milestone: Tor: 0.3.1.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: review-group-12 | Actual Points:
Parent ID: #19531 | Points: 2
Reviewer: dgoulet | Sponsor: SponsorR-can
-----------------------------+------------------------------------
Comment (by catalyst):
Further findings:
* Nothing besides test code currently calls `base64_decode_nopad()`
* `base64_decode_nopad()` probably has no reason to exist if
`base64_decode()` is sufficiently lenient
[moved comment from parent ticket]
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17868#comment:40>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs