[tor-bugs] #17868 [Core Tor/Tor]: base64_decode_nopad() destination buffer length problem
Tor Bug Tracker & Wiki
blackhole at torproject.org
Sun Aug 7 18:52:35 UTC 2016
#17868: base64_decode_nopad() destination buffer length problem
--------------------------------------------+------------------------------
Reporter: dgoulet | Owner: nikkolasg
Type: defect | Status:
Priority: Medium | needs_revision
Component: Core Tor/Tor | Milestone: Tor:
Severity: Normal | 0.2.9.x-final
Keywords: review-group-4, review-group-6 | Version:
Parent ID: | Resolution:
Reviewer: dgoulet | Actual Points:
| Points: 0.1
| Sponsor: SponsorR-can
--------------------------------------------+------------------------------
Comment (by nikkolasg):
In order to make it API consistent, I had to change also the
`base64_encode{_nopad}` structure. That way, it's possible to use the size
given by `base64_encode_size` (before, `base64_encode` used implicitely
the `base64_encode_size` in both cases). See the tests in
`test_util_format_base64_encode_size{_nopad}` which test the "full API
from a-to-z".
There's a few inconsistencies I did not solve right here (but it's easily
resolvable):
* `base64_encode_nopad` does not take any flags parameters while we have
now a `base64_encode_size_nopad` with a flag parameter.
* `base64_encode` expects `char *` but `base64_encode_nopad` expects
`uint8_t *`.
You can find the branch `base64_nopad` in my github repo
[https://github.com/nikkolasg/tor/tree/base64_nopad]
Ask for a patch if preferable.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17868#comment:27>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list