[tor-bugs] #6765 [Tor Client]: Defensive programming: Use tor_malloc_zero() in var_cell_new()
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Wed Sep 5 22:23:40 UTC 2012
#6765: Defensive programming: Use tor_malloc_zero() in var_cell_new()
------------------------+---------------------------------------------------
Reporter: asn | Owner:
Type: defect | Status: needs_review
Priority: normal | Milestone: Tor: 0.2.4.x-final
Component: Tor Client | Version:
Keywords: | Parent:
Points: | Actualpoints:
------------------------+---------------------------------------------------
Changes (by asn):
* status: new => needs_review
Comment:
Replying to [comment:1 nickm]:
> I think I was initially concerned here about losing efficiency. But
we're going to encrypt these things anyway: memset() is amazingly cheap
compared to even the fastest TLS.
That's what I think too.
Please see branch `bug6765` in
`https://git.torproject.org/user/asn/tor.git`.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/6765#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list