[tor-bugs] #17868 [Core Tor/Tor]: base64_decode_nopad() destination buffer length problem
Tor Bug Tracker & Wiki
blackhole at torproject.org
Thu May 26 18:23:56 UTC 2016
#17868: base64_decode_nopad() destination buffer length problem
--------------------------+------------------------------------
Reporter: dgoulet | Owner: nikkolasg
Type: defect | Status: needs_revision
Priority: Medium | Milestone: Tor: 0.2.9.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points: 0.1
Reviewer: dgoulet | Sponsor: SponsorR-can
--------------------------+------------------------------------
Changes (by dgoulet):
* parent: #16943 =>
Comment:
Oh, this one is orthogonal to #16943. Yes it would be great to have it
before so we don't have to explicitly add two bytes to all of our base64
decoded buffer but ultimately it won't change the behavior.
Removing it as a child of #16943.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17868#comment:12>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list