diff options
author | Nick Mathewson <nickm@torproject.org> | 2012-04-19 17:13:47 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2012-04-19 17:13:47 -0400 |
commit | f2384d5e2c25469038caa84e0dedaa5e2efca29c (patch) | |
tree | a26859675d34bd09566dbab44fcd724ea0d8ec0e /README | |
parent | bd7724a57eeb756232f5be222c643ccb8b364966 (diff) | |
download | tor-f2384d5e2c25469038caa84e0dedaa5e2efca29c.tar.gz tor-f2384d5e2c25469038caa84e0dedaa5e2efca29c.zip |
Make base64_decode in rend_parse_client_keys more foolproof
In general, whenever we can, we should be doing
base64_decode(buf, sizeof(buf), s, strlen(s)),
and not
base_64_decode(buf, expr1, s, expr2)
where we hope that expr1 is a good name for the size of buf and expr2
is a good formula for the length of the base64 expression in s.
Diffstat (limited to 'README')
0 files changed, 0 insertions, 0 deletions