diff options
author | Daniel Kahn Gillmor <[email protected]> | 2019-07-24 23:26:10 +0000 |
---|---|---|
committer | Daniel Kahn Gillmor <[email protected]> | 2019-07-24 23:56:23 +0000 |
commit | efffd9907b7501323bae89ae515bc26312aaab15 (patch) | |
tree | bf368c19e76802b0b9cd9ca34fd365b4241fef18 /tools/wks-receive.c | |
parent | gpg,gpgsm: Handle pkdecrypt responses with or without NUL terminators (diff) | |
download | gnupg-dkg-fix-T4652.tar.gz gnupg-dkg-fix-T4652.zip |
agent: Do not place a trailing NUL byte on S-expressionsdkg-fix-T4652
* agent/pkdecrypt.c (agent_pkdecrypt): Avoid appending a trailing NUL
byte at the end of the generated S-expression.
--
In many cases, a canonical S-expression may have an embedded NUL
anyway (especially if it contains raw cryptographic key material or
other high-entropy bytestrings), so trying to treat a canonical
S-expression as a C string is likely to be dangerous -- better to not
leave any such expectations.
With the previous commit addressing the otherwise brittle consumers of
pkdecrypt, this should now be safe to do.
GnuPG-bug-id: 4652
Signed-off-by: Daniel Kahn Gillmor <[email protected]>
Diffstat (limited to 'tools/wks-receive.c')
0 files changed, 0 insertions, 0 deletions