Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Avoid buffer overflow during hex<->base32 conversion #164

Merged
merged 2 commits into from
Oct 5, 2016

Conversation

szszszsz
Copy link
Member

@szszszsz szszszsz commented Oct 5, 2016

Issue #155
Tested on Ubuntu 16.04
Nitrokey Storage v0.43

Code cleanup. Check conditions earlier on function code

Signed-off-by: Szczepan Zalega <szczepan@nitrokey.com>
Set maximum secret length field depending on chosen secret format
Clear buffers before use

Signed-off-by: Szczepan Zalega <szczepan@nitrokey.com>
@szszszsz szszszsz merged commit f440157 into master Oct 5, 2016
@szszszsz szszszsz deleted the 155-buffer_overflow branch October 5, 2016 20:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant