[gnutls-devel] GnuTLS | Fix coverity in lib/ (!1092)

Development of GNU's TLS library gnutls-devel at lists.gnutls.org
Sat Oct 12 17:35:04 CEST 2019




Tim Rühsen commented on a discussion on lib/str.c: https://gitlab.com/gnutls/gnutls/merge_requests/1092#note_229640804

>  
>  	while (pos < dest->length) {
>  		if (dest->data[pos] == '%') {
> -			char b[3];
> -			unsigned int u;
>  			unsigned char x;
>  
> -			b[0] = dest->data[pos + 1];
> -			b[1] = dest->data[pos + 2];
> -			b[2] = 0;
> -
> -			sscanf(b, "%02x", &u);
> -
> -			x = u;
> +			hex_decode((char *) dest->data + pos + 1, 2, &x, 1);

`hex_decode` is used by `gnutls_hex_decode2` and `gnutls_hex_decode` which are used at several places.

The function `_gnutls_buffer_unescape()` itself seems to be suboptimal, under worst circumstances it has a O(n^2) behavior. Technically better would be a `_gnutls_buffer_append_unescape()` which unescapes the input while adding it to the buffer (would fit since there also is `_gnutls_buffer_append_escape()`).

I prefer a unit test that tests the corner cases like incomplete/invalid escape sequences. Since that is not much, what existing unit test C file should it go into ? Also the old code adds random bytes if the escape sequence isn't valid (if sscanf() fails). What should we do if the input has e.g. something like `%Z` or `%aZ`. I suggest that we don't touch the sequence in such cases.

-- 
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/merge_requests/1092#note_229640804
You're receiving this email because of your account on gitlab.com.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20191012/53a8b533/attachment.html>


More information about the Gnutls-devel mailing list