src: ccm cipher update with zero-length dataView#62343
src: ccm cipher update with zero-length dataView#62343mertcanaltin wants to merge 1 commit intonodejs:mainfrom
Conversation
664507a to
88f8f03
Compare
Codecov Report❌ Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #62343 +/- ##
==========================================
- Coverage 91.60% 89.68% -1.92%
==========================================
Files 337 676 +339
Lines 140741 206692 +65951
Branches 21797 39585 +17788
==========================================
+ Hits 128923 185378 +56455
- Misses 11594 13445 +1851
- Partials 224 7869 +7645
🚀 New features to boost your workflow:
|
panva
left a comment
There was a problem hiding this comment.
With ArrayBufferViewContents being used broadly throughout node's codebase I wonder if we can be sure this is entirely without side effects. I cannot assess that.
That being said, it does fix the particular node:crypto issue reported.
I went through all 19 files that use ArrayBufferViewContents, every usage passes data() alongside length(), and none dereferences the pointer when length is 0. Currently data_ can already be null in this scenario, this fix just ensures it's a valid pointer instead, so it's strictly safer than the current behavior. |
Very well, can you update the commit message to |
added fallback stack_storage for null scenario
for:#62342