Project

General

Profile

Actions

Feature #2565

closed

verify hex key sizes read from DB

Added by neels over 6 years ago. Updated over 4 years ago.

Status:
Resolved
Priority:
Normal
Assignee:
Target version:
-
Start date:
10/10/2017
Due date:
% Done:

100%

Spec Reference:

Description

currently, osmo-hlr reads auth data from the DB as strings and uses osmo_hexparse() without verifying the resulting size.
Write a test suite and make sure wrong key sizes are complained about and error handling is in place.

Note that there is a code snippet #if'd out in db_auc.c:

               aud2g->algo = sqlite3_column_int(stmt, 1);
               ki = sqlite3_column_text(stmt, 2);
#if 0
               if (sqlite3_column_bytes(stmt, 2) != sizeof(aud2g->u.gsm.ki)) {
                       LOGAUC(imsi, LOGL_ERROR, "Error reading Ki: %d\n", rc);
                       goto end_2g;
               }
#endif
Actions #1

Updated by laforge over 4 years ago

  • Assignee set to osmith
Actions #2

Updated by osmith over 4 years ago

  • Status changed from New to In Progress
Actions #3

Updated by osmith over 4 years ago

  • % Done changed from 0 to 90
Actions #4

Updated by osmith over 4 years ago

  • Status changed from In Progress to Resolved
  • % Done changed from 90 to 100
Actions

Also available in: Atom PDF

Add picture from clipboard (Maximum size: 48.8 MB)