The spec of the new method doesn't give me enough information to
determine whether it is safe to call it when the value of the length
argument is much larger than the number of bytes I expect to actually
read. This use case comes up frequently in security libraries, because
we have to handle length values that were chosen by an attacker. Would
it be possible to add a sentence or two to the spec to clarify this
situation?
Possible wording, if this method can be called with large length values:
"The total amount of memory allocated by this method is proportional to
the number of bytes read from the stream. Therefore, the method may be
safely called with very large values of {@code len}.
Possible wording, otherwise:
"The total amount of memory allocated by this method may be proportional
to the value of {@code len}. Therefore, calling this method with very
large values of {@code len} is not recommended."
On 1/17/2018 11:24 AM, Brian Burkhalter wrote:
The proposed change has been modified to replace the two methods
byte[] InputStream.readAllBytes(int) // reads at most ‘len’ bytes
byte[] InputStream.readNBytes(int) // reads exactly ‘len’ bytes or throws
IOException
with a single method
byte[] InputStream.readNBytes(int) // reads at most ‘len’ bytes
A negative value of ‘len’ will now cause an IllegalArgumentException instead of
an IndexOutOfBoundsException. Also some verbiage has been improved.
http://cr.openjdk.java.net/~bpb/8139206/webrev.01/
Thanks,
Brian
On Jan 16, 2018, at 11:17 AM, Brian Burkhalter <brian.burkhal...@oracle.com>
wrote:
https://bugs.openjdk.java.net/browse/JDK-8139206
http://cr.openjdk.java.net/~bpb/8139206/webrev.00/
This change would add a new method “byte[] InputStream.readNBytes(int len)”
which would read up to at most ‘len’ bytes from the stream and return them in
an internally allocated array.