http://bugzilla.spamassassin.org/show_bug.cgi?id=3780
[EMAIL PROTECTED] changed:
What |Removed |Added
----------------------------------------------------------------------------
CC|[email protected] |
AssignedTo|[EMAIL PROTECTED] |[email protected]
Target Milestone|Future |3.1.0
------- Additional Comments From [EMAIL PROTECTED] 2005-03-06 00:12 -------
reassigning to dev and moving to 3.1 queue.
it looks like I already put in a patch to semi-address the request, but there
are some remaining "issues" if someone wants to deal with them.
from looking at the code, Util::base64_decode() will only return a certain
number of decoded bytes. if the base64 is formed correctly, the raw scalar is
trimmed down to the appropriate number of bytes, and is then decoded and the
appropriate number of bytes returned. if the base64 is not formed correctly,
the raw scalar is fully decoded, then the appropriate number of bytes returned.
so the thing that's left is that to decode a part, a copy is made of the raw
data, and that's passed into base64_decode. so you get a bit of a memory suck
there. what you could do is pass in the reference to the raw data array, then
have base64_decode only copy if malformed, and generate a minimal "to decode"
scalar otherwise.
but it's kind of a pain, and I still don't think this is really necessary. but
YMMV. :)
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
You are on the CC list for the bug, or are watching someone who is.