Karlson2k <k...@narod.ru> writes:

> Hi!
>
> First patch is direct fix for crash on Win64 (as result of invalid pointer
> casting), also fix possible crash on any platform with 
> sizeof(size_t) != sizeof(long).
> Second patch is similar fix for function that are not (yet) crashing.
> Third patch is some kind of optimization and protection for buffer overruns -
> once size of string is computed in any function, it will be reused in
> subsequent called internal functions.

Hi!  I am slowly returning to these emails.  I think I was finally able
to reproduce the problem you were seeing, and it was fixed in libidn
version 1.42:

https://lists.gnu.org/archive/html/help-libidn/2022-02/msg00000.html
https://lists.gnu.org/archive/html/help-libidn/2024-01/msg00000.html

I see that some of your patches were used but removed when upgrading to
version 1.42:

https://github.com/msys2/MINGW-packages/commit/9ddd87aeb6df905cf825c3624e9bd614515bc5f1

Are there any remaining concerns using libidn on Windows?  We now build
it in various configurations in GitLab CI/CD for Windows, so I'm hoping
all of these problems are gone.

/Simon

Attachment: signature.asc
Description: PGP signature

  • [PA... Karlson2k
    • ... Karlson2k
    • ... Karlson2k
    • ... Karlson2k
    • ... Karlson2k
    • ... Discussion list for GNU Internationalized Domain Name library (Libidn)

Reply via email to