diff options
author | Anders Svensson <[email protected]> | 2015-02-12 11:41:59 +0100 |
---|---|---|
committer | Anders Svensson <[email protected]> | 2015-03-24 10:57:02 +0100 |
commit | 1590920c910c030369fbf871b63f6836b988e90a (patch) | |
tree | bf2b2f8e353f2f0a8f80196b3f143890e45f3482 /lib/diameter/src/.gitignore | |
parent | 75ee72b4e1d288b1d96194d0e352eb0c73db4a6f (diff) | |
download | otp-1590920c910c030369fbf871b63f6836b988e90a.tar.gz otp-1590920c910c030369fbf871b63f6836b988e90a.tar.bz2 otp-1590920c910c030369fbf871b63f6836b988e90a.zip |
Add service_opt() string_decode
To control whether stringish Diameter types are decoded to string or
left as binary. The motivation is the same as in the parent commit: to
avoid large strings being copied when incoming Diameter messages are
passed between processes; or *if* in the case of messages destined for
handle_request and handle_answer callbacks, since these are decoded in
the dedicated processes that the callbacks take place in. It would be
possible to do something about other messages without requiring an
option, but disabling the decode is the most effective.
The value is a boolean(), true being the default for backwards
compatibility. Setting false causes both diameter_caps records and
decoded messages to contain binary() in relevant places that previously
had string(): diameter_app(3) callbacks need to be prepared for the
change.
The Diameter types affected are OctetString and the derived types that
can contain arbitrarily large values: OctetString, UTF8String,
DiameterIdentity, DiameterURI, IPFilterRule, and QoSFilterRule. Time and
Address are unaffected.
The DiameterURI decode has been redone using re(3), which both
simplifies and does away with a vulnerability resulting from the
conversion of arbitrary strings to atom.
The solution continues the use and abuse of the process dictionary for
encode/decode purposes, last seen in commit 0f9cdba.
Diffstat (limited to 'lib/diameter/src/.gitignore')
0 files changed, 0 insertions, 0 deletions