It's UWAweek 47

help3007

This forum is provided to promote discussion amongst students enrolled in CITS3007 Secure Coding. If posting a question, it's suggested you check first whether your question is answered in the unit Frequently Asked Questions (FAQ) list, and use the search box (on the right) to see if an answer to your question has already been posted.

Please consider offering answers and suggestions to help other students! And if you fix a problem by following a suggestion here, it would be great if other interested students could see a short "Great, fixed it!"  followup message.

Note that any posts must comply with the UWA Code of Conduct and the UWA Academic Conduct Policy. That means you should (a) treat everyone with respect and courtesy, and (b) not post your solutions to an assessment that's in progress.

If asking a programming question, it's recommended you read How do I ask a good question? If reporting or troubleshooting a bug in software used in the unit, it's recommend you read How to report bugs effectively.
Displaying the 3 articles in this topic
Showing 3 of 170 articles.
Currently 36 other people reading this forum.


 UWA week 21 (1st semester, week 12) ↓
SVG not supported

Login to reply

👍x1
helpful

Hoping to get some clarification as to how we should be handling cases where an out of range int is passed into the caesar functions.
>From crypto.h, we know that a precondition of `key` is that it must fall within the range of `(range_low - range_high)` to `(range_high - range_low)`.
If a value which exceeds this range is passed into the cli (e.g. cli(argv[0],"caesar-encrypt","52","HELLO"), would it be acceptable to mod this value by the range so that the operation is still performed (which is consistent with many of the online implementations referenced in the spec) or do we reject it on the basis of having an out of range key? Apologies if this has already been answered. Thanks!


SVG not supported

Login to reply

👍?
helpful

Yes, this has already been answered.

ANONYMOUS wrote:

Hoping to get some clarification as to how we should be handling cases where an out of range int is passed into the caesar functions.

From crypto.h, we know that a precondition of key is that it must fall within the range of (range_low - range_high) to (range_high - range_low).

If a value which exceeds this range is passed into the cli (e.g. cli(argv[0],"caesar-encrypt","52","HELLO"), would it be acceptable to mod this value by the range so that the operation is still performed (which is consistent with many of the online implementations referenced in the spec) or do we reject it on the basis of having an out of range key?

Apologies if this has already been answered.

Thanks!


SVG not supported

Login to reply

👍?
helpful

Would you be willing to restate the answer, or link the previously given response? I've made an honest effort to look through the help forum, but there's only so many vaguely titled articles I can trawl through before losing my mind. Thanks

The University of Western Australia

Computer Science and Software Engineering

CRICOS Code: 00126G
Written by [email protected]
Powered by history
Feedback always welcome - it makes our software better!
Last modified  8:08AM Aug 25 2024
Privacy policy