diff options
author | tb <> | 2022-08-10 16:51:26 +0000 |
---|---|---|
committer | tb <> | 2022-08-10 16:51:26 +0000 |
commit | f2180ecff31e646ade77376f9c1694e54f7f8d32 (patch) | |
tree | 1fe6fb883559ad685757c640bcbb34f9b507b7d8 /src/lib/libcrypto/dsa/dsa_gen.c | |
parent | 07a8d75b5ae234230be00fa0617d05fd80787b7a (diff) | |
download | openbsd-f2180ecff31e646ade77376f9c1694e54f7f8d32.tar.gz openbsd-f2180ecff31e646ade77376f9c1694e54f7f8d32.tar.bz2 openbsd-f2180ecff31e646ade77376f9c1694e54f7f8d32.zip |
Avoid signed integer overflow due to unary negation
The current X509_print_ex() tries too hard pretty printing negative
serialNumbers (which shouldn't occur in the first place). In particular,
negating LONG_MAX leads to signed overflow. Ditch the code dealing with
negative serialNumbers representable as long and fall back to the long
form printing. This simplifies the code and fixes
oss-fuzz #49944
with/ok jsing
Diffstat (limited to 'src/lib/libcrypto/dsa/dsa_gen.c')
0 files changed, 0 insertions, 0 deletions