| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
| |
|
|
|
|
|
|
|
|
| |
of ckinv.
Pointed out and fix suggested by David Schrammel and Samuel Weiser
ok jsing
|
| |
|
|
|
|
|
|
|
|
| |
of kinv.
Pointed out and fix suggested by David Schrammel and Samuel Weiser
ok jsing
|
|
|
|
| |
for consistency with all the other X509_STORE_*(3) manual pages
|
|
|
|
|
| |
and add a sentence pointing to the detailed description
in RSA_get_ex_new_index(3), worded like in DH_get_ex_new_index(3).
|
| |
|
| |
|
|
|
|
| |
ok tb@
|
| |
|
| |
|
|
|
|
|
| |
Issue found by Guido Vranken <guidovranken@gmail.com>
ok tedu@ tb@
|
|
|
|
|
|
| |
fixes oss-fuzz #14558
ok beck jsing
|
|
|
|
|
|
|
|
|
| |
assigned from aesni_ccm_init_key() via CRYPTO_ccm128_init(), so it needs
to be copied over...
Pointed out by Guido Vranken.
ok jsing
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
Fixes COV-186146
ok tb, beck
|
|
|
|
|
|
|
|
|
| |
aesni_gcm_init_key() via CRYPTO_gcm128_init(), so it needs to be
copied over...
Fixes cryptofuzz issue #14352 and likely also #14374.
ok beck jsing
|
|
|
|
|
|
|
|
|
| |
that there is already a carry and Sigma[i-1] == -1, the carry
must be kept.
From Dmitry Eremin-Solenik.
Fixes incorrect Streebog result reported by Guido Vranken.
|
|
|
|
| |
ok beck@, tb@
|
|
|
|
|
|
|
|
|
| |
in CRYPTO_ccm128_tag(). Otherwise the caller might end up
using the part of the tag buffer that was left uninitialized.
Issue found by Guido Vranken.
ok inoguchi
|
|
|
|
|
|
|
|
| |
(same fix as in a_int.c rev 1.34)
Fixes oss-fuzz issue #13809
ok beck, jsing
|
|
|
|
|
|
| |
Fixes oss-fuzz issue #13804
ok beck, jsing
|
|
|
|
| |
ok jsing
|
|
|
|
| |
ok jsing
|
|
|
|
| |
ok jsing
|
|
|
|
| |
ok jsing
|
|
|
|
| |
ok jsing
|
|
|
|
|
|
| |
an ugly strlen + malloc + strcat/strcpy dance by a simple asprintf().
ok jsing
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
and i2v_GENERAL_NAMES() by taking ownership of the extlist only if we
were passed NULL. Otherwise it remains the caller's responsibility to
free it. To do so, we allocate the extlist explicitly instead of using
X509V3_add_value()'s implicit allocation feature. Preserve behavior in
i2v_AUTHORITY_KEYID() by adding an explicit check that something was
pushed onto the stack.
The other i2v_* functions will receive a similar treatment in upcoming
commits.
ok jsing
|
|
|
|
|
|
|
| |
and i2v_GENERAL_NAMES(). This fixes a couple of leaks and other
ugliness.
tweaks & ok jsing
|
|
|
|
| |
imported OpenSSL 0.9.4 in 1999. It won't ever be used.
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
minimum value.
Fixes oss-fuzz #14354.
ok beck@ bcook@ tb@
|
|
|
|
|
|
| |
Found by Guido Vranken when fuzzing and trying to use GOST with HMAC.
Fix confirmed by Guido; ok tb@
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
X509V3_add_value() helpfully allocates a STACK_OF(CONF_VALUE) if it
receives a pointer to a NULL pointer. If anything fails along the way,
it is however the caller's responsibility to free it. This can easily
be fixed by freeing *extlist in the error path and zeroing it to avoid
a double free if there happens to be a caller out there that avoids
the leak.
Polish a few things so the function conforms a bit better to our usual
style.
tweak & ok jsing
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
Fixes oss-fuzz issue #13843.
ok tb@
|
|
|
|
|
|
|
|
|
| |
Some bread/bwrite functions implement this themselves, while others do not.
This makes it consistent across all BIO implementations.
Addresses an issue that Guido Vranken found with his fuzzer.
ok tb@
|
|
|
|
| |
ok tb@
|
|
|
|
|
|
|
|
| |
This reverts part of OpenSSL c2fd5d79, which added the same code to AES
CCM, GCM and XTS. In the case of CCM and GCM nothing assigns {ccm,gcm}.key
so there is never going to be anything to update (unlike XTS).
ok tb@
|
|
|
|
|
|
| |
Avoids use of uninitialised memory.
ok tb@
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
In the case of a cipher with a custom copy control, if that control fails
we may still have pointers that we do not own in the previously copied
cipher data. Avoid potential double-frees by zeroing and freeing the
copied cipher data in this case.
Issue reported by Guido Vranken.
ok tb@
|