Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | opencdk: improved error code checking in the stream reading functions | Nikos Mavrogiannopoulos | 2017-01-17 | 1 | -2/+3 | |
| | | | | | | This ammends 49be4f7b82eba2363bb8d4090950dad976a77a3a Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | |||||
* | doc update [ci skip] | Nikos Mavrogiannopoulos | 2017-01-09 | 1 | -2/+2 | |
| | ||||||
* | tests: added missing filegnutls_3_5_8 | Nikos Mavrogiannopoulos | 2017-01-09 | 1 | -1/+1 | |
| | ||||||
* | bumped version | Nikos Mavrogiannopoulos | 2017-01-09 | 2 | -2/+2 | |
| | ||||||
* | doc update [ci skip] | Nikos Mavrogiannopoulos | 2017-01-09 | 1 | -0/+3 | |
| | ||||||
* | doc update | Nikos Mavrogiannopoulos | 2017-01-06 | 1 | -0/+3 | |
| | ||||||
* | gitignore: update | Alon Bar-Lev | 2017-01-06 | 1 | -1/+15 | |
| | | | | Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com> | |||||
* | gitignore: sort() | Alon Bar-Lev | 2017-01-06 | 1 | -354/+354 | |
| | | | | Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com> | |||||
* | opencdk: added error checking in the stream reading functions | Nikos Mavrogiannopoulos | 2017-01-06 | 1 | -5/+35 | |
| | | | | | | | This addresses an out of memory error. Issue found using oss-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=337 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | |||||
* | tests: added test case with invalid openpgp cert | Nikos Mavrogiannopoulos | 2017-01-06 | 2 | -35/+9 | |
| | | | | | | | This triggers an out of memory error. Issue found using oss-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=337 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | |||||
* | opencdk: cdk_pk_get_keyid: fix stack overflow | Nikos Mavrogiannopoulos | 2017-01-06 | 1 | -1/+7 | |
| | | | | | | | Issue found using oss-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=340 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | |||||
* | tests: added test case with invalid openpgp cert | Nikos Mavrogiannopoulos | 2017-01-06 | 3 | -1/+7 | |
| | | | | | | | This triggers a memory error. Issue found using oss-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=340 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | |||||
* | tests: added test case with invalid openpgp cert | Nikos Mavrogiannopoulos | 2017-01-06 | 3 | -1/+7 | |
| | | | | | | | This triggers a memory error. Issue found using oss-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=346 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | |||||
* | opencdk: read_attribute: added more precise checks when reading stream | Nikos Mavrogiannopoulos | 2017-01-06 | 1 | -11/+29 | |
| | | | | | | | | That addresses heap read overflows found using oss-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=338 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=346 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | |||||
* | tests: added test case with invalid openpgp cert | Nikos Mavrogiannopoulos | 2017-01-06 | 3 | -1/+8 | |
| | | | | | | | This triggers a memory error. Issue found using oss-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=338 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | |||||
* | tests: openpgp-cert-parser: simplified | Nikos Mavrogiannopoulos | 2017-01-06 | 1 | -8/+20 | |
| | ||||||
* | doc updatetmp-backported-mem-leak-fixes | Nikos Mavrogiannopoulos | 2017-01-05 | 1 | -0/+6 | |
| | ||||||
* | _gnutls_pkcs12_string_to_key: avoid division by zero when salt_size = 0 | Nikos Mavrogiannopoulos | 2017-01-05 | 1 | -3/+9 | |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | |||||
* | gnutls_x509_ext_import_policies: fixed memory leak on error path | Nikos Mavrogiannopoulos | 2017-01-05 | 1 | -3/+4 | |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | |||||
* | tests: added test case with invalid X.509 cert | Nikos Mavrogiannopoulos | 2017-01-05 | 2 | -1/+1 | |
| | | | | | | | This triggers a memory leak. Issue found using oss-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=294 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | |||||
* | tests: added test case with invalid X.509 cert | Nikos Mavrogiannopoulos | 2017-01-05 | 2 | -1/+1 | |
| | | | | | | | Issue found using oss-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=300 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | |||||
* | x509 output: fixed memory leak in AIA extension printing | Nikos Mavrogiannopoulos | 2017-01-05 | 1 | -2/+1 | |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | |||||
* | proc_server_kx: eliminated leak on error path | Nikos Mavrogiannopoulos | 2017-01-05 | 1 | -0/+3 | |
| | | | | | | | Issue found using oss-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=272 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | |||||
* | tests: do not run key-tests under leak sanitizer | Nikos Mavrogiannopoulos | 2017-01-05 | 1 | -1/+1 | |
| | | | | | | | | | The reason is that we cannot distinguish between a memory leak on application failure (which is followed by exit- thus should be ignored) and an address sanitizer issue (which should never be ignored). As such we disable leak detection with asan and rely on valgrind. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | |||||
* | tests: illegal-rsa: don't hide stderr | Nikos Mavrogiannopoulos | 2017-01-05 | 1 | -2/+2 | |
| | ||||||
* | _gnutls_x509_get_signature: fix memory leak on error path | Nikos Mavrogiannopoulos | 2017-01-05 | 1 | -1/+2 | |
| | ||||||
* | tests: added test case with invalid X.509 certificate | Nikos Mavrogiannopoulos | 2017-01-05 | 2 | -1/+2 | |
| | | | | | | | | | This certificate causes a memory leak while printing. Issue found using oss-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=280 Relates #156 | |||||
* | x509: address leak in print_altname - cert printing | Nikos Mavrogiannopoulos | 2017-01-05 | 1 | -1/+3 | |
| | ||||||
* | tests: added certificate to reproduce memory leak | Nikos Mavrogiannopoulos | 2017-01-05 | 2 | -1/+1 | |
| | | | | | | | Found by oss-fuzz project: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=299 Relates #156 | |||||
* | status_request: eliminated leak on error path | Nikos Mavrogiannopoulos | 2017-01-05 | 1 | -5/+10 | |
| | | | | | | | Issue found using oss-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=269 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | |||||
* | submodules: use the github mirror of openssl | Nikos Mavrogiannopoulos | 2017-01-05 | 1 | -1/+1 | |
| | ||||||
* | auth rsa: eliminated memory leak on pkcs-1 formatting attack path | Nikos Mavrogiannopoulos | 2017-01-04 | 1 | -1/+5 | |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | |||||
* | doc update [ci skip] | Nikos Mavrogiannopoulos | 2017-01-02 | 1 | -0/+10 | |
| | ||||||
* | valgrind: use different exit code to signify error | Nikos Mavrogiannopoulos | 2017-01-02 | 2 | -2/+2 | |
| | | | | | This allows the test suite to differentiate between valgrind and expected errors from tools. | |||||
* | tests: cert-tests: force asan to return an error code other than one on failure | Nikos Mavrogiannopoulos | 2017-01-02 | 1 | -1/+1 | |
| | ||||||
* | gnutls_pkcs8_info: addressed memory leak on error path | Nikos Mavrogiannopoulos | 2017-01-02 | 1 | -3/+5 | |
| | ||||||
* | certtool: pkcs8_info_int: fix memory leak | Nikos Mavrogiannopoulos | 2017-01-02 | 1 | -5/+7 | |
| | ||||||
* | wrap_nettle_mpi_modm: bail on a modulus that is zero | Nikos Mavrogiannopoulos | 2017-01-02 | 1 | -0/+3 | |
| | | | | Relates #156 | |||||
* | tests: added test for invalid private keys | Nikos Mavrogiannopoulos | 2017-01-02 | 3 | -2/+54 | |
| | | | | | Also force asan to return an error code other than one (the normally expected for invalid keys). | |||||
* | tests: added test case with invalid PKCS#8 data | Nikos Mavrogiannopoulos | 2017-01-02 | 3 | -2/+2 | |
| | | | | | | | Issue found using oss-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=363 Relates #156 | |||||
* | pkcs7 decrypt: require a valid IV size on all ciphers | Nikos Mavrogiannopoulos | 2017-01-02 | 1 | -4/+13 | |
| | | | | | | | That is, do not accept the IV size present in the structure as valid without checking. Relates #156 | |||||
* | certtool: don't print PKCS#8 information when outputting DER data | Nikos Mavrogiannopoulos | 2017-01-02 | 1 | -2/+8 | |
| | ||||||
* | pkcs8: pkcs8_key_info() will correctly detect non-encrypted files | Nikos Mavrogiannopoulos | 2017-01-02 | 1 | -2/+32 | |
| | ||||||
* | Corrected a leak in OpenPGP sub-packet parsing. | Alex Gaynor | 2017-01-02 | 3 | -1/+8 | |
| | | | | Signed-off-by: Alex Gaynor <alex.gaynor@gmail.com> | |||||
* | Attempt to fix a leak in OpenPGP cert parsing. | Alex Gaynor | 2017-01-02 | 3 | -1/+7 | |
| | ||||||
* | Do not infinite loop if an EOF occurs while skipping a PGP packet | Alex Gaynor | 2017-01-02 | 4 | -5/+59 | |
| | | | | Signed-off-by: Alex Gaynor <alex.gaynor@gmail.com> | |||||
* | doc: fixed copyright date in gnutls.texi | Nikos Mavrogiannopoulos | 2017-01-02 | 1 | -2/+2 | |
| | ||||||
* | gnutls_rnd: document the available values of level [ci skip] | Nikos Mavrogiannopoulos | 2017-01-02 | 1 | -1/+3 | |
| | | | | This enables using the function by only checking the man page. | |||||
* | tests: enable all the ciphersuite in openssl cli for DSS checkstmp-gnutls35x-compat-checks-fix | Nikos Mavrogiannopoulos | 2016-12-31 | 1 | -3/+3 | |
| | ||||||
* | tests: don't check against 3DES if disabled in openssl | Nikos Mavrogiannopoulos | 2016-12-31 | 1 | -3/+8 | |
| |