Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | development moved to gitlabHEADmaster | Nikos Mavrogiannopoulos | 2018-01-21 | 876 | -59161/+7 |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org> | ||||
* | released 4.13libtasn1_4_13 | Nikos Mavrogiannopoulos | 2018-01-16 | 2 | -2/+2 |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org> | ||||
* | Improved documentation on decoding flags | Nikos Mavrogiannopoulos | 2018-01-09 | 1 | -4/+11 |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | .gitlab-ci.yml: removed references to i686 package installationtmp-protect-ber-decoder-from-recursion2 | Nikos Mavrogiannopoulos | 2018-01-04 | 1 | -2/+3 |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | bumped version | Nikos Mavrogiannopoulos | 2018-01-04 | 1 | -2/+2 |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | doc update | Nikos Mavrogiannopoulos | 2018-01-04 | 1 | -0/+4 |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | _asn1_decode_simple_ber: restrict the levels of recursion to 3 | Nikos Mavrogiannopoulos | 2018-01-04 | 1 | -2/+19 |
| | | | | | | | | On indefinite string decoding, setting a maximum level of recursions protects the BER decoder from a stack exhaustion due to large amounts of recursion. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | tests: Added octet string which causes a large number of recursions | Nikos Mavrogiannopoulos | 2018-01-04 | 2 | -0/+14 |
| | | | | | | That could lead in stack exhaustion. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | _asn1_check_identifier: safer access to values read | Nikos Mavrogiannopoulos | 2017-06-30 | 1 | -5/+12 |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | doc updatelibtasn1_4_12 | Nikos Mavrogiannopoulos | 2017-05-29 | 2 | -1/+4 |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org> | ||||
* | fixed so-version bump | Nikos Mavrogiannopoulos | 2017-05-29 | 1 | -3/+3 |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org> | ||||
* | regenerated ASN1.c filelibtasn1_4_11 | Nikos Mavrogiannopoulos | 2017-05-27 | 1 | -1/+1 |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org> | ||||
* | bumped version | Nikos Mavrogiannopoulos | 2017-05-27 | 3 | -4/+4 |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org> | ||||
* | doc update | Nikos Mavrogiannopoulos | 2017-05-19 | 1 | -0/+7 |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org> | ||||
* | tests: added reproducer for encoding issuetmp-fix-encoding-issues | Nikos Mavrogiannopoulos | 2017-05-18 | 3 | -2/+9 |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | tests: added reproducer for encoding issue | Nikos Mavrogiannopoulos | 2017-05-18 | 3 | -3/+58 |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | asn1_find_node: added safety check on asn1_find_node() | Nikos Mavrogiannopoulos | 2017-05-18 | 1 | -0/+6 |
| | | | | | | | | | | This prevents a stack overflow in asn1_find_node() which is triggered by too long variable names in the definitions files. That means that applications have to deliberately pass a too long 'name' constant to asn1_write_value() and friends. Reported by Jakub Jirasek. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | doc update | Nikos Mavrogiannopoulos | 2017-05-18 | 1 | -0/+5 |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | tests: check decoding with ASN1_DECODE_FLAG_ALLOW_INCORRECT_TIME flag | Nikos Mavrogiannopoulos | 2017-05-18 | 3 | -1/+18 |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | asn1Decoding: allow decoding with ASN1_DECODE_FLAG_ALLOW_INCORRECT_TIME flag | Nikos Mavrogiannopoulos | 2017-05-18 | 1 | -10/+15 |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | decoding: added flag ASN1_DECODE_FLAG_ALLOW_INCORRECT_TIME | Nikos Mavrogiannopoulos | 2017-05-18 | 2 | -1/+3 |
| | | | | | | | | | This flag allows decoding errors in time fields even when in strict DER mode. That is introduced in order to allow toleration of invalid times in certificates (which are common) even though strict DER adherence is enforced in other fields. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | doc update | Nikos Mavrogiannopoulos | 2017-05-01 | 1 | -0/+4 |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | Introduced error code ASN1_TIME_ENCODING_ERROR | Nikos Mavrogiannopoulos | 2017-05-01 | 3 | -3/+5 |
| | | | | | | | This error code indicates an invalid encoding in the TIME field. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | tests: cast to avoid compiler warning | Nikos Mavrogiannopoulos | 2017-01-19 | 1 | -1/+1 |
| | |||||
* | DER decoding: check the return value of _asn1_append_sequence_set | Nikos Mavrogiannopoulos | 2017-01-19 | 2 | -4/+21 |
| | | | | | | | Ensure that the return value of _asn1_append_sequence_set. This addresses a potential NULL pointer dereference. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | Cast input to isdigit() to integer | Nikos Mavrogiannopoulos | 2017-01-17 | 1 | -1/+1 |
| | | | | | | | That prevents complaints from isdigit() implementations using the input as an array index without casting. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | tests: added missing file (mscat.asn) | Nikos Mavrogiannopoulos | 2017-01-16 | 1 | -1/+1 |
| | |||||
* | Makefile: added abi-dump target | Nikos Mavrogiannopoulos | 2017-01-16 | 1 | -0/+9 |
| | |||||
* | Updated ABI dump with a more precise dump of the 3.0 library | Nikos Mavrogiannopoulos | 2017-01-16 | 1 | -1084/+975 |
| | |||||
* | released 4.10 | Nikos Mavrogiannopoulos | 2017-01-16 | 1 | -3/+7 |
| | |||||
* | added missing gnulib files | Nikos Mavrogiannopoulos | 2017-01-16 | 3 | -0/+156 |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | doc update | Nikos Mavrogiannopoulos | 2017-01-16 | 1 | -0/+4 |
| | |||||
* | asn1_get_length_ber: pass the correct length to ↵ | Nikos Mavrogiannopoulos | 2017-01-16 | 1 | -3/+3 |
| | | | | | | | | _asn1_get_indefinite_length_string This addresses reading 1-byte past the end of data. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | bumped version | Nikos Mavrogiannopoulos | 2017-01-16 | 1 | -1/+1 |
| | | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | tests: added additional invalid PKCS#7 structs | Nikos Mavrogiannopoulos | 2017-01-16 | 3 | -1/+2 |
| | | | | | | These structures cause a read overflow in the heap. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | _asn1_ltostr: avoid undefined negation of int64_t | Nikos Mavrogiannopoulos | 2017-01-16 | 1 | -1/+1 |
| | | | | | | Use cast to (uint64_t) and negation instead. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | updated gnulib | Nikos Mavrogiannopoulos | 2017-01-16 | 136 | -1050/+1735 |
| | |||||
* | Bring in par valgrind and asan tests | Nikos Mavrogiannopoulos | 2017-01-16 | 2 | -1/+2 |
| | | | | | | | | | Ensure that exit code on failure is something different than "1" (to detect parsing errors from heap errors), and that address sanitizer will not detect leaks (there are few by design leaks in libtasn1). Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | tests: run decoding-invalid-pkcs7 on make check | Nikos Mavrogiannopoulos | 2017-01-16 | 1 | -1/+1 |
| | |||||
* | .gitlab-ci.yml: install bison on all platforms | Nikos Mavrogiannopoulos | 2017-01-16 | 1 | -1/+1 |
| | |||||
* | .gitlab-ci.yml: force mingw32 build in gitlab shared runners | Nikos Mavrogiannopoulos | 2017-01-13 | 1 | -0/+1 |
| | | | | That is, because this build requires a privileged container. | ||||
* | tests: added missing file | Nikos Mavrogiannopoulos | 2017-01-13 | 1 | -0/+43 |
| | |||||
* | _asn1_ltostr: ensure that input value will always be printed | Nikos Mavrogiannopoulos | 2017-01-13 | 1 | -7/+11 |
| | | | | | | | | | | That is, use an unsigned type to store the output of the negation (in case the input is negative). This addresses the issue found in PKCS#7 decoding: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=388 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | ||||
* | tests: added invalid PKCS#7 struct checks | Nikos Mavrogiannopoulos | 2017-01-13 | 4 | -31/+40 |
| | | | | The added struct causes an integer overflow. | ||||
* | decoding-invalid-x509: output log on error | Nikos Mavrogiannopoulos | 2017-01-13 | 1 | -2/+5 |
| | |||||
* | MSVS 2013 and 2015 native builds | Vasiliy Olekhov | 2016-12-05 | 8 | -0/+359 |
| | |||||
* | tests: added copyright statements to files | Nikos Mavrogiannopoulos | 2016-10-24 | 2 | -0/+40 |
| | |||||
* | doc updatetmp-test-suite-spc | Nikos Mavrogiannopoulos | 2016-10-24 | 1 | -2/+4 |
| | |||||
* | Add spc_pe_image_data test | Andreas Schneider | 2016-10-24 | 4 | -3/+169 |
| | | | | Signed-off-by: Andreas Schneider <asn@cryptomilk.org> | ||||
* | doc update | Nikos Mavrogiannopoulos | 2016-10-11 | 1 | -1/+1 |
| |