summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* development moved to gitlabHEADmasterNikos Mavrogiannopoulos2018-01-21876-59161/+7
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* released 4.13libtasn1_4_13Nikos Mavrogiannopoulos2018-01-162-2/+2
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* Improved documentation on decoding flagsNikos Mavrogiannopoulos2018-01-091-4/+11
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* .gitlab-ci.yml: removed references to i686 package installationtmp-protect-ber-decoder-from-recursion2Nikos Mavrogiannopoulos2018-01-041-2/+3
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* bumped versionNikos Mavrogiannopoulos2018-01-041-2/+2
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* doc updateNikos Mavrogiannopoulos2018-01-041-0/+4
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* _asn1_decode_simple_ber: restrict the levels of recursion to 3Nikos Mavrogiannopoulos2018-01-041-2/+19
| | | | | | | | On indefinite string decoding, setting a maximum level of recursions protects the BER decoder from a stack exhaustion due to large amounts of recursion. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* tests: Added octet string which causes a large number of recursionsNikos Mavrogiannopoulos2018-01-042-0/+14
| | | | | | That could lead in stack exhaustion. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* _asn1_check_identifier: safer access to values readNikos Mavrogiannopoulos2017-06-301-5/+12
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* doc updatelibtasn1_4_12Nikos Mavrogiannopoulos2017-05-292-1/+4
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* fixed so-version bumpNikos Mavrogiannopoulos2017-05-291-3/+3
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* regenerated ASN1.c filelibtasn1_4_11Nikos Mavrogiannopoulos2017-05-271-1/+1
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* bumped versionNikos Mavrogiannopoulos2017-05-273-4/+4
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* doc updateNikos Mavrogiannopoulos2017-05-191-0/+7
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* tests: added reproducer for encoding issuetmp-fix-encoding-issuesNikos Mavrogiannopoulos2017-05-183-2/+9
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* tests: added reproducer for encoding issueNikos Mavrogiannopoulos2017-05-183-3/+58
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* asn1_find_node: added safety check on asn1_find_node()Nikos Mavrogiannopoulos2017-05-181-0/+6
| | | | | | | | | | This prevents a stack overflow in asn1_find_node() which is triggered by too long variable names in the definitions files. That means that applications have to deliberately pass a too long 'name' constant to asn1_write_value() and friends. Reported by Jakub Jirasek. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* doc updateNikos Mavrogiannopoulos2017-05-181-0/+5
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* tests: check decoding with ASN1_DECODE_FLAG_ALLOW_INCORRECT_TIME flagNikos Mavrogiannopoulos2017-05-183-1/+18
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* asn1Decoding: allow decoding with ASN1_DECODE_FLAG_ALLOW_INCORRECT_TIME flagNikos Mavrogiannopoulos2017-05-181-10/+15
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* decoding: added flag ASN1_DECODE_FLAG_ALLOW_INCORRECT_TIMENikos Mavrogiannopoulos2017-05-182-1/+3
| | | | | | | | | This flag allows decoding errors in time fields even when in strict DER mode. That is introduced in order to allow toleration of invalid times in certificates (which are common) even though strict DER adherence is enforced in other fields. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* doc updateNikos Mavrogiannopoulos2017-05-011-0/+4
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* Introduced error code ASN1_TIME_ENCODING_ERRORNikos Mavrogiannopoulos2017-05-013-3/+5
| | | | | | | This error code indicates an invalid encoding in the TIME field. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* tests: cast to avoid compiler warningNikos Mavrogiannopoulos2017-01-191-1/+1
|
* DER decoding: check the return value of _asn1_append_sequence_setNikos Mavrogiannopoulos2017-01-192-4/+21
| | | | | | | Ensure that the return value of _asn1_append_sequence_set. This addresses a potential NULL pointer dereference. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* Cast input to isdigit() to integerNikos Mavrogiannopoulos2017-01-171-1/+1
| | | | | | | That prevents complaints from isdigit() implementations using the input as an array index without casting. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* tests: added missing file (mscat.asn)Nikos Mavrogiannopoulos2017-01-161-1/+1
|
* Makefile: added abi-dump targetNikos Mavrogiannopoulos2017-01-161-0/+9
|
* Updated ABI dump with a more precise dump of the 3.0 libraryNikos Mavrogiannopoulos2017-01-161-1084/+975
|
* released 4.10Nikos Mavrogiannopoulos2017-01-161-3/+7
|
* added missing gnulib filesNikos Mavrogiannopoulos2017-01-163-0/+156
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* doc updateNikos Mavrogiannopoulos2017-01-161-0/+4
|
* asn1_get_length_ber: pass the correct length to ↵Nikos Mavrogiannopoulos2017-01-161-3/+3
| | | | | | | | _asn1_get_indefinite_length_string This addresses reading 1-byte past the end of data. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* bumped versionNikos Mavrogiannopoulos2017-01-161-1/+1
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* tests: added additional invalid PKCS#7 structsNikos Mavrogiannopoulos2017-01-163-1/+2
| | | | | | These structures cause a read overflow in the heap. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* _asn1_ltostr: avoid undefined negation of int64_tNikos Mavrogiannopoulos2017-01-161-1/+1
| | | | | | Use cast to (uint64_t) and negation instead. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* updated gnulibNikos Mavrogiannopoulos2017-01-16136-1050/+1735
|
* Bring in par valgrind and asan testsNikos Mavrogiannopoulos2017-01-162-1/+2
| | | | | | | | | Ensure that exit code on failure is something different than "1" (to detect parsing errors from heap errors), and that address sanitizer will not detect leaks (there are few by design leaks in libtasn1). Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* tests: run decoding-invalid-pkcs7 on make checkNikos Mavrogiannopoulos2017-01-161-1/+1
|
* .gitlab-ci.yml: install bison on all platformsNikos Mavrogiannopoulos2017-01-161-1/+1
|
* .gitlab-ci.yml: force mingw32 build in gitlab shared runnersNikos Mavrogiannopoulos2017-01-131-0/+1
| | | | That is, because this build requires a privileged container.
* tests: added missing fileNikos Mavrogiannopoulos2017-01-131-0/+43
|
* _asn1_ltostr: ensure that input value will always be printedNikos Mavrogiannopoulos2017-01-131-7/+11
| | | | | | | | | | That is, use an unsigned type to store the output of the negation (in case the input is negative). This addresses the issue found in PKCS#7 decoding: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=388 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* tests: added invalid PKCS#7 struct checksNikos Mavrogiannopoulos2017-01-134-31/+40
| | | | The added struct causes an integer overflow.
* decoding-invalid-x509: output log on errorNikos Mavrogiannopoulos2017-01-131-2/+5
|
* MSVS 2013 and 2015 native buildsVasiliy Olekhov2016-12-058-0/+359
|
* tests: added copyright statements to filesNikos Mavrogiannopoulos2016-10-242-0/+40
|
* doc updatetmp-test-suite-spcNikos Mavrogiannopoulos2016-10-241-2/+4
|
* Add spc_pe_image_data testAndreas Schneider2016-10-244-3/+169
| | | | Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
* doc updateNikos Mavrogiannopoulos2016-10-111-1/+1
|