#
1.16 |
|
30-Aug-2023 |
tb |
Fix leaks in copy_issuer()
The stack of subject alternative names from the issuer is parsed using X509V3_EXT_d2i(), so it must be freed with sk_GENERAL_NAME_pop_free(). It's not worth doing complicated ownership handling when the individual alternative names can be copied with GENERAL_NAME_dup().
Previously, ialt and its remaining members would be leaked when the call to sk_GENERAL_NAME_push() failed halfway through.
This is only reachable via the issuer:copy x509v3.cnf(5) directive.
ok jsing
|
Revision tags: OPENBSD_7_3_BASE
|
#
1.15 |
|
16-Feb-2023 |
tb |
libressl *_namespace.h: adjust *_ALIAS() to require a semicolon
LCRYPTO_ALIAS() and LSSL_ALIAS() contained a trailing semicolon. This does not conform to style(9), breaks editors and ctags and (most importantly) my workflow. Fix this by neutering them with asm("") so that -Wpedantic doesn't complain. There's precedent in libc's namespace.h
fix suggested by & ok jsing
|
#
1.14 |
|
14-Nov-2022 |
beck |
Hide public symbols in libcrypto/x509 .c files
ok tb@
|
#
1.13 |
|
11-Nov-2022 |
beck |
Start CBS-ifying the name constraints code.
ok jsing@ tb@
|
Revision tags: OPENBSD_7_1_BASE OPENBSD_7_2_BASE
|
#
1.12 |
|
26-Mar-2022 |
tb |
name constraints: be more careful with NULs
An IA5STRING is a Pascal string that can have embedded NULs and is not NUL terminated (except that for legacy reasons it happens to be).
Instead of taking the strlen(), use the already known ASN.1 length and use strndup() instead of strdup() to generate NUL terminated strings after some existing code has checked that there are no embedded NULs.
In v2i_GENERAL_NAME_ex() use %.*s to print the bytes. This is not optimal and might be switched to using strvis() later.
ok beck inoguchi jsing
|
#
1.11 |
|
14-Mar-2022 |
tb |
Rework ownership handling in x509_constraints_validate()
Instead of having the caller allocate and pass in a new x509_constraints_name struct, handle allocation inside x509_constraints_validate(). Also make the error optional. All this is done to simplify the call sites and to make it more obvious that there are no leaks.
ok jsing
|
#
1.10 |
|
13-Mar-2022 |
tb |
Check name constraints using the proper API
The previous versions were too strict and disallowed leading dots.
From Alex Wilson
ok jsing
|
#
1.9 |
|
13-Mar-2022 |
tb |
style tweak
|
#
1.8 |
|
11-Feb-2022 |
tb |
Fix length check of IP addresses for name constraints
An IP address in a name constraint is actually an IP address concatenated with a netmask, so it is twice as long as usual.
This fixes a third bug introduced in r1.3 and reported by Volker Schlecht
ok jsing
|
#
1.7 |
|
11-Feb-2022 |
tb |
Add missing error check for a2i_GENERAL_NAME()
Fixes a segfault reported by Volker Schlecht.
ok jsing
|
#
1.6 |
|
11-Feb-2022 |
tb |
Fix a double free in v2i_NAME_CONSTRAINTS()
a2i_GENERAL_NAME() modifies and returns the out argument that was passed in unless out == NULL, in which case it returns something freshly allocated. Thus, in v2i_GENERAL_NAME_ex() we must only free ret if out == NULL so v2i_NAME_CONSTRAINTS() can free correctly.
Issue reported by Volker Schlecht
ok jsing
|
#
1.5 |
|
28-Oct-2021 |
tb |
Bring back r1.3, ok beck
Original commit message from beck:
Validate Subject Alternate Names when they are being added to certificates.
With this change we will reject adding SAN DNS, EMAIL, and IP addresses that are malformed at certificate creation time.
ok jsing@ tb@
|
#
1.4 |
|
27-Oct-2021 |
beck |
Revert version 1.3 - not allowing the creation of bogus certificates breaks the ruby regression tests that expect to make bogus certificates and see that they are rejected :(
I am reverting this for now to make the regress tests pass, and will bring it back if we decide to patch the regress tests to remove the problem cases
|
#
1.3 |
|
26-Oct-2021 |
beck |
Validate Subject Alternate Names when they are being added to certificates.
With this change we will reject adding SAN DNS, EMAIL, and IP addresses that are malformed at certificate creation time.
ok jsing@ tb@
|
Revision tags: OPENBSD_7_0_BASE
|
#
1.2 |
|
24-Aug-2021 |
tb |
Fix various read buffer overflow when printing ASN.1 strings (which are not necessarily NUL terminated). Same as schwarze's fix in t_x509a.c r1.9.
From David Benjamin and Matt Caswell (part of the fixes in OpenSSL 1.1.1l)
ok inoguchi
|
Revision tags: OPENBSD_6_8_BASE OPENBSD_6_9_BASE
|
#
1.1 |
|
04-Jun-2020 |
jsing |
Collapse the x509v3 directory into x509.
This avoids the need to grep across directories to find functions and prepares for further rototilling and chainsawing.
Discussed with tb@ (who also tested the release build)
|
#
1.15 |
|
16-Feb-2023 |
tb |
libressl *_namespace.h: adjust *_ALIAS() to require a semicolon
LCRYPTO_ALIAS() and LSSL_ALIAS() contained a trailing semicolon. This does not conform to style(9), breaks editors and ctags and (most importantly) my workflow. Fix this by neutering them with asm("") so that -Wpedantic doesn't complain. There's precedent in libc's namespace.h
fix suggested by & ok jsing
|
#
1.14 |
|
14-Nov-2022 |
beck |
Hide public symbols in libcrypto/x509 .c files
ok tb@
|
#
1.13 |
|
11-Nov-2022 |
beck |
Start CBS-ifying the name constraints code.
ok jsing@ tb@
|
Revision tags: OPENBSD_7_1_BASE OPENBSD_7_2_BASE
|
#
1.12 |
|
26-Mar-2022 |
tb |
name constraints: be more careful with NULs
An IA5STRING is a Pascal string that can have embedded NULs and is not NUL terminated (except that for legacy reasons it happens to be).
Instead of taking the strlen(), use the already known ASN.1 length and use strndup() instead of strdup() to generate NUL terminated strings after some existing code has checked that there are no embedded NULs.
In v2i_GENERAL_NAME_ex() use %.*s to print the bytes. This is not optimal and might be switched to using strvis() later.
ok beck inoguchi jsing
|
#
1.11 |
|
14-Mar-2022 |
tb |
Rework ownership handling in x509_constraints_validate()
Instead of having the caller allocate and pass in a new x509_constraints_name struct, handle allocation inside x509_constraints_validate(). Also make the error optional. All this is done to simplify the call sites and to make it more obvious that there are no leaks.
ok jsing
|
#
1.10 |
|
13-Mar-2022 |
tb |
Check name constraints using the proper API
The previous versions were too strict and disallowed leading dots.
From Alex Wilson
ok jsing
|
#
1.9 |
|
13-Mar-2022 |
tb |
style tweak
|
#
1.8 |
|
11-Feb-2022 |
tb |
Fix length check of IP addresses for name constraints
An IP address in a name constraint is actually an IP address concatenated with a netmask, so it is twice as long as usual.
This fixes a third bug introduced in r1.3 and reported by Volker Schlecht
ok jsing
|
#
1.7 |
|
11-Feb-2022 |
tb |
Add missing error check for a2i_GENERAL_NAME()
Fixes a segfault reported by Volker Schlecht.
ok jsing
|
#
1.6 |
|
11-Feb-2022 |
tb |
Fix a double free in v2i_NAME_CONSTRAINTS()
a2i_GENERAL_NAME() modifies and returns the out argument that was passed in unless out == NULL, in which case it returns something freshly allocated. Thus, in v2i_GENERAL_NAME_ex() we must only free ret if out == NULL so v2i_NAME_CONSTRAINTS() can free correctly.
Issue reported by Volker Schlecht
ok jsing
|
#
1.5 |
|
28-Oct-2021 |
tb |
Bring back r1.3, ok beck
Original commit message from beck:
Validate Subject Alternate Names when they are being added to certificates.
With this change we will reject adding SAN DNS, EMAIL, and IP addresses that are malformed at certificate creation time.
ok jsing@ tb@
|
#
1.4 |
|
27-Oct-2021 |
beck |
Revert version 1.3 - not allowing the creation of bogus certificates breaks the ruby regression tests that expect to make bogus certificates and see that they are rejected :(
I am reverting this for now to make the regress tests pass, and will bring it back if we decide to patch the regress tests to remove the problem cases
|
#
1.3 |
|
26-Oct-2021 |
beck |
Validate Subject Alternate Names when they are being added to certificates.
With this change we will reject adding SAN DNS, EMAIL, and IP addresses that are malformed at certificate creation time.
ok jsing@ tb@
|
Revision tags: OPENBSD_7_0_BASE
|
#
1.2 |
|
24-Aug-2021 |
tb |
Fix various read buffer overflow when printing ASN.1 strings (which are not necessarily NUL terminated). Same as schwarze's fix in t_x509a.c r1.9.
From David Benjamin and Matt Caswell (part of the fixes in OpenSSL 1.1.1l)
ok inoguchi
|
Revision tags: OPENBSD_6_8_BASE OPENBSD_6_9_BASE
|
#
1.1 |
|
04-Jun-2020 |
jsing |
Collapse the x509v3 directory into x509.
This avoids the need to grep across directories to find functions and prepares for further rototilling and chainsawing.
Discussed with tb@ (who also tested the release build)
|
#
1.14 |
|
14-Nov-2022 |
beck |
Hide public symbols in libcrypto/x509 .c files
ok tb@
|
#
1.13 |
|
11-Nov-2022 |
beck |
Start CBS-ifying the name constraints code.
ok jsing@ tb@
|
Revision tags: OPENBSD_7_1_BASE OPENBSD_7_2_BASE
|
#
1.12 |
|
26-Mar-2022 |
tb |
name constraints: be more careful with NULs
An IA5STRING is a Pascal string that can have embedded NULs and is not NUL terminated (except that for legacy reasons it happens to be).
Instead of taking the strlen(), use the already known ASN.1 length and use strndup() instead of strdup() to generate NUL terminated strings after some existing code has checked that there are no embedded NULs.
In v2i_GENERAL_NAME_ex() use %.*s to print the bytes. This is not optimal and might be switched to using strvis() later.
ok beck inoguchi jsing
|
#
1.11 |
|
14-Mar-2022 |
tb |
Rework ownership handling in x509_constraints_validate()
Instead of having the caller allocate and pass in a new x509_constraints_name struct, handle allocation inside x509_constraints_validate(). Also make the error optional. All this is done to simplify the call sites and to make it more obvious that there are no leaks.
ok jsing
|
#
1.10 |
|
13-Mar-2022 |
tb |
Check name constraints using the proper API
The previous versions were too strict and disallowed leading dots.
From Alex Wilson
ok jsing
|
#
1.9 |
|
13-Mar-2022 |
tb |
style tweak
|
#
1.8 |
|
11-Feb-2022 |
tb |
Fix length check of IP addresses for name constraints
An IP address in a name constraint is actually an IP address concatenated with a netmask, so it is twice as long as usual.
This fixes a third bug introduced in r1.3 and reported by Volker Schlecht
ok jsing
|
#
1.7 |
|
11-Feb-2022 |
tb |
Add missing error check for a2i_GENERAL_NAME()
Fixes a segfault reported by Volker Schlecht.
ok jsing
|
#
1.6 |
|
11-Feb-2022 |
tb |
Fix a double free in v2i_NAME_CONSTRAINTS()
a2i_GENERAL_NAME() modifies and returns the out argument that was passed in unless out == NULL, in which case it returns something freshly allocated. Thus, in v2i_GENERAL_NAME_ex() we must only free ret if out == NULL so v2i_NAME_CONSTRAINTS() can free correctly.
Issue reported by Volker Schlecht
ok jsing
|
#
1.5 |
|
28-Oct-2021 |
tb |
Bring back r1.3, ok beck
Original commit message from beck:
Validate Subject Alternate Names when they are being added to certificates.
With this change we will reject adding SAN DNS, EMAIL, and IP addresses that are malformed at certificate creation time.
ok jsing@ tb@
|
#
1.4 |
|
27-Oct-2021 |
beck |
Revert version 1.3 - not allowing the creation of bogus certificates breaks the ruby regression tests that expect to make bogus certificates and see that they are rejected :(
I am reverting this for now to make the regress tests pass, and will bring it back if we decide to patch the regress tests to remove the problem cases
|
#
1.3 |
|
26-Oct-2021 |
beck |
Validate Subject Alternate Names when they are being added to certificates.
With this change we will reject adding SAN DNS, EMAIL, and IP addresses that are malformed at certificate creation time.
ok jsing@ tb@
|
Revision tags: OPENBSD_7_0_BASE
|
#
1.2 |
|
24-Aug-2021 |
tb |
Fix various read buffer overflow when printing ASN.1 strings (which are not necessarily NUL terminated). Same as schwarze's fix in t_x509a.c r1.9.
From David Benjamin and Matt Caswell (part of the fixes in OpenSSL 1.1.1l)
ok inoguchi
|
Revision tags: OPENBSD_6_8_BASE OPENBSD_6_9_BASE
|
#
1.1 |
|
04-Jun-2020 |
jsing |
Collapse the x509v3 directory into x509.
This avoids the need to grep across directories to find functions and prepares for further rototilling and chainsawing.
Discussed with tb@ (who also tested the release build)
|
#
1.13 |
|
11-Nov-2022 |
beck |
Start CBS-ifying the name constraints code.
ok jsing@ tb@
|
Revision tags: OPENBSD_7_1_BASE OPENBSD_7_2_BASE
|
#
1.12 |
|
26-Mar-2022 |
tb |
name constraints: be more careful with NULs
An IA5STRING is a Pascal string that can have embedded NULs and is not NUL terminated (except that for legacy reasons it happens to be).
Instead of taking the strlen(), use the already known ASN.1 length and use strndup() instead of strdup() to generate NUL terminated strings after some existing code has checked that there are no embedded NULs.
In v2i_GENERAL_NAME_ex() use %.*s to print the bytes. This is not optimal and might be switched to using strvis() later.
ok beck inoguchi jsing
|
#
1.11 |
|
14-Mar-2022 |
tb |
Rework ownership handling in x509_constraints_validate()
Instead of having the caller allocate and pass in a new x509_constraints_name struct, handle allocation inside x509_constraints_validate(). Also make the error optional. All this is done to simplify the call sites and to make it more obvious that there are no leaks.
ok jsing
|
#
1.10 |
|
13-Mar-2022 |
tb |
Check name constraints using the proper API
The previous versions were too strict and disallowed leading dots.
From Alex Wilson
ok jsing
|
#
1.9 |
|
13-Mar-2022 |
tb |
style tweak
|
#
1.8 |
|
11-Feb-2022 |
tb |
Fix length check of IP addresses for name constraints
An IP address in a name constraint is actually an IP address concatenated with a netmask, so it is twice as long as usual.
This fixes a third bug introduced in r1.3 and reported by Volker Schlecht
ok jsing
|
#
1.7 |
|
11-Feb-2022 |
tb |
Add missing error check for a2i_GENERAL_NAME()
Fixes a segfault reported by Volker Schlecht.
ok jsing
|
#
1.6 |
|
11-Feb-2022 |
tb |
Fix a double free in v2i_NAME_CONSTRAINTS()
a2i_GENERAL_NAME() modifies and returns the out argument that was passed in unless out == NULL, in which case it returns something freshly allocated. Thus, in v2i_GENERAL_NAME_ex() we must only free ret if out == NULL so v2i_NAME_CONSTRAINTS() can free correctly.
Issue reported by Volker Schlecht
ok jsing
|
#
1.5 |
|
28-Oct-2021 |
tb |
Bring back r1.3, ok beck
Original commit message from beck:
Validate Subject Alternate Names when they are being added to certificates.
With this change we will reject adding SAN DNS, EMAIL, and IP addresses that are malformed at certificate creation time.
ok jsing@ tb@
|
#
1.4 |
|
27-Oct-2021 |
beck |
Revert version 1.3 - not allowing the creation of bogus certificates breaks the ruby regression tests that expect to make bogus certificates and see that they are rejected :(
I am reverting this for now to make the regress tests pass, and will bring it back if we decide to patch the regress tests to remove the problem cases
|
#
1.3 |
|
26-Oct-2021 |
beck |
Validate Subject Alternate Names when they are being added to certificates.
With this change we will reject adding SAN DNS, EMAIL, and IP addresses that are malformed at certificate creation time.
ok jsing@ tb@
|
Revision tags: OPENBSD_7_0_BASE
|
#
1.2 |
|
24-Aug-2021 |
tb |
Fix various read buffer overflow when printing ASN.1 strings (which are not necessarily NUL terminated). Same as schwarze's fix in t_x509a.c r1.9.
From David Benjamin and Matt Caswell (part of the fixes in OpenSSL 1.1.1l)
ok inoguchi
|
Revision tags: OPENBSD_6_8_BASE OPENBSD_6_9_BASE
|
#
1.1 |
|
04-Jun-2020 |
jsing |
Collapse the x509v3 directory into x509.
This avoids the need to grep across directories to find functions and prepares for further rototilling and chainsawing.
Discussed with tb@ (who also tested the release build)
|
#
1.12 |
|
26-Mar-2022 |
tb |
name constraints: be more careful with NULs
An IA5STRING is a Pascal string that can have embedded NULs and is not NUL terminated (except that for legacy reasons it happens to be).
Instead of taking the strlen(), use the already known ASN.1 length and use strndup() instead of strdup() to generate NUL terminated strings after some existing code has checked that there are no embedded NULs.
In v2i_GENERAL_NAME_ex() use %.*s to print the bytes. This is not optimal and might be switched to using strvis() later.
ok beck inoguchi jsing
|
#
1.11 |
|
14-Mar-2022 |
tb |
Rework ownership handling in x509_constraints_validate()
Instead of having the caller allocate and pass in a new x509_constraints_name struct, handle allocation inside x509_constraints_validate(). Also make the error optional. All this is done to simplify the call sites and to make it more obvious that there are no leaks.
ok jsing
|
#
1.10 |
|
13-Mar-2022 |
tb |
Check name constraints using the proper API
The previous versions were too strict and disallowed leading dots.
From Alex Wilson
ok jsing
|
#
1.9 |
|
13-Mar-2022 |
tb |
style tweak
|
#
1.8 |
|
11-Feb-2022 |
tb |
Fix length check of IP addresses for name constraints
An IP address in a name constraint is actually an IP address concatenated with a netmask, so it is twice as long as usual.
This fixes a third bug introduced in r1.3 and reported by Volker Schlecht
ok jsing
|
#
1.7 |
|
11-Feb-2022 |
tb |
Add missing error check for a2i_GENERAL_NAME()
Fixes a segfault reported by Volker Schlecht.
ok jsing
|
#
1.6 |
|
11-Feb-2022 |
tb |
Fix a double free in v2i_NAME_CONSTRAINTS()
a2i_GENERAL_NAME() modifies and returns the out argument that was passed in unless out == NULL, in which case it returns something freshly allocated. Thus, in v2i_GENERAL_NAME_ex() we must only free ret if out == NULL so v2i_NAME_CONSTRAINTS() can free correctly.
Issue reported by Volker Schlecht
ok jsing
|
#
1.5 |
|
28-Oct-2021 |
tb |
Bring back r1.3, ok beck
Original commit message from beck:
Validate Subject Alternate Names when they are being added to certificates.
With this change we will reject adding SAN DNS, EMAIL, and IP addresses that are malformed at certificate creation time.
ok jsing@ tb@
|
#
1.4 |
|
27-Oct-2021 |
beck |
Revert version 1.3 - not allowing the creation of bogus certificates breaks the ruby regression tests that expect to make bogus certificates and see that they are rejected :(
I am reverting this for now to make the regress tests pass, and will bring it back if we decide to patch the regress tests to remove the problem cases
|
#
1.3 |
|
26-Oct-2021 |
beck |
Validate Subject Alternate Names when they are being added to certificates.
With this change we will reject adding SAN DNS, EMAIL, and IP addresses that are malformed at certificate creation time.
ok jsing@ tb@
|
Revision tags: OPENBSD_7_0_BASE
|
#
1.2 |
|
24-Aug-2021 |
tb |
Fix various read buffer overflow when printing ASN.1 strings (which are not necessarily NUL terminated). Same as schwarze's fix in t_x509a.c r1.9.
From David Benjamin and Matt Caswell (part of the fixes in OpenSSL 1.1.1l)
ok inoguchi
|
Revision tags: OPENBSD_6_8_BASE OPENBSD_6_9_BASE
|
#
1.1 |
|
04-Jun-2020 |
jsing |
Collapse the x509v3 directory into x509.
This avoids the need to grep across directories to find functions and prepares for further rototilling and chainsawing.
Discussed with tb@ (who also tested the release build)
|
#
1.11 |
|
14-Mar-2022 |
tb |
Rework ownership handling in x509_constraints_validate()
Instead of having the caller allocate and pass in a new x509_constraints_name struct, handle allocation inside x509_constraints_validate(). Also make the error optional. All this is done to simplify the call sites and to make it more obvious that there are no leaks.
ok jsing
|
#
1.10 |
|
13-Mar-2022 |
tb |
Check name constraints using the proper API
The previous versions were too strict and disallowed leading dots.
From Alex Wilson
ok jsing
|
#
1.9 |
|
13-Mar-2022 |
tb |
style tweak
|
#
1.8 |
|
11-Feb-2022 |
tb |
Fix length check of IP addresses for name constraints
An IP address in a name constraint is actually an IP address concatenated with a netmask, so it is twice as long as usual.
This fixes a third bug introduced in r1.3 and reported by Volker Schlecht
ok jsing
|
#
1.7 |
|
11-Feb-2022 |
tb |
Add missing error check for a2i_GENERAL_NAME()
Fixes a segfault reported by Volker Schlecht.
ok jsing
|
#
1.6 |
|
11-Feb-2022 |
tb |
Fix a double free in v2i_NAME_CONSTRAINTS()
a2i_GENERAL_NAME() modifies and returns the out argument that was passed in unless out == NULL, in which case it returns something freshly allocated. Thus, in v2i_GENERAL_NAME_ex() we must only free ret if out == NULL so v2i_NAME_CONSTRAINTS() can free correctly.
Issue reported by Volker Schlecht
ok jsing
|
#
1.5 |
|
28-Oct-2021 |
tb |
Bring back r1.3, ok beck
Original commit message from beck:
Validate Subject Alternate Names when they are being added to certificates.
With this change we will reject adding SAN DNS, EMAIL, and IP addresses that are malformed at certificate creation time.
ok jsing@ tb@
|
#
1.4 |
|
27-Oct-2021 |
beck |
Revert version 1.3 - not allowing the creation of bogus certificates breaks the ruby regression tests that expect to make bogus certificates and see that they are rejected :(
I am reverting this for now to make the regress tests pass, and will bring it back if we decide to patch the regress tests to remove the problem cases
|
#
1.3 |
|
26-Oct-2021 |
beck |
Validate Subject Alternate Names when they are being added to certificates.
With this change we will reject adding SAN DNS, EMAIL, and IP addresses that are malformed at certificate creation time.
ok jsing@ tb@
|
Revision tags: OPENBSD_7_0_BASE
|
#
1.2 |
|
24-Aug-2021 |
tb |
Fix various read buffer overflow when printing ASN.1 strings (which are not necessarily NUL terminated). Same as schwarze's fix in t_x509a.c r1.9.
From David Benjamin and Matt Caswell (part of the fixes in OpenSSL 1.1.1l)
ok inoguchi
|
Revision tags: OPENBSD_6_8_BASE OPENBSD_6_9_BASE
|
#
1.1 |
|
04-Jun-2020 |
jsing |
Collapse the x509v3 directory into x509.
This avoids the need to grep across directories to find functions and prepares for further rototilling and chainsawing.
Discussed with tb@ (who also tested the release build)
|
#
1.10 |
|
13-Mar-2022 |
tb |
Check name constraints using the proper API
The previous versions were too strict and disallowed leading dots.
From Alex Wilson
ok jsing
|
#
1.9 |
|
13-Mar-2022 |
tb |
style tweak
|
#
1.8 |
|
11-Feb-2022 |
tb |
Fix length check of IP addresses for name constraints
An IP address in a name constraint is actually an IP address concatenated with a netmask, so it is twice as long as usual.
This fixes a third bug introduced in r1.3 and reported by Volker Schlecht
ok jsing
|
#
1.7 |
|
11-Feb-2022 |
tb |
Add missing error check for a2i_GENERAL_NAME()
Fixes a segfault reported by Volker Schlecht.
ok jsing
|
#
1.6 |
|
11-Feb-2022 |
tb |
Fix a double free in v2i_NAME_CONSTRAINTS()
a2i_GENERAL_NAME() modifies and returns the out argument that was passed in unless out == NULL, in which case it returns something freshly allocated. Thus, in v2i_GENERAL_NAME_ex() we must only free ret if out == NULL so v2i_NAME_CONSTRAINTS() can free correctly.
Issue reported by Volker Schlecht
ok jsing
|
#
1.5 |
|
28-Oct-2021 |
tb |
Bring back r1.3, ok beck
Original commit message from beck:
Validate Subject Alternate Names when they are being added to certificates.
With this change we will reject adding SAN DNS, EMAIL, and IP addresses that are malformed at certificate creation time.
ok jsing@ tb@
|
#
1.4 |
|
27-Oct-2021 |
beck |
Revert version 1.3 - not allowing the creation of bogus certificates breaks the ruby regression tests that expect to make bogus certificates and see that they are rejected :(
I am reverting this for now to make the regress tests pass, and will bring it back if we decide to patch the regress tests to remove the problem cases
|
#
1.3 |
|
26-Oct-2021 |
beck |
Validate Subject Alternate Names when they are being added to certificates.
With this change we will reject adding SAN DNS, EMAIL, and IP addresses that are malformed at certificate creation time.
ok jsing@ tb@
|
Revision tags: OPENBSD_7_0_BASE
|
#
1.2 |
|
24-Aug-2021 |
tb |
Fix various read buffer overflow when printing ASN.1 strings (which are not necessarily NUL terminated). Same as schwarze's fix in t_x509a.c r1.9.
From David Benjamin and Matt Caswell (part of the fixes in OpenSSL 1.1.1l)
ok inoguchi
|
Revision tags: OPENBSD_6_8_BASE OPENBSD_6_9_BASE
|
#
1.1 |
|
04-Jun-2020 |
jsing |
Collapse the x509v3 directory into x509.
This avoids the need to grep across directories to find functions and prepares for further rototilling and chainsawing.
Discussed with tb@ (who also tested the release build)
|
#
1.8 |
|
11-Feb-2022 |
tb |
Fix length check of IP addresses for name constraints
An IP address in a name constraint is actually an IP address concatenated with a netmask, so it is twice as long as usual.
This fixes a third bug introduced in r1.3 and reported by Volker Schlecht
ok jsing
|
#
1.7 |
|
11-Feb-2022 |
tb |
Add missing error check for a2i_GENERAL_NAME()
Fixes a segfault reported by Volker Schlecht.
ok jsing
|
#
1.6 |
|
11-Feb-2022 |
tb |
Fix a double free in v2i_NAME_CONSTRAINTS()
a2i_GENERAL_NAME() modifies and returns the out argument that was passed in unless out == NULL, in which case it returns something freshly allocated. Thus, in v2i_GENERAL_NAME_ex() we must only free ret if out == NULL so v2i_NAME_CONSTRAINTS() can free correctly.
Issue reported by Volker Schlecht
ok jsing
|
#
1.5 |
|
28-Oct-2021 |
tb |
Bring back r1.3, ok beck
Original commit message from beck:
Validate Subject Alternate Names when they are being added to certificates.
With this change we will reject adding SAN DNS, EMAIL, and IP addresses that are malformed at certificate creation time.
ok jsing@ tb@
|
#
1.4 |
|
27-Oct-2021 |
beck |
Revert version 1.3 - not allowing the creation of bogus certificates breaks the ruby regression tests that expect to make bogus certificates and see that they are rejected :(
I am reverting this for now to make the regress tests pass, and will bring it back if we decide to patch the regress tests to remove the problem cases
|
#
1.3 |
|
26-Oct-2021 |
beck |
Validate Subject Alternate Names when they are being added to certificates.
With this change we will reject adding SAN DNS, EMAIL, and IP addresses that are malformed at certificate creation time.
ok jsing@ tb@
|
Revision tags: OPENBSD_7_0_BASE
|
#
1.2 |
|
24-Aug-2021 |
tb |
Fix various read buffer overflow when printing ASN.1 strings (which are not necessarily NUL terminated). Same as schwarze's fix in t_x509a.c r1.9.
From David Benjamin and Matt Caswell (part of the fixes in OpenSSL 1.1.1l)
ok inoguchi
|
Revision tags: OPENBSD_6_8_BASE OPENBSD_6_9_BASE
|
#
1.1 |
|
04-Jun-2020 |
jsing |
Collapse the x509v3 directory into x509.
This avoids the need to grep across directories to find functions and prepares for further rototilling and chainsawing.
Discussed with tb@ (who also tested the release build)
|
#
1.5 |
|
28-Oct-2021 |
tb |
Bring back r1.3, ok beck
Original commit message from beck:
Validate Subject Alternate Names when they are being added to certificates.
With this change we will reject adding SAN DNS, EMAIL, and IP addresses that are malformed at certificate creation time.
ok jsing@ tb@
|
#
1.4 |
|
27-Oct-2021 |
beck |
Revert version 1.3 - not allowing the creation of bogus certificates breaks the ruby regression tests that expect to make bogus certificates and see that they are rejected :(
I am reverting this for now to make the regress tests pass, and will bring it back if we decide to patch the regress tests to remove the problem cases
|
#
1.3 |
|
26-Oct-2021 |
beck |
Validate Subject Alternate Names when they are being added to certificates.
With this change we will reject adding SAN DNS, EMAIL, and IP addresses that are malformed at certificate creation time.
ok jsing@ tb@
|
Revision tags: OPENBSD_7_0_BASE
|
#
1.2 |
|
24-Aug-2021 |
tb |
Fix various read buffer overflow when printing ASN.1 strings (which are not necessarily NUL terminated). Same as schwarze's fix in t_x509a.c r1.9.
From David Benjamin and Matt Caswell (part of the fixes in OpenSSL 1.1.1l)
ok inoguchi
|
Revision tags: OPENBSD_6_8_BASE OPENBSD_6_9_BASE
|
#
1.1 |
|
04-Jun-2020 |
jsing |
Collapse the x509v3 directory into x509.
This avoids the need to grep across directories to find functions and prepares for further rototilling and chainsawing.
Discussed with tb@ (who also tested the release build)
|
#
1.4 |
|
27-Oct-2021 |
beck |
Revert version 1.3 - not allowing the creation of bogus certificates breaks the ruby regression tests that expect to make bogus certificates and see that they are rejected :(
I am reverting this for now to make the regress tests pass, and will bring it back if we decide to patch the regress tests to remove the problem cases
|
#
1.3 |
|
26-Oct-2021 |
beck |
Validate Subject Alternate Names when they are being added to certificates.
With this change we will reject adding SAN DNS, EMAIL, and IP addresses that are malformed at certificate creation time.
ok jsing@ tb@
|
Revision tags: OPENBSD_7_0_BASE
|
#
1.2 |
|
24-Aug-2021 |
tb |
Fix various read buffer overflow when printing ASN.1 strings (which are not necessarily NUL terminated). Same as schwarze's fix in t_x509a.c r1.9.
From David Benjamin and Matt Caswell (part of the fixes in OpenSSL 1.1.1l)
ok inoguchi
|
Revision tags: OPENBSD_6_8_BASE OPENBSD_6_9_BASE
|
#
1.1 |
|
04-Jun-2020 |
jsing |
Collapse the x509v3 directory into x509.
This avoids the need to grep across directories to find functions and prepares for further rototilling and chainsawing.
Discussed with tb@ (who also tested the release build)
|
#
1.3 |
|
26-Oct-2021 |
beck |
Validate Subject Alternate Names when they are being added to certificates.
With this change we will reject adding SAN DNS, EMAIL, and IP addresses that are malformed at certificate creation time.
ok jsing@ tb@
|
Revision tags: OPENBSD_7_0_BASE
|
#
1.2 |
|
24-Aug-2021 |
tb |
Fix various read buffer overflow when printing ASN.1 strings (which are not necessarily NUL terminated). Same as schwarze's fix in t_x509a.c r1.9.
From David Benjamin and Matt Caswell (part of the fixes in OpenSSL 1.1.1l)
ok inoguchi
|
Revision tags: OPENBSD_6_8_BASE OPENBSD_6_9_BASE
|
#
1.1 |
|
04-Jun-2020 |
jsing |
Collapse the x509v3 directory into x509.
This avoids the need to grep across directories to find functions and prepares for further rototilling and chainsawing.
Discussed with tb@ (who also tested the release build)
|
#
1.2 |
|
24-Aug-2021 |
tb |
Fix various read buffer overflow when printing ASN.1 strings (which are not necessarily NUL terminated). Same as schwarze's fix in t_x509a.c r1.9.
From David Benjamin and Matt Caswell (part of the fixes in OpenSSL 1.1.1l)
ok inoguchi
|
Revision tags: OPENBSD_6_8_BASE OPENBSD_6_9_BASE
|
#
1.1 |
|
04-Jun-2020 |
jsing |
Collapse the x509v3 directory into x509.
This avoids the need to grep across directories to find functions and prepares for further rototilling and chainsawing.
Discussed with tb@ (who also tested the release build)
|
#
1.1 |
|
04-Jun-2020 |
jsing |
Collapse the x509v3 directory into x509.
This avoids the need to grep across directories to find functions and prepares for further rototilling and chainsawing.
Discussed with tb@ (who also tested the release build)
|