boringssl/crypto/x509
Adam Langley 8750fe58f4 base64: fix underflow in EVP_EncodeBlock.
When I switched the base64 code to use size_t, I missed that one of the
loops was counting down, not up, and depended on the loop variable going
negative.

Additionally this change fixes a bug in NETSCAPE_SPKI_b64_encode where
the size of the result buffer was incorrectly calculated and a possible
memory leak.

Change-Id: Ibdf644244291274f50b314f3bb13a61b46858ca1
Reviewed-on: https://boringssl-review.googlesource.com/1220
Reviewed-by: David Benjamin <davidben@chromium.org>
Reviewed-by: Adam Langley <agl@google.com>
2014-07-16 18:14:32 +00:00
..
a_digest.c
a_sign.c
a_strex.c Const correctness. 2014-06-20 13:17:36 -07:00
a_verify.c Don't try and verify signatures if key is NULL (CVE-2013-0166) 2014-06-20 13:17:39 -07:00
asn1_gen.c
by_dir.c Try both old and new X.509 hashes. 2014-06-20 15:31:01 -07:00
by_file.c
charmap.h
CMakeLists.txt
i2d_pr.c
pkcs7.c
t_crl.c
t_x509.c Remove CHARSET_EBCDIC 2014-07-07 19:30:35 +00:00
t_x509a.c
vpm_int.h Fixes to host checking. 2014-06-20 13:17:40 -07:00
x509_att.c
x509_cmp.c
x509_d2.c
x509_def.c
x509_error.c Move public headers to include/openssl/ 2014-07-14 22:42:18 +00:00
x509_ext.c
x509_lu.c
x509_obj.c Remove CHARSET_EBCDIC 2014-07-07 19:30:35 +00:00
x509_r2x.c
x509_req.c
x509_set.c
x509_trs.c Const correctness. 2014-06-20 13:17:36 -07:00
x509_txt.c
x509_v3.c
x509_vfy.c Fixes to host checking. 2014-06-20 13:17:40 -07:00
x509_vpm.c Fixes to host checking. 2014-06-20 13:17:40 -07:00
x509.c
x509cset.c
x509name.c
x509rset.c
x509spki.c base64: fix underflow in EVP_EncodeBlock. 2014-07-16 18:14:32 +00:00
x509type.c
x_algor.c
x_all.c Remove OPENSSL_NO_RSA 2014-07-07 20:20:53 +00:00
x_attrib.c
x_crl.c
x_exten.c
x_info.c
x_name.c
x_pkey.c
x_pubkey.c Remove OPENSSL_NO_RSA 2014-07-07 20:20:53 +00:00
x_req.c
x_sig.c
x_spki.c
x_val.c
x_x509.c
x_x509a.c