28243c08db
Avoid seg fault by checking mgf1 parameter is not NULL. This can be triggered during certificate verification so could be a DoS attack against a client or a server enabling client authentication. Thanks to Loïc Jonas Etienne (Qnective AG) for discovering this bug. CVE-2015-3194 (Imported from upstream's c394a488942387246653833359a5c94b5832674e and test data from 00456fded43eadd4bb94bf675ae4ea5d158a764f.) Change-Id: Ic97059d42722fd810973ccb0c26c415c4eaae79a Reviewed-on: https://boringssl-review.googlesource.com/6617 Reviewed-by: Adam Langley <agl@google.com> |
||
---|---|---|
.. | ||
algorithm.c | ||
CMakeLists.txt | ||
digestsign.c | ||
evp_asn1.c | ||
evp_ctx.c | ||
evp_extra_test.cc | ||
evp_test.cc | ||
evp_tests.txt | ||
evp.c | ||
internal.h | ||
p_dsa_asn1.c | ||
p_ec_asn1.c | ||
p_ec.c | ||
p_rsa_asn1.c | ||
p_rsa.c | ||
pbkdf_test.cc | ||
pbkdf.c | ||
sign.c |