Revision 05f61fb27efaf1a3f4cfa1a8d4d62c34e3c8a0fe authored by Emilia Kasper on 25 August 2014, 10:38:16 UTC, committed by Emilia Kasper on 27 August 2014, 17:42:31 UTC
The old code implicitly relies on the ASN.1 code returning a \0-prefixed buffer when the buffer length is 0. Change this to verify explicitly that the ASN.1 string has positive length. Reviewed-by: Dr Stephen Henson <steve@openssl.org> (cherry picked from commit 82dc08de54ce443c2a9ac478faffe79e76157795)
1 parent 10be715
d2i_DHparams.pod
=pod
=head1 NAME
d2i_DHparams, i2d_DHparams - PKCS#3 DH parameter functions.
=head1 SYNOPSIS
#include <openssl/dh.h>
DH *d2i_DHparams(DH **a, unsigned char **pp, long length);
int i2d_DHparams(DH *a, unsigned char **pp);
=head1 DESCRIPTION
These functions decode and encode PKCS#3 DH parameters using the
DHparameter structure described in PKCS#3.
Othewise these behave in a similar way to d2i_X509() and i2d_X509()
described in the L<d2i_X509(3)|d2i_X509(3)> manual page.
=head1 SEE ALSO
L<d2i_X509(3)|d2i_X509(3)>
=head1 HISTORY
TBA
=cut

Computing file changes ...