Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2010-10-22 | asn1: ber_write_OID_String() to be more picky about supplied OID | Kamen Mazdrashki | 1 | -0/+5 | |
Now function will check for invalid OID handling cases where: - sub-identifier has invalid characters (non-digit) - 'dot' separator found on unexpected place. For instance '.' at start or end of the OID. Two '.' in a row. | |||||
2010-10-20 | lib/util/asn1.c: comment spelling | Kamen Mazdrashki | 1 | -1/+1 | |
2010-10-04 | lib/util/asn1: let asn1_peek_full_tag() return an error if we fail to parse ↵ | Stefan Metzmacher | 1 | -1/+13 | |
tag hdr/len metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Mon Oct 4 14:46:40 UTC 2010 on sn-devel-104 | |||||
2010-10-02 | s3: Fix a 64-bit BUG | Volker Lendecke | 1 | -1/+1 | |
Quick explanation why this is a problem: It is not safe to pass a pointer to a uint32_t into a routine that expects a size_t *. The routine that this pointer is passed to has no chance to find out that in reality it was passed a pointer to a uint32_t. On platforms where sizeof(size_t)==8, we get a nice overwrite of a stack area that should not be overwritten. As this happens over an over again: Does someone know a means to make gcc stop with an error in this case? Volker | |||||
2010-09-26 | lib/util/asn1: add asn1_peek_tag_needed_size() and asn1_peek_full_tag() | Stefan Metzmacher | 1 | -0/+83 | |
We need a way to ask for the length of a tag without having the full buffer yet. metze | |||||
2010-03-21 | Fix an uninitialized variable | Volker Lendecke | 1 | -0/+4 | |
2010-02-02 | Change uint_t to unsigned int in lib/util | Matt Kraai | 1 | -2/+2 | |
Signed-off-by: Stefan Metzmacher <metze@samba.org> | |||||
2009-10-16 | s4/asn1: Use explicite TALLOC_CTX in ber_write_OID functions | Kamen Mazdrashki | 1 | -11/+11 | |
2009-10-01 | s4/asn1: ber_read_OID_String() to be based on _ber_read_OID_String_impl() | Kamen Mazdrashki | 1 | -30/+3 | |
2009-10-01 | s4/drsuapi: ber_read_partial_OID_String() implementation | Kamen Mazdrashki | 1 | -0/+36 | |
2009-10-01 | s4/drsuapi: Internal implementation for ber_read_OID_String | Kamen Mazdrashki | 1 | -0/+40 | |
Modified implementation _ber_read_OID_String_impl() returns how much bytes are converted. The intentation is to use this implementation both for reading OIDs and partial-OIDs in the future | |||||
2009-10-01 | s4/drsuapi: ber_write_partial_OID_String() implementation | Kamen Mazdrashki | 1 | -0/+35 | |
2009-09-17 | spnego: Support ASN.1 BIT STRING and use it in SPNEGO. | Kouhei Sutou | 1 | -0/+42 | |
Signed-off-by: Günther Deschner <gd@samba.org> | |||||
2009-07-31 | util/asn1: fix potential memory leak in asn1_write_OID() | Stefan Metzmacher | 1 | -0/+1 | |
metze | |||||
2009-06-20 | Move asn1_load_nocopy() to lib/util/asn1.c | Volker Lendecke | 1 | -0/+10 | |
2009-06-20 | Move asn1_blob() to lib/util/asn1.c | Volker Lendecke | 1 | -0/+16 | |
2009-06-10 | added asn1 functions for handling booleans in a simple context | Andrew Tridgell | 1 | -0/+23 | |
2009-06-06 | Use data_blob_null instead of data_blob(NULL, 0) | Volker Lendecke | 1 | -1/+1 | |
2008-10-22 | lib-util: fix c++ compile warning. | Günther Deschner | 1 | -1/+1 | |
Guenther | |||||
2008-10-11 | Fix include paths to new location of libutil. | Jelmer Vernooij | 1 | -1/+1 | |
2008-10-11 | Move lib/util from source4 to top-level libutil. | Jelmer Vernooij | 1 | -0/+770 | |
Conflicts: source4/Makefile |