Scott Gayou
0d79675497
Small memory leak fix (CVE-2019-6502 in #1586 )
...
CVE-2019-6502 was assigned to what appears to be a very minor
memory leak that only occurs on an error-case in a CLI tool.
If util_connect_card fails, we still need to release the sc
context previously allocated by sc_context_create else memory
will leak.
2019-03-06 19:51:43 +01:00
alegon01
728d099a53
FIX typo OpenSSL vs OpenSsl.
2019-03-06 11:35:11 +01:00
alegon01
b327b76134
FIX use pseudo_randomize() for a proper initialization of orig_data in encrypt_decrypt().
2019-03-06 10:26:05 +01:00
Frank Morgner
19c5ab315d
fixed uninitialized use of variable
2019-03-06 08:53:47 +01:00
Frank Morgner
070370895f
fixed 333707 Dereference before null check
2019-03-06 00:42:38 +01:00
Frank Morgner
8fbd0b3ee1
fixed 333708 Dereference after null check
2019-03-06 00:42:38 +01:00
Frank Morgner
ba185954c5
fixed 333709 Unchecked return value
2019-03-06 00:42:38 +01:00
Frank Morgner
e8f8f0bfbb
fixed 333714 Uninitialized scalar variable
2019-03-06 00:42:38 +01:00
Frank Morgner
9abe44f03c
fixed 333715 Dereference after null check
2019-03-06 00:42:38 +01:00
Frank Morgner
e876cf62eb
fixed 333711 Dereference before null check
2019-03-06 00:42:38 +01:00
Frank Morgner
b1a58c7925
removed dead code
2019-03-06 00:42:38 +01:00
Frank Morgner
27526de021
implemented sc_format_apdu_ex
2019-03-05 13:54:13 +01:00
Frank Morgner
155b197932
sc-hsm: require T=1 connection
2019-03-05 13:47:45 +01:00
Frank Morgner
f3e6639de6
added GoID CVCA
2019-03-05 13:17:15 +01:00
alegon01
7271fe610b
Add support for the OpenSsl signature format for the signature verification.
2019-02-18 16:03:41 +01:00
Frank Morgner
20daced605
fixed special case of deletion in gnuk_write_certificate
2019-02-14 09:22:23 +01:00
Frank Morgner
1a61ae849f
fixed Null pointer argument in call to memcpy
2019-02-14 09:22:23 +01:00
Frank Morgner
b6fadb469f
fixed sc_decompress_zlib_alloc return code
2019-02-14 09:22:23 +01:00
Frank Morgner
6e48de83c7
avoid allocation of 0 bytes
2019-02-14 09:22:23 +01:00
Frank Morgner
f4fccfd94e
fixed undefined bitshift
2019-02-14 09:22:23 +01:00
Frank Morgner
c858d4b3d1
fixed argument checking
2019-02-14 09:22:23 +01:00
Frank Morgner
6fdb29a470
fixed use of uninitialized values
2019-02-14 09:22:23 +01:00
Frank Morgner
01d515a026
fixed use of garbage value
2019-02-14 09:22:23 +01:00
Frank Morgner
8ea77a83e0
fixed misuse of realloc
2019-02-14 09:22:23 +01:00
Frank Morgner
32e1995300
fixed dead assignment
2019-02-14 09:22:23 +01:00
Frank Morgner
e4a01643a6
fixed possible NULL pointer dereference
2019-02-14 09:22:23 +01:00
Frank Morgner
53954e9ff1
fixed OpenSSL handling in PKCS#11 mapping
...
prevents NULL pointer dereference
2019-02-14 09:22:23 +01:00
Frank Morgner
b708cab0a3
fixed assignment of garbage value
2019-02-14 09:22:23 +01:00
Frank Morgner
85485eb9b0
fixed unused assignments
2019-02-14 09:22:23 +01:00
Frank Morgner
fdb0e6d581
Fixed Potential leak of memory
2019-02-14 09:22:23 +01:00
alegon01
9ae507c5f8
Fix indentation.
2019-02-12 14:09:26 +01:00
alegon01
b63a868e68
Fix build when EVP_PKEY_CTX_set_rsa_oaep_md is not defined.
2019-02-12 10:42:39 +01:00
Raul Metsma
c2cc83754e
select_esteid_df is only used in card-mcrd.c
...
Signed-off-by: Raul Metsma <raul@metsma.ee>
2019-02-12 08:56:20 +01:00
Raul Metsma
f37a8a5c52
is_esteid_card is only used card-mcrd.c
...
Signed-off-by: Raul Metsma <raul@metsma.ee>
2019-02-12 08:56:20 +01:00
Peter Marschall
4757466f27
OpenPGP: space police
...
remove trailing spaces & tabs
2019-02-12 08:55:59 +01:00
Alex Karabanov
04ef9dbf3b
Fix build on cygwin in strict mode ( #1605 )
2019-02-11 20:50:12 +01:00
Frank Morgner
be33e82b75
goid-tool: fixed possible memory leak
...
internally created context needs to be freed if TA/CA is done without
an existing SM context from PACE
2019-02-11 15:41:32 +01:00
Frank Morgner
72cdc9d82e
goid-tool: fixed confusion about always/never acl
2019-02-08 15:08:03 +01:00
Frank Morgner
aca9d79f6d
fixed parsing SoCManager info
2019-02-07 16:56:33 +01:00
alegon01
973625773b
Fix encrypt_decrypt() for CKM_RSA_PKCS_OAEP. It is working fine now with OpenSsl 1.1.1a.
2019-02-07 10:42:48 +01:00
alegon01
084624f340
Fix CKM_RSA_PKCS in encrypt_decrypt().
2019-02-05 12:03:51 +01:00
alegon01
9aa413bd7e
Fix CKM_RSA_X_509 encrypt_decrypt(). Improve the code for CKM_RSA_PKCS and CKM_RSA_PKCS_OAEP. For these alogs, only CKM_SHA_1 is supported.
2019-02-05 11:35:42 +01:00
alegon01
d25fbe3cec
Remove 2 useless comments in encrypt_decrypt().
2019-02-05 11:24:33 +01:00
Frank Morgner
928fbf2f03
goid-tool: implented PIN/FP verification for PAccess
2019-02-04 16:01:56 +01:00
alegon01
3d09823df0
Fix build when OPENSSL_NO_RIPEMD and OPENSSL_NO_CAST are defined. Fix formatting.
2019-02-04 14:26:02 +01:00
alegon01
f030aa2c25
Add support for CKM_RSA_X_509 in encrypt_decrypt() and decrypt_data().
2019-02-04 14:23:13 +01:00
alegon01
9b7605ff3c
Add support for CKM_RSA_PKCS_OAEP in encrypt_decrypt(). Only set the OAEP params for CKM_RSA_PKCS_OAEP, I had an issue with a variable not initialized.
2019-02-01 15:27:55 +01:00
alegon01
cf617da4bd
Before calling encrypt_decrypt() make sure that the mechanism is for RSA and supports decryption, otherwise skip it.
2019-02-01 11:37:47 +01:00
alegon01
2be799f739
Add support for CKM_RSA_PKCS_OAEP in encrypt_decrypt(). fix mechanism value in call to util_fatal(). fix formatting.
2019-02-01 11:35:25 +01:00
alegon01
16ca73ae40
Add support for CKM_RSA_PKCS_OAEP in encrypt_decrypt(). fix mechanism value in call to util_fatal().
2019-02-01 11:19:33 +01:00