Commit Graph

6 Commits

Author SHA1 Message Date
Eric Warmenhoven e8da8f8d29 minor mbedtls update
This brings it in line with 2.6.0. Previously it had been taken from a
development branch somewhere between 2.5.1 and 2.6.0.

Only return VERIFY_FAILED from a single point

Everything else is a fatal error. Also improve documentation about that for
the vrfy callback.

Improve comments

Update doc of return value of verify()

Fix potential integer overflow parsing DER CRL

This patch prevents a potential signed integer overflow during the
CRL version verification checks.

Fix potential integer overflow parsing DER CRT

This patch prevents a potential signed integer overflow during the
certificate version verification checks.

Prevent signed integer overflow in CSR parsing

Modify the function mbedtls_x509_csr_parse_der() so that it checks the
parsed CSR version integer before it increments the value. This prevents
a potential signed integer overflow, as these have undefined behaviour
in the C standard.

Rename time and index parameter to avoid name conflict.

As noted in #557, several functions use 'index' resp. 'time'
as parameter names in their declaration and/or definition, causing name
conflicts with the functions in the C standard library of the same
name some compilers warn about.

This commit renames the arguments accordingly.

Update version number to 2.6.0
2025-06-09 22:20:05 -04:00
twinaphex e5dc2b5bcb (mbedtls) Cleanups 2020-07-01 03:23:46 +02:00
twinaphex 308e16f63e Cleanups 2020-07-01 01:21:20 +02:00
twinaphex 8fe5ad8fd4 (mbedtls) Get rid of MBEDTLS_SELF_TEST 2020-07-01 01:04:35 +02:00
twinaphex 3019748b17 (mbedtls) Use arc4_alt.h 2018-08-04 20:54:11 +02:00
Brad Parker 02381aabef add SSL/TLS support 2017-07-26 09:18:17 -04:00