./security/libtasn1, ASN.1 structure parser library

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 4.12, Package name: libtasn1-4.12, Maintainer: pkgsrc-users

libtasn1 library was developed for ASN1 (Abstract Syntax Notation One)
structures management.

The main features of this library are:
- on-line ASN1 structure management that does
not require any C code file generation;
- off-line ASN1 structure management with C code
file generation containing an array;
- DER (Distinguish Encoding Rules) encoding;
- no limits for INTEGER and ENUMERATED values


Required to build:
[pkgtools/cwrappers]

Master sites: (Expand)

SHA1: f9a05b3b8acf319d89f07267407c03b184c4e3b0
RMD160: a3062789a73655c83f99a12af8aab3c92c8acdf8
Filesize: 1844.189 KB

Version history: (Expand)


CVS history: (Expand)


   2017-08-18 23:53:47 by Adam Ciarcinski | Files touched by this commit (2)
Log message:
release 4.12:
- Corrected so-name version

release 4.11:
- Introduced the ASN1_TIME_ENCODING_ERROR error code to indicate
  an invalid encoding in the DER time fields.
- Introduced flag ASN1_DECODE_FLAG_ALLOW_INCORRECT_TIME. This flag
  allows decoding errors in time fields even when in strict DER mode.
  That is introduced in order to allow toleration of invalid times in
  X.509 certificates (which are common) even though strict DER adherence
  is enforced in other fields.
- Added safety check in asn1_find_node(). That prevents a crash
  when a very long variable name is provided by the developer.
  Note that this to be exploited requires controlling the ASN.1
  definitions used by the developer, i.e., the 'name' parameter of
  asn1_write_value() or asn1_read_value(). The library is
  not designed to protect against malicious manipulation of the
  developer assigned variable names.
   2017-02-26 09:45:44 by Adam Ciarcinski | Files touched by this commit (3) | Package updated
Log message:
* Noteworthy changes in release 4.10:
- Updated gnulib
- Removed -Werror from default compiler flags
- Fixed undefined behavior when negating integers in _asn1_ltostr().
  Issue found by oss-fuzz project (via gnutls):
  https://bugs.chromium.org/p/oss-fuzz/is … ail?id=388
- Pass the correct length to _asn1_get_indefinite_length_string in
  asn1_get_length_ber. This addresses reading 1-byte past the end
  of data. Issue found by oss-fuzz project (via gnutls):
  https://bugs.chromium.org/p/oss-fuzz/is … ail?id=330
  https://bugs.chromium.org/p/oss-fuzz/is … tail?id=33
   2017-01-11 17:25:06 by Thomas Klausner | Files touched by this commit (1)
Log message:
Remove -Werror from compilation flags.

PR 51821
PR 51829
   2017-01-10 16:26:32 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
Updated libtasn1 to 4.9.

* Noteworthy changes in release 4.9 (released 2016-07-25) [stable]
- Fixes to OID encoding of OIDs which have elements which exceed 2^32
   2016-06-22 12:36:00 by Thomas Klausner | Files touched by this commit (3) | Package updated
Log message:
Updated libtasn1 to 4.8. Security update.

* Noteworthy changes in release 4.8 (released 2016-04-11) [stable]
- Fixes to avoid reliance on C undefined behavior.
- Fixes to avoid an infinite recursion when decoding without
  the ASN1_DECODE_FLAG_STRICT_DER flag. Reported by Pascal Cuoq.
- Combined all the BER octet string decoding functions to a single
  one based on asn1_decode_simple_ber().

* Noteworthy changes in release 4.7 (released 2015-09-14) [stable]
- Fixed regression introduced in the decoding of multi-byte tags
  fix.

* Noteworthy changes in release 4.6 (released 2015-09-05) [stable]
- Allow decoding OCTET STRINGs with multi-byte tags.
- API and ABI changes since last version:
  asn1_get_object_id_der: New function
   2016-02-26 10:41:07 by Jonathan Perkin | Files touched by this commit (32)
Log message:
Use OPSYSVARS.
   2015-11-04 02:18:12 by Alistair G. Crooks | Files touched by this commit (434)
Log message:
Add SHA512 digests for distfiles for security category

Problems found locating distfiles:
	Package f-prot-antivirus6-fs-bin: missing distfile fp-NetBSD.x86.32-fs-6.2.3.tar.gz
	Package f-prot-antivirus6-ws-bin: missing distfile fp-NetBSD.x86.32-ws-6.2.3.tar.gz
	Package libidea: missing distfile libidea-0.8.2b.tar.gz
	Package openssh: missing distfile openssh-7.1p1-hpn-20150822.diff.bz2
	Package uvscan: missing distfile vlp4510e.tar.Z

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
   2015-04-30 17:07:28 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
Update to 4.5:

* Noteworthy changes in release 4.5 (released 2015-04-29) [stable]
- Corrected an invalid memory access in octet string decoding.
  Reported by Hanno Böck.