diff options
author | David Benjamin <davidben@chromium.org> | 2016-02-07 00:35:42 -0500 |
---|---|---|
committer | Jessica Wagantall <jwagantall@cyngn.com> | 2016-05-03 12:32:43 -0700 |
commit | 93ac22ad1244b252d9b154b3489e301c4b9052b5 (patch) | |
tree | 2fff4f1c892b644cf0c5d3ad268cabb93b947d0a /src/crypto/asn1/x_bignum.c | |
parent | b935273fda1b04385ff80b7f261a886a04b9c917 (diff) | |
download | external_boringssl-93ac22ad1244b252d9b154b3489e301c4b9052b5.zip external_boringssl-93ac22ad1244b252d9b154b3489e301c4b9052b5.tar.gz external_boringssl-93ac22ad1244b252d9b154b3489e301c4b9052b5.tar.bz2 |
Remove support for mis-encoded PKCS#8 DSA keys.
Previously, OpenSSL supported many different DSA PKCS#8 encodings. Only
support the standard format. One of the workaround formats (SEQUENCE of
private key and public key) seems to be a workaround for an old Netscape
bug. From inspection, NSS seems to have fixed this from the first open
source commit.
(cherry-picked from 440f1037716eca16f203edb8f03d4a59c92ae0cc)
Ticket: CYNGNOS-2373
Bug: 27449871
Change-Id: I1e097b675145954b4d7a0bed8733e5a25c25fd8e
Reviewed-on: https://boringssl-review.googlesource.com/7074
Reviewed-by: Adam Langley <agl@google.com>
(cherry picked from commit c042e7ed31f9ee2d85637320c0cd54b12bbb12fe)
Diffstat (limited to 'src/crypto/asn1/x_bignum.c')
0 files changed, 0 insertions, 0 deletions