Skip to content

Instantly share code, notes, and snippets.

#include <string.h>
#include <stdio.h>
static void
xcp(unsigned long *dst, const unsigned long *src, int top)
{
for (int i = 0; i < top; i++) {
dst[i] = src[i];
printf("%zu\n", src[i]);
}
}
<html>
<body>
<script>
function getKeyMaterial() {
let enc = new TextEncoder();
return window.crypto.subtle.importKey(
"raw",
enc.encode("PW"),
"HKDF",
diff --git a/contrib/bsnmp/lib/asn1.c b/contrib/bsnmp/lib/asn1.c
index 03b5662..57f9380 100644
--- a/contrib/bsnmp/lib/asn1.c
+++ b/contrib/bsnmp/lib/asn1.c
@@ -100,6 +100,11 @@ asn_get_header(struct asn_buf *b, u_char *type, asn_len_t *len)
*len = *b->asn_cptr++;
b->asn_len--;
}
+
+ if ( *len > b->asn_len ) {
From 523fa8f085346b19a46da240309716057cb24340 Mon Sep 17 00:00:00 2001
From: Guido Vranken <guidovranken@gmail.com>
Date: Mon, 14 May 2018 23:04:40 +0200
Subject: [PATCH 1/1] SSL server: send excessively large DH prime
---
ssl/statem/statem_srvr.c | 2053 +++++++++++++++++++++++++++++++++++++++++++++-
1 file changed, 2033 insertions(+), 20 deletions(-)
diff --git a/ssl/statem/statem_srvr.c b/ssl/statem/statem_srvr.c
### Keybase proof
I hereby claim:
* I am guidovranken on github.
* I am guidovranken (https://keybase.io/guidovranken) on keybase.
* I have a public key whose fingerprint is 9A9E DC20 C7C9 E021 F3ED 4CD9 734C 1576 6744 7B97
To claim this, I am signing this object:
Tracing Go VM:
[1] 0 : JUMPDEST
Stack: []
Gas: 99999
[2] 1 : PC
Stack: [1]
Gas: 99997
[3] 2 : ADDRESS
Stack: [1 341]
Gas: 99995