commit | d607dd7e5bc5c08854ec0c9baff70ba4a35be36f | [log] [tgz] |
---|---|---|
author | Fraser Tweedale <frase@frase.id.au> | Mon May 29 16:33:20 2017 -0500 |
committer | Paul Kehrer <paul.l.kehrer@gmail.com> | Mon May 29 16:33:20 2017 -0500 |
tree | 1baa1b7d0cc1ba9a5b500abdf044962aabbb702f | |
parent | 7bc36865fcdb1057a4d2925d28f688c5590d6eaf [diff] |
Enlarge _oid2txt buffer to handle larger OIDs (#3612) The OpenSSL manual recommends a buffer size of 80 for OBJ_oid2txt: https://www.openssl.org/docs/crypto/OBJ_nid2ln.html#return_values. But OIDs longer than this occur in real life (e.g. Active Directory makes some very long OIDs). If the length of the stringified OID exceeds the buffer size, allocate a new buffer that is big enough to hold the stringified OID, and re-do the conversion into the new buffer.