mirror of
https://github.com/openssl/openssl.git
synced 2024-12-09 05:51:54 +08:00
ec061bf8ff
We already check for an excessively large P in DH_generate_key(), but not in DH_check_pub_key(), and none of them check for an excessively large Q. This change adds all the missing excessive size checks of P and Q. It's to be noted that behaviours surrounding excessively sized P and Q differ. DH_check() raises an error on the excessively sized P, but only sets a flag for the excessively sized Q. This behaviour is mimicked in DH_check_pub_key(). Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22453) |
||
---|---|---|
.. | ||
build.info | ||
dh_ameth.c | ||
dh_asn1.c | ||
dh_backend.c | ||
dh_check.c | ||
dh_depr.c | ||
dh_err.c | ||
dh_gen.c | ||
dh_group_params.c | ||
dh_kdf.c | ||
dh_key.c | ||
dh_lib.c | ||
dh_local.h | ||
dh_meth.c | ||
dh_pmeth.c | ||
dh_prn.c | ||
dh_rfc5114.c |