summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/ecdsa/ecs_ossl.c
diff options
context:
space:
mode:
authorsthen <>2018-06-12 15:32:54 +0000
committersthen <>2018-06-12 15:32:54 +0000
commitf205a75959ba84bef74fc19e6728ba281c6b7575 (patch)
treefb7b950632b5c481da12c93906cbe9e80acccd57 /src/lib/libcrypto/ecdsa/ecs_ossl.c
parent5fafcafc436e54effef15dc1a5669f88d67b5bd7 (diff)
downloadopenbsd-f205a75959ba84bef74fc19e6728ba281c6b7575.tar.gz
openbsd-f205a75959ba84bef74fc19e6728ba281c6b7575.tar.bz2
openbsd-f205a75959ba84bef74fc19e6728ba281c6b7575.zip
Reject excessively large primes in DH key generation. Problem reported
by Guido Vranken to OpenSSL (https://github.com/openssl/openssl/pull/6457) and based on his diff. suggestions from tb@, ok tb@ jsing@ "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack."
Diffstat (limited to 'src/lib/libcrypto/ecdsa/ecs_ossl.c')
0 files changed, 0 insertions, 0 deletions