boringssl/crypto/dh
Adam Langley aa24851515 Don't crash when generating a key for a zero DH prime.
I didn't look into whether this was reachable, but I assume not. Still,
better to be robust here becasue DH groups are commonly under some
amount of attacker control.

Change-Id: I1e0c33ccf314c73a9d34dd48312f6f7580049ba7
Reviewed-on: https://boringssl-review.googlesource.com/10261
Reviewed-by: Adam Langley <agl@google.com>
Commit-Queue: Adam Langley <agl@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
2016-08-11 16:52:56 +00:00
..
check.c Remove optimisation for known DH groups. 2016-08-11 16:41:50 +00:00
CMakeLists.txt
dh_asn1.c Reimplement PKCS #3 DH parameter parsing with crypto/bytestring. 2016-05-09 19:36:41 +00:00
dh_test.cc Remove optimisation for known DH groups. 2016-08-11 16:41:50 +00:00
dh.c Don't crash when generating a key for a zero DH prime. 2016-08-11 16:52:56 +00:00
params.c Remove optimisation for known DH groups. 2016-08-11 16:41:50 +00:00