• Adam Langley's avatar
    crypto/tls: check curve equation in ECDHE. · 30fbcc75
    Adam Langley authored
    This change causes a TLS client and server to verify that received
    elliptic curve points are on the expected curve. This isn't actually
    necessary in the Go TLS stack, but Watson Ladd has convinced me that
    it's worthwhile because it's pretty cheap and it removes the
    possibility that some change in the future (e.g. tls-unique) will
    depend on it without the author checking that precondition.
    
    LGTM=bradfitz
    R=bradfitz
    CC=golang-codereviews
    https://golang.org/cl/115290046
    30fbcc75
Name
Last commit
Last update
..
aes Loading commit data...
cipher Loading commit data...
des Loading commit data...
dsa Loading commit data...
ecdsa Loading commit data...
elliptic Loading commit data...
hmac Loading commit data...
md5 Loading commit data...
rand Loading commit data...
rc4 Loading commit data...
rsa Loading commit data...
sha1 Loading commit data...
sha256 Loading commit data...
sha512 Loading commit data...
subtle Loading commit data...
tls Loading commit data...
x509 Loading commit data...
crypto.go Loading commit data...