• Adam Langley's avatar
    crypto/tls: check curve equation in ECDHE. · 30fbcc75
    Adam Langley authored
    This change causes a TLS client and server to verify that received
    elliptic curve points are on the expected curve. This isn't actually
    necessary in the Go TLS stack, but Watson Ladd has convinced me that
    it's worthwhile because it's pretty cheap and it removes the
    possibility that some change in the future (e.g. tls-unique) will
    depend on it without the author checking that precondition.
    
    LGTM=bradfitz
    R=bradfitz
    CC=golang-codereviews
    https://golang.org/cl/115290046
    30fbcc75
Name
Last commit
Last update
..
testdata Loading commit data...
alert.go Loading commit data...
cipher_suites.go Loading commit data...
common.go Loading commit data...
conn.go Loading commit data...
conn_test.go Loading commit data...
example_test.go Loading commit data...
generate_cert.go Loading commit data...
handshake_client.go Loading commit data...
handshake_client_test.go Loading commit data...
handshake_messages.go Loading commit data...
handshake_messages_test.go Loading commit data...
handshake_server.go Loading commit data...
handshake_server_test.go Loading commit data...
handshake_test.go Loading commit data...
key_agreement.go Loading commit data...
prf.go Loading commit data...
prf_test.go Loading commit data...
ticket.go Loading commit data...
tls.go Loading commit data...
tls_test.go Loading commit data...