diff options
author | Michael Brown <mcb30@ipxe.org> | 2024-01-30 13:14:21 +0000 |
---|---|---|
committer | Michael Brown <mcb30@ipxe.org> | 2024-01-30 13:21:01 +0000 |
commit | 27398f136030efb8845c45fbe154e544feefd7e5 (patch) | |
tree | 11a7010a065c90bb0e0cd8040a158cf9cb41e09c /src/usr | |
parent | de8a0821c7bc737e724fa3dfb6d89dc36f591d7a (diff) | |
download | ipxe-27398f136030efb8845c45fbe154e544feefd7e5.tar.gz |
[crypto] Check for all-zeros result from X25519 key exchange
RFC7748 states that it is entirely optional for X25519 Diffie-Hellman
implementations to check whether or not the result is the all-zero
value (indicating that an attacker sent a malicious public key with a
small order). RFC8422 states that implementations in TLS must abort
the handshake if the all-zero value is obtained.
Return an error if the all-zero value is obtained, so that the TLS
code will not require knowledge specific to the X25519 curve.
Signed-off-by: Michael Brown <mcb30@ipxe.org>
Diffstat (limited to 'src/usr')
0 files changed, 0 insertions, 0 deletions