summaryrefslogtreecommitdiffstats
path: root/src/protocols/ec25519_fhmqvc/ec25519_fhmqvc.h
diff options
context:
space:
mode:
authorMatthias Schiffer <mschiffer@universe-factory.net>2015-01-06 09:15:00 +0100
committerMatthias Schiffer <mschiffer@universe-factory.net>2015-01-06 09:15:00 +0100
commitf64c8e3bee2e9c61cf18c93c6a328dd5d6d8e1b4 (patch)
tree7c6515b38c67d2ffd148527ebc51e2146ff2f716 /src/protocols/ec25519_fhmqvc/ec25519_fhmqvc.h
parent7ebc5824153f6ba8ac7385f6965bedd1b984cf5d (diff)
downloadfastd-f64c8e3bee2e9c61cf18c93c6a328dd5d6d8e1b4.tar
fastd-f64c8e3bee2e9c61cf18c93c6a328dd5d6d8e1b4.zip
ec25519-fhmqvc: additional key checks
Until now, it wasn't checked if a public key was the identity element. I don't think this mistake allows any actual attacks against the handshake though.
Diffstat (limited to 'src/protocols/ec25519_fhmqvc/ec25519_fhmqvc.h')
-rw-r--r--src/protocols/ec25519_fhmqvc/ec25519_fhmqvc.h2
1 files changed, 2 insertions, 0 deletions
diff --git a/src/protocols/ec25519_fhmqvc/ec25519_fhmqvc.h b/src/protocols/ec25519_fhmqvc/ec25519_fhmqvc.h
index 55696c1..087cf35 100644
--- a/src/protocols/ec25519_fhmqvc/ec25519_fhmqvc.h
+++ b/src/protocols/ec25519_fhmqvc/ec25519_fhmqvc.h
@@ -120,6 +120,8 @@ fastd_peer_t * fastd_protocol_ec25519_fhmqvc_find_peer(const fastd_protocol_key_
void fastd_protocol_ec25519_fhmqvc_generate_key(void);
void fastd_protocol_ec25519_fhmqvc_show_key(void);
+bool fastd_protocol_ec25519_fhmqvc_check_key(const ecc_int256_t *key);
+
void fastd_protocol_ec25519_fhmqvc_set_shell_env(fastd_shell_env_t *env, const fastd_peer_t *peer);
bool fastd_protocol_ec25519_fhmqvc_describe_peer(const fastd_peer_t *peer, char *buf, size_t len);