diff options
author | Jason A. Donenfeld <Jason@zx2c4.com> | 2017-03-30 15:28:57 +0200 |
---|---|---|
committer | Jason A. Donenfeld <Jason@zx2c4.com> | 2017-03-30 15:58:30 +0200 |
commit | ba631f262d929bba3a77f470a21c6ada45eadf3c (patch) | |
tree | 19bfb0bb69c999a3e67326e0510cd063dd2a8b5c /src/crypto/curve25519.h | |
parent | config: do not allow peers with public keys the same as the interface (diff) | |
download | wireguard-monolithic-historical-ba631f262d929bba3a77f470a21c6ada45eadf3c.tar.xz wireguard-monolithic-historical-ba631f262d929bba3a77f470a21c6ada45eadf3c.zip |
curve25519: protect against potential invalid point attacks
Diffstat (limited to 'src/crypto/curve25519.h')
-rw-r--r-- | src/crypto/curve25519.h | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/crypto/curve25519.h b/src/crypto/curve25519.h index 8e440a1..16be496 100644 --- a/src/crypto/curve25519.h +++ b/src/crypto/curve25519.h @@ -9,9 +9,9 @@ enum curve25519_lengths { CURVE25519_POINT_SIZE = 32 }; -void curve25519(u8 mypublic[CURVE25519_POINT_SIZE], const u8 secret[CURVE25519_POINT_SIZE], const u8 basepoint[CURVE25519_POINT_SIZE]); +bool __must_check curve25519(u8 mypublic[CURVE25519_POINT_SIZE], const u8 secret[CURVE25519_POINT_SIZE], const u8 basepoint[CURVE25519_POINT_SIZE]); void curve25519_generate_secret(u8 secret[CURVE25519_POINT_SIZE]); -void curve25519_generate_public(u8 pub[CURVE25519_POINT_SIZE], const u8 secret[CURVE25519_POINT_SIZE]); +bool __must_check curve25519_generate_public(u8 pub[CURVE25519_POINT_SIZE], const u8 secret[CURVE25519_POINT_SIZE]); void curve25519_fpu_init(void); |