Make sure the signature also covers the session label.
This commit is contained in:
parent
42a0b61076
commit
d7bf63c63a
2 changed files with 9 additions and 6 deletions
|
@ -124,7 +124,7 @@ Remarks:
|
|||
- After receiving the other's SIG message, the signature is verified. If it is
|
||||
correct, the shared secret is calculated from the public keys exchanged in the
|
||||
KEX message using the Elliptic Curve Diffie-Helman algorithm.
|
||||
- The shared secret key is expanded using a PRF. Both nonces and an application
|
||||
- The shared secret key is expanded using a PRF. Both nonces and the application
|
||||
specific label are also used as input for the PRF.
|
||||
- An ACK message is sent only when doing key renegotiation, and is sent using
|
||||
the old encryption keys.
|
||||
|
@ -135,6 +135,7 @@ The signature is calculated over this string:
|
|||
- uint8_t initiator (0 = local peer, 1 = remote peer is initiator)
|
||||
- opaque remote_kex_message[1 + 32 + ECDH_SIZE]
|
||||
- opaque local_kex_message[1 + 32 + ECDH_SIZE]
|
||||
- opaque label[label_length]
|
||||
|
||||
The PRF is calculated as follows:
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue