Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

5.4. Session Key Computation - how to derive the salt #47

Open
sschulz-t opened this issue Mar 5, 2024 · 2 comments
Open

5.4. Session Key Computation - how to derive the salt #47

sschulz-t opened this issue Mar 5, 2024 · 2 comments

Comments

@sschulz-t
Copy link

sschulz-t commented Mar 5, 2024

I have a question regarding the current draft https://openid.net/specs/openid-4-verifiable-presentations-over-ble-1_0.html.

In section “5.4. Session Key Computation” you specify the key exchange and state that the salt should be derived via sha-256:

openid4vp_ble/main.md

Lines 273 to 287 in e5370d5

The Verifier MUST derive its session key using HKDF as defined in [@!RFC5869] with the following parameters:
* Hash: SHA-256
* IKM: Zab
* salt: SHA-256
* info: “SKVerifier” (encoded as ASCII string)
* L: 32 octets
The Wallet MUST derive its session key using HKDF as defined in [@!RFC5869] with the following parameters:
* Hash: SHA-256
* IKM: Zab
* salt: SHA-256
* info: “SKWallet” (encoded as ASCII string)
* L: 32 octets

What is the input for the hash function?

seems like there is a related ongoing discussion in this pr: #18

@gsasikumar
Copy link
Collaborator

Please assume we will use a SHA256(random nonce). It is under discussion in #18 . If you would like to contribute it would be nice to discuss there.

@sschulz-t
Copy link
Author

Ok, i will use the sha256(nonce from identify packet) for now (using the raw bytes of the nonce).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants