We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
I have a question regarding the current draft https://openid.net/specs/openid-4-verifiable-presentations-over-ble-1_0.html.
In section “5.4. Session Key Computation” you specify the key exchange and state that the salt should be derived via sha-256:
openid4vp_ble/main.md
Lines 273 to 287 in e5370d5
What is the input for the hash function?
seems like there is a related ongoing discussion in this pr: #18
The text was updated successfully, but these errors were encountered:
Please assume we will use a SHA256(random nonce). It is under discussion in #18 . If you would like to contribute it would be nice to discuss there.
Sorry, something went wrong.
Ok, i will use the sha256(nonce from identify packet) for now (using the raw bytes of the nonce).
No branches or pull requests
I have a question regarding the current draft https://openid.net/specs/openid-4-verifiable-presentations-over-ble-1_0.html.
In section “5.4. Session Key Computation” you specify the key exchange and state that the salt should be derived via sha-256:
openid4vp_ble/main.md
Lines 273 to 287 in e5370d5
What is the input for the hash function?
seems like there is a related ongoing discussion in this pr: #18
The text was updated successfully, but these errors were encountered: