Thread Client Hello question

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Thread Client Hello question

Jump to solution
1,801 Views
likeli
NXP Employee
NXP Employee

My customer is evaluating Thead stacks on KW41.

From Sniffer log, they found there is 330 bytes of “unknown extension” in the Client Hello message. Does anyone know what’s this for? Is it possible to remove it to reduce payload size of wireless communication?

Also, what’s the 168 bytes data in the Server Key Exchange message? Is it public key, or a & b?

gogoer

Labels (1)
1 Solution
1,643 Views
CommunityBot
Community Manager
This an automatic process.

We are marking this post as solved, due to the either low activity or any reply marked as correct.

If you have additional questions, please create a new post and reference to this closed post.

NXP Community!

View solution in original post

0 Kudos
2 Replies
1,644 Views
CommunityBot
Community Manager
This an automatic process.

We are marking this post as solved, due to the either low activity or any reply marked as correct.

If you have additional questions, please create a new post and reference to this closed post.

NXP Community!
0 Kudos
1,643 Views
haidong_zheng
NXP Employee
NXP Employee

Please refer https://tools.ietf.org/html/draft-hao-jpake-01

Client hello “unknown extension”  format  as below:

Extension jpake_key_kp_list:

Length:(330)dec (2 bytes)

octet string KP_X1:... (165bytes)

octet string KP_X2:...  (165bytes)

Server key Exchange message format as below:

/* Server Key Exchange format:

  struct

{

   curve_type: 0x03 (1 byte)

   namedcurve: 0x0017 (2 bytes ->secp256)

   jpake_key_kp:

octet string KP_Xs:... (165 bytes)

}ServerKeyExchange

*/