Thread Client Hello question

キャンセル
次の結果を表示 
表示  限定  | 次の代わりに検索 
もしかして: 

Thread Client Hello question

ソリューションへジャンプ
6,253件の閲覧回数
likeli
NXP Employee
NXP Employee

My customer is evaluating Thead stacks on KW41.

From Sniffer log, they found there is 330 bytes of “unknown extension” in the Client Hello message. Does anyone know what’s this for? Is it possible to remove it to reduce payload size of wireless communication?

Also, what’s the 168 bytes data in the Server Key Exchange message? Is it public key, or a & b?

gogoer

ラベル(1)
1 解決策
6,095件の閲覧回数
CommunityBot
Community Manager
This an automatic process.

We are marking this post as solved, due to the either low activity or any reply marked as correct.

If you have additional questions, please create a new post and reference to this closed post.

NXP Community!

元の投稿で解決策を見る

0 件の賞賛
返信
2 返答(返信)
6,096件の閲覧回数
CommunityBot
Community Manager
This an automatic process.

We are marking this post as solved, due to the either low activity or any reply marked as correct.

If you have additional questions, please create a new post and reference to this closed post.

NXP Community!
0 件の賞賛
返信
6,095件の閲覧回数
haidong_zheng
NXP Employee
NXP Employee

Please refer https://tools.ietf.org/html/draft-hao-jpake-01

Client hello “unknown extension”  format  as below:

Extension jpake_key_kp_list:

Length:(330)dec (2 bytes)

octet string KP_X1:... (165bytes)

octet string KP_X2:...  (165bytes)

Server key Exchange message format as below:

/* Server Key Exchange format:

  struct

{

   curve_type: 0x03 (1 byte)

   namedcurve: 0x0017 (2 bytes ->secp256)

   jpake_key_kp:

octet string KP_Xs:... (165 bytes)

}ServerKeyExchange

*/