Thread Client Hello question

取消
显示结果 
显示  仅  | 搜索替代 
您的意思是: 
已解决

Thread Client Hello question

跳至解决方案
6,243 次查看
likeli
NXP Employee
NXP Employee

My customer is evaluating Thead stacks on KW41.

From Sniffer log, they found there is 330 bytes of “unknown extension” in the Client Hello message. Does anyone know what’s this for? Is it possible to remove it to reduce payload size of wireless communication?

Also, what’s the 168 bytes data in the Server Key Exchange message? Is it public key, or a & b?

gogoer

标签 (1)
1 解答
6,085 次查看
CommunityBot
Community Manager
This an automatic process.

We are marking this post as solved, due to the either low activity or any reply marked as correct.

If you have additional questions, please create a new post and reference to this closed post.

NXP Community!

在原帖中查看解决方案

0 项奖励
回复
2 回复数
6,086 次查看
CommunityBot
Community Manager
This an automatic process.

We are marking this post as solved, due to the either low activity or any reply marked as correct.

If you have additional questions, please create a new post and reference to this closed post.

NXP Community!
0 项奖励
回复
6,085 次查看
haidong_zheng
NXP Employee
NXP Employee

Please refer https://tools.ietf.org/html/draft-hao-jpake-01

Client hello “unknown extension”  format  as below:

Extension jpake_key_kp_list:

Length:(330)dec (2 bytes)

octet string KP_X1:... (165bytes)

octet string KP_X2:...  (165bytes)

Server key Exchange message format as below:

/* Server Key Exchange format:

  struct

{

   curve_type: 0x03 (1 byte)

   namedcurve: 0x0017 (2 bytes ->secp256)

   jpake_key_kp:

octet string KP_Xs:... (165 bytes)

}ServerKeyExchange

*/