Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

GH-525: Fix sntrup761x25519-sha512 #528

Merged
merged 1 commit into from
Jul 15, 2024
Merged

Conversation

tomaswolf
Copy link
Member

Because all other KEX algorithms treat the secret resulting from the key agreement as "mpint", our key agreements all returned the "mpint" representation of the result of the key agreement.

But sntrup761x25519-sha512 needs the raw 32 bytes of the key agreement (curve25519-sha256).

Add a flag to XDH that determines whether it returns the raw bytes or the "mpint" bytes.

Fixes #525.

Because all other KEX algorithms treat the secret resulting from the
key agreement as "mpint", our key agreements all returned the "mpint"
representation of the result of the key agreement.

But sntrup761x25519-sha512 needs the raw 32 bytes of the key agreement
(curve25519-sha256).

Add a flag to XDH that determines whether it returns the raw bytes or
the "mpint" bytes.

Bug: apache#525
@tomaswolf tomaswolf merged commit 5b00c1f into apache:master Jul 15, 2024
8 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

sntrup761x25519-sha512@openssh.com KEX causing "incorrect signature" with OpenSSH client
1 participant