|
523 | 523 | //!
|
524 | 524 | //! Upon a successful completion of the OPAQUE protocol (the client runs login
|
525 | 525 | //! with the same password used during registration), the client and server have
|
526 |
| -//! access to a session key, which is a pseudorandomly distributed 32-byte |
527 |
| -//! string which only the client and server know. Multiple login runs using the |
| 526 | +//! access to a session key, which is a pseudorandomly distributed byte |
| 527 | +//! string (of length equal to the output size of [voprf::CipherSuite::Hash]) |
| 528 | +//! which only the client and server know. Multiple login runs using the |
528 | 529 | //! same password for the same client will produce different session keys,
|
529 | 530 | //! distributed as uniformly random strings. Thus, the session key can be used
|
530 | 531 | //! to establish a secure channel between the client and server.
|
|
620 | 621 | //!
|
621 | 622 | //! ## Export Key
|
622 | 623 | //!
|
623 |
| -//! The export key is a pseudorandomly distributed 32-byte string output by both |
624 |
| -//! the [Client Registration Finish](#client-registration-finish) and [Client |
625 |
| -//! Login Finish](#client-login-finish) steps. The same export key string will |
626 |
| -//! be output by both functions only if the exact same password is passed to |
627 |
| -//! [ClientRegistration::start] and [ClientLogin::start]. |
| 624 | +//! The export key is a pseudorandomly distributed byte string |
| 625 | +//! (of length equal to the output size of [voprf::CipherSuite::Hash]) output by |
| 626 | +//! both the [Client Registration Finish](#client-registration-finish) and |
| 627 | +//! [Client Login Finish](#client-login-finish) steps. The same export key |
| 628 | +//! string will be output by both functions only if the exact same password is |
| 629 | +//! passed to [ClientRegistration::start] and [ClientLogin::start]. |
628 | 630 | //!
|
629 | 631 | //! The export key retains as much secrecy as the password itself, and is
|
630 | 632 | //! similarly derived through an evaluation of the key stretching function.
|
|
0 commit comments