-
Notifications
You must be signed in to change notification settings - Fork 294
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
implicitly generate HMAC-secret #231
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM for storage.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We still pass the conformance tool (only tested HMAC-Extension) with this PR.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
I'll let @gendx approve too and this can be merged
This PR implements the new version of the HMAC-secret extension. It does so by reverting the extension of key handles in #218, now implicitly creating
cred_random
values deterministically from the credential and 2 new device secrets.Part of #106 , but backwards compatible to the 2.0 version.
@jmichelp for checking the idea
@ia0 for storage
optional FYI @gendx for crypto (i.e.
generate_cred_random
)