Open Bug 1312976 Opened 8 years ago Updated 11 months ago

Add support for exporters on SHA 384 cipher suites

Categories

(NSS :: Libraries, defect, P3)

3.28

Tracking

(Not tracked)

ASSIGNED

People

(Reporter: mt, Assigned: mt)

References

Details

(Whiteboard: [nss-fx])

Attachments

(1 file)

We do absolutely the wrong thing for exporting when the PRF hash is SHA-384.

See bug 1310061 for details.
Attached patch bug1312976.patchSplinter Review
Bob, we recently discovered that Elio's work on implementing AES-256-GCM and SHA-384 was incomplete.  This makes the TLS 1.2 PRF more generic (it takes a hash argument).  Can you check that my pk11 code isn't completely bonkers?
Assignee: nobody → martin.thomson
Status: NEW → ASSIGNED
Attachment #8806201 - Flags: review?(rrelyea)
Oh, to be clear here, I am treating mechanisms as requiring ABI compatibility.  On that basis, none of the existing mechanisms are usable here.  The only one to take a variable hash function also limits the size of its output (to the size of the TLS Finished).
if we have problems with the mechansims as defined, we should submit patches back to the OASIS spec rather than define yet another NSS specific version.
Note that the existing mechanisms I'm talking about are also NSS internal mechanisms.
Oh, and I think that we should ask OASIS for help here, but TLS 1.3 is a moving target, and clearly TLS 1.2 never got the proper treatment.
Priority: -- → P3
See Also: → 1484077
side question: is there any command line tool that can print and/or derive the TLS Exporter values? I don't see anything in the tstclnt help meesage in 3.39.0...
Writing an addition to tstclnt or selfserv (or both) would be relatively straightforward.  I would suggest that you open a new bug for that though.
(In reply to Martin Thomson [:mt:] from comment #9)
> Writing an addition to tstclnt or selfserv (or both) would be relatively
> straightforward.  I would suggest that you open a new bug for that though.

done, bug 1494063
Severity: normal → S4
Whiteboard: [nss-fx]
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: