Hi Andy,

4347, section 4.2.6
"However, in order to remove sensitivity to fragmentation, the Finished MAC
MUST be computed as if each handshake message had been send as a single
fragment."

My interpretation is that you re-assemble all fragments and fix the
handshake
header as if it is a single fragment before MAC calculation. (ie. with
frag_len = len, frag_offset = 0)

Thanks,
Alex.

On 9/26/07, Andy Polyakov <[EMAIL PROTECTED]> wrote:
>
> > 4) Handshake "headers" are omitted in the signature computation in
> > both CertificateVerify and Finished messages.
> > (RFC 4347 does not clearly state what is to be included. However,
> > according to the TLS v1.1 (RFC 4346), it shall be the complete handshake
> > message, starting from Handshake.msg_type. However, OpenSSL starts at
> > Handshake.body)
>
> 4347 specifies that signature computation must be insensitive to
> fragmentation. Handshake header is not same as in TLS and payload is
> therefore natural choice for such invariant. Would you suggest to hash
> fictitious header with message type and length? Have you asked for
> comment on this elsewhere? A.
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> Development Mailing List                       [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]
>

Reply via email to