On Wed, 7 May 2025 04:27:10 GMT, Bradford Wetmore <wetm...@openjdk.org> wrote:

>> src/java.base/share/classes/sun/security/ssl/ServerHello.java line 1222:
>> 
>>> 1220:             CipherSuite.HashAlg hashAlg = 
>>> hc.negotiatedCipherSuite.hashAlg;
>>> 1221:             KDF hkdf = KDF.getInstance(hashAlg.hkdfAlgorithm);
>>> 1222:             SecretKey earlySecret = hkdf.deriveKey("TlsEarlySecret",
>> 
>> I'm a little worried that the proper number of salt zeros are now expected 
>> to be known in the KDF deriveKey code instead of specified specifically here 
>> (and in other similar places).  Should we consider specifying them here and 
>> the other places instead to play it safe?
>
> I just found that we had talked about this previously.  What was your 
> reasoning for pulling it?  
> 
> Call me paranoid, but I'm not seeing where the [JDK 24 
> javadocs](https://docs.oracle.com/en/java/javase/24/docs/api/java.base/javax/crypto/spec/HKDFParameterSpec.Builder.html#addSalt(byte%5B%5D))
>  discuss what happens if salt is not supplied.  [RFC 8446/Section 
> 7.1](https://www.rfc-editor.org/rfc/rfc8446.html#section-7.1) states:
> 
>      -  "0" indicates a string of Hash.length bytes set to zero.

Ok, I will add it back just to be safe.

-------------

PR Review Comment: https://git.openjdk.org/jdk/pull/24393#discussion_r2080292640

Reply via email to