On Fri, Nov 1, 2019 at 3:54 PM Rob Sayre <say...@gmail.com> wrote: > > > On Fri, Nov 1, 2019 at 3:39 PM Eric Rescorla <e...@rtfm.com> wrote: > >> >>>> >>> I see. But is there any reason to make these inputs predictably zero by >>> spec? >>> >> >> Absent some reason not to, this seems like a reasonable design choice. At >> minimum, it has the advantage that it's easy to detect some classes of >> implementation errors. >> > > I don't think the current spec is a good idea. It mandates padding with > zeros, and lets servers dictate a length. I think the client should dictate > the length, at least. >
This is a separate issue from the structure of the padding. >> I wouldn't exactly call that misreading. >>> >> >> This seems like a definitional question that is not worth debating. >> > > Hey now, you're the one that wrote "misreading" initially. If "additional > data" is not what's used as "additional authenticated data" in the end, > fine. > NSS does not include the leading 0s as part of the computation of the AAD that appears on the wire. To the extent to which you may have believed otherwise based on your reading of the code, that is not a correct understanding. -Ekr
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls