[noise] expected length of messages during handshake

David Wong davidwong.crypto at gmail.com
Wed Nov 1 08:58:10 PDT 2017


Hello,

I'm guessing that a client/server application need to be able to
receive fragmented handshake messages. This becomes complicated when
we don't know what kind of length to expect (since a data can be sent
encrypted at the end of each message pattern).

This is also a problem post-handshake (btw I really think the spec
needs a post-handshake section, even if short and redundant) where
there are no indications for the expected lengths of received
ciphertext.

Did I miss something?

Cheers,
David


More information about the Noise mailing list