You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Fix to use fingerprint to find keys
* Improved the fingerprint calculation code and added hash
* Added multiple server support using `contextStr`
* Add unit test to `make check`
* Improve `src/wolfkeymgr` exit documentation
* Added example output for demo to `README.md`
-F <fprint> Fingerprint used for multiple servers (first 80-bit of pkey hash as hex string)
159
-
-n <name> Find key using public key name (hex string)
160
+
-F <fprint> Fingerprint of ephemeral public key (first 80-bit of pkey hash as hex string)
161
+
-C <ctxstr> Context string (used for multiple servers)
160
162
```
161
163
162
164
This client also support stress testing options:
163
165
* Use the thread pool "-t" to spin up more threads.
164
166
* Use the ETSI test client "-r" to make additional requests per thread.
165
-
* Use the "-n" command to find key using public key name (hex string of first 64 bytes of public key).
166
167
* Use the "-F" argument to get key for specific fingerprint (hex string of hash of public key - first 80 bits / 10 bytes)
168
+
* Use the "-C" command to include context string (used for multiple servers).
167
169
168
-
#### ETSI Fingerprint Names
169
-
170
-
The fingerprint is a SHA-256 hash of the long term public key with the first 80 bits returned in big endian format. This is used when keys are served for multiple servers concurrently where each server should use a different ephemeral key. If the fingerprint is blank the same key will be returned assuming it is within the expiration and use count restrictions.
171
-
172
-
#### ETSI Context Names
170
+
#### ETSI Fingerprint
173
171
174
-
The context is used to lookup an ephemeral key based on public key using the following scheme:
175
-
* ECC: Public X and Y limited to 32 digits each (64 total)
176
-
* DH: Public key truncated to 64 digits.
172
+
The fingerprint is a SHA-256 hash of the ephemeral public key with the first 80 bits (10 bytes) in big endian format. If the fingerprint is blank the current active key for that TLS group will be returned (assuming it is within the expiration and use count restrictions).
177
173
178
-
The "contextStr" used in the HTTP GET is converted to a hex string up to 128 characters.
174
+
The fingerprint is used to lookup an ephemeral key based on public key using the following scheme:
175
+
* ECC: Public X and Y hashed with SHA256 (first 10 bytes)
176
+
* DH: Public key hashed with SHA256 (first 10 bytes)
0 commit comments