Skip to content

Conversation

@BrianSipos
Copy link
Contributor

@BrianSipos BrianSipos commented Oct 29, 2025

This deals only with the SHA-2 variants of direct+HKDF, not the AES-MAC variants (which I don't fully understand to even try to implement).

Closes #35
Closes #130
Closes #139

@BrianSipos
Copy link
Contributor Author

This PR does have an API change that for MacMessage and EncMessage, the direct shared key needs to be set on the first recipient instead of on the message itself (because the message layer-0 key is always derived from a recipient key). I think this was an inconsistency in the original API for direct key use, but there could be a workaround for API compatibility (e.g. only set the self.key if it is None).

@BrianSipos BrianSipos marked this pull request as ready for review October 29, 2025 14:09
@BrianSipos
Copy link
Contributor Author

If there is a need for direct+HKDF-SHA-256 test inputs, one of the examples from RFC 5869 could be used (one has a salt and one does not).

@BrianSipos BrianSipos force-pushed the 130-enable-direct-hkdf-sha branch from 65658ba to bb415b2 Compare November 19, 2025 16:16
@BrianSipos BrianSipos force-pushed the 130-enable-direct-hkdf-sha branch from bb415b2 to fdda499 Compare December 17, 2025 02:37
@sonarqubecloud
Copy link

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

1 participant