Closed thiccaxe closed 2 months ago
It could just be the same keys used for the chacha in pair setup
Not really sure, tried a few permutations/combinations of HKDF and what not. will monkey patch it for now by forcing ios client to reconnect (and thus use the "proper" pair verify procedure)
I confirmed that this is the behavior, and ios makes no attempt at pair-verify right after pair-setup (through device logs)
ok, success! its just the srp shared key!
This broke just now, for some reason, I do not know why.
Right after pairing, _systemInfo
is sent, and decrypted properly. Then there are some issues with the next packet. Investigating.
The data is definitely encrypted, unknown what keys.
you just need to set the nonce_length to 12 :facepalm:
maybe. I'm not really sure though. However, the logs make sense. the question is what keys ios decides to use for chacha!