is a gnutls_srp_server_credentials_t type
const gnutls_datum_t * seed
is the seed data, only needs to be valid until the
function returns; size of the seed must be greater than
unsigned int salt_length
is the length of the generated fake salts
This function sets the seed that is used to generate salts for
invalid (non-existent) usernames.
In order to prevent attackers from guessing valid usernames, when a
user does not exist gnutls generates a salt and a verifier and
proceeds with the protocol as usual. The authentication will
ultimately fail, but the client cannot tell whether the username is
valid (exists) or invalid.
If an attacker learns the seed, given a salt (which is part of the
handshake) which was generated when the seed was in use, it can tell
whether or not the authentication failed because of an unknown
username. This seed cannot be used to reveal application data or
salt_length should represent the salt length your application uses.
Generating fake salts longer than 20 bytes is not supported.
By default the seed is a random value, different each time a
gnutls_srp_server_credentials_t is allocated and fake salts are 16
This page is part of the GnuTLS (GnuTLS Transport Layer Security
Library) project. Information about the project can be found at
⟨http://www.gnutls.org/⟩. If you have a bug report for this manual
page, send it to firstname.lastname@example.org.. This page was obtained from the
tarball gnutls-3.5.9.tar.xz fetched from
⟨http://www.gnutls.org/download.html⟩ on 2017-04-25. If you discover
any rendering problems in this HTML version of the page, or you
believe there is a better or more up-to-date source for the page, or
you have corrections or improvements to the information in this
COLOPHON (which is not part of the original manual page), send a mail