spec fixes

This commit is contained in:
zzz
2025-03-05 05:33:36 -05:00
parent 09cb1a9ec0
commit cdf5184f35
8 changed files with 27 additions and 27 deletions

View File

@ -3,8 +3,8 @@ ECIES-X25519 Router Messages
=============================
.. meta::
:category: Protocols
:lastupdated: 2021-01
:accuratefor: 0.9.49
:lastupdated: 2025-03
:accuratefor: 0.9.65
.. contents::
@ -271,7 +271,7 @@ This is the same as specified in [Tunnel-Creation-ECIES]_ and [Prop152]_ for tun
//chainKey = keydata[0:31]
// AEAD parameters
k = keydata[32:64]
k = keydata[32:63]
n = 0
plaintext = 464 byte build request record
ad = h

View File

@ -3,8 +3,8 @@ ECIES-X25519-AEAD-Ratchet
=========================
.. meta::
:category: Protocols
:lastupdated: 2024-08
:accuratefor: 0.9.63
:lastupdated: 2025-03
:accuratefor: 0.9.65
.. contents::
@ -892,7 +892,7 @@ This is the "e" message pattern:
chainKey = keydata[0:31]
// AEAD parameters
k = keydata[32:64]
k = keydata[32:63]
n = 0
ad = h
ciphertext = ENCRYPT(k, n, flags/static key section, ad)
@ -936,7 +936,7 @@ This is the "ss" message pattern:
chainKey = keydata[0:31]
// AEAD parameters
k = keydata[32:64]
k = keydata[32:63]
n = 0
ad = h
ciphertext = ENCRYPT(k, n, payload, ad)
@ -1141,7 +1141,7 @@ KDF for Reply Key Section Encrypted Contents
chainKey = keydata[0:31]
// AEAD parameters
k = keydata[32:64]
k = keydata[32:63]
n = 0
ad = h
ciphertext = ENCRYPT(k, n, ZEROLEN, ad)

View File

@ -5,7 +5,7 @@ ECIES-X25519-AEAD-Ratchet
:author: zzz, chisana, orignal
:created: 2018-11-22
:thread: http://zzz.i2p/topics/2639
:lastupdated: 2020-11-12
:lastupdated: 2025-03-05
:status: Closed
:target: 0.9.46
:implementedin: 0.9.46
@ -1109,7 +1109,7 @@ This is the "e" message pattern:
chainKey = keydata[0:31]
// AEAD parameters
k = keydata[32:64]
k = keydata[32:63]
n = 0
ad = h
ciphertext = ENCRYPT(k, n, flags/static key section, ad)
@ -1153,7 +1153,7 @@ This is the "ss" message pattern:
chainKey = keydata[0:31]
// AEAD parameters
k = keydata[32:64]
k = keydata[32:63]
n = 0
ad = h
ciphertext = ENCRYPT(k, n, payload, ad)
@ -1358,7 +1358,7 @@ KDF for Reply Key Section Encrypted Contents
chainKey = keydata[0:31]
// AEAD parameters
k = keydata[32:64]
k = keydata[32:63]
n = 0
ad = h
ciphertext = ENCRYPT(k, n, ZEROLEN, ad)

View File

@ -5,7 +5,7 @@ ECIES Tunnels
:author: chisana, zzz, orignal
:created: 2019-07-04
:thread: http://zzz.i2p/topics/2737
:lastupdated: 2021-03-21
:lastupdated: 2025-03-05
:status: Closed
:target: 0.9.48
:implementedin: 0.9.48
@ -700,7 +700,7 @@ Failing to use unique keys opens an attack vector for colluding hops to confirm
chainKey = keydata[0:31]
// AEAD parameters
k = keydata[32:64]
k = keydata[32:63]
n = 0
plaintext = 464 byte build request record
ad = h

View File

@ -5,7 +5,7 @@ ECIES Routers
:author: zzz, orignal
:created: 2020-09-01
:thread: http://zzz.i2p/topics/2950
:lastupdated: 2021-07-31
:lastupdated: 2025-03-05
:status: Closed
:target: 0.9.51
@ -331,7 +331,7 @@ This is the same as specified in [Tunnel-Creation-ECIES]_ and [Prop152]_ for tun
//chainKey = keydata[0:31]
// AEAD parameters
k = keydata[32:64]
k = keydata[32:63]
n = 0
plaintext = 464 byte build request record
ad = h

View File

@ -5,7 +5,7 @@ SSU2
:author: eyedeekay, orignal, zlatinb, zzz
:created: 2021-09-12
:thread: http://zzz.i2p/topics/2612
:lastupdated: 2024-01-05
:lastupdated: 2025-03-05
:status: Closed
:target: 0.9.56
@ -3463,7 +3463,7 @@ KDF for Session Request
chainKey = keydata[0:31]
// AEAD parameters
k = keydata[32:64]
k = keydata[32:63]
n = 0
ad = h
ciphertext = ENCRYPT(k, n, payload, ad)
@ -3764,7 +3764,7 @@ KDF for Session Created and Session Confirmed part 1
chainKey = keydata[0:31]
// AEAD parameters
k = keydata[32:64]
k = keydata[32:63]
n = 0
ad = h
ciphertext = ENCRYPT(k, n, payload, ad)
@ -4044,7 +4044,7 @@ This is the "se" message pattern:
chainKey = keydata[0:31]
// AEAD parameters
k = keydata[32:64]
k = keydata[32:63]
n = 0
ad = h
ciphertext = ENCRYPT(k, n, payload, ad)

View File

@ -3,8 +3,8 @@ SSU2
======
.. meta::
:category: Transports
:lastupdated: 2024-11
:accuratefor: 0.9.64
:lastupdated: 2025-03
:accuratefor: 0.9.65
.. contents::
@ -1075,7 +1075,7 @@ KDF for Session Request
chainKey = keydata[0:31]
// AEAD parameters
k = keydata[32:64]
k = keydata[32:63]
n = 0
ad = h
ciphertext = ENCRYPT(k, n, payload, ad)
@ -1375,7 +1375,7 @@ KDF for Session Created and Session Confirmed part 1
chainKey = keydata[0:31]
// AEAD parameters
k = keydata[32:64]
k = keydata[32:63]
n = 0
ad = h
ciphertext = ENCRYPT(k, n, payload, ad)
@ -1654,7 +1654,7 @@ This is the "se" message pattern:
chainKey = keydata[0:31]
// AEAD parameters
k = keydata[32:64]
k = keydata[32:63]
n = 0
ad = h
ciphertext = ENCRYPT(k, n, payload, ad)

View File

@ -3,7 +3,7 @@ ECIES-X25519 Tunnel Creation
=============================
.. meta::
:category: Protocols
:lastupdated: 2024-12
:lastupdated: 2025-03
:accuratefor: 0.9.65
.. contents::
@ -489,7 +489,7 @@ Failing to use unique keys opens an attack vector for colluding hops to confirm
chainKey = keydata[0:31]
// AEAD parameters
k = keydata[32:64]
k = keydata[32:63]
n = 0
plaintext = 464 byte build request record
ad = h