[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[minion-cvs] Rename OAEP_OVERHEAD to PK_OVERHEAD_LEN



Update of /home/minion/cvsroot/doc/spec
In directory moria.mit.edu:/tmp/cvs-serv14253

Modified Files:
	E2E-spec.txt nym-spec.txt 
Log Message:
Rename OAEP_OVERHEAD to PK_OVERHEAD_LEN

Index: E2E-spec.txt
===================================================================
RCS file: /home/minion/cvsroot/doc/spec/E2E-spec.txt,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -d -r1.12 -r1.13
--- E2E-spec.txt	2 Oct 2003 14:23:32 -0000	1.12
+++ E2E-spec.txt	7 Oct 2003 19:56:10 -0000	1.13
@@ -429,7 +429,7 @@
 
    To send an encrypted forward message M to a user with an RSA public
    key PK with length PKLEN (in octets), we set PAYLOADS =
-   PACKETIZE(M, 28KB-OAEP_OVERHEAD+TAG_LEN-SPRP_KEY_LEN).  (We lose 42
+   PACKETIZE(M, 28KB-PK_OVERHEAD_LEN+TAG_LEN-SPRP_KEY_LEN).  (We lose 42
    octets to OAEP padding and 20 to encode the session key, but gain
    20 by spilling the encrypted data into the decoding tag.)
 
@@ -438,10 +438,10 @@
       Repeat:
            Let K = Rand(SPRP_KEY_LEN).
            Let P = K | PAYLOAD_i
-           Let P0 = PK_Encrypt(PK, P[0:PKLEN-OAEP_OVERHEAD])
+           Let P0 = PK_Encrypt(PK, P[0:PKLEN-PK_OVERHEAD_LEN])
       Until the most significant bit of P0[0] is equal to 1.
       Let P1 = SPRP_Encrypt(K, "END-TO-END ENCRYPT",
-                            P[PKLEN-OAEP_OVERHEAD: Len(P)-PKLEN-OAEP_OVERHEAD])
+                            P[PKLEN-PK_OVERHEAD_LEN: Len(P)-PKLEN-PK_OVERHEAD_LEN])
       Let TAG_i = P0[0:TAG_LEN]
       Let EPAYLOAD_i = P0[TAG_LEN:Len(P0)-TAG_LEN] | P1
 

Index: nym-spec.txt
===================================================================
RCS file: /home/minion/cvsroot/doc/spec/nym-spec.txt,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -d -r1.4 -r1.5
--- nym-spec.txt	1 Oct 2003 22:15:24 -0000	1.4
+++ nym-spec.txt	7 Oct 2003 19:56:10 -0000	1.5
@@ -523,7 +523,7 @@
 
      Let K = R(16).
      Let M_Enc = SPRP_Encrypt(K, "", M_P)
-     Let RSA_LEN = Len(PK_nym) - OAEP_OVERHEAD - 16
+     Let RSA_LEN = Len(PK_nym) - PK_OVERHEAD_LEN - 16
      Let RSA_PART = PK_Encrypt(PK_nym, K | M_Enc[0:RSA_LEN])
 
      Return RSA_PART | M_Enc[RSA_LEN:Len(M_Enc)-RSA_LEN]