[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r17561: {tor} fix a typo in tor-spec.txt (tor/trunk/doc/spec)
Author: nickm
Date: 2008-12-10 12:25:17 -0500 (Wed, 10 Dec 2008)
New Revision: 17561
Modified:
tor/trunk/doc/spec/tor-spec.txt
Log:
fix a typo in tor-spec.txt
Modified: tor/trunk/doc/spec/tor-spec.txt
===================================================================
--- tor/trunk/doc/spec/tor-spec.txt 2008-12-10 16:10:23 UTC (rev 17560)
+++ tor/trunk/doc/spec/tor-spec.txt 2008-12-10 17:25:17 UTC (rev 17561)
@@ -61,11 +61,9 @@
For a public-key cipher, we use RSA with 1024-bit keys and a fixed
exponent of 65537. We use OAEP-MGF1 padding, with SHA-1 as its digest
- function. We leave optional the "Label" parameter unset. (For OAEP
+ function. We leave the optional "Label" parameter unset. (For OAEP
padding, see ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1.pdf)
- [Nick, what does "we leave optional the Label parameter unset" mean? -RD]
-
For Diffie-Hellman, we use a generator (g) of 2. For the modulus (p), we
use the 1024-bit safe prime from rfc2409 section 6.2 whose hex
representation is:
@@ -382,7 +380,7 @@
This value is hybrid-encrypted (see 0.3) to Bob's onion key, giving
an onion-skin of:
PK-encrypted:
- Padding padding [PK_PAD_LEN bytes]
+ Padding [PK_PAD_LEN bytes]
Symmetric key [KEY_LEN bytes]
First part of g^x [PK_ENC_LEN-PK_PAD_LEN-KEY_LEN bytes]
Symmetrically encrypted: