From c24627fa6ffb09de364d92be9135ef3c4e7f620b Mon Sep 17 00:00:00 2001 From: Nick Mathewson Date: Wed, 10 Dec 2008 17:25:17 +0000 Subject: fix a typo in tor-spec.txt svn:r17561 --- doc/spec/tor-spec.txt | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/doc/spec/tor-spec.txt b/doc/spec/tor-spec.txt index 642c695b60..8c6508f6ee 100644 --- a/doc/spec/tor-spec.txt +++ b/doc/spec/tor-spec.txt @@ -61,11 +61,9 @@ see tor-design.pdf. For a public-key cipher, we use RSA with 1024-bit keys and a fixed exponent of 65537. We use OAEP-MGF1 padding, with SHA-1 as its digest - function. We leave optional the "Label" parameter unset. (For OAEP + function. We leave the optional "Label" parameter unset. (For OAEP padding, see ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1.pdf) - [Nick, what does "we leave optional the Label parameter unset" mean? -RD] - For Diffie-Hellman, we use a generator (g) of 2. For the modulus (p), we use the 1024-bit safe prime from rfc2409 section 6.2 whose hex representation is: @@ -382,7 +380,7 @@ see tor-design.pdf. This value is hybrid-encrypted (see 0.3) to Bob's onion key, giving an onion-skin of: PK-encrypted: - Padding padding [PK_PAD_LEN bytes] + Padding [PK_PAD_LEN bytes] Symmetric key [KEY_LEN bytes] First part of g^x [PK_ENC_LEN-PK_PAD_LEN-KEY_LEN bytes] Symmetrically encrypted: -- cgit v1.2.3-54-g00ecf