aboutsummaryrefslogtreecommitdiff
path: root/spec/rend-spec-v3/hidden-service-descriptors-encryption-format-hs-desc-enc.md
diff options
context:
space:
mode:
Diffstat (limited to 'spec/rend-spec-v3/hidden-service-descriptors-encryption-format-hs-desc-enc.md')
-rw-r--r--spec/rend-spec-v3/hidden-service-descriptors-encryption-format-hs-desc-enc.md26
1 files changed, 13 insertions, 13 deletions
diff --git a/spec/rend-spec-v3/hidden-service-descriptors-encryption-format-hs-desc-enc.md b/spec/rend-spec-v3/hidden-service-descriptors-encryption-format-hs-desc-enc.md
index 719d4fa..834aceb 100644
--- a/spec/rend-spec-v3/hidden-service-descriptors-encryption-format-hs-desc-enc.md
+++ b/spec/rend-spec-v3/hidden-service-descriptors-encryption-format-hs-desc-enc.md
@@ -1,6 +1,6 @@
<a id="rend-spec-v3.txt-2.5"></a>
-## Hidden service descriptors: encryption format [HS-DESC-ENC]
+## Hidden service descriptors: encryption format \[HS-DESC-ENC\]
Hidden service descriptors are protected by two layers of encryption.
Clients need to decrypt both layers to connect to the hidden service.
@@ -12,7 +12,7 @@ and protects against entities that do not possess valid client credentials.
<a id="rend-spec-v3.txt-2.5.1"></a>
-### First layer of encryption [HS-DESC-FIRST-LAYER]
+### First layer of encryption \[HS-DESC-FIRST-LAYER\]
The first layer of HS descriptor encryption is designed to protect
descriptor confidentiality against entities who don't know the public
@@ -23,7 +23,7 @@ identity key of the hidden service.
#### First layer encryption logic
The encryption keys and format for the first layer of encryption are
-generated as specified in [HS-DESC-ENCRYPTION-KEYS] with customization
+generated as specified in \[HS-DESC-ENCRYPTION-KEYS\] with customization
parameters:
```text
@@ -31,8 +31,8 @@ parameters:
STRING_CONSTANT = "hsdir-superencrypted-data"
```
-The encryption scheme in [HS-DESC-ENCRYPTION-KEYS] uses the service
-credential which is derived from the public identity key (see [SUBCRED]) to
+The encryption scheme in \[HS-DESC-ENCRYPTION-KEYS\] uses the service
+credential which is derived from the public identity key (see \[SUBCRED\]) to
ensure that only entities who know the public identity key can decrypt the
first descriptor layer.
@@ -64,7 +64,7 @@ Here are all the supported fields:
"desc-auth-type" SP type NL
-[Exactly once]
+\[Exactly once\]
```text
This field contains the type of authorization used to protect the
@@ -138,7 +138,7 @@ Here are all the supported fields:
<a id="rend-spec-v3.txt-2.5.1.3"></a>
-#### Client behavior [FIRST-LAYER-CLIENT-BEHAVIOR]
+#### Client behavior \[FIRST-LAYER-CLIENT-BEHAVIOR\]
```text
The goal of clients at this stage is to decrypt the "encrypted" field as
@@ -183,7 +183,7 @@ Here are all the supported fields:
<a id="rend-spec-v3.txt-2.5.2"></a>
-### Second layer of encryption [HS-DESC-SECOND-LAYER]
+### Second layer of encryption \[HS-DESC-SECOND-LAYER\]
The second layer of descriptor encryption is designed to protect descriptor
confidentiality against unauthorized clients. If client authorization is
@@ -199,7 +199,7 @@ does not offer any additional security, but is still used.
#### Second layer encryption keys
The encryption keys and format for the second layer of encryption are
-generated as specified in [HS-DESC-ENCRYPTION-KEYS] with customization
+generated as specified in \[HS-DESC-ENCRYPTION-KEYS\] with customization
parameters as follows:
```text
@@ -220,7 +220,7 @@ list of intro points etc. The plaintext has the following format:
"create2-formats" SP formats NL
-[Exactly once]
+\[Exactly once\]
```text
A space-separated list of integers denoting CREATE2 cell HTYPEs
@@ -387,7 +387,7 @@ Other encryption and authentication key formats are allowed; clients
should ignore ones they do not recognize.
Clients who manage to extract the introduction points of the hidden service
-can proceed with the introduction protocol as specified in [INTRO-PROTOCOL].
+can proceed with the introduction protocol as specified in \[INTRO-PROTOCOL\].
Compatibility note: At least some versions of OnionBalance do not include
a final newline when generating this inner plaintext section; other
@@ -396,7 +396,7 @@ newline.
<a id="rend-spec-v3.txt-2.5.3"></a>
-### Deriving hidden service descriptor encryption keys [HS-DESC-ENCRYPTION-KEYS]
+### Deriving hidden service descriptor encryption keys \[HS-DESC-ENCRYPTION-KEYS\]
In this section we present the generic encryption format for hidden service
descriptors. We use the same encryption format in both encryption layers,
@@ -439,7 +439,7 @@ Here is the key generation logic:
<a id="rend-spec-v3.txt-2.5.4"></a>
-### Number of introduction points [NUM_INTRO_POINT]
+### Number of introduction points \[NUM_INTRO_POINT\]
This section defines how many introduction points an hidden service
descriptor can have at minimum, by default and the maximum: