[Pkg-privacy-commits] [libotr] 32/225: * Protocol-v2.html: Fix a typo, and correct the documentation regarding when MAC keys are revealed.
Ximin Luo
infinity0 at moszumanska.debian.org
Sat Aug 22 12:44:48 UTC 2015
This is an automated email from the git hooks/post-receive script.
infinity0 pushed a commit to branch master
in repository libotr.
commit 58fd90cb77c836ff9fa762e91d2b2becc6d5aae8
Author: cypherpunk <cypherpunk>
Date: Fri May 12 14:14:17 2006 +0000
* Protocol-v2.html: Fix a typo, and correct the documentation
regarding when MAC keys are revealed.
---
ChangeLog | 5 +++++
Protocol-v2.html | 13 +++++++------
2 files changed, 12 insertions(+), 6 deletions(-)
diff --git a/ChangeLog b/ChangeLog
index 6d6bb2a..862ec5f 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,8 @@
+2006-05-09
+
+ * Protocol-v2.html: Fix a typo, and correct the documentation
+ regarding when MAC keys are revealed.
+
2006-04-13
* src/context.h: Change "struct fingerprint" to "struct
diff --git a/Protocol-v2.html b/Protocol-v2.html
index b24dad0..8c001e9 100644
--- a/Protocol-v2.html
+++ b/Protocol-v2.html
@@ -178,7 +178,7 @@ receiving AES key, ek, and the receiving MAC key, mk, as detailed
below. (These will be the same as the keys Alice generated, above.)</li>
<li>Uses mk to verify MAC<sub>mk</sub>(T<sub>A</sub>).</li>
<li>Uses ek and ctr to decrypt
-AES-CTR<sub>ek,ctr</sub>(T<sub>A</sub>).</li>
+AES-CTR<sub>ek,ctr</sub>(msg).</li>
</ol>
</li>
</ul>
@@ -690,12 +690,13 @@ receiving AES key.</li>
</ul>
<h4>Revealing MAC keys</h4>
<p>Whenever you are about to forget either one of your old D-H key pairs, or
-one of your correspondent's old D-H public keys, take all of the MAC keys
-that were generated by that key (note that there are up to four: the
-sending and receiving MAC keys produced by the pairings of that key with
+one of your correspondent's old D-H public keys, take all of the
+receiving MAC keys
+that were generated by that key (note that there are up to two: the
+receiving MAC keys produced by the pairings of that key with
each of two of the other side's keys; but note that you only need to
-take MAC keys that were actually used to either create a MAC on a
-message, or verify a MAC on a message), and put them (as a set of
+take MAC keys that were actually used to verify a MAC on a message), and
+put them (as a set of
concatenated 20-byte values) into the "Old MAC keys to be revealed"
section of the next Data Message you send. This in done to allow the
forgeability of OTR transcripts: once the MAC keys are revealed, anyone
--
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-privacy/packages/libotr.git
More information about the Pkg-privacy-commits
mailing list