gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[lsd0001] branch master updated: use 'plaintext' instead of 'message' fo


From: gnunet
Subject: [lsd0001] branch master updated: use 'plaintext' instead of 'message' for consistency in the text
Date: Fri, 30 Jun 2023 19:08:20 +0200

This is an automated email from the git hooks/post-receive script.

grothoff pushed a commit to branch master
in repository lsd0001.

The following commit(s) were added to refs/heads/master by this push:
     new d383d75  use 'plaintext' instead of 'message' for consistency in the 
text
d383d75 is described below

commit d383d75b115e71bb1172cace4571266eca02f9cb
Author: Christian Grothoff <christian@grothoff.org>
AuthorDate: Fri Jun 30 19:08:16 2023 +0200

    use 'plaintext' instead of 'message' for consistency in the text
---
 draft-schanzen-gns.xml | 18 +++++++++---------
 1 file changed, 9 insertions(+), 9 deletions(-)

diff --git a/draft-schanzen-gns.xml b/draft-schanzen-gns.xml
index fbf778c..bfad4fe 100644
--- a/draft-schanzen-gns.xml
+++ b/draft-schanzen-gns.xml
@@ -529,19 +529,19 @@ 
example.000G006K2TJNMD9VTCYRX7BRVV3HAEPS15E6NHDXKPJA1KAJJEG9AFF884
          blinding zk with different values for the label must result
          in different, unlinkable zk' values.
        </dd>
-       <dt>S-Encrypt(zk,label,expiration,message) -> ciphertext</dt>
+       <dt>S-Encrypt(zk,label,expiration,plaintext) -> ciphertext</dt>
        <dd>
-         is a symmetric encryption function which encrypts the record
-         data based on key material derived from the zone key,
-         a label, and an expiration timestamp.
+         is a symmetric encryption function which encrypts the plaintext
+         to derive ciphertext based on key material derived from the zone key 
zk,
+         a label and an expiration timestamp.
          In order to leverage performance-enhancing caching features of certain
          underlying storages, in particular DHTs, a deterministic encryption
          scheme is recommended.
        </dd>
-       <dt>S-Decrypt(zk,label,expiration,ciphertext) -> message</dt>
+       <dt>S-Decrypt(zk,label,expiration,ciphertext) -> plaintext</dt>
        <dd>
-         is a symmetric decryption function which decrypts the encrypted record
-         data based on key material derived from the zone key,
+         is a symmetric decryption function which decrypts the ciphertext
+         into plaintext based on key material derived from the zone key,
          a label, and an expiration timestamp.
        </dd>
        <dt>Sign(d,message) -> signature</dt>
@@ -1436,13 +1436,13 @@ VerifyDerived(zk,label,message,signature):
            (XSalsa20-Poly1305):
          </t>
          <artwork name="" type="" align="left" alt=""><![CDATA[
-S-Encrypt(zk,label,expiration,message):
+S-Encrypt(zk,label,expiration,plaintext):
   PRK_k := HKDF-Extract ("gns-xsalsa-ctx-key", zk)
   PRK_n := HKDF-Extract ("gns-xsalsa-ctx-iv", zk)
   K := HKDF-Expand (PRK_k, label, 256 / 8)
   NONCE := HKDF-Expand (PRK_n, label, 128 / 8)
   IV := NONCE || expiration
-  return XSalsa20-Poly1305(K, IV, message)
+  return XSalsa20-Poly1305(K, IV, plaintext)
 
 S-Decrypt(zk,label,expiration,ciphertext):
   PRK_k := HKDF-Extract ("gns-xsalsa-ctx-key", zk)

-- 
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]