From 88bf0e166c816a79824418c323d79487c96e17b9 Mon Sep 17 00:00:00 2001 From: Pekka Riikonen Date: Tue, 3 Sep 2002 10:50:18 +0000 Subject: [PATCH] updates --- doc/draft-riikonen-silc-ke-auth-06.nroff | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/doc/draft-riikonen-silc-ke-auth-06.nroff b/doc/draft-riikonen-silc-ke-auth-06.nroff index 6b768a3d..cedfc216 100644 --- a/doc/draft-riikonen-silc-ke-auth-06.nroff +++ b/doc/draft-riikonen-silc-ke-auth-06.nroff @@ -616,12 +616,12 @@ protocol produces a hash value HASH as well. The keys MUST be derived from the key material as follows: .in 6 -Sending Initial Vector (IV) = hash(0 | KEY | HASH) -Receiving Initial Vector (IV) = hash(1 | KEY | HASH) -Sending Encryption Key = hash(2 | KEY | HASH) -Receiving Encryption Key = hash(3 | KEY | HASH) -Sending HMAC Key = hash(4 | KEY | HASH) -Receiving HMAC Key = hash(5 | KEY | HASH) +Sending Initial Vector (IV) = hash(0x0 | KEY | HASH) +Receiving Initial Vector (IV) = hash(0x1 | KEY | HASH) +Sending Encryption Key = hash(0x2 | KEY | HASH) +Receiving Encryption Key = hash(0x3 | KEY | HASH) +Sending HMAC Key = hash(0x4 | KEY | HASH) +Receiving HMAC Key = hash(0x5 | KEY | HASH) .in 3 @@ -638,14 +638,14 @@ output is too short for the encryption algorithm more key material MUST be produced in the following manner: .in 6 -K1 = hash(2 | KEY | HASH) +K1 = hash(0x2 | KEY | HASH) K2 = hash(KEY | HASH | K1) K3 = hash(KEY | HASH | K1 | K2) ... Sending Encryption Key = K1 | K2 | K3 ... -K1 = hash(3 | KEY | HASH) +K1 = hash(0x3 | KEY | HASH) K2 = hash(KEY | HASH | K1) K3 = hash(KEY | HASH | K1 | K2) ... -- 2.24.0