[or-cvs] Factor out cell packing and unpacking
Nick Mathewson
nickm at seul.org
Wed Apr 16 17:44:35 UTC 2003
Update of /home/or/cvsroot/doc
In directory moria.mit.edu:/tmp/cvs-serv5455/doc
Modified Files:
tor-spec.txt
Log Message:
Factor out cell packing and unpacking
Index: tor-spec.txt
===================================================================
RCS file: /home/or/cvsroot/doc/tor-spec.txt,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -d -r1.10 -r1.11
--- tor-spec.txt 16 Apr 2003 16:19:27 -0000 1.10
+++ tor-spec.txt 16 Apr 2003 17:44:32 -0000 1.11
@@ -281,12 +281,6 @@
The value of Version is currently 2.
- The forward and backward ciphers fields can take the following values:
- 0: Identity
- 1: Single DES in OFB
- 2: RC4
- 3: Triple DES (encrypt-decrypt-encrypt) in OFB
-
The port and address field denote the IPV4 address and port of
the next onion router in the circuit, or are set to 0 for the
last hop.
@@ -316,7 +310,7 @@
D. Encrypt the first 128 bytes of M with the RSA key of
OR_I, using no padding. Encrypt the remaining portion of
- M with DES/OFB, using K1_I as a key and an all-0 IV.
+ M with 3DES/OFB, using K1_I as a key and an all-0 IV.
3. M is now the onion.
@@ -365,7 +359,7 @@
in the past, then tear down the circuit (see section 4.2).
Compute K1 through K3 as above. Use K1 to decrypt the rest
- of the onion using DES/OFB.
+ of the onion using 3DES/OFB.
If we are not the exit node, remove the first layer from the
decrypted onion, and send the remainder to the next OR
@@ -403,14 +397,14 @@
Otherwise, if the OR is not at the OP edge of the circuit (that is,
either an 'exit node' or a non-edge node), it de/encrypts the length
- field and the payload with DES/OFB, as follows:
+ field and the payload with 3DES/OFB, as follows:
'Forward' data cell (same direction as onion):
Use K2 as key; encrypt.
'Back' data cell (opposite direction from onion):
Use K3 as key; decrypt.
Otherwise, if the data cell has arrived to the OP edge of the circuit,
- the OP de/encrypts the length and payload fields with DES/OFB as
+ the OP de/encrypts the length and payload fields with 3DES/OFB as
follows:
OP sends data cell:
For I=1...N, decrypt with K2_I.
More information about the tor-commits
mailing list