Skip to content

Commit

Permalink
Script updating gh-pages from 80e9e59. [ci skip]
Browse files Browse the repository at this point in the history
  • Loading branch information
ID Bot committed May 19, 2020
1 parent e96fa34 commit a0675fa
Show file tree
Hide file tree
Showing 3 changed files with 1,838 additions and 1,838 deletions.
22 changes: 11 additions & 11 deletions draft-ietf-quic-tls.html
Expand Up @@ -3334,7 +3334,7 @@ <h2 id="name-client-initial">
encoding for a packet number of 2:<a href="#section-a.2-3" class="pilcrow"></a></p>
<div class="artwork art-text alignLeft" id="section-a.2-4">
<pre>
c3ff00001b088394c8f03e5157080000449e00000002
c3ff00001c088394c8f03e5157080000449e00000002
</pre><a href="#section-a.2-4" class="pilcrow"></a>
</div>
<p id="section-a.2-5">Protecting the payload produces output that is sampled for header protection.
Expand All @@ -3351,13 +3351,13 @@ <h2 id="name-client-initial">
= c0
header[18..21] ^= mask[1..4]
= 3b343aa8
header = c0ff00001b088394c8f03e5157080000449e3b343aa8
header = c0ff00001c088394c8f03e5157080000449e3b343aa8
</pre><a href="#section-a.2-6" class="pilcrow"></a>
</div>
<p id="section-a.2-7">The resulting protected packet is:<a href="#section-a.2-7" class="pilcrow"></a></p>
<div class="artwork art-text alignLeft" id="section-a.2-8">
<pre>
c0ff00001b088394c8f03e5157080000 449e3b343aa8535064a4268a0d9d7b1c
c0ff00001c088394c8f03e5157080000 449e3b343aa8535064a4268a0d9d7b1c
9d250ae355162276e9b1e3011ef6bbc0 ab48ad5bcc2681e953857ca62becd752
4daac473e68d7405fbba4e9ee616c870 38bdbe908c06d9605d9ac49030359eec
b1d05a14e117db8cede2bb09d0dbbfee 271cb374d8f10abec82d0f59a1dee29f
Expand Down Expand Up @@ -3394,7 +3394,7 @@ <h2 id="name-client-initial">
cd191a58829104d6075c5594f627ca50 6bf181daec940f4a4f3af0074eee89da
acde6758312622d4fa675b39f728e062 d2bee680d8f41a597c262648bb18bcfc
13c8b3d97b1a77b2ac3af745d61a34cc 4709865bac824a94bb19058015e4e42d
38d3b779d72edc00c5cd088eff802b05
ea5388b911e76d2856d68cf6cf394185
</pre><a href="#section-a.2-8" class="pilcrow"></a>
</div>
</section>
Expand All @@ -3418,7 +3418,7 @@ <h2 id="name-server-initial">
number encoding for a packet number of 1:<a href="#section-a.3-3" class="pilcrow"></a></p>
<div class="artwork art-text alignLeft" id="section-a.3-4">
<pre>
c1ff00001b0008f067a5502a4262b50040740001
c1ff00001c0008f067a5502a4262b50040740001
</pre><a href="#section-a.3-4" class="pilcrow"></a>
</div>
<p id="section-a.3-5">As a result, after protection, the header protection sample is taken starting
Expand All @@ -3427,17 +3427,17 @@ <h2 id="name-server-initial">
<pre>
sample = 7002596f99ae67abf65a5852f54f58c3
mask = 38168a0c25
header = c9ff00001b0008f067a5502a4262b5004074168b
header = c9ff00001c0008f067a5502a4262b5004074168b
</pre><a href="#section-a.3-6" class="pilcrow"></a>
</div>
<p id="section-a.3-7">The final protected packet is then:<a href="#section-a.3-7" class="pilcrow"></a></p>
<div class="artwork art-text alignLeft" id="section-a.3-8">
<pre>
c9ff00001b0008f067a5502a4262b500 4074168bf22b7002596f99ae67abf65a
c9ff00001c0008f067a5502a4262b500 4074168bf22b7002596f99ae67abf65a
5852f54f58c37c808682e2e40492d8a3 899fb04fc0afe9aabc8767b18a0aa493
537426373b48d502214dd856d63b78ce e37bc664b3fe86d487ac7a77c53038a3
cd32f0b5004d9f5754c4f7f2d1f35cf3 f7116351c92bd8c3a9528d2b6aca20f0
8047d9f017f0
cd32f0b5004d9f5754c4f7f2d1f35cf3 f7116351c92bda5b23c81034ab74f54c
b1bd72951256
</pre><a href="#section-a.3-8" class="pilcrow"></a>
</div>
</section>
Expand All @@ -3453,8 +3453,8 @@ <h2 id="name-retry">
included in the final Retry packet:<a href="#section-a.4-1" class="pilcrow"></a></p>
<div class="artwork art-text alignLeft" id="section-a.4-2">
<pre>
ffff00001b0008f067a5502a4262b574 6f6b656ea523cb5ba524695f6569f293
a1359d8e
ffff00001c0008f067a5502a4262b574 6f6b656ef71a5f12afe3ecf8001a920e
6fdf1d63
</pre><a href="#section-a.4-2" class="pilcrow"></a>
</div>
</section>
Expand Down
22 changes: 11 additions & 11 deletions draft-ietf-quic-tls.txt
Expand Up @@ -2589,7 +2589,7 @@ Internet-Draft Using TLS to Secure QUIC May 2020
The unprotected header includes the connection ID and a 4 byte packet
number encoding for a packet number of 2:

c3ff00001b088394c8f03e5157080000449e00000002
c3ff00001c088394c8f03e5157080000449e00000002

Protecting the payload produces output that is sampled for header
protection. Because the header uses a 4 byte packet number encoding,
Expand All @@ -2605,7 +2605,7 @@ Internet-Draft Using TLS to Secure QUIC May 2020
= c0
header[18..21] ^= mask[1..4]
= 3b343aa8
header = c0ff00001b088394c8f03e5157080000449e3b343aa8
header = c0ff00001c088394c8f03e5157080000449e3b343aa8

The resulting protected packet is:

Expand Down Expand Up @@ -2634,7 +2634,7 @@ Thomson & Turner Expires 20 November 2020 [Page 47]
Internet-Draft Using TLS to Secure QUIC May 2020


c0ff00001b088394c8f03e5157080000 449e3b343aa8535064a4268a0d9d7b1c
c0ff00001c088394c8f03e5157080000 449e3b343aa8535064a4268a0d9d7b1c
9d250ae355162276e9b1e3011ef6bbc0 ab48ad5bcc2681e953857ca62becd752
4daac473e68d7405fbba4e9ee616c870 38bdbe908c06d9605d9ac49030359eec
b1d05a14e117db8cede2bb09d0dbbfee 271cb374d8f10abec82d0f59a1dee29f
Expand Down Expand Up @@ -2671,7 +2671,7 @@ Internet-Draft Using TLS to Secure QUIC May 2020
cd191a58829104d6075c5594f627ca50 6bf181daec940f4a4f3af0074eee89da
acde6758312622d4fa675b39f728e062 d2bee680d8f41a597c262648bb18bcfc
13c8b3d97b1a77b2ac3af745d61a34cc 4709865bac824a94bb19058015e4e42d
38d3b779d72edc00c5cd088eff802b05
ea5388b911e76d2856d68cf6cf394185

A.3. Server Initial

Expand All @@ -2693,22 +2693,22 @@ Internet-Draft Using TLS to Secure QUIC May 2020
The header from the server includes a new connection ID and a 2-byte
packet number encoding for a packet number of 1:

c1ff00001b0008f067a5502a4262b50040740001
c1ff00001c0008f067a5502a4262b50040740001

As a result, after protection, the header protection sample is taken
starting from the third protected octet:

sample = 7002596f99ae67abf65a5852f54f58c3
mask = 38168a0c25
header = c9ff00001b0008f067a5502a4262b5004074168b
header = c9ff00001c0008f067a5502a4262b5004074168b

The final protected packet is then:

c9ff00001b0008f067a5502a4262b500 4074168bf22b7002596f99ae67abf65a
c9ff00001c0008f067a5502a4262b500 4074168bf22b7002596f99ae67abf65a
5852f54f58c37c808682e2e40492d8a3 899fb04fc0afe9aabc8767b18a0aa493
537426373b48d502214dd856d63b78ce e37bc664b3fe86d487ac7a77c53038a3
cd32f0b5004d9f5754c4f7f2d1f35cf3 f7116351c92bd8c3a9528d2b6aca20f0
8047d9f017f0
cd32f0b5004d9f5754c4f7f2d1f35cf3 f7116351c92bda5b23c81034ab74f54c
b1bd72951256

A.4. Retry

Expand All @@ -2717,8 +2717,8 @@ A.4. Retry
client-chosen connection ID value of 0x8394c8f03e515708, but that
value is not included in the final Retry packet:

ffff00001b0008f067a5502a4262b574 6f6b656ea523cb5ba524695f6569f293
a1359d8e
ffff00001c0008f067a5502a4262b574 6f6b656ef71a5f12afe3ecf8001a920e
6fdf1d63

Appendix B. Change Log

Expand Down

0 comments on commit a0675fa

Please sign in to comment.