Skip to content

Commit c5b41c3

Browse files
committed
Remove underscores
1 parent 97796cb commit c5b41c3

File tree

1 file changed

+17
-14
lines changed

1 file changed

+17
-14
lines changed

draft-ietf-quic-tls.md

Lines changed: 17 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -780,9 +780,9 @@ an empty context. The size of the secret MUST be the size of the hash output
780780
for the PRF hash function negotiated by TLS.
781781

782782
~~~
783-
client_pp_secret_0 =
783+
client_pp_secret<0> =
784784
TLS-Exporter("EXPORTER-QUIC client 1rtt", "", Hash.length)
785-
server_pp_secret_0 =
785+
server_pp_secret<0> =
786786
TLS-Exporter("EXPORTER-QUIC server 1rtt", "", Hash.length)
787787
~~~
788788

@@ -799,10 +799,10 @@ secret. A Label parameter of "client 1rtt" is used for the client secret and
799799
the PRF hash function.
800800

801801
~~~
802-
client_pp_secret_<N+1> =
803-
QHKDF-Expand(client_pp_secret_<N>, "client 1rtt", Hash.length)
804-
server_pp_secret_<N+1> =
805-
QHKDF-Expand(server_pp_secret_<N>, "server 1rtt", Hash.length)
802+
client_pp_secret<N+1> =
803+
QHKDF-Expand(client_pp_secret<N>, "client 1rtt", Hash.length)
804+
server_pp_secret<N+1> =
805+
QHKDF-Expand(server_pp_secret<N>, "server 1rtt", Hash.length)
806806
~~~
807807

808808
This allows for a succession of new secrets to be created as needed.
@@ -816,8 +816,8 @@ HKDF-Expand-Label. QUIC uses the AEAD function negotiated by TLS.
816816
The packet protection key and IV used to protect the 0-RTT packets sent by a
817817
client are derived from the QUIC 0-RTT secret. The packet protection keys and
818818
IVs for 1-RTT packets sent by the client and server are derived from the current
819-
generation of client and server 1-RTT secrets (client_pp_secret_\<i> and
820-
server_pp_secret_\<i>) respectively.
819+
generation of client and server 1-RTT secrets (client_pp_secret\<i> and
820+
server_pp_secret\<i>) respectively.
821821

822822
The length of the QHKDF-Expand output is determined by the requirements of the
823823
AEAD function selected by TLS. The key length is the AEAD key size. As defined
@@ -833,12 +833,15 @@ key = QHKDF-Expand(S, "key", key_length)
833833
iv = QHKDF-Expand(S, "iv", iv_length)
834834
~~~
835835

836-
For example, client packet protection keys and IVs for AEAD_AES_128_GCM are
836+
Separate keys are derived for packet protection by clients and servers. Each
837+
endpoint uses the packet protection key of its peer to remove packet protection.
838+
For example, client packet protection keys and IVs - which are also used by the
839+
server to remove the protection added by a client - for AEAD_AES_128_GCM are
837840
derived from 1-RTT secrets as follows:
838841

839842
~~~
840-
client_pp_key_<i> = QHKDF-Expand(client_pp_secret_<i>, "key", 16)
841-
client_pp_iv_<i> = QHKDF-Expand(client_pp_secret_<i>, "iv", 12)
843+
client_pp_key<i> = QHKDF-Expand(client_pp_secret<i>, "key", 16)
844+
client_pp_iv<i> = QHKDF-Expand(client_pp_secret<i>, "iv", 12)
842845
~~~
843846

844847
The QUIC record protection initially starts with keying material derived from
@@ -870,12 +873,12 @@ input.
870873
Once TLS has provided a key, the contents of regular QUIC packets immediately
871874
after any TLS messages have been sent are protected by the AEAD selected by TLS.
872875

873-
The key, K, is either the client packet protection key (client_pp_key_\<i>) or
874-
the server packet protection key (server_pp_key_\<i>), derived as defined in
876+
The key, K, is either the client packet protection key (client_pp_key\<i>) or
877+
the server packet protection key (server_pp_key\<i>), derived as defined in
875878
{{key-expansion}}.
876879

877880
The nonce, N, is formed by combining the packet protection IV (either
878-
client_pp_iv_\<i\> or server_pp_iv_\<i\>) with the packet number. The 64 bits
881+
client_pp_iv\<i\> or server_pp_iv\<i\>) with the packet number. The 64 bits
879882
of the reconstructed QUIC packet number in network byte order is left-padded
880883
with zeros to the size of the IV. The exclusive OR of the padded packet number
881884
and the IV forms the AEAD nonce.

0 commit comments

Comments
 (0)