Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix TLS presentation language types #507

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
20 changes: 10 additions & 10 deletions draft-ietf-privacypass-auth-scheme.md
Original file line number Diff line number Diff line change
Expand Up @@ -190,7 +190,7 @@ The default TokenChallenge message has the following structure:

~~~
struct {
uint16_t token_type;
uint16 token_type;
opaque issuer_name<1..2^16-1>;
opaque redemption_context<0..32>;
opaque origin_info<0..2^16-1>;
Expand Down Expand Up @@ -400,11 +400,11 @@ The default Token message has the following structure:

~~~
struct {
uint16_t token_type;
uint8_t nonce[32];
uint8_t challenge_digest[32];
uint8_t token_key_id[Nid];
uint8_t authenticator[Nk];
uint16 token_type;
uint8 nonce[32];
uint8 challenge_digest[32];
uint8 token_key_id[Nid];
uint8 authenticator[Nk];
} Token;
~~~

Expand Down Expand Up @@ -476,10 +476,10 @@ protocol corresponding to the token type with the following value as the input:

~~~
struct {
uint16_t token_type;
uint8_t nonce[32];
uint8_t challenge_digest[32];
uint8_t token_key_id[Nid];
uint16 token_type;
uint8 nonce[32];
uint8 challenge_digest[32];
uint8 token_key_id[Nid];
} AuthenticatorInput;
~~~

Expand Down
38 changes: 19 additions & 19 deletions draft-ietf-privacypass-protocol.md
Original file line number Diff line number Diff line change
Expand Up @@ -340,9 +340,9 @@ The Client then creates a TokenRequest structured as follows:

~~~
struct {
uint16_t token_type = 0x0001; /* Type VOPRF(P-384, SHA-384) */
uint8_t truncated_token_key_id;
uint8_t blinded_msg[Ne];
uint16 token_type = 0x0001; /* Type VOPRF(P-384, SHA-384) */
uint8 truncated_token_key_id;
uint8 blinded_msg[Ne];
} TokenRequest;
~~~

Expand Down Expand Up @@ -408,8 +408,8 @@ structured as follows:

~~~
struct {
uint8_t evaluate_msg[Ne];
uint8_t evaluate_proof[Ns+Ns];
uint8 evaluate_msg[Ne];
uint8 evaluate_proof[Ns+Ns];
} TokenResponse;
~~~

Expand Down Expand Up @@ -454,11 +454,11 @@ succeeds, the Client then constructs a Token as follows:

~~~
struct {
uint16_t token_type = 0x0001; /* Type VOPRF(P-384, SHA-384) */
uint8_t nonce[32];
uint8_t challenge_digest[32];
uint8_t token_key_id[32];
uint8_t authenticator[Nk];
uint16 token_type = 0x0001; /* Type VOPRF(P-384, SHA-384) */
uint8 nonce[32];
uint8 challenge_digest[32];
uint8 token_key_id[32];
uint8 authenticator[Nk];
} Token;
~~~

Expand Down Expand Up @@ -580,9 +580,9 @@ The Client then creates a TokenRequest structured as follows:

~~~
struct {
uint16_t token_type = 0x0002; /* Type Blind RSA (2048-bit) */
uint8_t truncated_token_key_id;
uint8_t blinded_msg[Nk];
uint16 token_type = 0x0002; /* Type Blind RSA (2048-bit) */
uint8 truncated_token_key_id;
uint8 blinded_msg[Nk];
} TokenRequest;
~~~

Expand Down Expand Up @@ -637,7 +637,7 @@ TokenResponse structure:

~~~
struct {
uint8_t blind_sig[Nk];
uint8 blind_sig[Nk];
} TokenResponse;
~~~

Expand Down Expand Up @@ -669,11 +669,11 @@ follows:

~~~
struct {
uint16_t token_type = 0x0002; /* Type Blind RSA (2048-bit) */
uint8_t nonce[32];
uint8_t challenge_digest[32];
uint8_t token_key_id[32];
uint8_t authenticator[Nk];
uint16 token_type = 0x0002; /* Type Blind RSA (2048-bit) */
uint8 nonce[32];
uint8 challenge_digest[32];
uint8 token_key_id[32];
uint8 authenticator[Nk];
} Token;
~~~

Expand Down
Loading