@@ -391,13 +391,13 @@ The type of the Sub SA Key Derivation Function transform is <TBA2>.
391
391
392
392
*** New Transform IDs for Sequence Numbers Transform Type
393
393
394
- This document defines two new Transfor IDs for the Sequence Numbers
395
- transform type: 64-bit Sequential Numbers (<TBD4>) and None (<TBD5>).
394
+ This document defines two new Transform IDs for the Sequence Numbers
395
+ transform type: ~ 64-bit Sequential Numbers~ (<TBD4>) and ~ None~ (<TBD5>).
396
396
397
397
To enable presence of sequence numbers in the EESP header the
398
398
initiator MUST propose SN = (64-bit Sequential Numbers) in the
399
399
Proposal Substructure inside the Security Association (SA) payload.
400
- When the responder selects 64-bit Sequential Numbers, Sequence Number
400
+ When the responder selects 64-bit Sequential Numbers, the Sequence Number
401
401
field is included into the EESP header, that allows peers to
402
402
achieve replay protection.
403
403
@@ -441,7 +441,7 @@ context of EESPv0.
441
441
# [VS] In addition, that document must request IANA to add a column
442
442
# [VS] "EESPv0 Reference" to the ENCR Transform IDs registry.
443
443
444
- Note, that 64-bit Sequential Numbers and None transform IDs are
444
+ Note, that ~ 64-bit Sequential Numbers~ and ~ None~ transform IDs are
445
445
unspecified for ESP and MUST NOT be used in ESP proposals.
446
446
On the other hand, currently defined transform IDs for the
447
447
Sequence Numbers transform type (32-bit Sequential Numbers and
@@ -452,7 +452,7 @@ Implemenattions MUST ignore transforms containing invalid
452
452
values for the current proposal (as if they are unrecognized,
453
453
in accordance with Section 3.3.6 of [[RFC7296]]).
454
454
455
- The use of the None Transform ID for the SN tranform
455
+ The use of the None Transform ID for the SN transform
456
456
if further limited by the ENCR transform. In particular,
457
457
if the selected ENCR transform defines use of implicit IV
458
458
(as transforms defined in [[RFC8750]]), then the value None MUST NOT
@@ -607,7 +607,7 @@ outbound EESP SAs of the Child SA are done as described in section
607
607
608
608
If an SSKDF is selected as part of the proposal, instead of directly
609
609
taking keys for the Sub SAs from KEYMAT, as described in section 2.17
610
- of [[RFC7296]], only one " root" key is taken for each EESP SA of the
610
+ of [[RFC7296]], only one ~ root~ key is taken for each EESP SA of the
611
611
Child SA. Their length is determined by the key size of the
612
612
negotiated SSKDF. The root key for the EESP SA carrying data from
613
613
the initiator to the responder is taken before that for the SA going
0 commit comments