From cc2bf6ebabc910a07942abb394013cbea8e70990 Mon Sep 17 00:00:00 2001 From: zzz <zzz@mail.i2p> Date: Tue, 21 May 2019 18:46:14 +0000 Subject: [PATCH] references --- i2p2www/spec/proposals/151-ecdsa-blinding.rst | 12 ++++++++++-- 1 file changed, 10 insertions(+), 2 deletions(-) diff --git a/i2p2www/spec/proposals/151-ecdsa-blinding.rst b/i2p2www/spec/proposals/151-ecdsa-blinding.rst index 48c439b85..86bf5bb7c 100644 --- a/i2p2www/spec/proposals/151-ecdsa-blinding.rst +++ b/i2p2www/spec/proposals/151-ecdsa-blinding.rst @@ -72,8 +72,8 @@ HKDF(salt, ikm, info, n) of length 32 bytes, and a context-specific 'info' value, and produces an output of n bytes suitable for use as key material. - Use HKDF as specified in [RFC-5869], using the HMAC hash function SHA-256 - as specified in [RFC-2104]. This means that SALT_LEN is 32 bytes max. + Use HKDF as specified in [RFC-5869]_, using the HMAC hash function SHA-256 + as specified in [RFC-2104]_. This means that SALT_LEN is 32 bytes max. Blinding Calculations @@ -140,3 +140,11 @@ ECDSA's public key is (X,Y) pair, so for P256, for example, it's 64 bytes, rathe Either b33 address will be longer, or public key can be stored in compressed format like in bitcoin wallets. +References +========== + +.. [RFC-2104] + https://tools.ietf.org/html/rfc2104 + +.. [RFC-5869] + https://tools.ietf.org/html/rfc5869 -- GitLab