@@ -391,13 +391,13 @@ The type of the Sub SA Key Derivation Function transform is <TBA2>.
391391
392392*** New Transform IDs for Sequence Numbers Transform Type
393393
394- This document defines two new Transfor IDs for the Sequence Numbers
395- transform type: 64-bit Sequential Numbers (<TBD4>) and None (<TBD5>).
394+ This document defines two new Transform IDs for the Sequence Numbers
395+ transform type: ~ 64-bit Sequential Numbers~ (<TBD4>) and ~ None~ (<TBD5>).
396396
397397To enable presence of sequence numbers in the EESP header the
398398initiator MUST propose SN = (64-bit Sequential Numbers) in the
399399Proposal Substructure inside the Security Association (SA) payload.
400- When the responder selects 64-bit Sequential Numbers, Sequence Number
400+ When the responder selects 64-bit Sequential Numbers, the Sequence Number
401401field is included into the EESP header, that allows peers to
402402achieve replay protection.
403403
@@ -441,7 +441,7 @@ context of EESPv0.
441441# [VS] In addition, that document must request IANA to add a column
442442# [VS] "EESPv0 Reference" to the ENCR Transform IDs registry.
443443
444- Note, that 64-bit Sequential Numbers and None transform IDs are
444+ Note, that ~ 64-bit Sequential Numbers~ and ~ None~ transform IDs are
445445unspecified for ESP and MUST NOT be used in ESP proposals.
446446On the other hand, currently defined transform IDs for the
447447Sequence Numbers transform type (32-bit Sequential Numbers and
@@ -452,7 +452,7 @@ Implemenattions MUST ignore transforms containing invalid
452452values for the current proposal (as if they are unrecognized,
453453in accordance with Section 3.3.6 of [[RFC7296]]).
454454
455- The use of the None Transform ID for the SN tranform
455+ The use of the None Transform ID for the SN transform
456456if further limited by the ENCR transform. In particular,
457457if the selected ENCR transform defines use of implicit IV
458458(as transforms defined in [[RFC8750]]), then the value None MUST NOT
@@ -607,7 +607,7 @@ outbound EESP SAs of the Child SA are done as described in section
607607
608608If an SSKDF is selected as part of the proposal, instead of directly
609609taking keys for the Sub SAs from KEYMAT, as described in section 2.17
610- of [[RFC7296]], only one " root" key is taken for each EESP SA of the
610+ of [[RFC7296]], only one ~ root~ key is taken for each EESP SA of the
611611Child SA. Their length is determined by the key size of the
612612negotiated SSKDF. The root key for the EESP SA carrying data from
613613the initiator to the responder is taken before that for the SA going
0 commit comments