@@ -252,9 +252,7 @@ The Flags field in the fixed Base Header is defined as follows:
252252#+end_src
253253
254254- Packet Format (F) :: 1 bit: Set to zero for full EESP packet Format (i.e., the EESP header includes the
255- ~Payload Info Header~), set to 1 for Optimized EESP Packet format. This bit
256- MAY be only set to 1 if the Crypt Offset is positive. It MUST be set to
257- 0 otherwise.
255+ ~Payload Info Header~), set to 1 for Optimized EESP Packet format.
258256- Reserved (RR) :: 2 bits: Reserved for future versions, MUST be set to 00,
259257 and ignored by the receiver.
260258
@@ -502,18 +500,22 @@ generation and consumption of padding.
502500# computation applies to the Payload Data.
503501
504502If Padding bytes are needed but the algorithm does not
505- specify the padding contents, then the following default processing
506- MUST be used. The default processing follows exactly ESP as of [[RFC4303]].
507- The Padding bytes are initialized with a series of
508- (unsigned, 1-byte) integer values. The first padding byte appended
509- to the plaintext is numbered 1, with subsequent padding bytes making
510- up a monotonically increasing sequence: 1, 2, 3, .... When this
511- padding scheme is employed, the receiver SHOULD inspect the Padding
512- field. (This scheme was selected because of its relative simplicity,
513- ease of implementation in hardware, and because it offers limited
514- protection against certain forms of "cut and paste" attacks in the
515- absence of other integrity measures, if the receiver checks the
516- padding values upon decryption.)
503+ specify the padding contents, then the Padding bytes
504+ MUST be set to 0.
505+
506+ # then the following default processing
507+ # MUST be used.
508+ # The default processing follows exactly ESP as of [[RFC4303]].
509+ # The Padding bytes are initialized with a series of
510+ # (unsigned, 1-byte) integer values. The first padding byte appended
511+ # to the plaintext is numbered 1, with subsequent padding bytes making
512+ # up a monotonically increasing sequence: 1, 2, 3, .... When this
513+ # padding scheme is employed, the receiver SHOULD inspect the Padding
514+ # field. (This scheme was selected because of its relative simplicity,
515+ # ease of implementation in hardware, and because it offers limited
516+ # protection against certain forms of "cut and paste" attacks in the
517+ # absence of other integrity measures, if the receiver checks the
518+ # padding values upon decryption.)
517519
518520If an algorithm imposes constraints on
519521the values of the bytes used for padding, they MUST be specified by
0 commit comments