Changes

96 bytes added ,  17:55, 22 December 2009
no edit summary
Line 18: Line 18:     
After decrypting the trailblock, xx is always 0x3A, and yy is the size of the ES block (excluding the trail block). It is assumed that qq is a MAC (Message Authentication Code), used to verify the contents of the ES block after decryption, but this has not been verified yet.
 
After decrypting the trailblock, xx is always 0x3A, and yy is the size of the ES block (excluding the trail block). It is assumed that qq is a MAC (Message Authentication Code), used to verify the contents of the ES block after decryption, but this has not been verified yet.
 +
 +
The same 12-byte nonce from the trailblock is again used to decrypt the whole ES block itself.
    
Data larger than 0x20000 bytes is split into multiple ES blocks, each with their own trailblock.
 
Data larger than 0x20000 bytes is split into multiple ES blocks, each with their own trailblock.
143

edits