diff --git a/i2p2www/pages/site/docs/spec/common-structures.html b/i2p2www/pages/site/docs/spec/common-structures.html index eeee8ea7..7d5c48fd 100644 --- a/i2p2www/pages/site/docs/spec/common-structures.html +++ b/i2p2www/pages/site/docs/spec/common-structures.html @@ -518,7 +518,7 @@ Defines the way to uniquely identify a particular router | certificate | +----+----+----+-// -public_key :: `PublicKey` +public_key :: `PublicKey` (partial or full) length -> 256 bytes or as specified in key certificate padding :: random data @@ -586,11 +586,11 @@ public_key :: `PublicKey` (partial or full) padding :: random data length -> 0 bytes or as specified in key certificate - padding length + signing_public_key_length == 128 bytes + padding length + signing_public_key length == 128 bytes signing_public_key :: `SigningPublicKey` (partial or full) length -> 128 bytes or as specified in key certificate - padding length + signing_public_key_length == 128 bytes + padding length + signing_public_key length == 128 bytes certificate :: `Certificate` length -> >= 3 bytes @@ -843,6 +843,8 @@ As of release 0.9.3, the expiration is assumed zero and not stored, so any non-z will fail in the RouterInfo signature verification. Implementing expiration (or another use for these bytes) will be a backwards-incompatible change. Routers MUST set this field to all zeros. +As of release 0.9.12, a non-zero expiration field is again recognized, however we must wait +several releases to use this field, until the vast majority of the network recognizes it. {%- endtrans %}
{% trans transports=site_url('docs/transport'), ssu=site_url('docs/transport/ssu') -%} @@ -473,6 +473,9 @@ A check info connection will receive 256 bytes containing:
{% trans -%} +Check connection is completely disabled as of release 0.9.12. +{%- endtrans %}
{% trans ntcpdisc=site_url('docs/discussions/ntcp') -%} @@ -502,9 +505,6 @@ Can the establishment messages be randomly padded somehow, to frustrate identification of I2P traffic based on initial packet sizes? {%- endtrans %} -