|
@@ -1,11 +1,12 @@
|
|
|
-/*! The encrypted table of bridges. The table consists of a number of
|
|
|
- * buckets, each holding some number (currently up to 3) of bridges.
|
|
|
- * Each bucket is individually encrypted with a bucket key. Users will
|
|
|
- * have a credential containing a bucket (number, key) combination, and
|
|
|
- * so will be able to read one of the buckets. Users will either
|
|
|
- * download the whole encrypted bucket list or use PIR to download a
|
|
|
- * piece of it, so that the bridge authority does not learn which bucket
|
|
|
- * the user has access to. */
|
|
|
+/*! The encrypted table of bridges.
|
|
|
+
|
|
|
+The table consists of a number of buckets, each holding some number
|
|
|
+(currently up to 3) of bridges. Each bucket is individually encrypted
|
|
|
+with a bucket key. Users will have a credential containing a bucket
|
|
|
+(number, key) combination, and so will be able to read one of the
|
|
|
+buckets. Users will either download the whole encrypted bucket list or
|
|
|
+use PIR to download a piece of it, so that the bridge authority does not
|
|
|
+learn which bucket the user has access to. */
|
|
|
|
|
|
use aes_gcm::aead;
|
|
|
use aes_gcm::aead::{generic_array::GenericArray, Aead, NewAead};
|