[CFRG] [Editorial Errata Reported] RFC9180 (7932)

RFC Errata System <rfc-editor@rfc-editor.org> Fri, 10 May 2024 19:30 UTC

Return-Path: <wwwrun@rfcpa.amsl.com>
X-Original-To: cfrg@ietfa.amsl.com
Delivered-To: cfrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C5988C14F5ED; Fri, 10 May 2024 12:30:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.648
X-Spam-Level:
X-Spam-Status: No, score=-1.648 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GZbrdGX5tvb5; Fri, 10 May 2024 12:30:00 -0700 (PDT)
Received: from rfcpa.amsl.com (rfcpa.amsl.com [50.223.129.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F1E48C1D5C72; Fri, 10 May 2024 12:29:59 -0700 (PDT)
Received: by rfcpa.amsl.com (Postfix, from userid 499) id BFCE6F5D50; Fri, 10 May 2024 12:29:59 -0700 (PDT)
To: rfc-editor@rfc-editor.org, irsg@irtf.org, cfrg@irtf.org
From: RFC Errata System <rfc-editor@rfc-editor.org>
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20240510192959.BFCE6F5D50@rfcpa.amsl.com>
Date: Fri, 10 May 2024 12:29:59 -0700
Message-ID-Hash: 4X5CKHCAAHRHBGHEL5O4EFPELBCMGGLT
X-Message-ID-Hash: 4X5CKHCAAHRHBGHEL5O4EFPELBCMGGLT
X-MailFrom: wwwrun@rfcpa.amsl.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-cfrg.irtf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: raul@guardedbox.es, karthikeyan.bhargavan@inria.fr
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [CFRG] [Editorial Errata Reported] RFC9180 (7932)
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/cfrg/0wb0uDAYm_ggYNn3dzto3dDZWhw>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cfrg>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Owner: <mailto:cfrg-owner@irtf.org>
List-Post: <mailto:cfrg@irtf.org>
List-Subscribe: <mailto:cfrg-join@irtf.org>
List-Unsubscribe: <mailto:cfrg-leave@irtf.org>

The following errata report has been submitted for RFC9180,
"Hybrid Public Key Encryption".

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid7932

--------------------------------------
Type: Editorial
Reported by: Raul Siles <raul@guardedbox.es>

Section: 5.2 - last paragraph

Original Text
-------------
(In the pseudocode below,

Corrected Text
--------------
(In the pseudocode above,

Notes
-----
The Context<ROLE>.IncrementSeq() pseudocode has already been provided before the last paragraph of section 5.2.

Instructions:
-------------
This erratum is currently posted as "Reported". (If it is spam, it 
will be removed shortly by the RFC Production Center.) Please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
will log in to change the status and edit the report, if necessary.

--------------------------------------
RFC9180 (draft-irtf-cfrg-hpke-12)
--------------------------------------
Title               : Hybrid Public Key Encryption
Publication Date    : February 2022
Author(s)           : R. Barnes, K. Bhargavan, B. Lipp, C. Wood
Category            : INFORMATIONAL
Source              : Crypto Forum Research Group
Stream              : IRTF
Verifying Party     : IRSG